<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-15T05:45:35</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:93668" version="1" class="patch">
	<metadata>
		<title>389-ds-3.0.6~git86.dce421a0d-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-8105" ref_url="https://www.suse.com/security/cve/CVE-2014-8105/" source="CVE"/>
		<reference ref_id="CVE-2014-8112" ref_url="https://www.suse.com/security/cve/CVE-2014-8112/" source="CVE"/>
		<reference ref_id="CVE-2015-1854" ref_url="https://www.suse.com/security/cve/CVE-2015-1854/" source="CVE"/>
		<reference ref_id="CVE-2015-3230" ref_url="https://www.suse.com/security/cve/CVE-2015-3230/" source="CVE"/>
		<reference ref_id="CVE-2016-4992" ref_url="https://www.suse.com/security/cve/CVE-2016-4992/" source="CVE"/>
		<reference ref_id="CVE-2016-5416" ref_url="https://www.suse.com/security/cve/CVE-2016-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-15134" ref_url="https://www.suse.com/security/cve/CVE-2017-15134/" source="CVE"/>
		<reference ref_id="CVE-2017-15135" ref_url="https://www.suse.com/security/cve/CVE-2017-15135/" source="CVE"/>
		<reference ref_id="CVE-2018-1054" ref_url="https://www.suse.com/security/cve/CVE-2018-1054/" source="CVE"/>
		<reference ref_id="CVE-2018-10850" ref_url="https://www.suse.com/security/cve/CVE-2018-10850/" source="CVE"/>
		<reference ref_id="CVE-2018-10871" ref_url="https://www.suse.com/security/cve/CVE-2018-10871/" source="CVE"/>
		<reference ref_id="CVE-2018-1089" ref_url="https://www.suse.com/security/cve/CVE-2018-1089/" source="CVE"/>
		<reference ref_id="CVE-2018-10935" ref_url="https://www.suse.com/security/cve/CVE-2018-10935/" source="CVE"/>
		<reference ref_id="CVE-2018-14624" ref_url="https://www.suse.com/security/cve/CVE-2018-14624/" source="CVE"/>
		<reference ref_id="CVE-2018-14638" ref_url="https://www.suse.com/security/cve/CVE-2018-14638/" source="CVE"/>
		<reference ref_id="CVE-2018-14648" ref_url="https://www.suse.com/security/cve/CVE-2018-14648/" source="CVE"/>
		<reference ref_id="CVE-2019-14824" ref_url="https://www.suse.com/security/cve/CVE-2019-14824/" source="CVE"/>
		<reference ref_id="CVE-2019-3883" ref_url="https://www.suse.com/security/cve/CVE-2019-3883/" source="CVE"/>
		<reference ref_id="CVE-2021-3652" ref_url="https://www.suse.com/security/cve/CVE-2021-3652/" source="CVE"/>
		<reference ref_id="CVE-2021-4091" ref_url="https://www.suse.com/security/cve/CVE-2021-4091/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="CVE-2022-1949" ref_url="https://www.suse.com/security/cve/CVE-2022-1949/" source="CVE"/>
		<reference ref_id="CVE-2022-2850" ref_url="https://www.suse.com/security/cve/CVE-2022-2850/" source="CVE"/>
		<reference ref_id="CVE-2024-1062" ref_url="https://www.suse.com/security/cve/CVE-2024-1062/" source="CVE"/>
		<reference ref_id="CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199/" source="CVE"/>
		<reference ref_id="CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657/" source="CVE"/>
		<reference ref_id="CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953/" source="CVE"/>
		<reference ref_id="CVE-2024-6237" ref_url="https://www.suse.com/security/cve/CVE-2024-6237/" source="CVE"/>
		<reference ref_id="CVE-2025-2487" ref_url="https://www.suse.com/security/cve/CVE-2025-2487/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-3.0.6~git86.dce421a0d-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8105/">CVE-2014-8105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8105">CVE-2014-8105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8112/">CVE-2014-8112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8112">CVE-2014-8112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1854/">CVE-2015-1854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1854">CVE-2015-1854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3230/">CVE-2015-3230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3230">CVE-2015-3230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4992/">CVE-2016-4992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4992">CVE-2016-4992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5416/">CVE-2016-5416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5416">CVE-2016-5416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15134/">CVE-2017-15134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15134">CVE-2017-15134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15135/">CVE-2017-15135 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15135">CVE-2017-15135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1054/">CVE-2018-1054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1054">CVE-2018-1054 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10850/">CVE-2018-10850 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10850">CVE-2018-10850 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10871/">CVE-2018-10871 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10871">CVE-2018-10871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1089/">CVE-2018-1089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1089">CVE-2018-1089 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10935/">CVE-2018-10935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10935">CVE-2018-10935 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14624/">CVE-2018-14624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14624">CVE-2018-14624 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14638/">CVE-2018-14638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14638">CVE-2018-14638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14648/">CVE-2018-14648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14648">CVE-2018-14648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14824/">CVE-2019-14824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14824">CVE-2019-14824 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3883/">CVE-2019-3883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3883">CVE-2019-3883 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3652/">CVE-2021-3652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3652">CVE-2021-3652 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4091/">CVE-2021-4091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4091">CVE-2021-4091 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0918">CVE-2022-0918 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0996">CVE-2022-0996 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1949/">CVE-2022-1949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1949">CVE-2022-1949 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2850/">CVE-2022-2850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2850">CVE-2022-2850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1062/">CVE-2024-1062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1062">CVE-2024-1062 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6237/">CVE-2024-6237 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6237">CVE-2024-6237 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2487/">CVE-2025-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2487">CVE-2025-2487 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025971" comment="389-ds-3.0.6~git86.dce421a0d-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025972" comment="389-ds-devel-3.0.6~git86.dce421a0d-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025973" comment="389-ds-snmp-3.0.6~git86.dce421a0d-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025974" comment="lib389-3.0.6~git86.dce421a0d-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025975" comment="libsvrcore0-3.0.6~git86.dce421a0d-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93669" version="1" class="patch">
	<metadata>
		<title>FastCGI-2.4.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-2766" ref_url="https://www.suse.com/security/cve/CVE-2011-2766/" source="CVE"/>
		<reference ref_id="CVE-2025-23016" ref_url="https://www.suse.com/security/cve/CVE-2025-23016/" source="CVE"/>
		<description>
These are all security issues fixed in the FastCGI-2.4.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2766/">CVE-2011-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2766">CVE-2011-2766 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23016/">CVE-2025-23016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23016">CVE-2025-23016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025977" comment="FastCGI-2.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025978" comment="FastCGI-devel-2.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025979" comment="libfcgi0-2.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025980" comment="perl-FCGI-2.4.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93670" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.1.2.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-4601" ref_url="https://www.suse.com/security/cve/CVE-2005-4601/" source="CVE"/>
		<reference ref_id="CVE-2006-0082" ref_url="https://www.suse.com/security/cve/CVE-2006-0082/" source="CVE"/>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11624" ref_url="https://www.suse.com/security/cve/CVE-2018-11624/" source="CVE"/>
		<reference ref_id="CVE-2018-11625" ref_url="https://www.suse.com/security/cve/CVE-2018-11625/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16641" ref_url="https://www.suse.com/security/cve/CVE-2018-16641/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974/" source="CVE"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977/" source="CVE"/>
		<reference ref_id="CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136/" source="CVE"/>
		<reference ref_id="CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298/" source="CVE"/>
		<reference ref_id="CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299/" source="CVE"/>
		<reference ref_id="CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302/" source="CVE"/>
		<reference ref_id="CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303/" source="CVE"/>
		<reference ref_id="CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304/" source="CVE"/>
		<reference ref_id="CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305/" source="CVE"/>
		<reference ref_id="CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306/" source="CVE"/>
		<reference ref_id="CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307/" source="CVE"/>
		<reference ref_id="CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308/" source="CVE"/>
		<reference ref_id="CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309/" source="CVE"/>
		<reference ref_id="CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711/" source="CVE"/>
		<reference ref_id="CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7396" ref_url="https://www.suse.com/security/cve/CVE-2019-7396/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27756" ref_url="https://www.suse.com/security/cve/CVE-2020-27756/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27758" ref_url="https://www.suse.com/security/cve/CVE-2020-27758/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599/" source="CVE"/>
		<reference ref_id="CVE-2021-20241" ref_url="https://www.suse.com/security/cve/CVE-2021-20241/" source="CVE"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<reference ref_id="CVE-2021-20311" ref_url="https://www.suse.com/security/cve/CVE-2021-20311/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<reference ref_id="CVE-2021-4219" ref_url="https://www.suse.com/security/cve/CVE-2021-4219/" source="CVE"/>
		<reference ref_id="CVE-2022-0284" ref_url="https://www.suse.com/security/cve/CVE-2022-0284/" source="CVE"/>
		<reference ref_id="CVE-2022-1114" ref_url="https://www.suse.com/security/cve/CVE-2022-1114/" source="CVE"/>
		<reference ref_id="CVE-2022-1115" ref_url="https://www.suse.com/security/cve/CVE-2022-1115/" source="CVE"/>
		<reference ref_id="CVE-2022-2719" ref_url="https://www.suse.com/security/cve/CVE-2022-2719/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<reference ref_id="CVE-2022-3213" ref_url="https://www.suse.com/security/cve/CVE-2022-3213/" source="CVE"/>
		<reference ref_id="CVE-2022-32545" ref_url="https://www.suse.com/security/cve/CVE-2022-32545/" source="CVE"/>
		<reference ref_id="CVE-2022-32546" ref_url="https://www.suse.com/security/cve/CVE-2022-32546/" source="CVE"/>
		<reference ref_id="CVE-2022-32547" ref_url="https://www.suse.com/security/cve/CVE-2022-32547/" source="CVE"/>
		<reference ref_id="CVE-2022-44267" ref_url="https://www.suse.com/security/cve/CVE-2022-44267/" source="CVE"/>
		<reference ref_id="CVE-2022-44268" ref_url="https://www.suse.com/security/cve/CVE-2022-44268/" source="CVE"/>
		<reference ref_id="CVE-2023-1289" ref_url="https://www.suse.com/security/cve/CVE-2023-1289/" source="CVE"/>
		<reference ref_id="CVE-2023-1906" ref_url="https://www.suse.com/security/cve/CVE-2023-1906/" source="CVE"/>
		<reference ref_id="CVE-2023-2157" ref_url="https://www.suse.com/security/cve/CVE-2023-2157/" source="CVE"/>
		<reference ref_id="CVE-2023-34151" ref_url="https://www.suse.com/security/cve/CVE-2023-34151/" source="CVE"/>
		<reference ref_id="CVE-2023-34153" ref_url="https://www.suse.com/security/cve/CVE-2023-34153/" source="CVE"/>
		<reference ref_id="CVE-2023-3428" ref_url="https://www.suse.com/security/cve/CVE-2023-3428/" source="CVE"/>
		<reference ref_id="CVE-2023-34474" ref_url="https://www.suse.com/security/cve/CVE-2023-34474/" source="CVE"/>
		<reference ref_id="CVE-2023-34475" ref_url="https://www.suse.com/security/cve/CVE-2023-34475/" source="CVE"/>
		<reference ref_id="CVE-2023-5341" ref_url="https://www.suse.com/security/cve/CVE-2023-5341/" source="CVE"/>
		<reference ref_id="CVE-2025-53014" ref_url="https://www.suse.com/security/cve/CVE-2025-53014/" source="CVE"/>
		<reference ref_id="CVE-2025-53015" ref_url="https://www.suse.com/security/cve/CVE-2025-53015/" source="CVE"/>
		<reference ref_id="CVE-2025-53019" ref_url="https://www.suse.com/security/cve/CVE-2025-53019/" source="CVE"/>
		<reference ref_id="CVE-2025-53101" ref_url="https://www.suse.com/security/cve/CVE-2025-53101/" source="CVE"/>
		<reference ref_id="CVE-2025-55004" ref_url="https://www.suse.com/security/cve/CVE-2025-55004/" source="CVE"/>
		<reference ref_id="CVE-2025-55005" ref_url="https://www.suse.com/security/cve/CVE-2025-55005/" source="CVE"/>
		<reference ref_id="CVE-2025-55154" ref_url="https://www.suse.com/security/cve/CVE-2025-55154/" source="CVE"/>
		<reference ref_id="CVE-2025-55160" ref_url="https://www.suse.com/security/cve/CVE-2025-55160/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.1.2.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4601/">CVE-2005-4601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4601">CVE-2005-4601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0082/">CVE-2006-0082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0082">CVE-2006-0082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5456">CVE-2006-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1667">CVE-2007-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1797">CVE-2007-1797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4985">CVE-2007-4985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4986">CVE-2007-4986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4987">CVE-2007-4987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-4988">CVE-2007-4988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0247">CVE-2012-0247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0248">CVE-2012-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1185">CVE-2012-1185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1186">CVE-2012-1186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11624/">CVE-2018-11624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11624">CVE-2018-11624 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11625/">CVE-2018-11625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11625">CVE-2018-11625 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16323">CVE-2018-16323 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16328">CVE-2018-16328 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16329">CVE-2018-16329 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16412">CVE-2018-16412 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16640">CVE-2018-16640 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16641/">CVE-2018-16641 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16641">CVE-2018-16641 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9135">CVE-2018-9135 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10650">CVE-2019-10650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11007">CVE-2019-11007 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11008">CVE-2019-11008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11470">CVE-2019-11470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11505">CVE-2019-11505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11506">CVE-2019-11506 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11597">CVE-2019-11597 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11598">CVE-2019-11598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12974">CVE-2019-12974 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12975">CVE-2019-12975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12976">CVE-2019-12976 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12977">CVE-2019-12977 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12978">CVE-2019-12978 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12979">CVE-2019-12979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13133">CVE-2019-13133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13134">CVE-2019-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13135">CVE-2019-13135 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13136">CVE-2019-13136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13137">CVE-2019-13137 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13295">CVE-2019-13295 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13296">CVE-2019-13296 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13297">CVE-2019-13297 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13298">CVE-2019-13298 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13299">CVE-2019-13299 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13300">CVE-2019-13300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13301">CVE-2019-13301 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13302">CVE-2019-13302 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13303">CVE-2019-13303 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13304">CVE-2019-13304 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13305">CVE-2019-13305 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13306">CVE-2019-13306 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13307">CVE-2019-13307 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13308">CVE-2019-13308 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13309">CVE-2019-13309 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13310">CVE-2019-13310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13311">CVE-2019-13311 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13391">CVE-2019-13391 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13454">CVE-2019-13454 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14980">CVE-2019-14980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14981">CVE-2019-14981 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15139">CVE-2019-15139 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15140">CVE-2019-15140 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15141">CVE-2019-15141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16708">CVE-2019-16708 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16709">CVE-2019-16709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16710">CVE-2019-16710 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16711">CVE-2019-16711 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16712">CVE-2019-16712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16713">CVE-2019-16713 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19948">CVE-2019-19948 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19949">CVE-2019-19949 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7395">CVE-2019-7395 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7396/">CVE-2019-7396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7396">CVE-2019-7396 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9956">CVE-2019-9956 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25674">CVE-2020-25674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25675">CVE-2020-25675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25676">CVE-2020-25676 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27560">CVE-2020-27560 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27756/">CVE-2020-27756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27756">CVE-2020-27756 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27757">CVE-2020-27757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27758/">CVE-2020-27758 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27758">CVE-2020-27758 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27762">CVE-2020-27762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27764">CVE-2020-27764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27766">CVE-2020-27766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27773">CVE-2020-27773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27774">CVE-2020-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27776">CVE-2020-27776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29599">CVE-2020-29599 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20241/">CVE-2021-20241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20241">CVE-2021-20241 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20243">CVE-2021-20243 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20244">CVE-2021-20244 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20246">CVE-2021-20246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20311/">CVE-2021-20311 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20311">CVE-2021-20311 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20312">CVE-2021-20312 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20313">CVE-2021-20313 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4219/">CVE-2021-4219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4219">CVE-2021-4219 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0284/">CVE-2022-0284 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0284">CVE-2022-0284 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1114/">CVE-2022-1114 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1114">CVE-2022-1114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1115/">CVE-2022-1115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1115">CVE-2022-1115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2719/">CVE-2022-2719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2719">CVE-2022-2719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3213/">CVE-2022-3213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3213">CVE-2022-3213 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32545/">CVE-2022-32545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32545">CVE-2022-32545 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32546/">CVE-2022-32546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32546">CVE-2022-32546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32547/">CVE-2022-32547 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32547">CVE-2022-32547 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44267/">CVE-2022-44267 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44267">CVE-2022-44267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-44268/">CVE-2022-44268 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44268">CVE-2022-44268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1289/">CVE-2023-1289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1289">CVE-2023-1289 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1906/">CVE-2023-1906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1906">CVE-2023-1906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2157/">CVE-2023-2157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2157">CVE-2023-2157 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34151/">CVE-2023-34151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34151">CVE-2023-34151 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34153/">CVE-2023-34153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34153">CVE-2023-34153 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3428/">CVE-2023-3428 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3428">CVE-2023-3428 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34474/">CVE-2023-34474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34474">CVE-2023-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34475/">CVE-2023-34475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34475">CVE-2023-34475 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5341/">CVE-2023-5341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5341">CVE-2023-5341 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53014/">CVE-2025-53014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53014">CVE-2025-53014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53015/">CVE-2025-53015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53015">CVE-2025-53015 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53019/">CVE-2025-53019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53019">CVE-2025-53019 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53101/">CVE-2025-53101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53101">CVE-2025-53101 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55004/">CVE-2025-55004 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55004">CVE-2025-55004 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55005/">CVE-2025-55005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55005">CVE-2025-55005 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55154/">CVE-2025-55154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55154">CVE-2025-55154 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55160/">CVE-2025-55160 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55160">CVE-2025-55160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025981" comment="ImageMagick-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025982" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025983" comment="ImageMagick-devel-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025984" comment="ImageMagick-doc-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025985" comment="ImageMagick-extra-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025986" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025987" comment="libMagick++-devel-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025988" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025989" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025990" comment="perl-PerlMagick-7.1.2.0-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93671" version="1" class="patch">
	<metadata>
		<title>Mesa-24.1.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<reference ref_id="CVE-2023-45913" ref_url="https://www.suse.com/security/cve/CVE-2023-45913/" source="CVE"/>
		<reference ref_id="CVE-2023-45919" ref_url="https://www.suse.com/security/cve/CVE-2023-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-45922" ref_url="https://www.suse.com/security/cve/CVE-2023-45922/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-24.1.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5068">CVE-2019-5068 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45913/">CVE-2023-45913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45913">CVE-2023-45913 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45919/">CVE-2023-45919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45919">CVE-2023-45919 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45922/">CVE-2023-45922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45922">CVE-2023-45922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025991" comment="Mesa-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025992" comment="Mesa-KHR-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025993" comment="Mesa-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025994" comment="Mesa-dri-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025995" comment="Mesa-dri-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025996" comment="Mesa-dri-nouveau-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025997" comment="Mesa-dri-vc4-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025998" comment="Mesa-gallium-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025999" comment="Mesa-libEGL-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026000" comment="Mesa-libEGL1-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026001" comment="Mesa-libGL-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026002" comment="Mesa-libGL1-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026003" comment="Mesa-libGLESv1_CM-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026004" comment="Mesa-libGLESv2-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026005" comment="Mesa-libGLESv3-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026006" comment="Mesa-libOpenCL-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026007" comment="Mesa-libRusticlOpenCL-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026008" comment="Mesa-libd3d-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026009" comment="Mesa-libd3d-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026010" comment="Mesa-libglapi-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026011" comment="Mesa-libglapi0-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026012" comment="Mesa-libva-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026013" comment="Mesa-vulkan-device-select-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026014" comment="Mesa-vulkan-overlay-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026015" comment="libOSMesa-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026016" comment="libOSMesa8-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026017" comment="libgbm-devel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026018" comment="libgbm1-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026019" comment="libvdpau_nouveau-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026020" comment="libvdpau_r600-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026021" comment="libvdpau_radeonsi-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026022" comment="libvdpau_virtio_gpu-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026023" comment="libvulkan_broadcom-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026024" comment="libvulkan_freedreno-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026025" comment="libvulkan_intel-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026026" comment="libvulkan_lvp-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026027" comment="libvulkan_radeon-24.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026028" comment="libxatracker-devel-1.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026029" comment="libxatracker2-1.0.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93672" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-140.2.0-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-2808" ref_url="https://www.suse.com/security/cve/CVE-2012-2808/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1519" ref_url="https://www.suse.com/security/cve/CVE-2014-1519/" source="CVE"/>
		<reference ref_id="CVE-2014-1522" ref_url="https://www.suse.com/security/cve/CVE-2014-1522/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1525" ref_url="https://www.suse.com/security/cve/CVE-2014-1525/" source="CVE"/>
		<reference ref_id="CVE-2014-1526" ref_url="https://www.suse.com/security/cve/CVE-2014-1526/" source="CVE"/>
		<reference ref_id="CVE-2014-1528" ref_url="https://www.suse.com/security/cve/CVE-2014-1528/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1539" ref_url="https://www.suse.com/security/cve/CVE-2014-1539/" source="CVE"/>
		<reference ref_id="CVE-2014-1540" ref_url="https://www.suse.com/security/cve/CVE-2014-1540/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1542" ref_url="https://www.suse.com/security/cve/CVE-2014-1542/" source="CVE"/>
		<reference ref_id="CVE-2014-1543" ref_url="https://www.suse.com/security/cve/CVE-2014-1543/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1549" ref_url="https://www.suse.com/security/cve/CVE-2014-1549/" source="CVE"/>
		<reference ref_id="CVE-2014-1550" ref_url="https://www.suse.com/security/cve/CVE-2014-1550/" source="CVE"/>
		<reference ref_id="CVE-2014-1552" ref_url="https://www.suse.com/security/cve/CVE-2014-1552/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1558" ref_url="https://www.suse.com/security/cve/CVE-2014-1558/" source="CVE"/>
		<reference ref_id="CVE-2014-1559" ref_url="https://www.suse.com/security/cve/CVE-2014-1559/" source="CVE"/>
		<reference ref_id="CVE-2014-1560" ref_url="https://www.suse.com/security/cve/CVE-2014-1560/" source="CVE"/>
		<reference ref_id="CVE-2014-1561" ref_url="https://www.suse.com/security/cve/CVE-2014-1561/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1580" ref_url="https://www.suse.com/security/cve/CVE-2014-1580/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1582" ref_url="https://www.suse.com/security/cve/CVE-2014-1582/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1584" ref_url="https://www.suse.com/security/cve/CVE-2014-1584/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2014-8642" ref_url="https://www.suse.com/security/cve/CVE-2014-8642/" source="CVE"/>
		<reference ref_id="CVE-2014-8643" ref_url="https://www.suse.com/security/cve/CVE-2014-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-0798" ref_url="https://www.suse.com/security/cve/CVE-2015-0798/" source="CVE"/>
		<reference ref_id="CVE-2015-0799" ref_url="https://www.suse.com/security/cve/CVE-2015-0799/" source="CVE"/>
		<reference ref_id="CVE-2015-0800" ref_url="https://www.suse.com/security/cve/CVE-2015-0800/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0802" ref_url="https://www.suse.com/security/cve/CVE-2015-0802/" source="CVE"/>
		<reference ref_id="CVE-2015-0803" ref_url="https://www.suse.com/security/cve/CVE-2015-0803/" source="CVE"/>
		<reference ref_id="CVE-2015-0804" ref_url="https://www.suse.com/security/cve/CVE-2015-0804/" source="CVE"/>
		<reference ref_id="CVE-2015-0805" ref_url="https://www.suse.com/security/cve/CVE-2015-0805/" source="CVE"/>
		<reference ref_id="CVE-2015-0806" ref_url="https://www.suse.com/security/cve/CVE-2015-0806/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0808" ref_url="https://www.suse.com/security/cve/CVE-2015-0808/" source="CVE"/>
		<reference ref_id="CVE-2015-0810" ref_url="https://www.suse.com/security/cve/CVE-2015-0810/" source="CVE"/>
		<reference ref_id="CVE-2015-0811" ref_url="https://www.suse.com/security/cve/CVE-2015-0811/" source="CVE"/>
		<reference ref_id="CVE-2015-0812" ref_url="https://www.suse.com/security/cve/CVE-2015-0812/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0819" ref_url="https://www.suse.com/security/cve/CVE-2015-0819/" source="CVE"/>
		<reference ref_id="CVE-2015-0820" ref_url="https://www.suse.com/security/cve/CVE-2015-0820/" source="CVE"/>
		<reference ref_id="CVE-2015-0821" ref_url="https://www.suse.com/security/cve/CVE-2015-0821/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0823" ref_url="https://www.suse.com/security/cve/CVE-2015-0823/" source="CVE"/>
		<reference ref_id="CVE-2015-0824" ref_url="https://www.suse.com/security/cve/CVE-2015-0824/" source="CVE"/>
		<reference ref_id="CVE-2015-0825" ref_url="https://www.suse.com/security/cve/CVE-2015-0825/" source="CVE"/>
		<reference ref_id="CVE-2015-0826" ref_url="https://www.suse.com/security/cve/CVE-2015-0826/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0828" ref_url="https://www.suse.com/security/cve/CVE-2015-0828/" source="CVE"/>
		<reference ref_id="CVE-2015-0829" ref_url="https://www.suse.com/security/cve/CVE-2015-0829/" source="CVE"/>
		<reference ref_id="CVE-2015-0830" ref_url="https://www.suse.com/security/cve/CVE-2015-0830/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0832" ref_url="https://www.suse.com/security/cve/CVE-2015-0832/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0834" ref_url="https://www.suse.com/security/cve/CVE-2015-0834/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2706" ref_url="https://www.suse.com/security/cve/CVE-2015-2706/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2711" ref_url="https://www.suse.com/security/cve/CVE-2015-2711/" source="CVE"/>
		<reference ref_id="CVE-2015-2712" ref_url="https://www.suse.com/security/cve/CVE-2015-2712/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2715" ref_url="https://www.suse.com/security/cve/CVE-2015-2715/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2717" ref_url="https://www.suse.com/security/cve/CVE-2015-2717/" source="CVE"/>
		<reference ref_id="CVE-2015-2718" ref_url="https://www.suse.com/security/cve/CVE-2015-2718/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2742" ref_url="https://www.suse.com/security/cve/CVE-2015-2742/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4476" ref_url="https://www.suse.com/security/cve/CVE-2015-4476/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4483" ref_url="https://www.suse.com/security/cve/CVE-2015-4483/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4490" ref_url="https://www.suse.com/security/cve/CVE-2015-4490/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4502" ref_url="https://www.suse.com/security/cve/CVE-2015-4502/" source="CVE"/>
		<reference ref_id="CVE-2015-4503" ref_url="https://www.suse.com/security/cve/CVE-2015-4503/" source="CVE"/>
		<reference ref_id="CVE-2015-4504" ref_url="https://www.suse.com/security/cve/CVE-2015-4504/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4507" ref_url="https://www.suse.com/security/cve/CVE-2015-4507/" source="CVE"/>
		<reference ref_id="CVE-2015-4508" ref_url="https://www.suse.com/security/cve/CVE-2015-4508/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4512" ref_url="https://www.suse.com/security/cve/CVE-2015-4512/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4515" ref_url="https://www.suse.com/security/cve/CVE-2015-4515/" source="CVE"/>
		<reference ref_id="CVE-2015-4516" ref_url="https://www.suse.com/security/cve/CVE-2015-4516/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4518" ref_url="https://www.suse.com/security/cve/CVE-2015-4518/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7184" ref_url="https://www.suse.com/security/cve/CVE-2015-7184/" source="CVE"/>
		<reference ref_id="CVE-2015-7185" ref_url="https://www.suse.com/security/cve/CVE-2015-7185/" source="CVE"/>
		<reference ref_id="CVE-2015-7186" ref_url="https://www.suse.com/security/cve/CVE-2015-7186/" source="CVE"/>
		<reference ref_id="CVE-2015-7187" ref_url="https://www.suse.com/security/cve/CVE-2015-7187/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7190" ref_url="https://www.suse.com/security/cve/CVE-2015-7190/" source="CVE"/>
		<reference ref_id="CVE-2015-7191" ref_url="https://www.suse.com/security/cve/CVE-2015-7191/" source="CVE"/>
		<reference ref_id="CVE-2015-7192" ref_url="https://www.suse.com/security/cve/CVE-2015-7192/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7195" ref_url="https://www.suse.com/security/cve/CVE-2015-7195/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7203" ref_url="https://www.suse.com/security/cve/CVE-2015-7203/" source="CVE"/>
		<reference ref_id="CVE-2015-7204" ref_url="https://www.suse.com/security/cve/CVE-2015-7204/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7208" ref_url="https://www.suse.com/security/cve/CVE-2015-7208/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7211" ref_url="https://www.suse.com/security/cve/CVE-2015-7211/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7215" ref_url="https://www.suse.com/security/cve/CVE-2015-7215/" source="CVE"/>
		<reference ref_id="CVE-2015-7216" ref_url="https://www.suse.com/security/cve/CVE-2015-7216/" source="CVE"/>
		<reference ref_id="CVE-2015-7217" ref_url="https://www.suse.com/security/cve/CVE-2015-7217/" source="CVE"/>
		<reference ref_id="CVE-2015-7218" ref_url="https://www.suse.com/security/cve/CVE-2015-7218/" source="CVE"/>
		<reference ref_id="CVE-2015-7219" ref_url="https://www.suse.com/security/cve/CVE-2015-7219/" source="CVE"/>
		<reference ref_id="CVE-2015-7220" ref_url="https://www.suse.com/security/cve/CVE-2015-7220/" source="CVE"/>
		<reference ref_id="CVE-2015-7221" ref_url="https://www.suse.com/security/cve/CVE-2015-7221/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7223" ref_url="https://www.suse.com/security/cve/CVE-2015-7223/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1933" ref_url="https://www.suse.com/security/cve/CVE-2016-1933/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1937" ref_url="https://www.suse.com/security/cve/CVE-2016-1937/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1939" ref_url="https://www.suse.com/security/cve/CVE-2016-1939/" source="CVE"/>
		<reference ref_id="CVE-2016-1942" ref_url="https://www.suse.com/security/cve/CVE-2016-1942/" source="CVE"/>
		<reference ref_id="CVE-2016-1943" ref_url="https://www.suse.com/security/cve/CVE-2016-1943/" source="CVE"/>
		<reference ref_id="CVE-2016-1944" ref_url="https://www.suse.com/security/cve/CVE-2016-1944/" source="CVE"/>
		<reference ref_id="CVE-2016-1945" ref_url="https://www.suse.com/security/cve/CVE-2016-1945/" source="CVE"/>
		<reference ref_id="CVE-2016-1946" ref_url="https://www.suse.com/security/cve/CVE-2016-1946/" source="CVE"/>
		<reference ref_id="CVE-2016-1947" ref_url="https://www.suse.com/security/cve/CVE-2016-1947/" source="CVE"/>
		<reference ref_id="CVE-2016-1949" ref_url="https://www.suse.com/security/cve/CVE-2016-1949/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1959" ref_url="https://www.suse.com/security/cve/CVE-2016-1959/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1963" ref_url="https://www.suse.com/security/cve/CVE-2016-1963/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1967" ref_url="https://www.suse.com/security/cve/CVE-2016-1967/" source="CVE"/>
		<reference ref_id="CVE-2016-1968" ref_url="https://www.suse.com/security/cve/CVE-2016-1968/" source="CVE"/>
		<reference ref_id="CVE-2016-1970" ref_url="https://www.suse.com/security/cve/CVE-2016-1970/" source="CVE"/>
		<reference ref_id="CVE-2016-1971" ref_url="https://www.suse.com/security/cve/CVE-2016-1971/" source="CVE"/>
		<reference ref_id="CVE-2016-1972" ref_url="https://www.suse.com/security/cve/CVE-2016-1972/" source="CVE"/>
		<reference ref_id="CVE-2016-1973" ref_url="https://www.suse.com/security/cve/CVE-2016-1973/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1975" ref_url="https://www.suse.com/security/cve/CVE-2016-1975/" source="CVE"/>
		<reference ref_id="CVE-2016-1976" ref_url="https://www.suse.com/security/cve/CVE-2016-1976/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2804" ref_url="https://www.suse.com/security/cve/CVE-2016-2804/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2809" ref_url="https://www.suse.com/security/cve/CVE-2016-2809/" source="CVE"/>
		<reference ref_id="CVE-2016-2810" ref_url="https://www.suse.com/security/cve/CVE-2016-2810/" source="CVE"/>
		<reference ref_id="CVE-2016-2811" ref_url="https://www.suse.com/security/cve/CVE-2016-2811/" source="CVE"/>
		<reference ref_id="CVE-2016-2812" ref_url="https://www.suse.com/security/cve/CVE-2016-2812/" source="CVE"/>
		<reference ref_id="CVE-2016-2813" ref_url="https://www.suse.com/security/cve/CVE-2016-2813/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2816" ref_url="https://www.suse.com/security/cve/CVE-2016-2816/" source="CVE"/>
		<reference ref_id="CVE-2016-2817" ref_url="https://www.suse.com/security/cve/CVE-2016-2817/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2820" ref_url="https://www.suse.com/security/cve/CVE-2016-2820/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2825" ref_url="https://www.suse.com/security/cve/CVE-2016-2825/" source="CVE"/>
		<reference ref_id="CVE-2016-2827" ref_url="https://www.suse.com/security/cve/CVE-2016-2827/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2829" ref_url="https://www.suse.com/security/cve/CVE-2016-2829/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2832" ref_url="https://www.suse.com/security/cve/CVE-2016-2832/" source="CVE"/>
		<reference ref_id="CVE-2016-2833" ref_url="https://www.suse.com/security/cve/CVE-2016-2833/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5251" ref_url="https://www.suse.com/security/cve/CVE-2016-5251/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5253" ref_url="https://www.suse.com/security/cve/CVE-2016-5253/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5255" ref_url="https://www.suse.com/security/cve/CVE-2016-5255/" source="CVE"/>
		<reference ref_id="CVE-2016-5256" ref_url="https://www.suse.com/security/cve/CVE-2016-5256/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5260" ref_url="https://www.suse.com/security/cve/CVE-2016-5260/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5266" ref_url="https://www.suse.com/security/cve/CVE-2016-5266/" source="CVE"/>
		<reference ref_id="CVE-2016-5267" ref_url="https://www.suse.com/security/cve/CVE-2016-5267/" source="CVE"/>
		<reference ref_id="CVE-2016-5268" ref_url="https://www.suse.com/security/cve/CVE-2016-5268/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5271" ref_url="https://www.suse.com/security/cve/CVE-2016-5271/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5273" ref_url="https://www.suse.com/security/cve/CVE-2016-5273/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5275" ref_url="https://www.suse.com/security/cve/CVE-2016-5275/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5279" ref_url="https://www.suse.com/security/cve/CVE-2016-5279/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5282" ref_url="https://www.suse.com/security/cve/CVE-2016-5282/" source="CVE"/>
		<reference ref_id="CVE-2016-5283" ref_url="https://www.suse.com/security/cve/CVE-2016-5283/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5287" ref_url="https://www.suse.com/security/cve/CVE-2016-5287/" source="CVE"/>
		<reference ref_id="CVE-2016-5288" ref_url="https://www.suse.com/security/cve/CVE-2016-5288/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-5293" ref_url="https://www.suse.com/security/cve/CVE-2016-5293/" source="CVE"/>
		<reference ref_id="CVE-2016-5294" ref_url="https://www.suse.com/security/cve/CVE-2016-5294/" source="CVE"/>
		<reference ref_id="CVE-2016-5295" ref_url="https://www.suse.com/security/cve/CVE-2016-5295/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-5298" ref_url="https://www.suse.com/security/cve/CVE-2016-5298/" source="CVE"/>
		<reference ref_id="CVE-2016-5299" ref_url="https://www.suse.com/security/cve/CVE-2016-5299/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9061" ref_url="https://www.suse.com/security/cve/CVE-2016-9061/" source="CVE"/>
		<reference ref_id="CVE-2016-9062" ref_url="https://www.suse.com/security/cve/CVE-2016-9062/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9065" ref_url="https://www.suse.com/security/cve/CVE-2016-9065/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9070" ref_url="https://www.suse.com/security/cve/CVE-2016-9070/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9072" ref_url="https://www.suse.com/security/cve/CVE-2016-9072/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2016-9078" ref_url="https://www.suse.com/security/cve/CVE-2016-9078/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9080" ref_url="https://www.suse.com/security/cve/CVE-2016-9080/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9894" ref_url="https://www.suse.com/security/cve/CVE-2016-9894/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9896" ref_url="https://www.suse.com/security/cve/CVE-2016-9896/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9903" ref_url="https://www.suse.com/security/cve/CVE-2016-9903/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5031" ref_url="https://www.suse.com/security/cve/CVE-2017-5031/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5374" ref_url="https://www.suse.com/security/cve/CVE-2017-5374/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5377" ref_url="https://www.suse.com/security/cve/CVE-2017-5377/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5379" ref_url="https://www.suse.com/security/cve/CVE-2017-5379/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5381" ref_url="https://www.suse.com/security/cve/CVE-2017-5381/" source="CVE"/>
		<reference ref_id="CVE-2017-5382" ref_url="https://www.suse.com/security/cve/CVE-2017-5382/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5384" ref_url="https://www.suse.com/security/cve/CVE-2017-5384/" source="CVE"/>
		<reference ref_id="CVE-2017-5385" ref_url="https://www.suse.com/security/cve/CVE-2017-5385/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5387" ref_url="https://www.suse.com/security/cve/CVE-2017-5387/" source="CVE"/>
		<reference ref_id="CVE-2017-5388" ref_url="https://www.suse.com/security/cve/CVE-2017-5388/" source="CVE"/>
		<reference ref_id="CVE-2017-5389" ref_url="https://www.suse.com/security/cve/CVE-2017-5389/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5391" ref_url="https://www.suse.com/security/cve/CVE-2017-5391/" source="CVE"/>
		<reference ref_id="CVE-2017-5392" ref_url="https://www.suse.com/security/cve/CVE-2017-5392/" source="CVE"/>
		<reference ref_id="CVE-2017-5393" ref_url="https://www.suse.com/security/cve/CVE-2017-5393/" source="CVE"/>
		<reference ref_id="CVE-2017-5394" ref_url="https://www.suse.com/security/cve/CVE-2017-5394/" source="CVE"/>
		<reference ref_id="CVE-2017-5395" ref_url="https://www.suse.com/security/cve/CVE-2017-5395/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5415" ref_url="https://www.suse.com/security/cve/CVE-2017-5415/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5417" ref_url="https://www.suse.com/security/cve/CVE-2017-5417/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5420" ref_url="https://www.suse.com/security/cve/CVE-2017-5420/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5427" ref_url="https://www.suse.com/security/cve/CVE-2017-5427/" source="CVE"/>
		<reference ref_id="CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7760" ref_url="https://www.suse.com/security/cve/CVE-2017-7760/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7766" ref_url="https://www.suse.com/security/cve/CVE-2017-7766/" source="CVE"/>
		<reference ref_id="CVE-2017-7767" ref_url="https://www.suse.com/security/cve/CVE-2017-7767/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7843" ref_url="https://www.suse.com/security/cve/CVE-2017-7843/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34469" ref_url="https://www.suse.com/security/cve/CVE-2022-34469/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34471" ref_url="https://www.suse.com/security/cve/CVE-2022-34471/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34473" ref_url="https://www.suse.com/security/cve/CVE-2022-34473/" source="CVE"/>
		<reference ref_id="CVE-2022-34474" ref_url="https://www.suse.com/security/cve/CVE-2022-34474/" source="CVE"/>
		<reference ref_id="CVE-2022-34475" ref_url="https://www.suse.com/security/cve/CVE-2022-34475/" source="CVE"/>
		<reference ref_id="CVE-2022-34476" ref_url="https://www.suse.com/security/cve/CVE-2022-34476/" source="CVE"/>
		<reference ref_id="CVE-2022-34477" ref_url="https://www.suse.com/security/cve/CVE-2022-34477/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34480" ref_url="https://www.suse.com/security/cve/CVE-2022-34480/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34482" ref_url="https://www.suse.com/security/cve/CVE-2022-34482/" source="CVE"/>
		<reference ref_id="CVE-2022-34483" ref_url="https://www.suse.com/security/cve/CVE-2022-34483/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-34485" ref_url="https://www.suse.com/security/cve/CVE-2022-34485/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25734" ref_url="https://www.suse.com/security/cve/CVE-2023-25734/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25738" ref_url="https://www.suse.com/security/cve/CVE-2023-25738/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28163" ref_url="https://www.suse.com/security/cve/CVE-2023-28163/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<reference ref_id="CVE-2023-29531" ref_url="https://www.suse.com/security/cve/CVE-2023-29531/" source="CVE"/>
		<reference ref_id="CVE-2023-29532" ref_url="https://www.suse.com/security/cve/CVE-2023-29532/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29542" ref_url="https://www.suse.com/security/cve/CVE-2023-29542/" source="CVE"/>
		<reference ref_id="CVE-2023-29545" ref_url="https://www.suse.com/security/cve/CVE-2023-29545/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32214" ref_url="https://www.suse.com/security/cve/CVE-2023-32214/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<reference ref_id="CVE-2023-3482" ref_url="https://www.suse.com/security/cve/CVE-2023-3482/" source="CVE"/>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37203" ref_url="https://www.suse.com/security/cve/CVE-2023-37203/" source="CVE"/>
		<reference ref_id="CVE-2023-37204" ref_url="https://www.suse.com/security/cve/CVE-2023-37204/" source="CVE"/>
		<reference ref_id="CVE-2023-37205" ref_url="https://www.suse.com/security/cve/CVE-2023-37205/" source="CVE"/>
		<reference ref_id="CVE-2023-37206" ref_url="https://www.suse.com/security/cve/CVE-2023-37206/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37209" ref_url="https://www.suse.com/security/cve/CVE-2023-37209/" source="CVE"/>
		<reference ref_id="CVE-2023-37210" ref_url="https://www.suse.com/security/cve/CVE-2023-37210/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<reference ref_id="CVE-2023-37212" ref_url="https://www.suse.com/security/cve/CVE-2023-37212/" source="CVE"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11693" ref_url="https://www.suse.com/security/cve/CVE-2024-11693/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11698" ref_url="https://www.suse.com/security/cve/CVE-2024-11698/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<reference ref_id="CVE-2024-11704" ref_url="https://www.suse.com/security/cve/CVE-2024-11704/" source="CVE"/>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<reference ref_id="CVE-2024-2605" ref_url="https://www.suse.com/security/cve/CVE-2024-2605/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<reference ref_id="CVE-2024-43097" ref_url="https://www.suse.com/security/cve/CVE-2024-43097/" source="CVE"/>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5692" ref_url="https://www.suse.com/security/cve/CVE-2024-5692/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<reference ref_id="CVE-2024-6605" ref_url="https://www.suse.com/security/cve/CVE-2024-6605/" source="CVE"/>
		<reference ref_id="CVE-2024-6606" ref_url="https://www.suse.com/security/cve/CVE-2024-6606/" source="CVE"/>
		<reference ref_id="CVE-2024-6607" ref_url="https://www.suse.com/security/cve/CVE-2024-6607/" source="CVE"/>
		<reference ref_id="CVE-2024-6608" ref_url="https://www.suse.com/security/cve/CVE-2024-6608/" source="CVE"/>
		<reference ref_id="CVE-2024-6609" ref_url="https://www.suse.com/security/cve/CVE-2024-6609/" source="CVE"/>
		<reference ref_id="CVE-2024-6610" ref_url="https://www.suse.com/security/cve/CVE-2024-6610/" source="CVE"/>
		<reference ref_id="CVE-2024-6611" ref_url="https://www.suse.com/security/cve/CVE-2024-6611/" source="CVE"/>
		<reference ref_id="CVE-2024-6612" ref_url="https://www.suse.com/security/cve/CVE-2024-6612/" source="CVE"/>
		<reference ref_id="CVE-2024-6613" ref_url="https://www.suse.com/security/cve/CVE-2024-6613/" source="CVE"/>
		<reference ref_id="CVE-2024-6614" ref_url="https://www.suse.com/security/cve/CVE-2024-6614/" source="CVE"/>
		<reference ref_id="CVE-2024-6615" ref_url="https://www.suse.com/security/cve/CVE-2024-6615/" source="CVE"/>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7524" ref_url="https://www.suse.com/security/cve/CVE-2024-7524/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<reference ref_id="CVE-2024-7531" ref_url="https://www.suse.com/security/cve/CVE-2024-7531/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<reference ref_id="CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932/" source="CVE"/>
		<reference ref_id="CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933/" source="CVE"/>
		<reference ref_id="CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936/" source="CVE"/>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<reference ref_id="CVE-2025-2783" ref_url="https://www.suse.com/security/cve/CVE-2025-2783/" source="CVE"/>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-2857" ref_url="https://www.suse.com/security/cve/CVE-2025-2857/" source="CVE"/>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5265" ref_url="https://www.suse.com/security/cve/CVE-2025-5265/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6426" ref_url="https://www.suse.com/security/cve/CVE-2025-6426/" source="CVE"/>
		<reference ref_id="CVE-2025-6427" ref_url="https://www.suse.com/security/cve/CVE-2025-6427/" source="CVE"/>
		<reference ref_id="CVE-2025-6428" ref_url="https://www.suse.com/security/cve/CVE-2025-6428/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<reference ref_id="CVE-2025-6431" ref_url="https://www.suse.com/security/cve/CVE-2025-6431/" source="CVE"/>
		<reference ref_id="CVE-2025-6432" ref_url="https://www.suse.com/security/cve/CVE-2025-6432/" source="CVE"/>
		<reference ref_id="CVE-2025-6433" ref_url="https://www.suse.com/security/cve/CVE-2025-6433/" source="CVE"/>
		<reference ref_id="CVE-2025-6434" ref_url="https://www.suse.com/security/cve/CVE-2025-6434/" source="CVE"/>
		<reference ref_id="CVE-2025-6435" ref_url="https://www.suse.com/security/cve/CVE-2025-6435/" source="CVE"/>
		<reference ref_id="CVE-2025-6436" ref_url="https://www.suse.com/security/cve/CVE-2025-6436/" source="CVE"/>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<reference ref_id="CVE-2025-8036" ref_url="https://www.suse.com/security/cve/CVE-2025-8036/" source="CVE"/>
		<reference ref_id="CVE-2025-8037" ref_url="https://www.suse.com/security/cve/CVE-2025-8037/" source="CVE"/>
		<reference ref_id="CVE-2025-8038" ref_url="https://www.suse.com/security/cve/CVE-2025-8038/" source="CVE"/>
		<reference ref_id="CVE-2025-8039" ref_url="https://www.suse.com/security/cve/CVE-2025-8039/" source="CVE"/>
		<reference ref_id="CVE-2025-8040" ref_url="https://www.suse.com/security/cve/CVE-2025-8040/" source="CVE"/>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9183" ref_url="https://www.suse.com/security/cve/CVE-2025-9183/" source="CVE"/>
		<reference ref_id="CVE-2025-9184" ref_url="https://www.suse.com/security/cve/CVE-2025-9184/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-140.2.0-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6077">CVE-2006-6077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0008">CVE-2007-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0009">CVE-2007-0009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0078">CVE-2007-0078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0079">CVE-2007-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0775">CVE-2007-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0776">CVE-2007-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0777">CVE-2007-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0780">CVE-2007-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0800">CVE-2007-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0981">CVE-2007-0981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0995">CVE-2007-0995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0996">CVE-2007-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3089">CVE-2007-3089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3285">CVE-2007-3285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3656">CVE-2007-3656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3670">CVE-2007-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3734">CVE-2007-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3735">CVE-2007-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3736">CVE-2007-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3737">CVE-2007-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3738">CVE-2007-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0412">CVE-2008-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0414">CVE-2008-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0415">CVE-2008-0415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0417">CVE-2008-0417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0418">CVE-2008-0418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0419">CVE-2008-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0591">CVE-2008-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0592">CVE-2008-0592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0593">CVE-2008-0593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0594">CVE-2008-0594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3836">CVE-2008-3836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4063">CVE-2008-4063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4064">CVE-2008-4064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4070">CVE-2008-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0352">CVE-2009-0352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0353">CVE-2009-0353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0354">CVE-2009-0354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0355">CVE-2009-0355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0356">CVE-2009-0356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0357">CVE-2009-0357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0358">CVE-2009-0358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0164">CVE-2010-0164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0165">CVE-2010-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0166">CVE-2010-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0167">CVE-2010-0167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0168">CVE-2010-0168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0169">CVE-2010-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0170">CVE-2010-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0171">CVE-2010-0171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0172">CVE-2010-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1028">CVE-2010-1028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1207">CVE-2010-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1210">CVE-2010-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1215">CVE-2010-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0068">CVE-2011-0068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0079">CVE-2011-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1187">CVE-2011-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2366">CVE-2011-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2367">CVE-2011-2367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2368">CVE-2011-2368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2369">CVE-2011-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2370">CVE-2011-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2375">CVE-2011-2375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2985">CVE-2011-2985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2986">CVE-2011-2986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2988">CVE-2011-2988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2989">CVE-2011-2989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2990">CVE-2011-2990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2991">CVE-2011-2991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2992">CVE-2011-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2993">CVE-2011-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2997">CVE-2011-2997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3003">CVE-2011-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3079">CVE-2011-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3651">CVE-2011-3651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3652">CVE-2011-3652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3654">CVE-2011-3654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3655">CVE-2011-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0445">CVE-2012-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0446">CVE-2012-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0447">CVE-2012-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0451">CVE-2012-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0455">CVE-2012-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0456">CVE-2012-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0457">CVE-2012-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0458">CVE-2012-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0459">CVE-2012-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0460">CVE-2012-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0461">CVE-2012-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0462">CVE-2012-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0463">CVE-2012-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0464">CVE-2012-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0475">CVE-2012-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1938">CVE-2012-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1950">CVE-2012-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1965">CVE-2012-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1966">CVE-2012-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2808/">CVE-2012-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2808">CVE-2012-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3965">CVE-2012-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3973">CVE-2012-3973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3983">CVE-2012-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4191">CVE-2012-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4203">CVE-2012-4203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5837">CVE-2012-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0765">CVE-2013-0765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0772">CVE-2013-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0777">CVE-2013-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0778">CVE-2013-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0779">CVE-2013-0779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0781">CVE-2013-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0789">CVE-2013-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0801">CVE-2013-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1669">CVE-2013-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1670">CVE-2013-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1671">CVE-2013-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1674">CVE-2013-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1675">CVE-2013-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1676">CVE-2013-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1677">CVE-2013-1677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1678">CVE-2013-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1679">CVE-2013-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1680">CVE-2013-1680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1681">CVE-2013-1681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1683">CVE-2013-1683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1688">CVE-2013-1688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1694">CVE-2013-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1695">CVE-2013-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1696">CVE-2013-1696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1698">CVE-2013-1698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1699">CVE-2013-1699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1702">CVE-2013-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1704">CVE-2013-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1708">CVE-2013-1708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1711">CVE-2013-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1719">CVE-2013-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1720">CVE-2013-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1721">CVE-2013-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1723">CVE-2013-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1724">CVE-2013-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1728">CVE-2013-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1738">CVE-2013-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5590">CVE-2013-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5591">CVE-2013-5591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5592">CVE-2013-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5593">CVE-2013-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5595">CVE-2013-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5596">CVE-2013-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5597">CVE-2013-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5598">CVE-2013-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5599">CVE-2013-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5600">CVE-2013-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5601">CVE-2013-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5602">CVE-2013-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5603">CVE-2013-5603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5604">CVE-2013-5604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5610">CVE-2013-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5611">CVE-2013-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5612">CVE-2013-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5614">CVE-2013-5614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5619">CVE-2013-5619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6672">CVE-2013-6672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1478">CVE-2014-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1484">CVE-2014-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1489">CVE-2014-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1493">CVE-2014-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1494">CVE-2014-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1497">CVE-2014-1497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1498">CVE-2014-1498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1499">CVE-2014-1499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1500">CVE-2014-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1502">CVE-2014-1502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1504">CVE-2014-1504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1505">CVE-2014-1505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1508">CVE-2014-1508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1509">CVE-2014-1509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1510">CVE-2014-1510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1511">CVE-2014-1511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1512">CVE-2014-1512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1513">CVE-2014-1513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1514">CVE-2014-1514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1518">CVE-2014-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1519/">CVE-2014-1519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1519">CVE-2014-1519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1522/">CVE-2014-1522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1522">CVE-2014-1522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1523">CVE-2014-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1524">CVE-2014-1524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1525/">CVE-2014-1525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1525">CVE-2014-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1526/">CVE-2014-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1526">CVE-2014-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1528/">CVE-2014-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1528">CVE-2014-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1529">CVE-2014-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1530">CVE-2014-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1531">CVE-2014-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1532">CVE-2014-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1533">CVE-2014-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1534">CVE-2014-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1536">CVE-2014-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1537">CVE-2014-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1538">CVE-2014-1538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1539/">CVE-2014-1539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1539">CVE-2014-1539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1540/">CVE-2014-1540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1540">CVE-2014-1540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1541">CVE-2014-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1542/">CVE-2014-1542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1542">CVE-2014-1542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1543/">CVE-2014-1543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1543">CVE-2014-1543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1549/">CVE-2014-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1549">CVE-2014-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1550/">CVE-2014-1550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1550">CVE-2014-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1552/">CVE-2014-1552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1552">CVE-2014-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1553">CVE-2014-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1554">CVE-2014-1554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1558/">CVE-2014-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1558">CVE-2014-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1559/">CVE-2014-1559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1559">CVE-2014-1559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1560/">CVE-2014-1560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1560">CVE-2014-1560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1561/">CVE-2014-1561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1561">CVE-2014-1561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1563">CVE-2014-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1564">CVE-2014-1564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1565">CVE-2014-1565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1580/">CVE-2014-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1580">CVE-2014-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1582/">CVE-2014-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1582">CVE-2014-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1584/">CVE-2014-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1584">CVE-2014-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1589">CVE-2014-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1591">CVE-2014-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8635">CVE-2014-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8636">CVE-2014-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8637">CVE-2014-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8640">CVE-2014-8640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8642/">CVE-2014-8642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8642">CVE-2014-8642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8643/">CVE-2014-8643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8643">CVE-2014-8643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0798/">CVE-2015-0798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0798">CVE-2015-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0799/">CVE-2015-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0799">CVE-2015-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0800/">CVE-2015-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0800">CVE-2015-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0802/">CVE-2015-0802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0802">CVE-2015-0802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0803/">CVE-2015-0803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0803">CVE-2015-0803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0804/">CVE-2015-0804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0804">CVE-2015-0804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0805/">CVE-2015-0805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0805">CVE-2015-0805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0806/">CVE-2015-0806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0806">CVE-2015-0806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0808/">CVE-2015-0808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0808">CVE-2015-0808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0810/">CVE-2015-0810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0810">CVE-2015-0810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0811/">CVE-2015-0811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0811">CVE-2015-0811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0812/">CVE-2015-0812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0812">CVE-2015-0812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0814">CVE-2015-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0819/">CVE-2015-0819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0819">CVE-2015-0819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0820/">CVE-2015-0820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0820">CVE-2015-0820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0821/">CVE-2015-0821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0821">CVE-2015-0821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0823/">CVE-2015-0823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0823">CVE-2015-0823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0824/">CVE-2015-0824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0824">CVE-2015-0824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0825/">CVE-2015-0825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0825">CVE-2015-0825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0826/">CVE-2015-0826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0826">CVE-2015-0826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0828/">CVE-2015-0828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0828">CVE-2015-0828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0829/">CVE-2015-0829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0829">CVE-2015-0829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0830/">CVE-2015-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0830">CVE-2015-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0832/">CVE-2015-0832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0832">CVE-2015-0832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0833">CVE-2015-0833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0834/">CVE-2015-0834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0834">CVE-2015-0834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0835">CVE-2015-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2706/">CVE-2015-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2706">CVE-2015-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2709">CVE-2015-2709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2711/">CVE-2015-2711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2711">CVE-2015-2711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2712/">CVE-2015-2712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2712">CVE-2015-2712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2715/">CVE-2015-2715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2715">CVE-2015-2715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2717/">CVE-2015-2717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2717">CVE-2015-2717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2718/">CVE-2015-2718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2718">CVE-2015-2718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2727">CVE-2015-2727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2729">CVE-2015-2729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2731">CVE-2015-2731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2741">CVE-2015-2741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2742/">CVE-2015-2742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2742">CVE-2015-2742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4474">CVE-2015-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4476/">CVE-2015-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4476">CVE-2015-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4477">CVE-2015-4477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4480">CVE-2015-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4481">CVE-2015-4481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4482">CVE-2015-4482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4483/">CVE-2015-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4483">CVE-2015-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4490/">CVE-2015-4490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4490">CVE-2015-4490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4493">CVE-2015-4493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4502/">CVE-2015-4502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4502">CVE-2015-4502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4503/">CVE-2015-4503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4503">CVE-2015-4503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4504/">CVE-2015-4504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4504">CVE-2015-4504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4505">CVE-2015-4505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4507/">CVE-2015-4507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4507">CVE-2015-4507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4508/">CVE-2015-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4508">CVE-2015-4508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4510">CVE-2015-4510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4512/">CVE-2015-4512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4512">CVE-2015-4512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4514">CVE-2015-4514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4515/">CVE-2015-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4515">CVE-2015-4515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4516/">CVE-2015-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4516">CVE-2015-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4518/">CVE-2015-4518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4518">CVE-2015-4518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7178">CVE-2015-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7179">CVE-2015-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7184/">CVE-2015-7184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7184">CVE-2015-7184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7185/">CVE-2015-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7185">CVE-2015-7185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7186/">CVE-2015-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7186">CVE-2015-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7187/">CVE-2015-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7187">CVE-2015-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7190/">CVE-2015-7190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7190">CVE-2015-7190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7191/">CVE-2015-7191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7191">CVE-2015-7191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7192/">CVE-2015-7192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7192">CVE-2015-7192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7195/">CVE-2015-7195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7195">CVE-2015-7195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7203/">CVE-2015-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7203">CVE-2015-7203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7204/">CVE-2015-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7204">CVE-2015-7204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7207">CVE-2015-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7208/">CVE-2015-7208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7208">CVE-2015-7208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7211/">CVE-2015-7211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7211">CVE-2015-7211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7215/">CVE-2015-7215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7215">CVE-2015-7215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7216/">CVE-2015-7216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7216">CVE-2015-7216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7217/">CVE-2015-7217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7217">CVE-2015-7217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7218/">CVE-2015-7218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7218">CVE-2015-7218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7219/">CVE-2015-7219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7219">CVE-2015-7219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7220/">CVE-2015-7220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7220">CVE-2015-7220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7221/">CVE-2015-7221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7221">CVE-2015-7221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7223/">CVE-2015-7223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7223">CVE-2015-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1931">CVE-2016-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1933/">CVE-2016-1933 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1933">CVE-2016-1933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1937/">CVE-2016-1937 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1937">CVE-2016-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1939/">CVE-2016-1939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1939">CVE-2016-1939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1942/">CVE-2016-1942 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1942">CVE-2016-1942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1943/">CVE-2016-1943 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1943">CVE-2016-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1944/">CVE-2016-1944 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1944">CVE-2016-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1945/">CVE-2016-1945 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1945">CVE-2016-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1946/">CVE-2016-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1946">CVE-2016-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1947/">CVE-2016-1947 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1947">CVE-2016-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1949/">CVE-2016-1949 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1949">CVE-2016-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1955">CVE-2016-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1956">CVE-2016-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1959/">CVE-2016-1959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1959">CVE-2016-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1963/">CVE-2016-1963 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1963">CVE-2016-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1967/">CVE-2016-1967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1967">CVE-2016-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1968/">CVE-2016-1968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1968">CVE-2016-1968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1970/">CVE-2016-1970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1970">CVE-2016-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1971/">CVE-2016-1971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1971">CVE-2016-1971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1972/">CVE-2016-1972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1972">CVE-2016-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1973/">CVE-2016-1973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1973">CVE-2016-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1975/">CVE-2016-1975 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1975">CVE-2016-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1976/">CVE-2016-1976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1976">CVE-2016-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2804/">CVE-2016-2804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2804">CVE-2016-2804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2806">CVE-2016-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2809/">CVE-2016-2809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2809">CVE-2016-2809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2810/">CVE-2016-2810 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2810">CVE-2016-2810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2811/">CVE-2016-2811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2811">CVE-2016-2811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2812/">CVE-2016-2812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2812">CVE-2016-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2813/">CVE-2016-2813 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2813">CVE-2016-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2816/">CVE-2016-2816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2816">CVE-2016-2816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2817/">CVE-2016-2817 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2817">CVE-2016-2817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2820/">CVE-2016-2820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2820">CVE-2016-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2825/">CVE-2016-2825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2825">CVE-2016-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2827/">CVE-2016-2827 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2827">CVE-2016-2827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2829/">CVE-2016-2829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2829">CVE-2016-2829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2832/">CVE-2016-2832 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2832">CVE-2016-2832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2833/">CVE-2016-2833 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2833">CVE-2016-2833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5251/">CVE-2016-5251 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5251">CVE-2016-5251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5253/">CVE-2016-5253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5253">CVE-2016-5253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5255/">CVE-2016-5255 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5255">CVE-2016-5255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5256/">CVE-2016-5256 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5256">CVE-2016-5256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5260/">CVE-2016-5260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5260">CVE-2016-5260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5266/">CVE-2016-5266 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5266">CVE-2016-5266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5267/">CVE-2016-5267 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5267">CVE-2016-5267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5268/">CVE-2016-5268 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5268">CVE-2016-5268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5271/">CVE-2016-5271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5271">CVE-2016-5271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5273/">CVE-2016-5273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5273">CVE-2016-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5275/">CVE-2016-5275 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5275">CVE-2016-5275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5279/">CVE-2016-5279 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5279">CVE-2016-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5282/">CVE-2016-5282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5282">CVE-2016-5282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5283/">CVE-2016-5283 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5283">CVE-2016-5283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5287/">CVE-2016-5287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5287">CVE-2016-5287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5288/">CVE-2016-5288 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5288">CVE-2016-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5293/">CVE-2016-5293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5293">CVE-2016-5293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5294/">CVE-2016-5294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5294">CVE-2016-5294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5295/">CVE-2016-5295 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5295">CVE-2016-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5298/">CVE-2016-5298 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5298">CVE-2016-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5299/">CVE-2016-5299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5299">CVE-2016-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9061/">CVE-2016-9061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9061">CVE-2016-9061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9062/">CVE-2016-9062 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9062">CVE-2016-9062 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9065/">CVE-2016-9065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9065">CVE-2016-9065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9070/">CVE-2016-9070 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9070">CVE-2016-9070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9072/">CVE-2016-9072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9072">CVE-2016-9072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9078/">CVE-2016-9078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9078">CVE-2016-9078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9080/">CVE-2016-9080 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9080">CVE-2016-9080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9894/">CVE-2016-9894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9894">CVE-2016-9894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9896/">CVE-2016-9896 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9896">CVE-2016-9896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9903/">CVE-2016-9903 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9903">CVE-2016-9903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5031/">CVE-2017-5031 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5031">CVE-2017-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5374/">CVE-2017-5374 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5374">CVE-2017-5374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5377/">CVE-2017-5377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5377">CVE-2017-5377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5379/">CVE-2017-5379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5379">CVE-2017-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5381/">CVE-2017-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5381">CVE-2017-5381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5382/">CVE-2017-5382 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5382">CVE-2017-5382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5384/">CVE-2017-5384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5384">CVE-2017-5384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5385/">CVE-2017-5385 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5385">CVE-2017-5385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5387/">CVE-2017-5387 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5387">CVE-2017-5387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5388/">CVE-2017-5388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5388">CVE-2017-5388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5389/">CVE-2017-5389 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5389">CVE-2017-5389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5391/">CVE-2017-5391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5391">CVE-2017-5391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5392/">CVE-2017-5392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5392">CVE-2017-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5393/">CVE-2017-5393 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5393">CVE-2017-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5394/">CVE-2017-5394 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5394">CVE-2017-5394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5395/">CVE-2017-5395 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5395">CVE-2017-5395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5399">CVE-2017-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5403">CVE-2017-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5406">CVE-2017-5406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5412">CVE-2017-5412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5413">CVE-2017-5413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5414">CVE-2017-5414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5415/">CVE-2017-5415 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5415">CVE-2017-5415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5416">CVE-2017-5416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5417/">CVE-2017-5417 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5417">CVE-2017-5417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5418">CVE-2017-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5419">CVE-2017-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5420/">CVE-2017-5420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5420">CVE-2017-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5421">CVE-2017-5421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5422">CVE-2017-5422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5426">CVE-2017-5426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5427/">CVE-2017-5427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5427">CVE-2017-5427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5428">CVE-2017-5428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7755">CVE-2017-7755 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7760/">CVE-2017-7760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7760">CVE-2017-7760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7761">CVE-2017-7761 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7765">CVE-2017-7765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7766/">CVE-2017-7766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7766">CVE-2017-7766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7767/">CVE-2017-7767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7767">CVE-2017-7767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7768">CVE-2017-7768 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7771">CVE-2017-7771 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7772">CVE-2017-7772 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7773">CVE-2017-7773 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7774">CVE-2017-7774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-7775">CVE-2017-7775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7776">CVE-2017-7776 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7777">CVE-2017-7777 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7843/">CVE-2017-7843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7843">CVE-2017-7843 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12368">CVE-2018-12368 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12381">CVE-2018-12381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12386">CVE-2018-12386 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12387">CVE-2018-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12389">CVE-2018-12389 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12395">CVE-2018-12395 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12396">CVE-2018-12396 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12397">CVE-2018-12397 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18335">CVE-2018-18335 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5147">CVE-2018-5147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11694">CVE-2019-11694 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9794">CVE-2019-9794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9801">CVE-2019-9801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9815">CVE-2019-9815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9818">CVE-2019-9818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34469/">CVE-2022-34469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34469">CVE-2022-34469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34471/">CVE-2022-34471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34471">CVE-2022-34471 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34473/">CVE-2022-34473 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34473">CVE-2022-34473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34474/">CVE-2022-34474 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34474">CVE-2022-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34475/">CVE-2022-34475 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34475">CVE-2022-34475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34476/">CVE-2022-34476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34476">CVE-2022-34476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34477/">CVE-2022-34477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34477">CVE-2022-34477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34480/">CVE-2022-34480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34480">CVE-2022-34480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34482/">CVE-2022-34482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34482">CVE-2022-34482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34483/">CVE-2022-34483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34483">CVE-2022-34483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34485/">CVE-2022-34485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34485">CVE-2022-34485 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36314">CVE-2022-36314 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25734/">CVE-2023-25734 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25734">CVE-2023-25734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25738/">CVE-2023-25738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25738">CVE-2023-25738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28163/">CVE-2023-28163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28163">CVE-2023-28163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29531/">CVE-2023-29531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29531">CVE-2023-29531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29532/">CVE-2023-29532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29532">CVE-2023-29532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29542/">CVE-2023-29542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29542">CVE-2023-29542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29545/">CVE-2023-29545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29545">CVE-2023-29545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32214/">CVE-2023-32214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32214">CVE-2023-32214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3482/">CVE-2023-3482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3482">CVE-2023-3482 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37203/">CVE-2023-37203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37203">CVE-2023-37203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37204/">CVE-2023-37204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37204">CVE-2023-37204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37205/">CVE-2023-37205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37205">CVE-2023-37205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37206/">CVE-2023-37206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37206">CVE-2023-37206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37209/">CVE-2023-37209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37209">CVE-2023-37209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37210/">CVE-2023-37210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37210">CVE-2023-37210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37212/">CVE-2023-37212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37212">CVE-2023-37212 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11693/">CVE-2024-11693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11693">CVE-2024-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-11698/">CVE-2024-11698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11698">CVE-2024-11698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11704/">CVE-2024-11704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11704">CVE-2024-11704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2605/">CVE-2024-2605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2605">CVE-2024-2605 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43097/">CVE-2024-43097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43097">CVE-2024-43097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5692/">CVE-2024-5692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5692">CVE-2024-5692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6605/">CVE-2024-6605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6605">CVE-2024-6605 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6606/">CVE-2024-6606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6606">CVE-2024-6606 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6607/">CVE-2024-6607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6607">CVE-2024-6607 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6608/">CVE-2024-6608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6608">CVE-2024-6608 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6609/">CVE-2024-6609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6609">CVE-2024-6609 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6610/">CVE-2024-6610 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6610">CVE-2024-6610 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6611/">CVE-2024-6611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6611">CVE-2024-6611 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6612/">CVE-2024-6612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6612">CVE-2024-6612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6613/">CVE-2024-6613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6613">CVE-2024-6613 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6614/">CVE-2024-6614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6614">CVE-2024-6614 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6615/">CVE-2024-6615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6615">CVE-2024-6615 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7524/">CVE-2024-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7531/">CVE-2024-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7531">CVE-2024-7531 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2783/">CVE-2025-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2783">CVE-2025-2783 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2857/">CVE-2025-2857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2857">CVE-2025-2857 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5265/">CVE-2025-5265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5265">CVE-2025-5265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6426/">CVE-2025-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6426">CVE-2025-6426 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6427/">CVE-2025-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6427">CVE-2025-6427 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6428/">CVE-2025-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6428">CVE-2025-6428 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6431/">CVE-2025-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6431">CVE-2025-6431 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6432/">CVE-2025-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6432">CVE-2025-6432 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6433/">CVE-2025-6433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6433">CVE-2025-6433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6434/">CVE-2025-6434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6434">CVE-2025-6434 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6435/">CVE-2025-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6435">CVE-2025-6435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6436/">CVE-2025-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6436">CVE-2025-6436 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8036/">CVE-2025-8036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8036">CVE-2025-8036 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8037/">CVE-2025-8037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8037">CVE-2025-8037 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8038/">CVE-2025-8038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8038">CVE-2025-8038 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8039/">CVE-2025-8039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8039">CVE-2025-8039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8040/">CVE-2025-8040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8040">CVE-2025-8040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-9183/">CVE-2025-9183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9183">CVE-2025-9183 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9184/">CVE-2025-9184 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9184">CVE-2025-9184 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026030" comment="MozillaFirefox-140.2.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026031" comment="MozillaFirefox-devel-140.2.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026032" comment="MozillaFirefox-translations-common-140.2.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026033" comment="MozillaFirefox-translations-other-140.2.0-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93673" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.52.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<reference ref_id="CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2020-10754" ref_url="https://www.suse.com/security/cve/CVE-2020-10754/" source="CVE"/>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<reference ref_id="CVE-2021-20297" ref_url="https://www.suse.com/security/cve/CVE-2021-20297/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.52.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2006-7246">CVE-2006-7246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2924">CVE-2015-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0764">CVE-2016-0764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000135">CVE-2018-1000135 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10754/">CVE-2020-10754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10754">CVE-2020-10754 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20297/">CVE-2021-20297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20297">CVE-2021-20297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026034" comment="NetworkManager-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026035" comment="NetworkManager-cloud-setup-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026036" comment="NetworkManager-config-server-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026037" comment="NetworkManager-devel-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026038" comment="NetworkManager-lang-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026039" comment="NetworkManager-pppoe-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026040" comment="NetworkManager-tui-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026041" comment="NetworkManager-wwan-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026042" comment="libnm0-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026043" comment="typelib-1_0-NM-1_0-1.52.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93674" version="1" class="patch">
	<metadata>
		<title>OpenIPMI-2.0.36.56+git.0a3a991-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-42934" ref_url="https://www.suse.com/security/cve/CVE-2024-42934/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenIPMI-2.0.36.56+git.0a3a991-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42934/">CVE-2024-42934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42934">CVE-2024-42934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026044" comment="OpenIPMI-2.0.36.56+git.0a3a991-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026045" comment="OpenIPMI-devel-2.0.36.56+git.0a3a991-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026046" comment="OpenIPMI-python3-2.0.36.56+git.0a3a991-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026047" comment="libOpenIPMI0-2.0.36.56+git.0a3a991-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026048" comment="libOpenIPMIui1-2.0.36.56+git.0a3a991-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93675" version="1" class="patch">
	<metadata>
		<title>PackageKit-1.2.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<reference ref_id="CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-1.2.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1106">CVE-2018-1106 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16121">CVE-2020-16121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026049" comment="PackageKit-1.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026050" comment="PackageKit-backend-zypp-1.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026051" comment="PackageKit-branding-upstream-1.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026052" comment="PackageKit-devel-1.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026053" comment="PackageKit-lang-1.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026054" comment="libpackagekit-glib2-18-1.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026055" comment="libpackagekit-glib2-devel-1.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026056" comment="typelib-1_0-PackageKitGlib-1_0-1.2.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93676" version="1" class="patch">
	<metadata>
		<title>WebKitGTK-4.1-lang-2.48.5-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745/" source="CVE"/>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121/" source="CVE"/>
		<reference ref_id="CVE-2017-1000122" ref_url="https://www.suse.com/security/cve/CVE-2017-1000122/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8518" ref_url="https://www.suse.com/security/cve/CVE-2019-8518/" source="CVE"/>
		<reference ref_id="CVE-2019-8523" ref_url="https://www.suse.com/security/cve/CVE-2019-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-0108" ref_url="https://www.suse.com/security/cve/CVE-2022-0108/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="CVE-2022-22662" ref_url="https://www.suse.com/security/cve/CVE-2022-22662/" source="CVE"/>
		<reference ref_id="CVE-2022-22677" ref_url="https://www.suse.com/security/cve/CVE-2022-22677/" source="CVE"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26710" ref_url="https://www.suse.com/security/cve/CVE-2022-26710/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="CVE-2022-32792" ref_url="https://www.suse.com/security/cve/CVE-2022-32792/" source="CVE"/>
		<reference ref_id="CVE-2022-32816" ref_url="https://www.suse.com/security/cve/CVE-2022-32816/" source="CVE"/>
		<reference ref_id="CVE-2022-32885" ref_url="https://www.suse.com/security/cve/CVE-2022-32885/" source="CVE"/>
		<reference ref_id="CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886/" source="CVE"/>
		<reference ref_id="CVE-2022-32888" ref_url="https://www.suse.com/security/cve/CVE-2022-32888/" source="CVE"/>
		<reference ref_id="CVE-2022-32891" ref_url="https://www.suse.com/security/cve/CVE-2022-32891/" source="CVE"/>
		<reference ref_id="CVE-2022-32893" ref_url="https://www.suse.com/security/cve/CVE-2022-32893/" source="CVE"/>
		<reference ref_id="CVE-2022-32912" ref_url="https://www.suse.com/security/cve/CVE-2022-32912/" source="CVE"/>
		<reference ref_id="CVE-2022-32919" ref_url="https://www.suse.com/security/cve/CVE-2022-32919/" source="CVE"/>
		<reference ref_id="CVE-2022-32923" ref_url="https://www.suse.com/security/cve/CVE-2022-32923/" source="CVE"/>
		<reference ref_id="CVE-2022-32933" ref_url="https://www.suse.com/security/cve/CVE-2022-32933/" source="CVE"/>
		<reference ref_id="CVE-2022-42799" ref_url="https://www.suse.com/security/cve/CVE-2022-42799/" source="CVE"/>
		<reference ref_id="CVE-2022-42823" ref_url="https://www.suse.com/security/cve/CVE-2022-42823/" source="CVE"/>
		<reference ref_id="CVE-2022-42824" ref_url="https://www.suse.com/security/cve/CVE-2022-42824/" source="CVE"/>
		<reference ref_id="CVE-2022-42826" ref_url="https://www.suse.com/security/cve/CVE-2022-42826/" source="CVE"/>
		<reference ref_id="CVE-2022-42852" ref_url="https://www.suse.com/security/cve/CVE-2022-42852/" source="CVE"/>
		<reference ref_id="CVE-2022-42856" ref_url="https://www.suse.com/security/cve/CVE-2022-42856/" source="CVE"/>
		<reference ref_id="CVE-2022-42863" ref_url="https://www.suse.com/security/cve/CVE-2022-42863/" source="CVE"/>
		<reference ref_id="CVE-2022-42867" ref_url="https://www.suse.com/security/cve/CVE-2022-42867/" source="CVE"/>
		<reference ref_id="CVE-2022-46691" ref_url="https://www.suse.com/security/cve/CVE-2022-46691/" source="CVE"/>
		<reference ref_id="CVE-2022-46692" ref_url="https://www.suse.com/security/cve/CVE-2022-46692/" source="CVE"/>
		<reference ref_id="CVE-2022-46698" ref_url="https://www.suse.com/security/cve/CVE-2022-46698/" source="CVE"/>
		<reference ref_id="CVE-2022-46699" ref_url="https://www.suse.com/security/cve/CVE-2022-46699/" source="CVE"/>
		<reference ref_id="CVE-2022-46700" ref_url="https://www.suse.com/security/cve/CVE-2022-46700/" source="CVE"/>
		<reference ref_id="CVE-2022-46705" ref_url="https://www.suse.com/security/cve/CVE-2022-46705/" source="CVE"/>
		<reference ref_id="CVE-2022-46725" ref_url="https://www.suse.com/security/cve/CVE-2022-46725/" source="CVE"/>
		<reference ref_id="CVE-2022-48503" ref_url="https://www.suse.com/security/cve/CVE-2022-48503/" source="CVE"/>
		<reference ref_id="CVE-2023-23517" ref_url="https://www.suse.com/security/cve/CVE-2023-23517/" source="CVE"/>
		<reference ref_id="CVE-2023-23518" ref_url="https://www.suse.com/security/cve/CVE-2023-23518/" source="CVE"/>
		<reference ref_id="CVE-2023-23529" ref_url="https://www.suse.com/security/cve/CVE-2023-23529/" source="CVE"/>
		<reference ref_id="CVE-2023-25358" ref_url="https://www.suse.com/security/cve/CVE-2023-25358/" source="CVE"/>
		<reference ref_id="CVE-2023-25360" ref_url="https://www.suse.com/security/cve/CVE-2023-25360/" source="CVE"/>
		<reference ref_id="CVE-2023-25361" ref_url="https://www.suse.com/security/cve/CVE-2023-25361/" source="CVE"/>
		<reference ref_id="CVE-2023-25362" ref_url="https://www.suse.com/security/cve/CVE-2023-25362/" source="CVE"/>
		<reference ref_id="CVE-2023-25363" ref_url="https://www.suse.com/security/cve/CVE-2023-25363/" source="CVE"/>
		<reference ref_id="CVE-2023-27932" ref_url="https://www.suse.com/security/cve/CVE-2023-27932/" source="CVE"/>
		<reference ref_id="CVE-2023-27954" ref_url="https://www.suse.com/security/cve/CVE-2023-27954/" source="CVE"/>
		<reference ref_id="CVE-2023-28198" ref_url="https://www.suse.com/security/cve/CVE-2023-28198/" source="CVE"/>
		<reference ref_id="CVE-2023-28204" ref_url="https://www.suse.com/security/cve/CVE-2023-28204/" source="CVE"/>
		<reference ref_id="CVE-2023-28205" ref_url="https://www.suse.com/security/cve/CVE-2023-28205/" source="CVE"/>
		<reference ref_id="CVE-2023-32359" ref_url="https://www.suse.com/security/cve/CVE-2023-32359/" source="CVE"/>
		<reference ref_id="CVE-2023-32370" ref_url="https://www.suse.com/security/cve/CVE-2023-32370/" source="CVE"/>
		<reference ref_id="CVE-2023-32373" ref_url="https://www.suse.com/security/cve/CVE-2023-32373/" source="CVE"/>
		<reference ref_id="CVE-2023-32393" ref_url="https://www.suse.com/security/cve/CVE-2023-32393/" source="CVE"/>
		<reference ref_id="CVE-2023-32435" ref_url="https://www.suse.com/security/cve/CVE-2023-32435/" source="CVE"/>
		<reference ref_id="CVE-2023-32439" ref_url="https://www.suse.com/security/cve/CVE-2023-32439/" source="CVE"/>
		<reference ref_id="CVE-2023-35074" ref_url="https://www.suse.com/security/cve/CVE-2023-35074/" source="CVE"/>
		<reference ref_id="CVE-2023-37450" ref_url="https://www.suse.com/security/cve/CVE-2023-37450/" source="CVE"/>
		<reference ref_id="CVE-2023-38133" ref_url="https://www.suse.com/security/cve/CVE-2023-38133/" source="CVE"/>
		<reference ref_id="CVE-2023-38572" ref_url="https://www.suse.com/security/cve/CVE-2023-38572/" source="CVE"/>
		<reference ref_id="CVE-2023-38592" ref_url="https://www.suse.com/security/cve/CVE-2023-38592/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-38597" ref_url="https://www.suse.com/security/cve/CVE-2023-38597/" source="CVE"/>
		<reference ref_id="CVE-2023-38599" ref_url="https://www.suse.com/security/cve/CVE-2023-38599/" source="CVE"/>
		<reference ref_id="CVE-2023-38600" ref_url="https://www.suse.com/security/cve/CVE-2023-38600/" source="CVE"/>
		<reference ref_id="CVE-2023-38611" ref_url="https://www.suse.com/security/cve/CVE-2023-38611/" source="CVE"/>
		<reference ref_id="CVE-2023-39434" ref_url="https://www.suse.com/security/cve/CVE-2023-39434/" source="CVE"/>
		<reference ref_id="CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928/" source="CVE"/>
		<reference ref_id="CVE-2023-40397" ref_url="https://www.suse.com/security/cve/CVE-2023-40397/" source="CVE"/>
		<reference ref_id="CVE-2023-40414" ref_url="https://www.suse.com/security/cve/CVE-2023-40414/" source="CVE"/>
		<reference ref_id="CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451/" source="CVE"/>
		<reference ref_id="CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074/" source="CVE"/>
		<reference ref_id="CVE-2023-41983" ref_url="https://www.suse.com/security/cve/CVE-2023-41983/" source="CVE"/>
		<reference ref_id="CVE-2023-41993" ref_url="https://www.suse.com/security/cve/CVE-2023-41993/" source="CVE"/>
		<reference ref_id="CVE-2023-42833" ref_url="https://www.suse.com/security/cve/CVE-2023-42833/" source="CVE"/>
		<reference ref_id="CVE-2023-42843" ref_url="https://www.suse.com/security/cve/CVE-2023-42843/" source="CVE"/>
		<reference ref_id="CVE-2023-42852" ref_url="https://www.suse.com/security/cve/CVE-2023-42852/" source="CVE"/>
		<reference ref_id="CVE-2023-42875" ref_url="https://www.suse.com/security/cve/CVE-2023-42875/" source="CVE"/>
		<reference ref_id="CVE-2023-42883" ref_url="https://www.suse.com/security/cve/CVE-2023-42883/" source="CVE"/>
		<reference ref_id="CVE-2023-42890" ref_url="https://www.suse.com/security/cve/CVE-2023-42890/" source="CVE"/>
		<reference ref_id="CVE-2023-42916" ref_url="https://www.suse.com/security/cve/CVE-2023-42916/" source="CVE"/>
		<reference ref_id="CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917/" source="CVE"/>
		<reference ref_id="CVE-2023-42950" ref_url="https://www.suse.com/security/cve/CVE-2023-42950/" source="CVE"/>
		<reference ref_id="CVE-2023-42956" ref_url="https://www.suse.com/security/cve/CVE-2023-42956/" source="CVE"/>
		<reference ref_id="CVE-2023-42970" ref_url="https://www.suse.com/security/cve/CVE-2023-42970/" source="CVE"/>
		<reference ref_id="CVE-2024-23206" ref_url="https://www.suse.com/security/cve/CVE-2024-23206/" source="CVE"/>
		<reference ref_id="CVE-2024-23213" ref_url="https://www.suse.com/security/cve/CVE-2024-23213/" source="CVE"/>
		<reference ref_id="CVE-2024-23222" ref_url="https://www.suse.com/security/cve/CVE-2024-23222/" source="CVE"/>
		<reference ref_id="CVE-2024-23226" ref_url="https://www.suse.com/security/cve/CVE-2024-23226/" source="CVE"/>
		<reference ref_id="CVE-2024-23252" ref_url="https://www.suse.com/security/cve/CVE-2024-23252/" source="CVE"/>
		<reference ref_id="CVE-2024-23254" ref_url="https://www.suse.com/security/cve/CVE-2024-23254/" source="CVE"/>
		<reference ref_id="CVE-2024-23263" ref_url="https://www.suse.com/security/cve/CVE-2024-23263/" source="CVE"/>
		<reference ref_id="CVE-2024-23271" ref_url="https://www.suse.com/security/cve/CVE-2024-23271/" source="CVE"/>
		<reference ref_id="CVE-2024-23280" ref_url="https://www.suse.com/security/cve/CVE-2024-23280/" source="CVE"/>
		<reference ref_id="CVE-2024-23284" ref_url="https://www.suse.com/security/cve/CVE-2024-23284/" source="CVE"/>
		<reference ref_id="CVE-2024-27808" ref_url="https://www.suse.com/security/cve/CVE-2024-27808/" source="CVE"/>
		<reference ref_id="CVE-2024-27820" ref_url="https://www.suse.com/security/cve/CVE-2024-27820/" source="CVE"/>
		<reference ref_id="CVE-2024-27833" ref_url="https://www.suse.com/security/cve/CVE-2024-27833/" source="CVE"/>
		<reference ref_id="CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834/" source="CVE"/>
		<reference ref_id="CVE-2024-27838" ref_url="https://www.suse.com/security/cve/CVE-2024-27838/" source="CVE"/>
		<reference ref_id="CVE-2024-27851" ref_url="https://www.suse.com/security/cve/CVE-2024-27851/" source="CVE"/>
		<reference ref_id="CVE-2024-27856" ref_url="https://www.suse.com/security/cve/CVE-2024-27856/" source="CVE"/>
		<reference ref_id="CVE-2024-40776" ref_url="https://www.suse.com/security/cve/CVE-2024-40776/" source="CVE"/>
		<reference ref_id="CVE-2024-40779" ref_url="https://www.suse.com/security/cve/CVE-2024-40779/" source="CVE"/>
		<reference ref_id="CVE-2024-40780" ref_url="https://www.suse.com/security/cve/CVE-2024-40780/" source="CVE"/>
		<reference ref_id="CVE-2024-40782" ref_url="https://www.suse.com/security/cve/CVE-2024-40782/" source="CVE"/>
		<reference ref_id="CVE-2024-40789" ref_url="https://www.suse.com/security/cve/CVE-2024-40789/" source="CVE"/>
		<reference ref_id="CVE-2024-40866" ref_url="https://www.suse.com/security/cve/CVE-2024-40866/" source="CVE"/>
		<reference ref_id="CVE-2024-44185" ref_url="https://www.suse.com/security/cve/CVE-2024-44185/" source="CVE"/>
		<reference ref_id="CVE-2024-44187" ref_url="https://www.suse.com/security/cve/CVE-2024-44187/" source="CVE"/>
		<reference ref_id="CVE-2024-44192" ref_url="https://www.suse.com/security/cve/CVE-2024-44192/" source="CVE"/>
		<reference ref_id="CVE-2024-44244" ref_url="https://www.suse.com/security/cve/CVE-2024-44244/" source="CVE"/>
		<reference ref_id="CVE-2024-44296" ref_url="https://www.suse.com/security/cve/CVE-2024-44296/" source="CVE"/>
		<reference ref_id="CVE-2024-44308" ref_url="https://www.suse.com/security/cve/CVE-2024-44308/" source="CVE"/>
		<reference ref_id="CVE-2024-44309" ref_url="https://www.suse.com/security/cve/CVE-2024-44309/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<reference ref_id="CVE-2024-54467" ref_url="https://www.suse.com/security/cve/CVE-2024-54467/" source="CVE"/>
		<reference ref_id="CVE-2024-54479" ref_url="https://www.suse.com/security/cve/CVE-2024-54479/" source="CVE"/>
		<reference ref_id="CVE-2024-54502" ref_url="https://www.suse.com/security/cve/CVE-2024-54502/" source="CVE"/>
		<reference ref_id="CVE-2024-54505" ref_url="https://www.suse.com/security/cve/CVE-2024-54505/" source="CVE"/>
		<reference ref_id="CVE-2024-54508" ref_url="https://www.suse.com/security/cve/CVE-2024-54508/" source="CVE"/>
		<reference ref_id="CVE-2024-54534" ref_url="https://www.suse.com/security/cve/CVE-2024-54534/" source="CVE"/>
		<reference ref_id="CVE-2024-54543" ref_url="https://www.suse.com/security/cve/CVE-2024-54543/" source="CVE"/>
		<reference ref_id="CVE-2024-54551" ref_url="https://www.suse.com/security/cve/CVE-2024-54551/" source="CVE"/>
		<reference ref_id="CVE-2024-54658" ref_url="https://www.suse.com/security/cve/CVE-2024-54658/" source="CVE"/>
		<reference ref_id="CVE-2025-24143" ref_url="https://www.suse.com/security/cve/CVE-2025-24143/" source="CVE"/>
		<reference ref_id="CVE-2025-24150" ref_url="https://www.suse.com/security/cve/CVE-2025-24150/" source="CVE"/>
		<reference ref_id="CVE-2025-24158" ref_url="https://www.suse.com/security/cve/CVE-2025-24158/" source="CVE"/>
		<reference ref_id="CVE-2025-24162" ref_url="https://www.suse.com/security/cve/CVE-2025-24162/" source="CVE"/>
		<reference ref_id="CVE-2025-24189" ref_url="https://www.suse.com/security/cve/CVE-2025-24189/" source="CVE"/>
		<reference ref_id="CVE-2025-24201" ref_url="https://www.suse.com/security/cve/CVE-2025-24201/" source="CVE"/>
		<reference ref_id="CVE-2025-24208" ref_url="https://www.suse.com/security/cve/CVE-2025-24208/" source="CVE"/>
		<reference ref_id="CVE-2025-24209" ref_url="https://www.suse.com/security/cve/CVE-2025-24209/" source="CVE"/>
		<reference ref_id="CVE-2025-24213" ref_url="https://www.suse.com/security/cve/CVE-2025-24213/" source="CVE"/>
		<reference ref_id="CVE-2025-24216" ref_url="https://www.suse.com/security/cve/CVE-2025-24216/" source="CVE"/>
		<reference ref_id="CVE-2025-24223" ref_url="https://www.suse.com/security/cve/CVE-2025-24223/" source="CVE"/>
		<reference ref_id="CVE-2025-24264" ref_url="https://www.suse.com/security/cve/CVE-2025-24264/" source="CVE"/>
		<reference ref_id="CVE-2025-30427" ref_url="https://www.suse.com/security/cve/CVE-2025-30427/" source="CVE"/>
		<reference ref_id="CVE-2025-31204" ref_url="https://www.suse.com/security/cve/CVE-2025-31204/" source="CVE"/>
		<reference ref_id="CVE-2025-31205" ref_url="https://www.suse.com/security/cve/CVE-2025-31205/" source="CVE"/>
		<reference ref_id="CVE-2025-31206" ref_url="https://www.suse.com/security/cve/CVE-2025-31206/" source="CVE"/>
		<reference ref_id="CVE-2025-31215" ref_url="https://www.suse.com/security/cve/CVE-2025-31215/" source="CVE"/>
		<reference ref_id="CVE-2025-31257" ref_url="https://www.suse.com/security/cve/CVE-2025-31257/" source="CVE"/>
		<reference ref_id="CVE-2025-31273" ref_url="https://www.suse.com/security/cve/CVE-2025-31273/" source="CVE"/>
		<reference ref_id="CVE-2025-31278" ref_url="https://www.suse.com/security/cve/CVE-2025-31278/" source="CVE"/>
		<reference ref_id="CVE-2025-43211" ref_url="https://www.suse.com/security/cve/CVE-2025-43211/" source="CVE"/>
		<reference ref_id="CVE-2025-43212" ref_url="https://www.suse.com/security/cve/CVE-2025-43212/" source="CVE"/>
		<reference ref_id="CVE-2025-43216" ref_url="https://www.suse.com/security/cve/CVE-2025-43216/" source="CVE"/>
		<reference ref_id="CVE-2025-43227" ref_url="https://www.suse.com/security/cve/CVE-2025-43227/" source="CVE"/>
		<reference ref_id="CVE-2025-43228" ref_url="https://www.suse.com/security/cve/CVE-2025-43228/" source="CVE"/>
		<reference ref_id="CVE-2025-43240" ref_url="https://www.suse.com/security/cve/CVE-2025-43240/" source="CVE"/>
		<reference ref_id="CVE-2025-43265" ref_url="https://www.suse.com/security/cve/CVE-2025-43265/" source="CVE"/>
		<reference ref_id="CVE-2025-6558" ref_url="https://www.suse.com/security/cve/CVE-2025-6558/" source="CVE"/>
		<description>
These are all security issues fixed in the WebKitGTK-4.1-lang-2.48.5-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1856">CVE-2016-1856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1857">CVE-2016-1857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4590">CVE-2016-4590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4591">CVE-2016-4591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4622">CVE-2016-4622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4624">CVE-2016-4624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4692">CVE-2016-4692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4743">CVE-2016-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7586">CVE-2016-7586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7587">CVE-2016-7587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7589">CVE-2016-7589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7592">CVE-2016-7592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7598">CVE-2016-7598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7599">CVE-2016-7599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7610">CVE-2016-7610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7623">CVE-2016-7623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7632">CVE-2016-7632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7635">CVE-2016-7635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7639">CVE-2016-7639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7641">CVE-2016-7641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7645">CVE-2016-7645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7652">CVE-2016-7652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7654">CVE-2016-7654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7656">CVE-2016-7656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000121">CVE-2017-1000121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000122/">CVE-2017-1000122 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000122">CVE-2017-1000122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13788">CVE-2017-13788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13798">CVE-2017-13798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13803">CVE-2017-13803 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13856">CVE-2017-13856 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13866">CVE-2017-13866 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13870">CVE-2017-13870 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13884">CVE-2017-13884 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13885">CVE-2017-13885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2350">CVE-2017-2350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2354">CVE-2017-2354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2355">CVE-2017-2355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2356">CVE-2017-2356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2362">CVE-2017-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2363">CVE-2017-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2364">CVE-2017-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2365">CVE-2017-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2366">CVE-2017-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2369">CVE-2017-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2371">CVE-2017-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2373">CVE-2017-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2496">CVE-2017-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2510">CVE-2017-2510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2538">CVE-2017-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2539">CVE-2017-2539 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7006">CVE-2017-7006 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7011">CVE-2017-7011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7012">CVE-2017-7012 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7018">CVE-2017-7018 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7019">CVE-2017-7019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7020">CVE-2017-7020 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7030">CVE-2017-7030 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7034">CVE-2017-7034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7037">CVE-2017-7037 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7038">CVE-2017-7038 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7039">CVE-2017-7039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7040">CVE-2017-7040 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7041">CVE-2017-7041 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7042">CVE-2017-7042 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7043">CVE-2017-7043 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7046">CVE-2017-7046 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7048">CVE-2017-7048 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7049">CVE-2017-7049 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7052">CVE-2017-7052 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7055">CVE-2017-7055 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7056">CVE-2017-7056 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7059">CVE-2017-7059 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7061">CVE-2017-7061 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7064">CVE-2017-7064 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7081">CVE-2017-7081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7087">CVE-2017-7087 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7089">CVE-2017-7089 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7090">CVE-2017-7090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7091">CVE-2017-7091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7092">CVE-2017-7092 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7093">CVE-2017-7093 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7094">CVE-2017-7094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7095">CVE-2017-7095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7096">CVE-2017-7096 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7098">CVE-2017-7098 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7099">CVE-2017-7099 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7100">CVE-2017-7100 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7102">CVE-2017-7102 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7104">CVE-2017-7104 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7107">CVE-2017-7107 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7109">CVE-2017-7109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7111">CVE-2017-7111 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7117">CVE-2017-7117 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7120">CVE-2017-7120 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7142">CVE-2017-7142 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7153">CVE-2017-7153 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7156">CVE-2017-7156 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7157">CVE-2017-7157 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7160">CVE-2017-7160 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7161">CVE-2017-7161 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7165">CVE-2017-7165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11646">CVE-2018-11646 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11712">CVE-2018-11712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11713">CVE-2018-11713 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12911">CVE-2018-12911 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4088">CVE-2018-4088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4096">CVE-2018-4096 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4101">CVE-2018-4101 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4113">CVE-2018-4113 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4114">CVE-2018-4114 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4117">CVE-2018-4117 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4118">CVE-2018-4118 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4119">CVE-2018-4119 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4120">CVE-2018-4120 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4122">CVE-2018-4122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4125">CVE-2018-4125 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4127">CVE-2018-4127 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4128">CVE-2018-4128 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4129">CVE-2018-4129 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4133">CVE-2018-4133 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4146">CVE-2018-4146 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4161">CVE-2018-4161 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4162">CVE-2018-4162 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4163">CVE-2018-4163 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4165">CVE-2018-4165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4190">CVE-2018-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4191">CVE-2018-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4197">CVE-2018-4197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4199">CVE-2018-4199 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4200">CVE-2018-4200 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4204">CVE-2018-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4207">CVE-2018-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4208">CVE-2018-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4209">CVE-2018-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4210">CVE-2018-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4212">CVE-2018-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4213">CVE-2018-4213 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4218">CVE-2018-4218 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4222">CVE-2018-4222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4232">CVE-2018-4232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4233">CVE-2018-4233 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4246">CVE-2018-4246 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4261">CVE-2018-4261 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4262">CVE-2018-4262 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4263">CVE-2018-4263 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4264">CVE-2018-4264 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4265">CVE-2018-4265 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4266">CVE-2018-4266 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4267">CVE-2018-4267 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4270">CVE-2018-4270 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4272">CVE-2018-4272 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4273">CVE-2018-4273 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4278">CVE-2018-4278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4284">CVE-2018-4284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4299">CVE-2018-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4306">CVE-2018-4306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4309">CVE-2018-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4312">CVE-2018-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4314">CVE-2018-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4315">CVE-2018-4315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4316">CVE-2018-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4317">CVE-2018-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4318">CVE-2018-4318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4319">CVE-2018-4319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4323">CVE-2018-4323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4328">CVE-2018-4328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4345">CVE-2018-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4358">CVE-2018-4358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4359">CVE-2018-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4361">CVE-2018-4361 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4372">CVE-2018-4372 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4373">CVE-2018-4373 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4375">CVE-2018-4375 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4376">CVE-2018-4376 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4378">CVE-2018-4378 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4382">CVE-2018-4382 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4386">CVE-2018-4386 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4392">CVE-2018-4392 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4416">CVE-2018-4416 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4437">CVE-2018-4437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4438">CVE-2018-4438 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4441">CVE-2018-4441 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4442">CVE-2018-4442 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4443">CVE-2018-4443 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4464">CVE-2018-4464 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11070">CVE-2019-11070 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6201">CVE-2019-6201 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6212">CVE-2019-6212 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6215">CVE-2019-6215 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6216">CVE-2019-6216 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6217">CVE-2019-6217 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6226">CVE-2019-6226 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6227">CVE-2019-6227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6229">CVE-2019-6229 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6233">CVE-2019-6233 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6234">CVE-2019-6234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6251">CVE-2019-6251 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7285">CVE-2019-7285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7292">CVE-2019-7292 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8375">CVE-2019-8375 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8503">CVE-2019-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8506">CVE-2019-8506 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8515">CVE-2019-8515 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8518/">CVE-2019-8518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8518">CVE-2019-8518 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8523/">CVE-2019-8523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8523">CVE-2019-8523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8524">CVE-2019-8524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8535">CVE-2019-8535 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8536">CVE-2019-8536 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8544">CVE-2019-8544 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8735">CVE-2019-8735 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13543">CVE-2020-13543 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9952">CVE-2020-9952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9983">CVE-2020-9983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1820">CVE-2021-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1825">CVE-2021-1825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1826">CVE-2021-1826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30761">CVE-2021-30761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30762">CVE-2021-30762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762">CVE-2021-42762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0108/">CVE-2022-0108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0108">CVE-2022-0108 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22662/">CVE-2022-22662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22662">CVE-2022-22662 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22677/">CVE-2022-22677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22677">CVE-2022-22677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26710/">CVE-2022-26710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26710">CVE-2022-26710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32792/">CVE-2022-32792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32792">CVE-2022-32792 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32816/">CVE-2022-32816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32816">CVE-2022-32816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32885/">CVE-2022-32885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32885">CVE-2022-32885 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32886">CVE-2022-32886 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32888/">CVE-2022-32888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32888">CVE-2022-32888 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-32891/">CVE-2022-32891 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32891">CVE-2022-32891 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32893/">CVE-2022-32893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32893">CVE-2022-32893 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32912/">CVE-2022-32912 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32912">CVE-2022-32912 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32919/">CVE-2022-32919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32919">CVE-2022-32919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32923/">CVE-2022-32923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32923">CVE-2022-32923 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32933/">CVE-2022-32933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32933">CVE-2022-32933 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42799/">CVE-2022-42799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42799">CVE-2022-42799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42823/">CVE-2022-42823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42823">CVE-2022-42823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42824/">CVE-2022-42824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42824">CVE-2022-42824 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42826/">CVE-2022-42826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42826">CVE-2022-42826 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42852/">CVE-2022-42852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42852">CVE-2022-42852 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42856/">CVE-2022-42856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42856">CVE-2022-42856 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42863/">CVE-2022-42863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42863">CVE-2022-42863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42867/">CVE-2022-42867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42867">CVE-2022-42867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46691/">CVE-2022-46691 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46691">CVE-2022-46691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46692/">CVE-2022-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46692">CVE-2022-46692 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-46698/">CVE-2022-46698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46698">CVE-2022-46698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46699/">CVE-2022-46699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46699">CVE-2022-46699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46700/">CVE-2022-46700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46700">CVE-2022-46700 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46705/">CVE-2022-46705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46705">CVE-2022-46705 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46725/">CVE-2022-46725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46725">CVE-2022-46725 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48503/">CVE-2022-48503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503">CVE-2022-48503 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23517/">CVE-2023-23517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23517">CVE-2023-23517 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23518/">CVE-2023-23518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23518">CVE-2023-23518 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23529/">CVE-2023-23529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23529">CVE-2023-23529 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25358/">CVE-2023-25358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25358">CVE-2023-25358 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25360/">CVE-2023-25360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25360">CVE-2023-25360 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25361/">CVE-2023-25361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25361">CVE-2023-25361 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25362/">CVE-2023-25362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25362">CVE-2023-25362 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25363/">CVE-2023-25363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25363">CVE-2023-25363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27932/">CVE-2023-27932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27932">CVE-2023-27932 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-27954/">CVE-2023-27954 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27954">CVE-2023-27954 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28198/">CVE-2023-28198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28198">CVE-2023-28198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28204/">CVE-2023-28204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28204">CVE-2023-28204 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28205/">CVE-2023-28205 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28205">CVE-2023-28205 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32359/">CVE-2023-32359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-32370/">CVE-2023-32370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32370">CVE-2023-32370 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32373/">CVE-2023-32373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32373">CVE-2023-32373 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32393/">CVE-2023-32393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32393">CVE-2023-32393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32435/">CVE-2023-32435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435">CVE-2023-32435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32439/">CVE-2023-32439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439">CVE-2023-32439 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35074/">CVE-2023-35074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35074">CVE-2023-35074 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37450/">CVE-2023-37450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37450">CVE-2023-37450 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38133/">CVE-2023-38133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38133">CVE-2023-38133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38572/">CVE-2023-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38572">CVE-2023-38572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38592/">CVE-2023-38592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38592">CVE-2023-38592 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38597/">CVE-2023-38597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38597">CVE-2023-38597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38599/">CVE-2023-38599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38599">CVE-2023-38599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38600/">CVE-2023-38600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38600">CVE-2023-38600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38611/">CVE-2023-38611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38611">CVE-2023-38611 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39434/">CVE-2023-39434 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39434">CVE-2023-39434 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40397/">CVE-2023-40397 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40397">CVE-2023-40397 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40414/">CVE-2023-40414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40414">CVE-2023-40414 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41983/">CVE-2023-41983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41983">CVE-2023-41983 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-41993/">CVE-2023-41993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41993">CVE-2023-41993 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42833/">CVE-2023-42833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42833">CVE-2023-42833 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42843/">CVE-2023-42843 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42843">CVE-2023-42843 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42852/">CVE-2023-42852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42852">CVE-2023-42852 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42875/">CVE-2023-42875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42875">CVE-2023-42875 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42883/">CVE-2023-42883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42883">CVE-2023-42883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42890/">CVE-2023-42890 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42890">CVE-2023-42890 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42916/">CVE-2023-42916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42916">CVE-2023-42916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42950/">CVE-2023-42950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42950">CVE-2023-42950 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42956/">CVE-2023-42956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42956">CVE-2023-42956 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42970/">CVE-2023-42970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42970">CVE-2023-42970 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23206/">CVE-2024-23206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23206">CVE-2024-23206 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23213/">CVE-2024-23213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23213">CVE-2024-23213 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23222/">CVE-2024-23222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23222">CVE-2024-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23226/">CVE-2024-23226 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23226">CVE-2024-23226 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23252/">CVE-2024-23252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23252">CVE-2024-23252 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23254/">CVE-2024-23254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23254">CVE-2024-23254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23263/">CVE-2024-23263 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23263">CVE-2024-23263 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-23271/">CVE-2024-23271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23271">CVE-2024-23271 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23280/">CVE-2024-23280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23280">CVE-2024-23280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23284/">CVE-2024-23284 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23284">CVE-2024-23284 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27808/">CVE-2024-27808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27808">CVE-2024-27808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27820/">CVE-2024-27820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27820">CVE-2024-27820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27833/">CVE-2024-27833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27833">CVE-2024-27833 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27838/">CVE-2024-27838 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27838">CVE-2024-27838 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27851/">CVE-2024-27851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27851">CVE-2024-27851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-27856/">CVE-2024-27856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27856">CVE-2024-27856 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-40776/">CVE-2024-40776 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40776">CVE-2024-40776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40779/">CVE-2024-40779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40779">CVE-2024-40779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40780/">CVE-2024-40780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40780">CVE-2024-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40782/">CVE-2024-40782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40782">CVE-2024-40782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40789/">CVE-2024-40789 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40789">CVE-2024-40789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-40866/">CVE-2024-40866 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40866">CVE-2024-40866 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44185/">CVE-2024-44185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44185">CVE-2024-44185 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44187/">CVE-2024-44187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44187">CVE-2024-44187 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44192/">CVE-2024-44192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44192">CVE-2024-44192 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44244/">CVE-2024-44244 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44244">CVE-2024-44244 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44296/">CVE-2024-44296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44296">CVE-2024-44296 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44308/">CVE-2024-44308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44308">CVE-2024-44308 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-44309/">CVE-2024-44309 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44309">CVE-2024-44309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54467/">CVE-2024-54467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54467">CVE-2024-54467 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54479/">CVE-2024-54479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54479">CVE-2024-54479 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54502/">CVE-2024-54502 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54502">CVE-2024-54502 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54505/">CVE-2024-54505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54505">CVE-2024-54505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54508/">CVE-2024-54508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54508">CVE-2024-54508 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54534/">CVE-2024-54534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54534">CVE-2024-54534 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54543/">CVE-2024-54543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54543">CVE-2024-54543 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54551/">CVE-2024-54551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54551">CVE-2024-54551 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54658/">CVE-2024-54658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54658">CVE-2024-54658 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24143/">CVE-2025-24143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24143">CVE-2025-24143 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24150/">CVE-2025-24150 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24150">CVE-2025-24150 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24158/">CVE-2025-24158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24158">CVE-2025-24158 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24162/">CVE-2025-24162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24162">CVE-2025-24162 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24189/">CVE-2025-24189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24189">CVE-2025-24189 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24201/">CVE-2025-24201 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24201">CVE-2025-24201 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24208/">CVE-2025-24208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24208">CVE-2025-24208 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24209/">CVE-2025-24209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24209">CVE-2025-24209 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24213/">CVE-2025-24213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24213">CVE-2025-24213 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24216/">CVE-2025-24216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24216">CVE-2025-24216 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24223/">CVE-2025-24223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24223">CVE-2025-24223 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24264/">CVE-2025-24264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24264">CVE-2025-24264 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30427/">CVE-2025-30427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30427">CVE-2025-30427 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-31204/">CVE-2025-31204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31204">CVE-2025-31204 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-31205/">CVE-2025-31205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31205">CVE-2025-31205 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31206/">CVE-2025-31206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31206">CVE-2025-31206 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31215/">CVE-2025-31215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31215">CVE-2025-31215 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31257/">CVE-2025-31257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31257">CVE-2025-31257 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31273/">CVE-2025-31273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31273">CVE-2025-31273 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31278/">CVE-2025-31278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31278">CVE-2025-31278 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43211/">CVE-2025-43211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43211">CVE-2025-43211 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43212/">CVE-2025-43212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43212">CVE-2025-43212 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43216/">CVE-2025-43216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43216">CVE-2025-43216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43227/">CVE-2025-43227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43227">CVE-2025-43227 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-43228/">CVE-2025-43228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43228">CVE-2025-43228 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43240/">CVE-2025-43240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43240">CVE-2025-43240 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43265/">CVE-2025-43265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43265">CVE-2025-43265 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-6558/">CVE-2025-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6558">CVE-2025-6558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026057" comment="WebKitGTK-4.1-lang-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026058" comment="WebKitGTK-6.0-lang-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026059" comment="libjavascriptcoregtk-4_1-0-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026060" comment="libjavascriptcoregtk-6_0-1-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026061" comment="libwebkit2gtk-4_1-0-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026062" comment="libwebkitgtk-6_0-4-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026063" comment="typelib-1_0-JavaScriptCore-4_1-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026064" comment="typelib-1_0-JavaScriptCore-6_0-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026065" comment="typelib-1_0-WebKit-6_0-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026066" comment="typelib-1_0-WebKit2-4_1-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026067" comment="typelib-1_0-WebKit2WebExtension-4_1-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026068" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026069" comment="webkit-jsc-4.1-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026070" comment="webkit-jsc-6.0-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026071" comment="webkit2gtk-4_1-injected-bundles-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026072" comment="webkit2gtk3-minibrowser-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026073" comment="webkit2gtk4-minibrowser-2.48.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026074" comment="webkitgtk-6_0-injected-bundles-2.48.5-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93677" version="1" class="patch">
	<metadata>
		<title>aaa_base-84.87+git20250429.1cad3bc-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-84.87+git20250429.1cad3bc-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0461">CVE-2011-0461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026075" comment="aaa_base-84.87+git20250429.1cad3bc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026076" comment="aaa_base-extras-84.87+git20250429.1cad3bc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026077" comment="aaa_base-malloccheck-84.87+git20250429.1cad3bc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026078" comment="aaa_base-wsl-84.87+git20250429.1cad3bc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026079" comment="aaa_base-yama-enable-ptrace-84.87+git20250429.1cad3bc-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93678" version="1" class="patch">
	<metadata>
		<title>aardvark-dns-1.14.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-8418" ref_url="https://www.suse.com/security/cve/CVE-2024-8418/" source="CVE"/>
		<description>
These are all security issues fixed in the aardvark-dns-1.14.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8418/">CVE-2024-8418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8418">CVE-2024-8418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026080" comment="aardvark-dns-1.14.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93679" version="1" class="patch">
	<metadata>
		<title>accountsservice-23.13.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<reference ref_id="CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-23.13.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2737">CVE-2012-2737 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14036">CVE-2018-14036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026081" comment="accountsservice-23.13.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026082" comment="accountsservice-devel-23.13.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026083" comment="accountsservice-lang-23.13.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026084" comment="accountsservice-vala-23.13.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026085" comment="libaccountsservice0-23.13.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026086" comment="typelib-1_0-AccountsService-1_0-23.13.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93680" version="1" class="patch">
	<metadata>
		<title>afterburn-5.8.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-35905" ref_url="https://www.suse.com/security/cve/CVE-2020-35905/" source="CVE"/>
		<reference ref_id="CVE-2020-36465" ref_url="https://www.suse.com/security/cve/CVE-2020-36465/" source="CVE"/>
		<reference ref_id="CVE-2021-27378" ref_url="https://www.suse.com/security/cve/CVE-2021-27378/" source="CVE"/>
		<reference ref_id="CVE-2021-32714" ref_url="https://www.suse.com/security/cve/CVE-2021-32714/" source="CVE"/>
		<reference ref_id="CVE-2021-32715" ref_url="https://www.suse.com/security/cve/CVE-2021-32715/" source="CVE"/>
		<reference ref_id="CVE-2021-38191" ref_url="https://www.suse.com/security/cve/CVE-2021-38191/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the afterburn-5.8.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35905/">CVE-2020-35905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35905">CVE-2020-35905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36465/">CVE-2020-36465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36465">CVE-2020-36465 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27378/">CVE-2021-27378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27378">CVE-2021-27378 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32714/">CVE-2021-32714 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32714">CVE-2021-32714 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32715/">CVE-2021-32715 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32715">CVE-2021-32715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38191/">CVE-2021-38191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-38191">CVE-2021-38191 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026087" comment="afterburn-5.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026088" comment="afterburn-dracut-5.8.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93681" version="1" class="patch">
	<metadata>
		<title>agama-scripts-17+359.34bc8cc0b-160000.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<description>
These are all security issues fixed in the agama-scripts-17+359.34bc8cc0b-160000.5.1 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026089" comment="agama-scripts-17+359.34bc8cc0b-160000.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93682" version="1" class="patch">
	<metadata>
		<title>aide-0.18.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
These are all security issues fixed in the aide-0.18.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026090" comment="aide-0.18.8-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93683" version="1" class="patch">
	<metadata>
		<title>alloy-1.9.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-36129" ref_url="https://www.suse.com/security/cve/CVE-2024-36129/" source="CVE"/>
		<reference ref_id="CVE-2024-8975" ref_url="https://www.suse.com/security/cve/CVE-2024-8975/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-46327" ref_url="https://www.suse.com/security/cve/CVE-2025-46327/" source="CVE"/>
		<description>
These are all security issues fixed in the alloy-1.9.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36129/">CVE-2024-36129 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36129">CVE-2024-36129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8975/">CVE-2024-8975 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8975">CVE-2024-8975 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46327/">CVE-2025-46327 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46327">CVE-2025-46327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026091" comment="alloy-1.9.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93684" version="1" class="patch">
	<metadata>
		<title>alsa-1.2.14-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.2.14-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0035">CVE-2009-0035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026092" comment="alsa-1.2.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026093" comment="alsa-devel-1.2.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026094" comment="alsa-docs-1.2.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026095" comment="alsa-topology-devel-1.2.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026096" comment="libasound2-1.2.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026097" comment="libatopology2-1.2.14-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93685" version="1" class="patch">
	<metadata>
		<title>amazon-ssm-agent-3.3.2299.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-29527" ref_url="https://www.suse.com/security/cve/CVE-2022-29527/" source="CVE"/>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the amazon-ssm-agent-3.3.2299.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29527/">CVE-2022-29527 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29527">CVE-2022-29527 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026098" comment="amazon-ssm-agent-3.3.2299.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93686" version="1" class="patch">
	<metadata>
		<title>ansible-11.3.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-4966" ref_url="https://www.suse.com/security/cve/CVE-2014-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-4967" ref_url="https://www.suse.com/security/cve/CVE-2014-4967/" source="CVE"/>
		<reference ref_id="CVE-2015-3908" ref_url="https://www.suse.com/security/cve/CVE-2015-3908/" source="CVE"/>
		<reference ref_id="CVE-2016-3096" ref_url="https://www.suse.com/security/cve/CVE-2016-3096/" source="CVE"/>
		<reference ref_id="CVE-2016-8614" ref_url="https://www.suse.com/security/cve/CVE-2016-8614/" source="CVE"/>
		<reference ref_id="CVE-2016-8628" ref_url="https://www.suse.com/security/cve/CVE-2016-8628/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1744" ref_url="https://www.suse.com/security/cve/CVE-2020-1744/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-11.3.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4966/">CVE-2014-4966 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4966">CVE-2014-4966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4967/">CVE-2014-4967 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4967">CVE-2014-4967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3908/">CVE-2015-3908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3908">CVE-2015-3908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3096/">CVE-2016-3096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3096">CVE-2016-3096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8614/">CVE-2016-8614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8614">CVE-2016-8614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8628/">CVE-2016-8628 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8628">CVE-2016-8628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7481">CVE-2017-7481 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1744/">CVE-2020-1744 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1744">CVE-2020-1744 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026099" comment="ansible-11.3.0-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93687" version="1" class="patch">
	<metadata>
		<title>ansible-core-2.18.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-5115" ref_url="https://www.suse.com/security/cve/CVE-2023-5115/" source="CVE"/>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<reference ref_id="CVE-2024-11079" ref_url="https://www.suse.com/security/cve/CVE-2024-11079/" source="CVE"/>
		<reference ref_id="CVE-2024-8775" ref_url="https://www.suse.com/security/cve/CVE-2024-8775/" source="CVE"/>
		<reference ref_id="CVE-2024-9902" ref_url="https://www.suse.com/security/cve/CVE-2024-9902/" source="CVE"/>
		<description>
These are all security issues fixed in the ansible-core-2.18.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5115/">CVE-2023-5115 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5115">CVE-2023-5115 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-11079/">CVE-2024-11079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11079">CVE-2024-11079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8775/">CVE-2024-8775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8775">CVE-2024-8775 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9902/">CVE-2024-9902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9902">CVE-2024-9902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026100" comment="ansible-core-2.18.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93688" version="1" class="patch">
	<metadata>
		<title>ant-1.10.15-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<reference ref_id="CVE-2020-11979" ref_url="https://www.suse.com/security/cve/CVE-2020-11979/" source="CVE"/>
		<reference ref_id="CVE-2020-1945" ref_url="https://www.suse.com/security/cve/CVE-2020-1945/" source="CVE"/>
		<reference ref_id="CVE-2021-36373" ref_url="https://www.suse.com/security/cve/CVE-2021-36373/" source="CVE"/>
		<reference ref_id="CVE-2021-36374" ref_url="https://www.suse.com/security/cve/CVE-2021-36374/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.10.15-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11979/">CVE-2020-11979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11979">CVE-2020-11979 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1945/">CVE-2020-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1945">CVE-2020-1945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36373/">CVE-2021-36373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36373">CVE-2021-36373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36374/">CVE-2021-36374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36374">CVE-2021-36374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026101" comment="ant-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026102" comment="ant-antlr-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026103" comment="ant-apache-bcel-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026104" comment="ant-apache-bsf-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026105" comment="ant-apache-log4j-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026106" comment="ant-apache-oro-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026107" comment="ant-apache-regexp-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026108" comment="ant-apache-resolver-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026109" comment="ant-apache-xalan2-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026110" comment="ant-commons-logging-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026111" comment="ant-commons-net-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026112" comment="ant-imageio-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026113" comment="ant-jakartamail-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026114" comment="ant-javamail-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026115" comment="ant-jdepend-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026116" comment="ant-jmf-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026117" comment="ant-jsch-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026118" comment="ant-junit-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026119" comment="ant-junit5-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026120" comment="ant-manual-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026121" comment="ant-scripts-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026122" comment="ant-swing-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026123" comment="ant-testutil-1.10.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026124" comment="ant-xz-1.10.15-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93689" version="1" class="patch">
	<metadata>
		<title>aom-tools-3.11.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-30474" ref_url="https://www.suse.com/security/cve/CVE-2021-30474/" source="CVE"/>
		<reference ref_id="CVE-2021-30475" ref_url="https://www.suse.com/security/cve/CVE-2021-30475/" source="CVE"/>
		<description>
These are all security issues fixed in the aom-tools-3.11.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30474/">CVE-2021-30474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30474">CVE-2021-30474 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30475/">CVE-2021-30475 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30475">CVE-2021-30475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026125" comment="aom-tools-3.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026126" comment="libaom3-3.11.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93690" version="1" class="patch">
	<metadata>
		<title>apache-commons-beanutils-1.11.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0114" ref_url="https://www.suse.com/security/cve/CVE-2014-0114/" source="CVE"/>
		<reference ref_id="CVE-2014-3540" ref_url="https://www.suse.com/security/cve/CVE-2014-3540/" source="CVE"/>
		<reference ref_id="CVE-2015-4852" ref_url="https://www.suse.com/security/cve/CVE-2015-4852/" source="CVE"/>
		<reference ref_id="CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086/" source="CVE"/>
		<reference ref_id="CVE-2025-48734" ref_url="https://www.suse.com/security/cve/CVE-2025-48734/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-beanutils-1.11.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0114/">CVE-2014-0114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0114">CVE-2014-0114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3540/">CVE-2014-3540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3540">CVE-2014-3540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4852/">CVE-2015-4852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4852">CVE-2015-4852 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10086">CVE-2019-10086 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48734/">CVE-2025-48734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026127" comment="apache-commons-beanutils-1.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026128" comment="apache-commons-beanutils-javadoc-1.11.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93691" version="1" class="patch">
	<metadata>
		<title>apache-commons-compress-1.26.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-12402" ref_url="https://www.suse.com/security/cve/CVE-2019-12402/" source="CVE"/>
		<reference ref_id="CVE-2021-35515" ref_url="https://www.suse.com/security/cve/CVE-2021-35515/" source="CVE"/>
		<reference ref_id="CVE-2021-35516" ref_url="https://www.suse.com/security/cve/CVE-2021-35516/" source="CVE"/>
		<reference ref_id="CVE-2021-35517" ref_url="https://www.suse.com/security/cve/CVE-2021-35517/" source="CVE"/>
		<reference ref_id="CVE-2021-36090" ref_url="https://www.suse.com/security/cve/CVE-2021-36090/" source="CVE"/>
		<reference ref_id="CVE-2024-25710" ref_url="https://www.suse.com/security/cve/CVE-2024-25710/" source="CVE"/>
		<reference ref_id="CVE-2024-26308" ref_url="https://www.suse.com/security/cve/CVE-2024-26308/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-compress-1.26.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12402/">CVE-2019-12402 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12402">CVE-2019-12402 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35515/">CVE-2021-35515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35515">CVE-2021-35515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35516/">CVE-2021-35516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35516">CVE-2021-35516 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35517/">CVE-2021-35517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35517">CVE-2021-35517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36090/">CVE-2021-36090 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36090">CVE-2021-36090 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25710/">CVE-2024-25710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25710">CVE-2024-25710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26308/">CVE-2024-26308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26308">CVE-2024-26308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026129" comment="apache-commons-compress-1.26.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026130" comment="apache-commons-compress-javadoc-1.26.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93692" version="1" class="patch">
	<metadata>
		<title>apache-commons-configuration2-2.10.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-33980" ref_url="https://www.suse.com/security/cve/CVE-2022-33980/" source="CVE"/>
		<reference ref_id="CVE-2024-29131" ref_url="https://www.suse.com/security/cve/CVE-2024-29131/" source="CVE"/>
		<reference ref_id="CVE-2024-29133" ref_url="https://www.suse.com/security/cve/CVE-2024-29133/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-configuration2-2.10.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33980/">CVE-2022-33980 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33980">CVE-2022-33980 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29131/">CVE-2024-29131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29131">CVE-2024-29131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29133/">CVE-2024-29133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29133">CVE-2024-29133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026131" comment="apache-commons-configuration2-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026132" comment="apache-commons-configuration2-javadoc-2.10.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93693" version="1" class="patch">
	<metadata>
		<title>apache-commons-daemon-1.4.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-2729" ref_url="https://www.suse.com/security/cve/CVE-2011-2729/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-daemon-1.4.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2729/">CVE-2011-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2729">CVE-2011-2729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026133" comment="apache-commons-daemon-1.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026134" comment="apache-commons-daemon-javadoc-1.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026135" comment="apache-commons-daemon-jsvc-1.4.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93694" version="1" class="patch">
	<metadata>
		<title>apache-commons-httpclient-3.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-httpclient-3.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">CVE-2012-5783 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026136" comment="apache-commons-httpclient-3.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026137" comment="apache-commons-httpclient-demo-3.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026138" comment="apache-commons-httpclient-javadoc-3.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026139" comment="apache-commons-httpclient-manual-3.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93695" version="1" class="patch">
	<metadata>
		<title>apache-commons-io-2.18.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-29425" ref_url="https://www.suse.com/security/cve/CVE-2021-29425/" source="CVE"/>
		<reference ref_id="CVE-2024-47554" ref_url="https://www.suse.com/security/cve/CVE-2024-47554/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-io-2.18.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29425/">CVE-2021-29425 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29425">CVE-2021-29425 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47554/">CVE-2024-47554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47554">CVE-2024-47554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026140" comment="apache-commons-io-2.18.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026141" comment="apache-commons-io-javadoc-2.18.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93696" version="1" class="patch">
	<metadata>
		<title>apache-commons-lang3-3.18.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-48924" ref_url="https://www.suse.com/security/cve/CVE-2025-48924/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-lang3-3.18.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48924/">CVE-2025-48924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026142" comment="apache-commons-lang3-3.18.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026143" comment="apache-commons-lang3-javadoc-3.18.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93697" version="1" class="patch">
	<metadata>
		<title>apache-commons-net-3.9.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-37533" ref_url="https://www.suse.com/security/cve/CVE-2021-37533/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-net-3.9.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37533/">CVE-2021-37533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37533">CVE-2021-37533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026144" comment="apache-commons-net-3.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026145" comment="apache-commons-net-javadoc-3.9.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93698" version="1" class="patch">
	<metadata>
		<title>apache-commons-text-1.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-42889" ref_url="https://www.suse.com/security/cve/CVE-2022-42889/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-text-1.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42889/">CVE-2022-42889 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42889">CVE-2022-42889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026146" comment="apache-commons-text-1.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026147" comment="apache-commons-text-javadoc-1.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93699" version="1" class="patch">
	<metadata>
		<title>apache-commons-vfs2-2.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-27553" ref_url="https://www.suse.com/security/cve/CVE-2025-27553/" source="CVE"/>
		<reference ref_id="CVE-2025-30474" ref_url="https://www.suse.com/security/cve/CVE-2025-30474/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-vfs2-2.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-27553/">CVE-2025-27553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27553">CVE-2025-27553 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-30474/">CVE-2025-30474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30474">CVE-2025-30474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026148" comment="apache-commons-vfs2-2.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026149" comment="apache-commons-vfs2-ant-2.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026150" comment="apache-commons-vfs2-examples-2.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026151" comment="apache-commons-vfs2-javadoc-2.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93700" version="1" class="patch">
	<metadata>
		<title>apache-ivy-2.5.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-37865" ref_url="https://www.suse.com/security/cve/CVE-2022-37865/" source="CVE"/>
		<reference ref_id="CVE-2022-37866" ref_url="https://www.suse.com/security/cve/CVE-2022-37866/" source="CVE"/>
		<reference ref_id="CVE-2022-46751" ref_url="https://www.suse.com/security/cve/CVE-2022-46751/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-ivy-2.5.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37865/">CVE-2022-37865 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37865">CVE-2022-37865 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37866/">CVE-2022-37866 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37866">CVE-2022-37866 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46751/">CVE-2022-46751 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46751">CVE-2022-46751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026152" comment="apache-ivy-2.5.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026153" comment="apache-ivy-javadoc-2.5.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93701" version="1" class="patch">
	<metadata>
		<title>apache-pdfbox-2.0.29-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-2175" ref_url="https://www.suse.com/security/cve/CVE-2016-2175/" source="CVE"/>
		<reference ref_id="CVE-2018-11797" ref_url="https://www.suse.com/security/cve/CVE-2018-11797/" source="CVE"/>
		<reference ref_id="CVE-2018-8036" ref_url="https://www.suse.com/security/cve/CVE-2018-8036/" source="CVE"/>
		<reference ref_id="CVE-2021-27807" ref_url="https://www.suse.com/security/cve/CVE-2021-27807/" source="CVE"/>
		<reference ref_id="CVE-2021-27906" ref_url="https://www.suse.com/security/cve/CVE-2021-27906/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-pdfbox-2.0.29-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2175/">CVE-2016-2175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2175">CVE-2016-2175 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11797/">CVE-2018-11797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11797">CVE-2018-11797 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8036/">CVE-2018-8036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8036">CVE-2018-8036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27807/">CVE-2021-27807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27807">CVE-2021-27807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27906/">CVE-2021-27906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27906">CVE-2021-27906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026154" comment="apache-pdfbox-2.0.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026155" comment="apache-pdfbox-javadoc-2.0.29-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93702" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.63-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-3352" ref_url="https://www.suse.com/security/cve/CVE-2005-3352/" source="CVE"/>
		<reference ref_id="CVE-2005-3357" ref_url="https://www.suse.com/security/cve/CVE-2005-3357/" source="CVE"/>
		<reference ref_id="CVE-2006-20001" ref_url="https://www.suse.com/security/cve/CVE-2006-20001/" source="CVE"/>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-1955" ref_url="https://www.suse.com/security/cve/CVE-2009-1955/" source="CVE"/>
		<reference ref_id="CVE-2009-1956" ref_url="https://www.suse.com/security/cve/CVE-2009-1956/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-1176" ref_url="https://www.suse.com/security/cve/CVE-2011-1176/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-3502" ref_url="https://www.suse.com/security/cve/CVE-2012-3502/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-2249" ref_url="https://www.suse.com/security/cve/CVE-2013-2249/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0117" ref_url="https://www.suse.com/security/cve/CVE-2014-0117/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3523" ref_url="https://www.suse.com/security/cve/CVE-2014-3523/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583/" source="CVE"/>
		<reference ref_id="CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109/" source="CVE"/>
		<reference ref_id="CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228/" source="CVE"/>
		<reference ref_id="CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736/" source="CVE"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979/" source="CVE"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081/" source="CVE"/>
		<reference ref_id="CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082/" source="CVE"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2021-41773" ref_url="https://www.suse.com/security/cve/CVE-2021-41773/" source="CVE"/>
		<reference ref_id="CVE-2021-42013" ref_url="https://www.suse.com/security/cve/CVE-2021-42013/" source="CVE"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28330" ref_url="https://www.suse.com/security/cve/CVE-2022-28330/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<reference ref_id="CVE-2022-36760" ref_url="https://www.suse.com/security/cve/CVE-2022-36760/" source="CVE"/>
		<reference ref_id="CVE-2022-37436" ref_url="https://www.suse.com/security/cve/CVE-2022-37436/" source="CVE"/>
		<reference ref_id="CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690/" source="CVE"/>
		<reference ref_id="CVE-2023-27522" ref_url="https://www.suse.com/security/cve/CVE-2023-27522/" source="CVE"/>
		<reference ref_id="CVE-2023-31122" ref_url="https://www.suse.com/security/cve/CVE-2023-31122/" source="CVE"/>
		<reference ref_id="CVE-2023-38709" ref_url="https://www.suse.com/security/cve/CVE-2023-38709/" source="CVE"/>
		<reference ref_id="CVE-2023-43622" ref_url="https://www.suse.com/security/cve/CVE-2023-43622/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45802" ref_url="https://www.suse.com/security/cve/CVE-2023-45802/" source="CVE"/>
		<reference ref_id="CVE-2024-24795" ref_url="https://www.suse.com/security/cve/CVE-2024-24795/" source="CVE"/>
		<reference ref_id="CVE-2024-27316" ref_url="https://www.suse.com/security/cve/CVE-2024-27316/" source="CVE"/>
		<reference ref_id="CVE-2024-36387" ref_url="https://www.suse.com/security/cve/CVE-2024-36387/" source="CVE"/>
		<reference ref_id="CVE-2024-38472" ref_url="https://www.suse.com/security/cve/CVE-2024-38472/" source="CVE"/>
		<reference ref_id="CVE-2024-38473" ref_url="https://www.suse.com/security/cve/CVE-2024-38473/" source="CVE"/>
		<reference ref_id="CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474/" source="CVE"/>
		<reference ref_id="CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475/" source="CVE"/>
		<reference ref_id="CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476/" source="CVE"/>
		<reference ref_id="CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477/" source="CVE"/>
		<reference ref_id="CVE-2024-39573" ref_url="https://www.suse.com/security/cve/CVE-2024-39573/" source="CVE"/>
		<reference ref_id="CVE-2024-39884" ref_url="https://www.suse.com/security/cve/CVE-2024-39884/" source="CVE"/>
		<reference ref_id="CVE-2024-40725" ref_url="https://www.suse.com/security/cve/CVE-2024-40725/" source="CVE"/>
		<reference ref_id="CVE-2024-40898" ref_url="https://www.suse.com/security/cve/CVE-2024-40898/" source="CVE"/>
		<reference ref_id="CVE-2024-42516" ref_url="https://www.suse.com/security/cve/CVE-2024-42516/" source="CVE"/>
		<reference ref_id="CVE-2024-43204" ref_url="https://www.suse.com/security/cve/CVE-2024-43204/" source="CVE"/>
		<reference ref_id="CVE-2024-47252" ref_url="https://www.suse.com/security/cve/CVE-2024-47252/" source="CVE"/>
		<reference ref_id="CVE-2025-23048" ref_url="https://www.suse.com/security/cve/CVE-2025-23048/" source="CVE"/>
		<reference ref_id="CVE-2025-49630" ref_url="https://www.suse.com/security/cve/CVE-2025-49630/" source="CVE"/>
		<reference ref_id="CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812/" source="CVE"/>
		<reference ref_id="CVE-2025-53020" ref_url="https://www.suse.com/security/cve/CVE-2025-53020/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.63-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3352/">CVE-2005-3352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3352">CVE-2005-3352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3357/">CVE-2005-3357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3357">CVE-2005-3357 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2006-20001/">CVE-2006-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-20001">CVE-2006-20001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3747">CVE-2006-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5752">CVE-2006-5752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1862">CVE-2007-1862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1863">CVE-2007-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3304">CVE-2007-3304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3847">CVE-2007-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4465">CVE-2007-4465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5000">CVE-2007-5000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6388">CVE-2007-6388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6420">CVE-2007-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6421">CVE-2007-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6422">CVE-2007-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0005">CVE-2008-0005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1678">CVE-2008-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2364">CVE-2008-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2939">CVE-2008-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1191">CVE-2009-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1891">CVE-2009-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1955/">CVE-2009-1955 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1955">CVE-2009-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1956/">CVE-2009-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1956">CVE-2009-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2699">CVE-2009-2699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0425">CVE-2010-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1452">CVE-2010-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2068">CVE-2010-2068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1176/">CVE-2011-1176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1176">CVE-2011-1176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3192">CVE-2011-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3368">CVE-2011-3368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3607">CVE-2011-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4317">CVE-2011-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0031">CVE-2012-0031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0053">CVE-2012-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2687">CVE-2012-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3499">CVE-2012-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3502/">CVE-2012-3502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3502">CVE-2012-3502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1896">CVE-2013-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2249/">CVE-2013-2249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2249">CVE-2013-2249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6438">CVE-2013-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0098">CVE-2014-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0117/">CVE-2014-0117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0117">CVE-2014-0117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3523/">CVE-2014-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3523">CVE-2014-3523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3583">CVE-2014-3583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8109">CVE-2014-8109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0228">CVE-2015-0228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0253">CVE-2015-0253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0736">CVE-2016-0736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2161">CVE-2016-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4979">CVE-2016-4979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8740">CVE-2016-8740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10081">CVE-2019-10081 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10082">CVE-2019-10082 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10097">CVE-2019-10097 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41773/">CVE-2021-41773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41773">CVE-2021-41773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42013/">CVE-2021-42013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42013">CVE-2021-42013 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28330/">CVE-2022-28330 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28330">CVE-2022-28330 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36760/">CVE-2022-36760 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36760">CVE-2022-36760 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-37436/">CVE-2022-37436 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37436">CVE-2022-37436 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27522/">CVE-2023-27522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27522">CVE-2023-27522 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31122/">CVE-2023-31122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31122">CVE-2023-31122 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38709/">CVE-2023-38709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38709">CVE-2023-38709 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43622/">CVE-2023-43622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43622">CVE-2023-43622 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45802/">CVE-2023-45802 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45802">CVE-2023-45802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-24795/">CVE-2024-24795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24795">CVE-2024-24795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27316/">CVE-2024-27316 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27316">CVE-2024-27316 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36387/">CVE-2024-36387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36387">CVE-2024-36387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38472/">CVE-2024-38472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38472">CVE-2024-38472 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38473/">CVE-2024-38473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38473">CVE-2024-38473 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39573/">CVE-2024-39573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39573">CVE-2024-39573 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39884/">CVE-2024-39884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39884">CVE-2024-39884 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40725/">CVE-2024-40725 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40725">CVE-2024-40725 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40898/">CVE-2024-40898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40898">CVE-2024-40898 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42516/">CVE-2024-42516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42516">CVE-2024-42516 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43204/">CVE-2024-43204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43204">CVE-2024-43204 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47252/">CVE-2024-47252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47252">CVE-2024-47252 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23048/">CVE-2025-23048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23048">CVE-2025-23048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49630/">CVE-2025-49630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49630">CVE-2025-49630 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53020/">CVE-2025-53020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53020">CVE-2025-53020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026156" comment="apache2-2.4.63-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026157" comment="apache2-devel-2.4.63-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026158" comment="apache2-event-2.4.63-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026159" comment="apache2-manual-2.4.63-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026160" comment="apache2-prefork-2.4.63-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026161" comment="apache2-utils-2.4.63-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026162" comment="apache2-worker-2.4.63-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93703" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_mellon-0.19.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_mellon-0.19.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3639">CVE-2021-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026163" comment="apache2-mod_auth_mellon-0.19.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026164" comment="apache2-mod_auth_mellon-diagnostics-0.19.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026165" comment="apache2-mod_auth_mellon-doc-0.19.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93704" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_openidc-2.4.17-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-14857" ref_url="https://www.suse.com/security/cve/CVE-2019-14857/" source="CVE"/>
		<reference ref_id="CVE-2021-32785" ref_url="https://www.suse.com/security/cve/CVE-2021-32785/" source="CVE"/>
		<reference ref_id="CVE-2021-32786" ref_url="https://www.suse.com/security/cve/CVE-2021-32786/" source="CVE"/>
		<reference ref_id="CVE-2022-23527" ref_url="https://www.suse.com/security/cve/CVE-2022-23527/" source="CVE"/>
		<reference ref_id="CVE-2024-24814" ref_url="https://www.suse.com/security/cve/CVE-2024-24814/" source="CVE"/>
		<reference ref_id="CVE-2025-31492" ref_url="https://www.suse.com/security/cve/CVE-2025-31492/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_openidc-2.4.17-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14857/">CVE-2019-14857 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14857">CVE-2019-14857 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32785/">CVE-2021-32785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32785">CVE-2021-32785 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32786/">CVE-2021-32786 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32786">CVE-2021-32786 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23527/">CVE-2022-23527 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23527">CVE-2022-23527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24814/">CVE-2024-24814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24814">CVE-2024-24814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31492/">CVE-2025-31492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31492">CVE-2025-31492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026166" comment="apache2-mod_auth_openidc-2.4.17-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93705" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php8-8.4.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-3353" ref_url="https://www.suse.com/security/cve/CVE-2005-3353/" source="CVE"/>
		<reference ref_id="CVE-2005-3388" ref_url="https://www.suse.com/security/cve/CVE-2005-3388/" source="CVE"/>
		<reference ref_id="CVE-2005-3389" ref_url="https://www.suse.com/security/cve/CVE-2005-3389/" source="CVE"/>
		<reference ref_id="CVE-2005-3390" ref_url="https://www.suse.com/security/cve/CVE-2005-3390/" source="CVE"/>
		<reference ref_id="CVE-2005-3391" ref_url="https://www.suse.com/security/cve/CVE-2005-3391/" source="CVE"/>
		<reference ref_id="CVE-2005-3392" ref_url="https://www.suse.com/security/cve/CVE-2005-3392/" source="CVE"/>
		<reference ref_id="CVE-2006-0996" ref_url="https://www.suse.com/security/cve/CVE-2006-0996/" source="CVE"/>
		<reference ref_id="CVE-2006-1017" ref_url="https://www.suse.com/security/cve/CVE-2006-1017/" source="CVE"/>
		<reference ref_id="CVE-2006-1490" ref_url="https://www.suse.com/security/cve/CVE-2006-1490/" source="CVE"/>
		<reference ref_id="CVE-2006-1494" ref_url="https://www.suse.com/security/cve/CVE-2006-1494/" source="CVE"/>
		<reference ref_id="CVE-2006-1991" ref_url="https://www.suse.com/security/cve/CVE-2006-1991/" source="CVE"/>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4718" ref_url="https://www.suse.com/security/cve/CVE-2011-4718/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-1824" ref_url="https://www.suse.com/security/cve/CVE-2013-1824/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2013-7327" ref_url="https://www.suse.com/security/cve/CVE-2013-7327/" source="CVE"/>
		<reference ref_id="CVE-2013-7345" ref_url="https://www.suse.com/security/cve/CVE-2013-7345/" source="CVE"/>
		<reference ref_id="CVE-2014-0185" ref_url="https://www.suse.com/security/cve/CVE-2014-0185/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-1943" ref_url="https://www.suse.com/security/cve/CVE-2014-1943/" source="CVE"/>
		<reference ref_id="CVE-2014-2270" ref_url="https://www.suse.com/security/cve/CVE-2014-2270/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3538" ref_url="https://www.suse.com/security/cve/CVE-2014-3538/" source="CVE"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3622" ref_url="https://www.suse.com/security/cve/CVE-2014-3622/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-5120" ref_url="https://www.suse.com/security/cve/CVE-2014-5120/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-9426" ref_url="https://www.suse.com/security/cve/CVE-2014-9426/" source="CVE"/>
		<reference ref_id="CVE-2014-9427" ref_url="https://www.suse.com/security/cve/CVE-2014-9427/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1351" ref_url="https://www.suse.com/security/cve/CVE-2015-1351/" source="CVE"/>
		<reference ref_id="CVE-2015-1352" ref_url="https://www.suse.com/security/cve/CVE-2015-1352/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416/" source="CVE"/>
		<reference ref_id="CVE-2017-9120" ref_url="https://www.suse.com/security/cve/CVE-2017-9120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-1000888" ref_url="https://www.suse.com/security/cve/CVE-2018-1000888/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="CVE-2018-19935" ref_url="https://www.suse.com/security/cve/CVE-2018-19935/" source="CVE"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="CVE-2020-7062" ref_url="https://www.suse.com/security/cve/CVE-2020-7062/" source="CVE"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<reference ref_id="CVE-2021-21706" ref_url="https://www.suse.com/security/cve/CVE-2021-21706/" source="CVE"/>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<reference ref_id="CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626/" source="CVE"/>
		<reference ref_id="CVE-2022-31627" ref_url="https://www.suse.com/security/cve/CVE-2022-31627/" source="CVE"/>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630/" source="CVE"/>
		<reference ref_id="CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<reference ref_id="CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567/" source="CVE"/>
		<reference ref_id="CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568/" source="CVE"/>
		<reference ref_id="CVE-2023-0662" ref_url="https://www.suse.com/security/cve/CVE-2023-0662/" source="CVE"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<reference ref_id="CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823/" source="CVE"/>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-11235" ref_url="https://www.suse.com/security/cve/CVE-2024-11235/" source="CVE"/>
		<reference ref_id="CVE-2024-11236" ref_url="https://www.suse.com/security/cve/CVE-2024-11236/" source="CVE"/>
		<reference ref_id="CVE-2024-1874" ref_url="https://www.suse.com/security/cve/CVE-2024-1874/" source="CVE"/>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-2757" ref_url="https://www.suse.com/security/cve/CVE-2024-2757/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="CVE-2024-4577" ref_url="https://www.suse.com/security/cve/CVE-2024-4577/" source="CVE"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="CVE-2024-5585" ref_url="https://www.suse.com/security/cve/CVE-2024-5585/" source="CVE"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8926" ref_url="https://www.suse.com/security/cve/CVE-2024-8926/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="CVE-2024-8932" ref_url="https://www.suse.com/security/cve/CVE-2024-8932/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1220" ref_url="https://www.suse.com/security/cve/CVE-2025-1220/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1735" ref_url="https://www.suse.com/security/cve/CVE-2025-1735/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<reference ref_id="CVE-2025-6491" ref_url="https://www.suse.com/security/cve/CVE-2025-6491/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php8-8.4.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3353/">CVE-2005-3353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3353">CVE-2005-3353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3388/">CVE-2005-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3388">CVE-2005-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3389/">CVE-2005-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3389">CVE-2005-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3390/">CVE-2005-3390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3390">CVE-2005-3390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3391/">CVE-2005-3391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3391">CVE-2005-3391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3392/">CVE-2005-3392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3392">CVE-2005-3392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0996/">CVE-2006-0996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0996">CVE-2006-0996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1017/">CVE-2006-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1017">CVE-2006-1017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1490/">CVE-2006-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1490">CVE-2006-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1494/">CVE-2006-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1494">CVE-2006-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1991/">CVE-2006-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1991">CVE-2006-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7243">CVE-2006-7243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4783">CVE-2007-4783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4840">CVE-2007-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4887">CVE-2007-4887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0599">CVE-2008-0599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2225">CVE-2010-2225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2950">CVE-2010-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3436">CVE-2010-3436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3709">CVE-2010-3709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3710">CVE-2010-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4150">CVE-2010-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4645">CVE-2010-4645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0420">CVE-2011-0420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0708">CVE-2011-0708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1092">CVE-2011-1092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1153">CVE-2011-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1466">CVE-2011-1466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2202">CVE-2011-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3379">CVE-2011-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4153">CVE-2011-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4566">CVE-2011-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4718/">CVE-2011-4718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4718">CVE-2011-4718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4885">CVE-2011-4885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0830">CVE-2012-0830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1823">CVE-2012-1823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2311">CVE-2012-2311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2335">CVE-2012-2335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2336">CVE-2012-2336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2688">CVE-2012-2688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3365">CVE-2012-3365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1635">CVE-2013-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1643">CVE-2013-1643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1824/">CVE-2013-1824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1824">CVE-2013-1824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4113">CVE-2013-4113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4248">CVE-2013-4248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6420">CVE-2013-6420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6712">CVE-2013-6712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7327/">CVE-2013-7327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7327">CVE-2013-7327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7345/">CVE-2013-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7345">CVE-2013-7345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0185/">CVE-2014-0185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0185">CVE-2014-0185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1943/">CVE-2014-1943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1943">CVE-2014-1943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2270/">CVE-2014-2270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2270">CVE-2014-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3538/">CVE-2014-3538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3538">CVE-2014-3538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3622/">CVE-2014-3622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3622">CVE-2014-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5120/">CVE-2014-5120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5120">CVE-2014-5120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5459">CVE-2014-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9426/">CVE-2014-9426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9426">CVE-2014-9426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9427/">CVE-2014-9427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9427">CVE-2014-9427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1351/">CVE-2015-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1351">CVE-2015-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1352/">CVE-2015-1352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1352">CVE-2015-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2331">CVE-2015-2331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3416">CVE-2015-3416 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9120/">CVE-2017-9120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9120">CVE-2017-9120 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">CVE-2018-1000222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000888/">CVE-2018-1000888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000888">CVE-2018-1000888 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12882">CVE-2018-12882 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14851">CVE-2018-14851 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17082">CVE-2018-17082 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19935/">CVE-2018-19935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19935">CVE-2018-19935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11034">CVE-2019-11034 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11035">CVE-2019-11035 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11036">CVE-2019-11036 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11039">CVE-2019-11039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11040">CVE-2019-11040 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11045">CVE-2019-11045 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11046">CVE-2019-11046 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11047">CVE-2019-11047 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11050">CVE-2019-11050 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9022">CVE-2019-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9637">CVE-2019-9637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9638">CVE-2019-9638 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9639">CVE-2019-9639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9640">CVE-2019-9640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9675">CVE-2019-9675 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7062/">CVE-2020-7062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7062">CVE-2020-7062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7063">CVE-2020-7063 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">CVE-2021-21703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21706/">CVE-2021-21706 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21706">CVE-2021-21706 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">CVE-2021-21707 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21708">CVE-2021-21708 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31625">CVE-2022-31625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31626">CVE-2022-31626 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31627/">CVE-2022-31627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31627">CVE-2022-31627 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">CVE-2022-31630 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0662/">CVE-2023-0662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0662">CVE-2023-0662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11235/">CVE-2024-11235 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11235">CVE-2024-11235 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11236/">CVE-2024-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11236">CVE-2024-11236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1874/">CVE-2024-1874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1874">CVE-2024-1874 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2757/">CVE-2024-2757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2757">CVE-2024-2757 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4577/">CVE-2024-4577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4577">CVE-2024-4577 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-5585/">CVE-2024-5585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5585">CVE-2024-5585 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8926/">CVE-2024-8926 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8926">CVE-2024-8926 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8932/">CVE-2024-8932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8932">CVE-2024-8932 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1220/">CVE-2025-1220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1220">CVE-2025-1220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1735/">CVE-2025-1735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1735">CVE-2025-1735 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6491/">CVE-2025-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6491">CVE-2025-6491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026167" comment="apache2-mod_php8-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026168" comment="php8-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026169" comment="php8-bcmath-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026170" comment="php8-bz2-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026171" comment="php8-calendar-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026172" comment="php8-cli-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026173" comment="php8-ctype-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026174" comment="php8-curl-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026175" comment="php8-dba-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026176" comment="php8-devel-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026177" comment="php8-dom-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026178" comment="php8-embed-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026179" comment="php8-enchant-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026180" comment="php8-exif-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026181" comment="php8-fastcgi-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026182" comment="php8-ffi-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026183" comment="php8-fileinfo-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026184" comment="php8-fpm-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026185" comment="php8-fpm-apache-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026186" comment="php8-ftp-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026187" comment="php8-gd-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026188" comment="php8-gettext-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026189" comment="php8-gmp-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026190" comment="php8-iconv-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026191" comment="php8-intl-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026192" comment="php8-ldap-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026193" comment="php8-mbstring-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026194" comment="php8-mysql-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026195" comment="php8-odbc-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026196" comment="php8-opcache-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026197" comment="php8-openssl-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026198" comment="php8-pcntl-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026199" comment="php8-pdo-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026200" comment="php8-pgsql-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026201" comment="php8-phar-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026202" comment="php8-posix-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026203" comment="php8-readline-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026204" comment="php8-shmop-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026205" comment="php8-snmp-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026206" comment="php8-soap-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026207" comment="php8-sockets-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026208" comment="php8-sodium-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026209" comment="php8-sqlite-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026210" comment="php8-sysvmsg-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026211" comment="php8-sysvsem-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026212" comment="php8-sysvshm-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026213" comment="php8-tidy-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026214" comment="php8-tokenizer-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026215" comment="php8-xmlreader-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026216" comment="php8-xmlwriter-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026217" comment="php8-xsl-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026218" comment="php8-zip-8.4.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026219" comment="php8-zlib-8.4.10-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93706" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.9.11-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-5031" ref_url="https://www.suse.com/security/cve/CVE-2009-5031/" source="CVE"/>
		<reference ref_id="CVE-2012-2751" ref_url="https://www.suse.com/security/cve/CVE-2012-2751/" source="CVE"/>
		<reference ref_id="CVE-2012-4528" ref_url="https://www.suse.com/security/cve/CVE-2012-4528/" source="CVE"/>
		<reference ref_id="CVE-2013-1915" ref_url="https://www.suse.com/security/cve/CVE-2013-1915/" source="CVE"/>
		<reference ref_id="CVE-2013-2765" ref_url="https://www.suse.com/security/cve/CVE-2013-2765/" source="CVE"/>
		<reference ref_id="CVE-2022-48279" ref_url="https://www.suse.com/security/cve/CVE-2022-48279/" source="CVE"/>
		<reference ref_id="CVE-2023-24021" ref_url="https://www.suse.com/security/cve/CVE-2023-24021/" source="CVE"/>
		<reference ref_id="CVE-2025-47947" ref_url="https://www.suse.com/security/cve/CVE-2025-47947/" source="CVE"/>
		<reference ref_id="CVE-2025-48866" ref_url="https://www.suse.com/security/cve/CVE-2025-48866/" source="CVE"/>
		<reference ref_id="CVE-2025-52891" ref_url="https://www.suse.com/security/cve/CVE-2025-52891/" source="CVE"/>
		<reference ref_id="CVE-2025-54571" ref_url="https://www.suse.com/security/cve/CVE-2025-54571/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.9.11-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5031/">CVE-2009-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5031">CVE-2009-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2751/">CVE-2012-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2751">CVE-2012-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4528/">CVE-2012-4528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4528">CVE-2012-4528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1915/">CVE-2013-1915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1915">CVE-2013-1915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2765/">CVE-2013-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2765">CVE-2013-2765 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48279/">CVE-2022-48279 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48279">CVE-2022-48279 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24021/">CVE-2023-24021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24021">CVE-2023-24021 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47947/">CVE-2025-47947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47947">CVE-2025-47947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48866/">CVE-2025-48866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48866">CVE-2025-48866 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52891/">CVE-2025-52891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52891">CVE-2025-52891 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54571/">CVE-2025-54571 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54571">CVE-2025-54571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026220" comment="apache2-mod_security2-2.9.11-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93707" version="1" class="patch">
	<metadata>
		<title>apr-devel-1.7.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-35940" ref_url="https://www.suse.com/security/cve/CVE-2021-35940/" source="CVE"/>
		<reference ref_id="CVE-2022-24963" ref_url="https://www.suse.com/security/cve/CVE-2022-24963/" source="CVE"/>
		<reference ref_id="CVE-2023-49582" ref_url="https://www.suse.com/security/cve/CVE-2023-49582/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-devel-1.7.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35940/">CVE-2021-35940 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35940">CVE-2021-35940 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24963/">CVE-2022-24963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24963">CVE-2022-24963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49582/">CVE-2023-49582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49582">CVE-2023-49582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026221" comment="apr-devel-1.7.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026222" comment="libapr1-0-1.7.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93708" version="1" class="patch">
	<metadata>
		<title>apr-util-devel-1.6.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<reference ref_id="CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-util-devel-1.6.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12618">CVE-2017-12618 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026223" comment="apr-util-devel-1.6.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026224" comment="libapr-util1-0-1.6.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026225" comment="libapr-util1-0-dbd-mysql-1.6.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026226" comment="libapr-util1-0-dbd-pgsql-1.6.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026227" comment="libapr-util1-0-dbd-sqlite3-1.6.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93709" version="1" class="patch">
	<metadata>
		<title>argyllcms-3.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-3.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1616">CVE-2012-1616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026228" comment="argyllcms-3.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026229" comment="argyllcms-doc-3.3.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93710" version="1" class="patch">
	<metadata>
		<title>arm-trusted-firmware-2.10.14-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2022-23960" ref_url="https://www.suse.com/security/cve/CVE-2022-23960/" source="CVE"/>
		<reference ref_id="CVE-2022-47630" ref_url="https://www.suse.com/security/cve/CVE-2022-47630/" source="CVE"/>
		<description>
These are all security issues fixed in the arm-trusted-firmware-2.10.14-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23960/">CVE-2022-23960 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47630/">CVE-2022-47630 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47630">CVE-2022-47630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026230" comment="arm-trusted-firmware-2.10.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026231" comment="arm-trusted-firmware-rpi3-2.10.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026232" comment="arm-trusted-firmware-rpi4-2.10.14-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93711" version="1" class="patch">
	<metadata>
		<title>arpwatch-3.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
These are all security issues fixed in the arpwatch-3.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026233" comment="arpwatch-3.6-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93712" version="1" class="patch">
	<metadata>
		<title>audit-devel-4.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<description>
These are all security issues fixed in the audit-devel-4.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5186">CVE-2015-5186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026234" comment="audit-devel-4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026235" comment="libaudit1-4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026236" comment="libauparse0-4.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93713" version="1" class="patch">
	<metadata>
		<title>augeas-1.14.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="CVE-2025-2588" ref_url="https://www.suse.com/security/cve/CVE-2025-2588/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.14.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0786">CVE-2012-0786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-2588/">CVE-2025-2588 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2588">CVE-2025-2588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026237" comment="augeas-1.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026238" comment="augeas-bash-completion-1.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026239" comment="augeas-devel-1.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026240" comment="augeas-lenses-1.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026241" comment="libaugeas0-1.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026242" comment="libfa1-1.14.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93714" version="1" class="patch">
	<metadata>
		<title>autofs-5.1.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.1.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8169">CVE-2014-8169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026243" comment="autofs-5.1.9-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93715" version="1" class="patch">
	<metadata>
		<title>automake-1.18.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.18.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4029">CVE-2009-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026244" comment="automake-1.18.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026245" comment="m4-1.4.18-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93716" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<reference ref_id="CVE-2017-6519" ref_url="https://www.suse.com/security/cve/CVE-2017-6519/" source="CVE"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="CVE-2021-3502" ref_url="https://www.suse.com/security/cve/CVE-2021-3502/" source="CVE"/>
		<reference ref_id="CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981/" source="CVE"/>
		<reference ref_id="CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469/" source="CVE"/>
		<reference ref_id="CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470/" source="CVE"/>
		<reference ref_id="CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471/" source="CVE"/>
		<reference ref_id="CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472/" source="CVE"/>
		<reference ref_id="CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473/" source="CVE"/>
		<reference ref_id="CVE-2024-52616" ref_url="https://www.suse.com/security/cve/CVE-2024-52616/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5461">CVE-2006-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6870">CVE-2006-6870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3372">CVE-2007-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5081">CVE-2008-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2244">CVE-2010-2244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1002">CVE-2011-1002 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6519/">CVE-2017-6519 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">CVE-2017-6519 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">CVE-2021-26720 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3502/">CVE-2021-3502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3502">CVE-2021-3502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52616/">CVE-2024-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52616">CVE-2024-52616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026246" comment="avahi-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026247" comment="avahi-autoipd-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026248" comment="avahi-compat-mDNSResponder-devel-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026249" comment="avahi-lang-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026250" comment="avahi-utils-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026251" comment="avahi-utils-gtk-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026252" comment="libavahi-client3-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026253" comment="libavahi-common3-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026254" comment="libavahi-core7-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026255" comment="libavahi-devel-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026256" comment="libavahi-glib-devel-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026257" comment="libavahi-glib1-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026258" comment="libavahi-gobject-devel-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026259" comment="libavahi-gobject0-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026260" comment="libavahi-libevent1-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026261" comment="libavahi-ui-gtk3-0-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026262" comment="libdns_sd-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026263" comment="libhowl0-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026264" comment="python3-avahi-gtk-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026265" comment="python313-avahi-0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026266" comment="typelib-1_0-Avahi-0_6-0.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93717" version="1" class="patch">
	<metadata>
		<title>avif-tools-1.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-6350" ref_url="https://www.suse.com/security/cve/CVE-2023-6350/" source="CVE"/>
		<reference ref_id="CVE-2023-6351" ref_url="https://www.suse.com/security/cve/CVE-2023-6351/" source="CVE"/>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<reference ref_id="CVE-2025-48174" ref_url="https://www.suse.com/security/cve/CVE-2025-48174/" source="CVE"/>
		<reference ref_id="CVE-2025-48175" ref_url="https://www.suse.com/security/cve/CVE-2025-48175/" source="CVE"/>
		<description>
These are all security issues fixed in the avif-tools-1.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6350/">CVE-2023-6350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6351/">CVE-2023-6351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6351">CVE-2023-6351 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48174/">CVE-2025-48174 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48174">CVE-2025-48174 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48175/">CVE-2025-48175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48175">CVE-2025-48175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026267" comment="avif-tools-1.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026268" comment="gdk-pixbuf-loader-libavif-1.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026269" comment="libavif16-1.3.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93718" version="1" class="patch">
	<metadata>
		<title>aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<reference ref_id="CVE-2023-50711" ref_url="https://www.suse.com/security/cve/CVE-2023-50711/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-50711/">CVE-2023-50711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50711">CVE-2023-50711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026270" comment="aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026271" comment="aws-nitro-enclaves-cli-1.4.2~git0.6e8512e-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026272" comment="system-group-ne-1.4.2~git0.6e8512e-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93719" version="1" class="patch">
	<metadata>
		<title>bash-5.2.37-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-5.2.37-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2524">CVE-2014-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6277">CVE-2014-6277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6278">CVE-2014-6278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7169">CVE-2014-7169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7186">CVE-2014-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7187">CVE-2014-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026273" comment="bash-5.2.37-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026274" comment="bash-devel-5.2.37-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026275" comment="bash-doc-5.2.37-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026276" comment="bash-lang-5.2.37-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026277" comment="bash-loadables-5.2.37-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026278" comment="bash-sh-5.2.37-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026279" comment="libreadline8-8.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026280" comment="readline-devel-8.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026281" comment="readline-devel-static-8.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026282" comment="readline-doc-8.2.13-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93720" version="1" class="patch">
	<metadata>
		<title>bcel-6.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<description>
These are all security issues fixed in the bcel-6.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026283" comment="bcel-6.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026284" comment="bcel-javadoc-6.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93721" version="1" class="patch">
	<metadata>
		<title>bcm43xx-firmware-20180314-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-10370" ref_url="https://www.suse.com/security/cve/CVE-2020-10370/" source="CVE"/>
		<description>
These are all security issues fixed in the bcm43xx-firmware-20180314-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10370/">CVE-2020-10370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-10370">CVE-2020-10370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026285" comment="bcm43xx-firmware-20180314-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93722" version="1" class="patch">
	<metadata>
		<title>bind-9.20.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-3214" ref_url="https://www.suse.com/security/cve/CVE-2014-3214/" source="CVE"/>
		<reference ref_id="CVE-2014-3859" ref_url="https://www.suse.com/security/cve/CVE-2014-3859/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2014-8680" ref_url="https://www.suse.com/security/cve/CVE-2014-8680/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-5986" ref_url="https://www.suse.com/security/cve/CVE-2015-5986/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8461" ref_url="https://www.suse.com/security/cve/CVE-2015-8461/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2015-8705" ref_url="https://www.suse.com/security/cve/CVE-2015-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2088" ref_url="https://www.suse.com/security/cve/CVE-2016-2088/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="CVE-2016-9778" ref_url="https://www.suse.com/security/cve/CVE-2016-9778/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="CVE-2017-3140" ref_url="https://www.suse.com/security/cve/CVE-2017-3140/" source="CVE"/>
		<reference ref_id="CVE-2017-3141" ref_url="https://www.suse.com/security/cve/CVE-2017-3141/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="CVE-2018-5736" ref_url="https://www.suse.com/security/cve/CVE-2018-5736/" source="CVE"/>
		<reference ref_id="CVE-2018-5737" ref_url="https://www.suse.com/security/cve/CVE-2018-5737/" source="CVE"/>
		<reference ref_id="CVE-2018-5738" ref_url="https://www.suse.com/security/cve/CVE-2018-5738/" source="CVE"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5744" ref_url="https://www.suse.com/security/cve/CVE-2018-5744/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="CVE-2019-6467" ref_url="https://www.suse.com/security/cve/CVE-2019-6467/" source="CVE"/>
		<reference ref_id="CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471/" source="CVE"/>
		<reference ref_id="CVE-2019-6475" ref_url="https://www.suse.com/security/cve/CVE-2019-6475/" source="CVE"/>
		<reference ref_id="CVE-2019-6476" ref_url="https://www.suse.com/security/cve/CVE-2019-6476/" source="CVE"/>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618/" source="CVE"/>
		<reference ref_id="CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619/" source="CVE"/>
		<reference ref_id="CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620/" source="CVE"/>
		<reference ref_id="CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621/" source="CVE"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="CVE-2021-25218" ref_url="https://www.suse.com/security/cve/CVE-2021-25218/" source="CVE"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="CVE-2022-0396" ref_url="https://www.suse.com/security/cve/CVE-2022-0396/" source="CVE"/>
		<reference ref_id="CVE-2022-0635" ref_url="https://www.suse.com/security/cve/CVE-2022-0635/" source="CVE"/>
		<reference ref_id="CVE-2022-0667" ref_url="https://www.suse.com/security/cve/CVE-2022-0667/" source="CVE"/>
		<reference ref_id="CVE-2022-1183" ref_url="https://www.suse.com/security/cve/CVE-2022-1183/" source="CVE"/>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-2881" ref_url="https://www.suse.com/security/cve/CVE-2022-2881/" source="CVE"/>
		<reference ref_id="CVE-2022-2906" ref_url="https://www.suse.com/security/cve/CVE-2022-2906/" source="CVE"/>
		<reference ref_id="CVE-2022-3080" ref_url="https://www.suse.com/security/cve/CVE-2022-3080/" source="CVE"/>
		<reference ref_id="CVE-2022-3094" ref_url="https://www.suse.com/security/cve/CVE-2022-3094/" source="CVE"/>
		<reference ref_id="CVE-2022-3736" ref_url="https://www.suse.com/security/cve/CVE-2022-3736/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<reference ref_id="CVE-2022-3924" ref_url="https://www.suse.com/security/cve/CVE-2022-3924/" source="CVE"/>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<reference ref_id="CVE-2023-2911" ref_url="https://www.suse.com/security/cve/CVE-2023-2911/" source="CVE"/>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<reference ref_id="CVE-2023-4236" ref_url="https://www.suse.com/security/cve/CVE-2023-4236/" source="CVE"/>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="CVE-2023-5517" ref_url="https://www.suse.com/security/cve/CVE-2023-5517/" source="CVE"/>
		<reference ref_id="CVE-2023-5679" ref_url="https://www.suse.com/security/cve/CVE-2023-5679/" source="CVE"/>
		<reference ref_id="CVE-2023-6516" ref_url="https://www.suse.com/security/cve/CVE-2023-6516/" source="CVE"/>
		<reference ref_id="CVE-2024-0760" ref_url="https://www.suse.com/security/cve/CVE-2024-0760/" source="CVE"/>
		<reference ref_id="CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187/" source="CVE"/>
		<reference ref_id="CVE-2024-12705" ref_url="https://www.suse.com/security/cve/CVE-2024-12705/" source="CVE"/>
		<reference ref_id="CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737/" source="CVE"/>
		<reference ref_id="CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975/" source="CVE"/>
		<reference ref_id="CVE-2024-4076" ref_url="https://www.suse.com/security/cve/CVE-2024-4076/" source="CVE"/>
		<reference ref_id="CVE-2025-40775" ref_url="https://www.suse.com/security/cve/CVE-2025-40775/" source="CVE"/>
		<reference ref_id="CVE-2025-40777" ref_url="https://www.suse.com/security/cve/CVE-2025-40777/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.20.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2925">CVE-2007-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2926">CVE-2007-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3613">CVE-2010-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3614">CVE-2010-3614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3615">CVE-2010-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0414">CVE-2011-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1907">CVE-2011-1907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1910">CVE-2011-1910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2464">CVE-2011-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4313">CVE-2011-4313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1667">CVE-2012-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3817">CVE-2012-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3868">CVE-2012-3868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4244">CVE-2012-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5166">CVE-2012-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5688">CVE-2012-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5689">CVE-2012-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4854">CVE-2013-4854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0591">CVE-2014-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3214/">CVE-2014-3214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3214">CVE-2014-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3859/">CVE-2014-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3859">CVE-2014-3859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8680/">CVE-2014-8680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8680">CVE-2014-8680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1349">CVE-2015-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4620">CVE-2015-4620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5986/">CVE-2015-5986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5986">CVE-2015-5986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8461/">CVE-2015-8461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8461">CVE-2015-8461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8705/">CVE-2015-8705 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8705">CVE-2015-8705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2088/">CVE-2016-2088 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2088">CVE-2016-2088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2775">CVE-2016-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6170">CVE-2016-6170 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9778/">CVE-2016-9778 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9778">CVE-2016-9778 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3135">CVE-2017-3135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3136">CVE-2017-3136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3138">CVE-2017-3138 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3140/">CVE-2017-3140 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3140">CVE-2017-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3141/">CVE-2017-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3141">CVE-2017-3141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3143">CVE-2017-3143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5736/">CVE-2018-5736 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5736">CVE-2018-5736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5737/">CVE-2018-5737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5737">CVE-2018-5737 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5738/">CVE-2018-5738 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5738">CVE-2018-5738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5740">CVE-2018-5740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5744/">CVE-2018-5744 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5744">CVE-2018-5744 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6467/">CVE-2019-6467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6467">CVE-2019-6467 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6471">CVE-2019-6471 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6475/">CVE-2019-6475 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6475">CVE-2019-6475 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6476/">CVE-2019-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-6476">CVE-2019-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6477">CVE-2019-6477 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8618">CVE-2020-8618 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8619">CVE-2020-8619 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8620">CVE-2020-8620 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8621">CVE-2020-8621 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8623">CVE-2020-8623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8624">CVE-2020-8624 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25218/">CVE-2021-25218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25218">CVE-2021-25218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219">CVE-2021-25219 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0396/">CVE-2022-0396 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0396">CVE-2022-0396 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0635/">CVE-2022-0635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0635">CVE-2022-0635 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0667/">CVE-2022-0667 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0667">CVE-2022-0667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1183/">CVE-2022-1183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1183">CVE-2022-1183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2881/">CVE-2022-2881 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2881">CVE-2022-2881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2906/">CVE-2022-2906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2906">CVE-2022-2906 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3080/">CVE-2022-3080 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3094/">CVE-2022-3094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3094">CVE-2022-3094 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3736/">CVE-2022-3736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3736">CVE-2022-3736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3924/">CVE-2022-3924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3924">CVE-2022-3924 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2911/">CVE-2023-2911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2911">CVE-2023-2911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4236/">CVE-2023-4236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4236">CVE-2023-4236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5517/">CVE-2023-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5517">CVE-2023-5517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5679/">CVE-2023-5679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5679">CVE-2023-5679 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6516/">CVE-2023-6516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6516">CVE-2023-6516 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0760/">CVE-2024-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0760">CVE-2024-0760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12705/">CVE-2024-12705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12705">CVE-2024-12705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4076/">CVE-2024-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4076">CVE-2024-4076 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40775/">CVE-2025-40775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40775">CVE-2025-40775 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40777/">CVE-2025-40777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40777">CVE-2025-40777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026286" comment="bind-9.20.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026287" comment="bind-doc-9.20.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026288" comment="bind-modules-generic-9.20.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026289" comment="bind-modules-ldap-9.20.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026290" comment="bind-modules-mysql-9.20.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026291" comment="bind-modules-perl-9.20.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026292" comment="bind-modules-sqlite3-9.20.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026293" comment="bind-utils-9.20.11-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93723" version="1" class="patch">
	<metadata>
		<title>binutils-2.43-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="CVE-2019-1010204" ref_url="https://www.suse.com/security/cve/CVE-2019-1010204/" source="CVE"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-19726" ref_url="https://www.suse.com/security/cve/CVE-2020-19726/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="CVE-2021-32256" ref_url="https://www.suse.com/security/cve/CVE-2021-32256/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="CVE-2021-3648" ref_url="https://www.suse.com/security/cve/CVE-2021-3648/" source="CVE"/>
		<reference ref_id="CVE-2021-3826" ref_url="https://www.suse.com/security/cve/CVE-2021-3826/" source="CVE"/>
		<reference ref_id="CVE-2021-45078" ref_url="https://www.suse.com/security/cve/CVE-2021-45078/" source="CVE"/>
		<reference ref_id="CVE-2021-46195" ref_url="https://www.suse.com/security/cve/CVE-2021-46195/" source="CVE"/>
		<reference ref_id="CVE-2022-27943" ref_url="https://www.suse.com/security/cve/CVE-2022-27943/" source="CVE"/>
		<reference ref_id="CVE-2022-35205" ref_url="https://www.suse.com/security/cve/CVE-2022-35205/" source="CVE"/>
		<reference ref_id="CVE-2022-35206" ref_url="https://www.suse.com/security/cve/CVE-2022-35206/" source="CVE"/>
		<reference ref_id="CVE-2022-38126" ref_url="https://www.suse.com/security/cve/CVE-2022-38126/" source="CVE"/>
		<reference ref_id="CVE-2022-38127" ref_url="https://www.suse.com/security/cve/CVE-2022-38127/" source="CVE"/>
		<reference ref_id="CVE-2022-38533" ref_url="https://www.suse.com/security/cve/CVE-2022-38533/" source="CVE"/>
		<reference ref_id="CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285/" source="CVE"/>
		<reference ref_id="CVE-2022-44840" ref_url="https://www.suse.com/security/cve/CVE-2022-44840/" source="CVE"/>
		<reference ref_id="CVE-2022-45703" ref_url="https://www.suse.com/security/cve/CVE-2022-45703/" source="CVE"/>
		<reference ref_id="CVE-2022-47673" ref_url="https://www.suse.com/security/cve/CVE-2022-47673/" source="CVE"/>
		<reference ref_id="CVE-2022-47695" ref_url="https://www.suse.com/security/cve/CVE-2022-47695/" source="CVE"/>
		<reference ref_id="CVE-2022-47696" ref_url="https://www.suse.com/security/cve/CVE-2022-47696/" source="CVE"/>
		<reference ref_id="CVE-2022-48063" ref_url="https://www.suse.com/security/cve/CVE-2022-48063/" source="CVE"/>
		<reference ref_id="CVE-2022-48064" ref_url="https://www.suse.com/security/cve/CVE-2022-48064/" source="CVE"/>
		<reference ref_id="CVE-2022-48065" ref_url="https://www.suse.com/security/cve/CVE-2022-48065/" source="CVE"/>
		<reference ref_id="CVE-2023-0687" ref_url="https://www.suse.com/security/cve/CVE-2023-0687/" source="CVE"/>
		<reference ref_id="CVE-2023-1579" ref_url="https://www.suse.com/security/cve/CVE-2023-1579/" source="CVE"/>
		<reference ref_id="CVE-2023-1972" ref_url="https://www.suse.com/security/cve/CVE-2023-1972/" source="CVE"/>
		<reference ref_id="CVE-2023-2222" ref_url="https://www.suse.com/security/cve/CVE-2023-2222/" source="CVE"/>
		<reference ref_id="CVE-2023-25585" ref_url="https://www.suse.com/security/cve/CVE-2023-25585/" source="CVE"/>
		<reference ref_id="CVE-2023-25587" ref_url="https://www.suse.com/security/cve/CVE-2023-25587/" source="CVE"/>
		<reference ref_id="CVE-2023-25588" ref_url="https://www.suse.com/security/cve/CVE-2023-25588/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.43-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9939">CVE-2014-9939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12448">CVE-2017-12448 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12450">CVE-2017-12450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12452">CVE-2017-12452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12453">CVE-2017-12453 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12454">CVE-2017-12454 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12456">CVE-2017-12456 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12799">CVE-2017-12799 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13757">CVE-2017-13757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14128">CVE-2017-14128 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14129">CVE-2017-14129 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14130">CVE-2017-14130 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14333">CVE-2017-14333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14529">CVE-2017-14529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14729">CVE-2017-14729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14745">CVE-2017-14745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14974">CVE-2017-14974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15938">CVE-2017-15938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15939">CVE-2017-15939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15996">CVE-2017-15996 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16826">CVE-2017-16826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16827">CVE-2017-16827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16828">CVE-2017-16828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16830">CVE-2017-16830 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16831">CVE-2017-16831 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16832">CVE-2017-16832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6965">CVE-2017-6965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6966">CVE-2017-6966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6969">CVE-2017-6969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7209">CVE-2017-7209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7210">CVE-2017-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7223">CVE-2017-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7224">CVE-2017-7224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7225">CVE-2017-7225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7226">CVE-2017-7226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7299">CVE-2017-7299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7300">CVE-2017-7300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7301">CVE-2017-7301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7302">CVE-2017-7302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7303">CVE-2017-7303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7304">CVE-2017-7304 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8392">CVE-2017-8392 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8393">CVE-2017-8393 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8394">CVE-2017-8394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8396">CVE-2017-8396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8421">CVE-2017-8421 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9746">CVE-2017-9746 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9747">CVE-2017-9747 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9748">CVE-2017-9748 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9750">CVE-2017-9750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9755">CVE-2017-9755 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9756">CVE-2017-9756 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10372">CVE-2018-10372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10373">CVE-2018-10373 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10534">CVE-2018-10534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10535">CVE-2018-10535 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6323">CVE-2018-6323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6543">CVE-2018-6543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6759">CVE-2018-6759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6872">CVE-2018-6872 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7568">CVE-2018-7568 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7569">CVE-2018-7569 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7570">CVE-2018-7570 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7642">CVE-2018-7642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7643">CVE-2018-7643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8945">CVE-2018-8945 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010204/">CVE-2019-1010204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010204">CVE-2019-1010204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-19726/">CVE-2020-19726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19726">CVE-2020-19726 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32256/">CVE-2021-32256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32256">CVE-2021-32256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3648/">CVE-2021-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3648">CVE-2021-3648 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3826/">CVE-2021-3826 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3826">CVE-2021-3826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45078/">CVE-2021-45078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">CVE-2021-45078 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46195/">CVE-2021-46195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46195">CVE-2021-46195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27943/">CVE-2022-27943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">CVE-2022-27943 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35205/">CVE-2022-35205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35205">CVE-2022-35205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35206/">CVE-2022-35206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35206">CVE-2022-35206 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38126/">CVE-2022-38126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38126">CVE-2022-38126 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38127/">CVE-2022-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38127">CVE-2022-38127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38533/">CVE-2022-38533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44840/">CVE-2022-44840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44840">CVE-2022-44840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45703/">CVE-2022-45703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45703">CVE-2022-45703 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47673/">CVE-2022-47673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47673">CVE-2022-47673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47695/">CVE-2022-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47695">CVE-2022-47695 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47696/">CVE-2022-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47696">CVE-2022-47696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48063/">CVE-2022-48063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48063">CVE-2022-48063 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48064/">CVE-2022-48064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48064">CVE-2022-48064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48065/">CVE-2022-48065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48065">CVE-2022-48065 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0687/">CVE-2023-0687 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0687">CVE-2023-0687 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1579/">CVE-2023-1579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1972/">CVE-2023-1972 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2222/">CVE-2023-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2222">CVE-2023-2222 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25585/">CVE-2023-25585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25585">CVE-2023-25585 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25587/">CVE-2023-25587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25587">CVE-2023-25587 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25588/">CVE-2023-25588 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25588">CVE-2023-25588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026294" comment="binutils-2.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026295" comment="binutils-devel-2.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026296" comment="gprofng-2.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026297" comment="libctf-nobfd0-2.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026298" comment="libctf0-2.43-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93724" version="1" class="patch">
	<metadata>
		<title>bison-3.8.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-24979" ref_url="https://www.suse.com/security/cve/CVE-2020-24979/" source="CVE"/>
		<description>
These are all security issues fixed in the bison-3.8.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24979/">CVE-2020-24979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-24979">CVE-2020-24979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026299" comment="bison-3.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026300" comment="bison-lang-3.8.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93725" version="1" class="patch">
	<metadata>
		<title>blas-devel-3.12.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-4048" ref_url="https://www.suse.com/security/cve/CVE-2021-4048/" source="CVE"/>
		<description>
These are all security issues fixed in the blas-devel-3.12.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4048/">CVE-2021-4048 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4048">CVE-2021-4048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026301" comment="blas-devel-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026302" comment="blas-devel-static-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026303" comment="cblas-devel-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026304" comment="cblas-devel-static-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026305" comment="lapack-devel-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026306" comment="lapack-devel-static-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026307" comment="lapack-man-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026308" comment="lapacke-devel-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026309" comment="lapacke-devel-static-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026310" comment="libblas3-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026311" comment="libcblas3-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026312" comment="liblapack3-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026313" comment="liblapacke3-3.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026314" comment="libopenblas_openmp-devel-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026315" comment="libopenblas_openmp0-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026316" comment="libopenblas_pthreads-devel-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026317" comment="libopenblas_pthreads0-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026318" comment="libopenblas_serial-devel-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026319" comment="libopenblas_serial0-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026320" comment="openblas-common-devel-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026321" comment="openblas_openmp-devel-static-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026322" comment="openblas_pthreads-devel-static-0.3.29-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026323" comment="openblas_serial-devel-static-0.3.29-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93726" version="1" class="patch">
	<metadata>
		<title>bluez-5.79-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-3588" ref_url="https://www.suse.com/security/cve/CVE-2021-3588/" source="CVE"/>
		<reference ref_id="CVE-2022-0204" ref_url="https://www.suse.com/security/cve/CVE-2022-0204/" source="CVE"/>
		<reference ref_id="CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349/" source="CVE"/>
		<reference ref_id="CVE-2023-45866" ref_url="https://www.suse.com/security/cve/CVE-2023-45866/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.79-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9797">CVE-2016-9797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9798">CVE-2016-9798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9800">CVE-2016-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9801">CVE-2016-9801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9802">CVE-2016-9802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9804">CVE-2016-9804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9917">CVE-2016-9917 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9918">CVE-2016-9918 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3588/">CVE-2021-3588 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3588">CVE-2021-3588 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-0204/">CVE-2022-0204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0204">CVE-2022-0204 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45866/">CVE-2023-45866 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45866">CVE-2023-45866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026324" comment="bluez-5.79-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026325" comment="bluez-auto-enable-devices-5.79-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026326" comment="bluez-cups-5.79-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026327" comment="bluez-devel-5.79-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026328" comment="bluez-obexd-5.79-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026329" comment="bluez-zsh-completion-5.79-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026330" comment="libbluetooth3-5.79-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93727" version="1" class="patch">
	<metadata>
		<title>boost-license1_86_0-1.86.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license1_86_0-1.86.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0171">CVE-2008-0171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026331" comment="boost-license1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026332" comment="boost1_86_0-jam-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026333" comment="libboost_atomic1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026334" comment="libboost_atomic1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026335" comment="libboost_atomic1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026336" comment="libboost_charconv1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026337" comment="libboost_charconv1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026338" comment="libboost_charconv1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026339" comment="libboost_chrono1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026340" comment="libboost_chrono1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026341" comment="libboost_container1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026342" comment="libboost_container1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026343" comment="libboost_container1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026344" comment="libboost_context1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026345" comment="libboost_context1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026346" comment="libboost_contract1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026347" comment="libboost_contract1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026348" comment="libboost_coroutine1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026349" comment="libboost_coroutine1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026350" comment="libboost_date_time1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026351" comment="libboost_date_time1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026352" comment="libboost_date_time1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026353" comment="libboost_fiber1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026354" comment="libboost_fiber1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026355" comment="libboost_filesystem1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026356" comment="libboost_filesystem1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026357" comment="libboost_filesystem1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026358" comment="libboost_graph1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026359" comment="libboost_graph1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026360" comment="libboost_graph1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026361" comment="libboost_headers1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026362" comment="libboost_iostreams1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026363" comment="libboost_iostreams1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026364" comment="libboost_iostreams1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026365" comment="libboost_json1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026366" comment="libboost_json1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026367" comment="libboost_json1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026368" comment="libboost_locale1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026369" comment="libboost_locale1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026370" comment="libboost_locale1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026371" comment="libboost_log1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026372" comment="libboost_log1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026373" comment="libboost_math1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026374" comment="libboost_math1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026375" comment="libboost_math1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026376" comment="libboost_nowide1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026377" comment="libboost_nowide1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026378" comment="libboost_nowide1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026379" comment="libboost_process1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026380" comment="libboost_process1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026381" comment="libboost_process1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026382" comment="libboost_program_options1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026383" comment="libboost_program_options1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026384" comment="libboost_program_options1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026385" comment="libboost_random1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026386" comment="libboost_random1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026387" comment="libboost_random1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026388" comment="libboost_regex1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026389" comment="libboost_regex1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026390" comment="libboost_regex1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026391" comment="libboost_serialization1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026392" comment="libboost_serialization1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026393" comment="libboost_serialization1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026394" comment="libboost_stacktrace1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026395" comment="libboost_stacktrace1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026396" comment="libboost_stacktrace1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026397" comment="libboost_system1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026398" comment="libboost_system1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026399" comment="libboost_system1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026400" comment="libboost_test1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026401" comment="libboost_test1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026402" comment="libboost_test1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026403" comment="libboost_thread1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026404" comment="libboost_thread1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026405" comment="libboost_thread1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026406" comment="libboost_timer1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026407" comment="libboost_timer1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026408" comment="libboost_type_erasure1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026409" comment="libboost_type_erasure1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026410" comment="libboost_type_erasure1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026411" comment="libboost_url1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026412" comment="libboost_url1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026413" comment="libboost_url1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026414" comment="libboost_wave1_86_0-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026415" comment="libboost_wave1_86_0-devel-1.86.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026416" comment="libboost_wave1_86_0-x86-64-v3-1.86.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93728" version="1" class="patch">
	<metadata>
		<title>bosh-2022.10.16-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<description>
These are all security issues fixed in the bosh-2022.10.16-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026417" comment="bosh-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026418" comment="btcflash-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026419" comment="cdda2wav-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026420" comment="cdrecord-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026421" comment="libcdrdeflt1_0-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026422" comment="libdeflt1_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026423" comment="libedc_ecc1_0-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026424" comment="libedc_ecc_dec1_0-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026425" comment="libfile1_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026426" comment="libfind4_0-1.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026427" comment="libparanoia1_0-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026428" comment="librmt-devel-doc-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026429" comment="librmt1_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026430" comment="librscg1_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026431" comment="libscg-devel-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026432" comment="libscg1_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026433" comment="libscgcmd1_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026434" comment="libschily-devel-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026435" comment="libschily-devel-doc-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026436" comment="libschily2_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026437" comment="libxtermcap1_0-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026438" comment="mkisofs-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026439" comment="readcd-3.02~a10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026440" comment="rscsi-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026441" comment="schily-ctags-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026442" comment="schily-mt-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026443" comment="schily-rmt-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026444" comment="smake-2022.10.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026445" comment="spax-1.6.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026446" comment="star-1.6.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026447" comment="ved-1.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93729" version="1" class="patch">
	<metadata>
		<title>bouncycastle-1.80-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7940" ref_url="https://www.suse.com/security/cve/CVE-2015-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-1000338" ref_url="https://www.suse.com/security/cve/CVE-2016-1000338/" source="CVE"/>
		<reference ref_id="CVE-2016-1000339" ref_url="https://www.suse.com/security/cve/CVE-2016-1000339/" source="CVE"/>
		<reference ref_id="CVE-2016-1000340" ref_url="https://www.suse.com/security/cve/CVE-2016-1000340/" source="CVE"/>
		<reference ref_id="CVE-2016-1000341" ref_url="https://www.suse.com/security/cve/CVE-2016-1000341/" source="CVE"/>
		<reference ref_id="CVE-2016-1000342" ref_url="https://www.suse.com/security/cve/CVE-2016-1000342/" source="CVE"/>
		<reference ref_id="CVE-2016-1000343" ref_url="https://www.suse.com/security/cve/CVE-2016-1000343/" source="CVE"/>
		<reference ref_id="CVE-2016-1000344" ref_url="https://www.suse.com/security/cve/CVE-2016-1000344/" source="CVE"/>
		<reference ref_id="CVE-2016-1000345" ref_url="https://www.suse.com/security/cve/CVE-2016-1000345/" source="CVE"/>
		<reference ref_id="CVE-2016-1000346" ref_url="https://www.suse.com/security/cve/CVE-2016-1000346/" source="CVE"/>
		<reference ref_id="CVE-2016-1000352" ref_url="https://www.suse.com/security/cve/CVE-2016-1000352/" source="CVE"/>
		<reference ref_id="CVE-2017-13098" ref_url="https://www.suse.com/security/cve/CVE-2017-13098/" source="CVE"/>
		<reference ref_id="CVE-2018-1000180" ref_url="https://www.suse.com/security/cve/CVE-2018-1000180/" source="CVE"/>
		<reference ref_id="CVE-2018-1000613" ref_url="https://www.suse.com/security/cve/CVE-2018-1000613/" source="CVE"/>
		<reference ref_id="CVE-2019-17359" ref_url="https://www.suse.com/security/cve/CVE-2019-17359/" source="CVE"/>
		<reference ref_id="CVE-2020-15522" ref_url="https://www.suse.com/security/cve/CVE-2020-15522/" source="CVE"/>
		<reference ref_id="CVE-2020-28052" ref_url="https://www.suse.com/security/cve/CVE-2020-28052/" source="CVE"/>
		<reference ref_id="CVE-2023-33201" ref_url="https://www.suse.com/security/cve/CVE-2023-33201/" source="CVE"/>
		<reference ref_id="CVE-2024-29857" ref_url="https://www.suse.com/security/cve/CVE-2024-29857/" source="CVE"/>
		<reference ref_id="CVE-2024-30171" ref_url="https://www.suse.com/security/cve/CVE-2024-30171/" source="CVE"/>
		<reference ref_id="CVE-2024-30172" ref_url="https://www.suse.com/security/cve/CVE-2024-30172/" source="CVE"/>
		<description>
These are all security issues fixed in the bouncycastle-1.80-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7940/">CVE-2015-7940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7940">CVE-2015-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000338/">CVE-2016-1000338 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000338">CVE-2016-1000338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000339/">CVE-2016-1000339 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000339">CVE-2016-1000339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000340/">CVE-2016-1000340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000340">CVE-2016-1000340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000341/">CVE-2016-1000341 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000341">CVE-2016-1000341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000342/">CVE-2016-1000342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000342">CVE-2016-1000342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000343/">CVE-2016-1000343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000343">CVE-2016-1000343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000344/">CVE-2016-1000344 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000344">CVE-2016-1000344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000345/">CVE-2016-1000345 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000345">CVE-2016-1000345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000346/">CVE-2016-1000346 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000346">CVE-2016-1000346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000352/">CVE-2016-1000352 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000352">CVE-2016-1000352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13098/">CVE-2017-13098 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13098">CVE-2017-13098 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000180/">CVE-2018-1000180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000180">CVE-2018-1000180 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000613/">CVE-2018-1000613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000613">CVE-2018-1000613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17359/">CVE-2019-17359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17359">CVE-2019-17359 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15522/">CVE-2020-15522 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15522">CVE-2020-15522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28052/">CVE-2020-28052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28052">CVE-2020-28052 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-33201/">CVE-2023-33201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33201">CVE-2023-33201 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-29857/">CVE-2024-29857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29857">CVE-2024-29857 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30171/">CVE-2024-30171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30171">CVE-2024-30171 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-30172/">CVE-2024-30172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30172">CVE-2024-30172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026448" comment="bouncycastle-1.80-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026449" comment="bouncycastle-javadoc-1.80-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026450" comment="bouncycastle-jmail-1.80-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026451" comment="bouncycastle-mail-1.80-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026452" comment="bouncycastle-pg-1.80-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026453" comment="bouncycastle-pkix-1.80-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026454" comment="bouncycastle-tls-1.80-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026455" comment="bouncycastle-util-1.80-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93730" version="1" class="patch">
	<metadata>
		<title>bpftrace-0.23.5-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-2313" ref_url="https://www.suse.com/security/cve/CVE-2024-2313/" source="CVE"/>
		<description>
These are all security issues fixed in the bpftrace-0.23.5-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2313/">CVE-2024-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2313">CVE-2024-2313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026456" comment="bpftrace-0.23.5-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026457" comment="bpftrace-tools-0.23.5-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93731" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.8.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="CVE-2017-5601" ref_url="https://www.suse.com/security/cve/CVE-2017-5601/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2018-1000879" ref_url="https://www.suse.com/security/cve/CVE-2018-1000879/" source="CVE"/>
		<reference ref_id="CVE-2018-1000880" ref_url="https://www.suse.com/security/cve/CVE-2018-1000880/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<reference ref_id="CVE-2019-19221" ref_url="https://www.suse.com/security/cve/CVE-2019-19221/" source="CVE"/>
		<reference ref_id="CVE-2021-23177" ref_url="https://www.suse.com/security/cve/CVE-2021-23177/" source="CVE"/>
		<reference ref_id="CVE-2021-31566" ref_url="https://www.suse.com/security/cve/CVE-2021-31566/" source="CVE"/>
		<reference ref_id="CVE-2021-36976" ref_url="https://www.suse.com/security/cve/CVE-2021-36976/" source="CVE"/>
		<reference ref_id="CVE-2022-26280" ref_url="https://www.suse.com/security/cve/CVE-2022-26280/" source="CVE"/>
		<reference ref_id="CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227/" source="CVE"/>
		<reference ref_id="CVE-2024-20696" ref_url="https://www.suse.com/security/cve/CVE-2024-20696/" source="CVE"/>
		<reference ref_id="CVE-2024-26256" ref_url="https://www.suse.com/security/cve/CVE-2024-26256/" source="CVE"/>
		<reference ref_id="CVE-2024-57970" ref_url="https://www.suse.com/security/cve/CVE-2024-57970/" source="CVE"/>
		<reference ref_id="CVE-2025-1632" ref_url="https://www.suse.com/security/cve/CVE-2025-1632/" source="CVE"/>
		<reference ref_id="CVE-2025-25724" ref_url="https://www.suse.com/security/cve/CVE-2025-25724/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.8.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5680">CVE-2006-5680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3641">CVE-2007-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3644">CVE-2007-3644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3645">CVE-2007-3645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0211">CVE-2013-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8917">CVE-2015-8917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8928">CVE-2015-8928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8933">CVE-2015-8933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8934">CVE-2015-8934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1541">CVE-2016-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4300">CVE-2016-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4301">CVE-2016-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5418">CVE-2016-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5844">CVE-2016-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6250">CVE-2016-6250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8687">CVE-2016-8687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8688">CVE-2016-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8689">CVE-2016-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14166">CVE-2017-14166 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14501">CVE-2017-14501 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14502">CVE-2017-14502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5601/">CVE-2017-5601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5601">CVE-2017-5601 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000877">CVE-2018-1000877 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000878">CVE-2018-1000878 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000879/">CVE-2018-1000879 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000879">CVE-2018-1000879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000880/">CVE-2018-1000880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000880">CVE-2018-1000880 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000019">CVE-2019-1000019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000020">CVE-2019-1000020 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18408">CVE-2019-18408 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19221/">CVE-2019-19221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19221">CVE-2019-19221 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-23177/">CVE-2021-23177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23177">CVE-2021-23177 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-31566/">CVE-2021-31566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36976/">CVE-2021-36976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36976">CVE-2021-36976 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26280/">CVE-2022-26280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-20696/">CVE-2024-20696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20696">CVE-2024-20696 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26256/">CVE-2024-26256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57970/">CVE-2024-57970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57970">CVE-2024-57970 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1632/">CVE-2025-1632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1632">CVE-2025-1632 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25724/">CVE-2025-25724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25724">CVE-2025-25724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026458" comment="bsdtar-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026459" comment="libarchive-devel-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026460" comment="libarchive13-3.8.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93732" version="1" class="patch">
	<metadata>
		<title>bsh2-2.1.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-2510" ref_url="https://www.suse.com/security/cve/CVE-2016-2510/" source="CVE"/>
		<description>
These are all security issues fixed in the bsh2-2.1.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2510/">CVE-2016-2510 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">CVE-2016-2510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026461" comment="bsh2-2.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026462" comment="bsh2-bsf-2.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026463" comment="bsh2-classgen-2.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026464" comment="bsh2-demo-2.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026465" comment="bsh2-javadoc-2.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026466" comment="bsh2-manual-2.1.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93733" version="1" class="patch">
	<metadata>
		<title>btrfsmaintenance-0.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-14722" ref_url="https://www.suse.com/security/cve/CVE-2018-14722/" source="CVE"/>
		<description>
These are all security issues fixed in the btrfsmaintenance-0.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14722/">CVE-2018-14722 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14722">CVE-2018-14722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026467" comment="btrfsmaintenance-0.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93734" version="1" class="patch">
	<metadata>
		<title>bubblewrap-0.11.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-12439" ref_url="https://www.suse.com/security/cve/CVE-2019-12439/" source="CVE"/>
		<reference ref_id="CVE-2020-5291" ref_url="https://www.suse.com/security/cve/CVE-2020-5291/" source="CVE"/>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
These are all security issues fixed in the bubblewrap-0.11.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5226">CVE-2017-5226 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12439/">CVE-2019-12439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12439">CVE-2019-12439 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5291/">CVE-2020-5291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5291">CVE-2020-5291 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026468" comment="bubblewrap-0.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026469" comment="bubblewrap-zsh-completion-0.11.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93735" version="1" class="patch">
	<metadata>
		<title>buildah-1.39.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<reference ref_id="CVE-2022-27651" ref_url="https://www.suse.com/security/cve/CVE-2022-27651/" source="CVE"/>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.39.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10696">CVE-2020-10696 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27651/">CVE-2022-27651 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27651">CVE-2022-27651 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2990">CVE-2022-2990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026470" comment="buildah-1.39.4-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93736" version="1" class="patch">
	<metadata>
		<title>buildkit-0.12.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<description>
These are all security issues fixed in the buildkit-0.12.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026471" comment="buildkit-0.12.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93737" version="1" class="patch">
	<metadata>
		<title>busybox-1.37.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="CVE-2022-30065" ref_url="https://www.suse.com/security/cve/CVE-2022-30065/" source="CVE"/>
		<reference ref_id="CVE-2022-48174" ref_url="https://www.suse.com/security/cve/CVE-2022-48174/" source="CVE"/>
		<reference ref_id="CVE-2023-42363" ref_url="https://www.suse.com/security/cve/CVE-2023-42363/" source="CVE"/>
		<reference ref_id="CVE-2023-42364" ref_url="https://www.suse.com/security/cve/CVE-2023-42364/" source="CVE"/>
		<reference ref_id="CVE-2023-42365" ref_url="https://www.suse.com/security/cve/CVE-2023-42365/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.37.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-5325">CVE-2011-5325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9645">CVE-2014-9645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9261">CVE-2015-9261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2147">CVE-2016-2147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2148">CVE-2016-2148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6301">CVE-2016-6301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15873">CVE-2017-15873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15874">CVE-2017-15874 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16544">CVE-2017-16544 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000500">CVE-2018-1000500 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000517">CVE-2018-1000517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20679">CVE-2018-20679 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5747">CVE-2019-5747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28831">CVE-2021-28831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42373">CVE-2021-42373 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42374">CVE-2021-42374 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42375">CVE-2021-42375 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42376">CVE-2021-42376 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42377">CVE-2021-42377 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42378">CVE-2021-42378 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42379">CVE-2021-42379 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42380">CVE-2021-42380 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42381">CVE-2021-42381 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42382">CVE-2021-42382 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42383">CVE-2021-42383 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42384">CVE-2021-42384 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42385">CVE-2021-42385 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42386">CVE-2021-42386 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30065/">CVE-2022-30065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30065">CVE-2022-30065 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48174/">CVE-2022-48174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48174">CVE-2022-48174 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42363/">CVE-2023-42363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42363">CVE-2023-42363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42364/">CVE-2023-42364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42364">CVE-2023-42364 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42365/">CVE-2023-42365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42365">CVE-2023-42365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026472" comment="busybox-1.37.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026473" comment="busybox-static-1.37.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026474" comment="busybox-warewulf3-1.37.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93738" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1372">CVE-2008-1372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026475" comment="bzip2-1.0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026476" comment="bzip2-doc-1.0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026477" comment="libbz2-1-1.0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026478" comment="libbz2-1-x86-64-v3-1.0.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026479" comment="libbz2-devel-1.0.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93739" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.34.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="CVE-2025-31498" ref_url="https://www.suse.com/security/cve/CVE-2025-31498/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.34.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5180">CVE-2016-5180 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31498/">CVE-2025-31498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31498">CVE-2025-31498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026480" comment="c-ares-devel-1.34.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026481" comment="c-ares-utils-1.34.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026482" comment="libcares2-1.34.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93740" version="1" class="patch">
	<metadata>
		<title>cairo-devel-1.18.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-0528" ref_url="https://www.suse.com/security/cve/CVE-2006-0528/" source="CVE"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
These are all security issues fixed in the cairo-devel-1.18.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0528/">CVE-2006-0528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0528">CVE-2006-0528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026483" comment="cairo-devel-1.18.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026484" comment="cairo-tools-1.18.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026485" comment="libcairo-gobject2-1.18.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026486" comment="libcairo-script-interpreter2-1.18.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026487" comment="libcairo2-1.18.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93741" version="1" class="patch">
	<metadata>
		<title>cargo-1.88.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000622" ref_url="https://www.suse.com/security/cve/CVE-2018-1000622/" source="CVE"/>
		<reference ref_id="CVE-2019-12083" ref_url="https://www.suse.com/security/cve/CVE-2019-12083/" source="CVE"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-1.88.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000622/">CVE-2018-1000622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000622">CVE-2018-1000622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12083/">CVE-2019-12083 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12083">CVE-2019-12083 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">CVE-2020-1967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026488" comment="cargo-1.88.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026489" comment="rust-1.88.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93742" version="1" class="patch">
	<metadata>
		<title>cargo-audit-0.21.2~git0.18e58c2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2024-45405" ref_url="https://www.suse.com/security/cve/CVE-2024-45405/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-0.21.2~git0.18e58c2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45405/">CVE-2024-45405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45405">CVE-2024-45405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026490" comment="cargo-audit-0.21.2~git0.18e58c2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93743" version="1" class="patch">
	<metadata>
		<title>cargo-audit-advisory-db-20250304-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<reference ref_id="CVE-2021-32629" ref_url="https://www.suse.com/security/cve/CVE-2021-32629/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="CVE-2022-24791" ref_url="https://www.suse.com/security/cve/CVE-2022-24791/" source="CVE"/>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-36086" ref_url="https://www.suse.com/security/cve/CVE-2022-36086/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<reference ref_id="CVE-2023-49092" ref_url="https://www.suse.com/security/cve/CVE-2023-49092/" source="CVE"/>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<reference ref_id="CVE-2024-28854" ref_url="https://www.suse.com/security/cve/CVE-2024-28854/" source="CVE"/>
		<reference ref_id="CVE-2024-34063" ref_url="https://www.suse.com/security/cve/CVE-2024-34063/" source="CVE"/>
		<reference ref_id="CVE-2024-40648" ref_url="https://www.suse.com/security/cve/CVE-2024-40648/" source="CVE"/>
		<reference ref_id="CVE-2024-47609" ref_url="https://www.suse.com/security/cve/CVE-2024-47609/" source="CVE"/>
		<reference ref_id="CVE-2024-52813" ref_url="https://www.suse.com/security/cve/CVE-2024-52813/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-audit-advisory-db-20250304-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32629/">CVE-2021-32629 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32629">CVE-2021-32629 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24791/">CVE-2022-24791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24791">CVE-2022-24791 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36086/">CVE-2022-36086 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36086">CVE-2022-36086 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49092/">CVE-2023-49092 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49092">CVE-2023-49092 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28854/">CVE-2024-28854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28854">CVE-2024-28854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34063/">CVE-2024-34063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34063">CVE-2024-34063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40648/">CVE-2024-40648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40648">CVE-2024-40648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47609/">CVE-2024-47609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47609">CVE-2024-47609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52813/">CVE-2024-52813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52813">CVE-2024-52813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026491" comment="cargo-audit-advisory-db-20250304-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93744" version="1" class="patch">
	<metadata>
		<title>cargo-c-0.10.3~git0.ee7d7ef-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-25023" ref_url="https://www.suse.com/security/cve/CVE-2018-25023/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2024-45405" ref_url="https://www.suse.com/security/cve/CVE-2024-45405/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-c-0.10.3~git0.ee7d7ef-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-25023/">CVE-2018-25023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25023">CVE-2018-25023 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45405/">CVE-2024-45405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45405">CVE-2024-45405 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026492" comment="cargo-c-0.10.3~git0.ee7d7ef-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93745" version="1" class="patch">
	<metadata>
		<title>checkbashisms-2.22.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-2240" ref_url="https://www.suse.com/security/cve/CVE-2012-2240/" source="CVE"/>
		<reference ref_id="CVE-2012-2241" ref_url="https://www.suse.com/security/cve/CVE-2012-2241/" source="CVE"/>
		<reference ref_id="CVE-2012-3500" ref_url="https://www.suse.com/security/cve/CVE-2012-3500/" source="CVE"/>
		<description>
These are all security issues fixed in the checkbashisms-2.22.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2240/">CVE-2012-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2240">CVE-2012-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2241/">CVE-2012-2241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2241">CVE-2012-2241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3500/">CVE-2012-3500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3500">CVE-2012-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026493" comment="checkbashisms-2.22.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93746" version="1" class="patch">
	<metadata>
		<title>chrony-4.6.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-4502" ref_url="https://www.suse.com/security/cve/CVE-2012-4502/" source="CVE"/>
		<reference ref_id="CVE-2012-4503" ref_url="https://www.suse.com/security/cve/CVE-2012-4503/" source="CVE"/>
		<reference ref_id="CVE-2014-0021" ref_url="https://www.suse.com/security/cve/CVE-2014-0021/" source="CVE"/>
		<reference ref_id="CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567/" source="CVE"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-4.6.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4502/">CVE-2012-4502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4502">CVE-2012-4502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4503/">CVE-2012-4503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4503">CVE-2012-4503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0021/">CVE-2014-0021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0021">CVE-2014-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1567">CVE-2016-1567 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026494" comment="chrony-4.6.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026495" comment="chrony-pool-empty-4.6.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026496" comment="chrony-pool-suse-4.6.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93747" version="1" class="patch">
	<metadata>
		<title>cifs-utils-7.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-1059" ref_url="https://www.suse.com/security/cve/CVE-2006-1059/" source="CVE"/>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<reference ref_id="CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342/" source="CVE"/>
		<reference ref_id="CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208/" source="CVE"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-7.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1059/">CVE-2006-1059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1059">CVE-2006-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1586">CVE-2012-1586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14342">CVE-2020-14342 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20208">CVE-2021-20208 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026497" comment="cifs-utils-7.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026498" comment="cifs-utils-devel-7.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026499" comment="pam_cifscreds-7.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026500" comment="wb-cifs-idmap-plugin-7.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93748" version="1" class="patch">
	<metadata>
		<title>clamav-1.4.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-3239" ref_url="https://www.suse.com/security/cve/CVE-2005-3239/" source="CVE"/>
		<reference ref_id="CVE-2005-3303" ref_url="https://www.suse.com/security/cve/CVE-2005-3303/" source="CVE"/>
		<reference ref_id="CVE-2006-1614" ref_url="https://www.suse.com/security/cve/CVE-2006-1614/" source="CVE"/>
		<reference ref_id="CVE-2006-1615" ref_url="https://www.suse.com/security/cve/CVE-2006-1615/" source="CVE"/>
		<reference ref_id="CVE-2006-1630" ref_url="https://www.suse.com/security/cve/CVE-2006-1630/" source="CVE"/>
		<reference ref_id="CVE-2006-1989" ref_url="https://www.suse.com/security/cve/CVE-2006-1989/" source="CVE"/>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2019-1785" ref_url="https://www.suse.com/security/cve/CVE-2019-1785/" source="CVE"/>
		<reference ref_id="CVE-2019-1786" ref_url="https://www.suse.com/security/cve/CVE-2019-1786/" source="CVE"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="CVE-2019-1798" ref_url="https://www.suse.com/security/cve/CVE-2019-1798/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="CVE-2022-20770" ref_url="https://www.suse.com/security/cve/CVE-2022-20770/" source="CVE"/>
		<reference ref_id="CVE-2022-20771" ref_url="https://www.suse.com/security/cve/CVE-2022-20771/" source="CVE"/>
		<reference ref_id="CVE-2022-20785" ref_url="https://www.suse.com/security/cve/CVE-2022-20785/" source="CVE"/>
		<reference ref_id="CVE-2022-20792" ref_url="https://www.suse.com/security/cve/CVE-2022-20792/" source="CVE"/>
		<reference ref_id="CVE-2022-20796" ref_url="https://www.suse.com/security/cve/CVE-2022-20796/" source="CVE"/>
		<reference ref_id="CVE-2023-20032" ref_url="https://www.suse.com/security/cve/CVE-2023-20032/" source="CVE"/>
		<reference ref_id="CVE-2023-20052" ref_url="https://www.suse.com/security/cve/CVE-2023-20052/" source="CVE"/>
		<reference ref_id="CVE-2023-20197" ref_url="https://www.suse.com/security/cve/CVE-2023-20197/" source="CVE"/>
		<reference ref_id="CVE-2023-40477" ref_url="https://www.suse.com/security/cve/CVE-2023-40477/" source="CVE"/>
		<reference ref_id="CVE-2024-20380" ref_url="https://www.suse.com/security/cve/CVE-2024-20380/" source="CVE"/>
		<reference ref_id="CVE-2024-20505" ref_url="https://www.suse.com/security/cve/CVE-2024-20505/" source="CVE"/>
		<reference ref_id="CVE-2024-20506" ref_url="https://www.suse.com/security/cve/CVE-2024-20506/" source="CVE"/>
		<reference ref_id="CVE-2025-20128" ref_url="https://www.suse.com/security/cve/CVE-2025-20128/" source="CVE"/>
		<reference ref_id="CVE-2025-20234" ref_url="https://www.suse.com/security/cve/CVE-2025-20234/" source="CVE"/>
		<reference ref_id="CVE-2025-20260" ref_url="https://www.suse.com/security/cve/CVE-2025-20260/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-1.4.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3239/">CVE-2005-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3239">CVE-2005-3239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3303/">CVE-2005-3303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3303">CVE-2005-3303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1614/">CVE-2006-1614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1614">CVE-2006-1614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1615/">CVE-2006-1615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1615">CVE-2006-1615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1630/">CVE-2006-1630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1630">CVE-2006-1630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1989/">CVE-2006-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1989">CVE-2006-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4182">CVE-2006-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5295">CVE-2006-5295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5874">CVE-2006-5874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-0897">CVE-2007-0897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0898">CVE-2007-0898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1745">CVE-2007-1745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1997">CVE-2007-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6335">CVE-2007-6335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6336">CVE-2007-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6337">CVE-2007-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6595">CVE-2007-6595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6596">CVE-2007-6596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0318">CVE-2008-0318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0728">CVE-2008-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1100">CVE-2008-1100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2713">CVE-2008-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2721">CVE-2011-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3627">CVE-2011-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1457">CVE-2012-1457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1458">CVE-2012-1458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1459">CVE-2012-1459 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6497">CVE-2013-6497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9050">CVE-2014-9050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9328">CVE-2014-9328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1461">CVE-2015-1461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1462">CVE-2015-1462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1463">CVE-2015-1463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2170">CVE-2015-2170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2221">CVE-2015-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2222">CVE-2015-2222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2668">CVE-2015-2668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12374">CVE-2017-12374 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12375">CVE-2017-12375 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12376">CVE-2017-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12377">CVE-2017-12377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12378">CVE-2017-12378 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12379">CVE-2017-12379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12380">CVE-2017-12380 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6418">CVE-2017-6418 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6420">CVE-2017-6420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0202">CVE-2018-0202 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0360">CVE-2018-0360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0361">CVE-2018-0361 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15378">CVE-2018-15378 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1785/">CVE-2019-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1785">CVE-2019-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1786/">CVE-2019-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1786">CVE-2019-1786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1787">CVE-2019-1787 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1788">CVE-2019-1788 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1789">CVE-2019-1789 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1798/">CVE-2019-1798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1798">CVE-2019-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20770/">CVE-2022-20770 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20770">CVE-2022-20770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20771/">CVE-2022-20771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20771">CVE-2022-20771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20785/">CVE-2022-20785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20785">CVE-2022-20785 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20792/">CVE-2022-20792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20792">CVE-2022-20792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20796/">CVE-2022-20796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20796">CVE-2022-20796 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20032/">CVE-2023-20032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20032">CVE-2023-20032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20052/">CVE-2023-20052 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20052">CVE-2023-20052 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-20197/">CVE-2023-20197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20197">CVE-2023-20197 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40477/">CVE-2023-40477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40477">CVE-2023-40477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-20380/">CVE-2024-20380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20380">CVE-2024-20380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-20505/">CVE-2024-20505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-20505">CVE-2024-20505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-20506/">CVE-2024-20506 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-20506">CVE-2024-20506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20128/">CVE-2025-20128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20128">CVE-2025-20128 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20234/">CVE-2025-20234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20234">CVE-2025-20234 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-20260/">CVE-2025-20260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20260">CVE-2025-20260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026501" comment="clamav-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026502" comment="clamav-devel-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026503" comment="clamav-docs-html-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026504" comment="clamav-milter-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026505" comment="libclamav12-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026506" comment="libclammspack0-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026507" comment="libfreshclam3-1.4.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93749" version="1" class="patch">
	<metadata>
		<title>cloud-init-25.1.3-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816/" source="CVE"/>
		<reference ref_id="CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631/" source="CVE"/>
		<reference ref_id="CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632/" source="CVE"/>
		<reference ref_id="CVE-2021-3429" ref_url="https://www.suse.com/security/cve/CVE-2021-3429/" source="CVE"/>
		<reference ref_id="CVE-2022-2084" ref_url="https://www.suse.com/security/cve/CVE-2022-2084/" source="CVE"/>
		<reference ref_id="CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786/" source="CVE"/>
		<reference ref_id="CVE-2024-11584" ref_url="https://www.suse.com/security/cve/CVE-2024-11584/" source="CVE"/>
		<reference ref_id="CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174/" source="CVE"/>
		<description>
These are all security issues fixed in the cloud-init-25.1.3-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0816">CVE-2019-0816 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8631">CVE-2020-8631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8632">CVE-2020-8632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3429/">CVE-2021-3429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3429">CVE-2021-3429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2084/">CVE-2022-2084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2084">CVE-2022-2084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11584/">CVE-2024-11584 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11584">CVE-2024-11584 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026508" comment="cloud-init-25.1.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026509" comment="cloud-init-config-suse-25.1.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026510" comment="cloud-init-doc-25.1.3-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93750" version="1" class="patch">
	<metadata>
		<title>cmake-3.31.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<description>
These are all security issues fixed in the cmake-3.31.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026511" comment="cmake-3.31.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026512" comment="cmake-full-3.31.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026513" comment="cmake-man-3.31.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93751" version="1" class="patch">
	<metadata>
		<title>cockpit-340-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-6126" ref_url="https://www.suse.com/security/cve/CVE-2024-6126/" source="CVE"/>
		<description>
These are all security issues fixed in the cockpit-340-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-6126/">CVE-2024-6126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6126">CVE-2024-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026514" comment="cockpit-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026515" comment="cockpit-bridge-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026516" comment="cockpit-devel-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026517" comment="cockpit-doc-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026518" comment="cockpit-firewalld-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026519" comment="cockpit-kdump-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026520" comment="cockpit-networkmanager-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026521" comment="cockpit-packagekit-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026522" comment="cockpit-selinux-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026523" comment="cockpit-storaged-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026524" comment="cockpit-system-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026525" comment="cockpit-ws-340-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026526" comment="cockpit-ws-selinux-340-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93752" version="1" class="patch">
	<metadata>
		<title>colord-1.4.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<reference ref_id="CVE-2021-42523" ref_url="https://www.suse.com/security/cve/CVE-2021-42523/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.4.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4349">CVE-2011-4349 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42523/">CVE-2021-42523 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42523">CVE-2021-42523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026527" comment="colord-1.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026528" comment="colord-color-profiles-1.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026529" comment="colord-lang-1.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026530" comment="libcolord-devel-1.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026531" comment="libcolord2-1.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026532" comment="libcolorhug2-1.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026533" comment="typelib-1_0-Colord-1_0-1.4.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026534" comment="typelib-1_0-Colorhug-1_0-1.4.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93753" version="1" class="patch">
	<metadata>
		<title>colord-gtk-0.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-gtk-0.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4349">CVE-2011-4349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026535" comment="colord-gtk-0.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026536" comment="colord-gtk-doc-0.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026537" comment="colord-gtk-lang-0.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026538" comment="libcolord-gtk-devel-0.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026539" comment="libcolord-gtk1-0.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026540" comment="libcolord-gtk4-1-0.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026541" comment="typelib-1_0-ColordGtk-1_0-0.3.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93754" version="1" class="patch">
	<metadata>
		<title>conmon-2.1.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<description>
These are all security issues fixed in the conmon-2.1.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1708">CVE-2022-1708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026542" comment="conmon-2.1.13-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93755" version="1" class="patch">
	<metadata>
		<title>conntrack-tools-1.4.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-6496" ref_url="https://www.suse.com/security/cve/CVE-2015-6496/" source="CVE"/>
		<description>
These are all security issues fixed in the conntrack-tools-1.4.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6496/">CVE-2015-6496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6496">CVE-2015-6496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026543" comment="conntrack-tools-1.4.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026544" comment="conntrackd-1.4.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93756" version="1" class="patch">
	<metadata>
		<title>containerd-1.7.27-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157/" source="CVE"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2021-21334" ref_url="https://www.suse.com/security/cve/CVE-2021-21334/" source="CVE"/>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-23471" ref_url="https://www.suse.com/security/cve/CVE-2022-23471/" source="CVE"/>
		<reference ref_id="CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648/" source="CVE"/>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-31030" ref_url="https://www.suse.com/security/cve/CVE-2022-31030/" source="CVE"/>
		<reference ref_id="CVE-2023-25153" ref_url="https://www.suse.com/security/cve/CVE-2023-25153/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2024-40635" ref_url="https://www.suse.com/security/cve/CVE-2024-40635/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.7.27-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15157">CVE-2020-15157 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21334/">CVE-2021-21334 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21334">CVE-2021-21334 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23471/">CVE-2022-23471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31030/">CVE-2022-31030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25153/">CVE-2023-25153 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25153">CVE-2023-25153 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-40635/">CVE-2024-40635 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40635">CVE-2024-40635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026545" comment="containerd-1.7.27-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026546" comment="containerd-ctr-1.7.27-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026547" comment="containerd-devel-1.7.27-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93757" version="1" class="patch">
	<metadata>
		<title>corepack22-22.15.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<reference ref_id="CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018/" source="CVE"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-27980" ref_url="https://www.suse.com/security/cve/CVE-2024-27980/" source="CVE"/>
		<reference ref_id="CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137/" source="CVE"/>
		<reference ref_id="CVE-2024-36138" ref_url="https://www.suse.com/security/cve/CVE-2024-36138/" source="CVE"/>
		<reference ref_id="CVE-2024-37372" ref_url="https://www.suse.com/security/cve/CVE-2024-37372/" source="CVE"/>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<reference ref_id="CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165/" source="CVE"/>
		<reference ref_id="CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166/" source="CVE"/>
		<description>
These are all security issues fixed in the corepack22-22.15.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27980/">CVE-2024-27980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27980">CVE-2024-27980 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36138/">CVE-2024-36138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36138">CVE-2024-36138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37372/">CVE-2024-37372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37372">CVE-2024-37372 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026548" comment="corepack22-22.15.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026549" comment="nodejs22-22.15.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026550" comment="nodejs22-devel-22.15.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026551" comment="nodejs22-docs-22.15.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026552" comment="npm22-22.15.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93758" version="1" class="patch">
	<metadata>
		<title>coreutils-9.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<reference ref_id="CVE-2024-0684" ref_url="https://www.suse.com/security/cve/CVE-2024-0684/" source="CVE"/>
		<reference ref_id="CVE-2025-5278" ref_url="https://www.suse.com/security/cve/CVE-2025-5278/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-9.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4041">CVE-2015-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4042">CVE-2015-4042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0684/">CVE-2024-0684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0684">CVE-2024-0684 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5278/">CVE-2025-5278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5278">CVE-2025-5278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026553" comment="coreutils-9.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026554" comment="coreutils-doc-9.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026555" comment="coreutils-lang-9.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026556" comment="coreutils-single-9.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026557" comment="coreutils-systemd-9.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93759" version="1" class="patch">
	<metadata>
		<title>cosign-2.5.3-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-23649" ref_url="https://www.suse.com/security/cve/CVE-2022-23649/" source="CVE"/>
		<reference ref_id="CVE-2022-35929" ref_url="https://www.suse.com/security/cve/CVE-2022-35929/" source="CVE"/>
		<reference ref_id="CVE-2022-36056" ref_url="https://www.suse.com/security/cve/CVE-2022-36056/" source="CVE"/>
		<reference ref_id="CVE-2023-46737" ref_url="https://www.suse.com/security/cve/CVE-2023-46737/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2024-29902" ref_url="https://www.suse.com/security/cve/CVE-2024-29902/" source="CVE"/>
		<reference ref_id="CVE-2024-29903" ref_url="https://www.suse.com/security/cve/CVE-2024-29903/" source="CVE"/>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569/" source="CVE"/>
		<description>
These are all security issues fixed in the cosign-2.5.3-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23649/">CVE-2022-23649 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23649">CVE-2022-23649 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35929/">CVE-2022-35929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35929">CVE-2022-35929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36056/">CVE-2022-36056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36056">CVE-2022-36056 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46737/">CVE-2023-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46737">CVE-2023-46737 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29902/">CVE-2024-29902 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29902">CVE-2024-29902 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29903/">CVE-2024-29903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29903">CVE-2024-29903 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026558" comment="cosign-2.5.3-160000.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93760" version="1" class="patch">
	<metadata>
		<title>cpio-2.15-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2015-1197" ref_url="https://www.suse.com/security/cve/CVE-2015-1197/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.15-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1197/">CVE-2015-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1197">CVE-2015-1197 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2037">CVE-2016-2037 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026559" comment="cpio-2.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026560" comment="cpio-lang-2.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026561" comment="cpio-mt-2.15-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93761" version="1" class="patch">
	<metadata>
		<title>cpp13-13.4.0+git9739-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp13-13.4.0+git9739-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026562" comment="cpp13-13.4.0+git9739-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026563" comment="gcc13-13.4.0+git9739-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93762" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026564" comment="cracklib-2.9.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026565" comment="cracklib-devel-2.9.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026566" comment="cracklib-dict-small-2.9.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026567" comment="libcrack2-2.9.11-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93763" version="1" class="patch">
	<metadata>
		<title>crash-9.0.0-160000.2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<description>
These are all security issues fixed in the crash-9.0.0-160000.2.3 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2524">CVE-2014-2524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026568" comment="crash-9.0.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026569" comment="crash-devel-9.0.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026570" comment="crash-doc-9.0.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026571" comment="crash-gcore-9.0.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026572" comment="crash-kmp-64kb-9.0.0_k6.12.0_160000.5-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026573" comment="crash-kmp-default-9.0.0_k6.12.0_160000.5-160000.2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93764" version="1" class="patch">
	<metadata>
		<title>cron-4.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2607">CVE-2006-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9704">CVE-2019-9704 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9705">CVE-2019-9705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026574" comment="cron-4.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026575" comment="cronie-1.7.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026576" comment="cronie-anacron-1.7.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93765" version="1" class="patch">
	<metadata>
		<title>cryptsetup-2.7.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-14382" ref_url="https://www.suse.com/security/cve/CVE-2020-14382/" source="CVE"/>
		<reference ref_id="CVE-2021-4122" ref_url="https://www.suse.com/security/cve/CVE-2021-4122/" source="CVE"/>
		<description>
These are all security issues fixed in the cryptsetup-2.7.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14382/">CVE-2020-14382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14382">CVE-2020-14382 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4122/">CVE-2021-4122 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026577" comment="cryptsetup-2.7.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026578" comment="cryptsetup-doc-2.7.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026579" comment="cryptsetup-lang-2.7.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026580" comment="cryptsetup-ssh-2.7.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026581" comment="libcryptsetup-devel-2.7.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026582" comment="libcryptsetup12-2.7.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93766" version="1" class="patch">
	<metadata>
		<title>cscope-15.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2004-2541" ref_url="https://www.suse.com/security/cve/CVE-2004-2541/" source="CVE"/>
		<reference ref_id="CVE-2006-4262" ref_url="https://www.suse.com/security/cve/CVE-2006-4262/" source="CVE"/>
		<description>
These are all security issues fixed in the cscope-15.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2541/">CVE-2004-2541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2541">CVE-2004-2541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4262/">CVE-2006-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4262">CVE-2006-4262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026583" comment="cscope-15.9-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93767" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<reference ref_id="CVE-2022-4515" ref_url="https://www.suse.com/security/cve/CVE-2022-4515/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7204">CVE-2014-7204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4515/">CVE-2022-4515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4515">CVE-2022-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026584" comment="ctags-5.8-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93768" version="1" class="patch">
	<metadata>
		<title>ctdb-4.22.3+git.401.c70158430cc-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-1059" ref_url="https://www.suse.com/security/cve/CVE-2006-1059/" source="CVE"/>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="CVE-2018-10918" ref_url="https://www.suse.com/security/cve/CVE-2018-10918/" source="CVE"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<reference ref_id="CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2018-14628" ref_url="https://www.suse.com/security/cve/CVE-2018-14628/" source="CVE"/>
		<reference ref_id="CVE-2018-14629" ref_url="https://www.suse.com/security/cve/CVE-2018-14629/" source="CVE"/>
		<reference ref_id="CVE-2018-16841" ref_url="https://www.suse.com/security/cve/CVE-2018-16841/" source="CVE"/>
		<reference ref_id="CVE-2018-16851" ref_url="https://www.suse.com/security/cve/CVE-2018-16851/" source="CVE"/>
		<reference ref_id="CVE-2018-16852" ref_url="https://www.suse.com/security/cve/CVE-2018-16852/" source="CVE"/>
		<reference ref_id="CVE-2018-16853" ref_url="https://www.suse.com/security/cve/CVE-2018-16853/" source="CVE"/>
		<reference ref_id="CVE-2018-16857" ref_url="https://www.suse.com/security/cve/CVE-2018-16857/" source="CVE"/>
		<reference ref_id="CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860/" source="CVE"/>
		<reference ref_id="CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197/" source="CVE"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="CVE-2019-12435" ref_url="https://www.suse.com/security/cve/CVE-2019-12435/" source="CVE"/>
		<reference ref_id="CVE-2019-12436" ref_url="https://www.suse.com/security/cve/CVE-2019-12436/" source="CVE"/>
		<reference ref_id="CVE-2019-14833" ref_url="https://www.suse.com/security/cve/CVE-2019-14833/" source="CVE"/>
		<reference ref_id="CVE-2019-14847" ref_url="https://www.suse.com/security/cve/CVE-2019-14847/" source="CVE"/>
		<reference ref_id="CVE-2019-14861" ref_url="https://www.suse.com/security/cve/CVE-2019-14861/" source="CVE"/>
		<reference ref_id="CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870/" source="CVE"/>
		<reference ref_id="CVE-2019-14902" ref_url="https://www.suse.com/security/cve/CVE-2019-14902/" source="CVE"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="CVE-2019-19344" ref_url="https://www.suse.com/security/cve/CVE-2019-19344/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2019-3870" ref_url="https://www.suse.com/security/cve/CVE-2019-3870/" source="CVE"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760/" source="CVE"/>
		<reference ref_id="CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303/" source="CVE"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="CVE-2020-17049" ref_url="https://www.suse.com/security/cve/CVE-2020-17049/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2020-25718" ref_url="https://www.suse.com/security/cve/CVE-2020-25718/" source="CVE"/>
		<reference ref_id="CVE-2020-25719" ref_url="https://www.suse.com/security/cve/CVE-2020-25719/" source="CVE"/>
		<reference ref_id="CVE-2020-25721" ref_url="https://www.suse.com/security/cve/CVE-2020-25721/" source="CVE"/>
		<reference ref_id="CVE-2020-25722" ref_url="https://www.suse.com/security/cve/CVE-2020-25722/" source="CVE"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20251" ref_url="https://www.suse.com/security/cve/CVE-2021-20251/" source="CVE"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="CVE-2021-3738" ref_url="https://www.suse.com/security/cve/CVE-2021-3738/" source="CVE"/>
		<reference ref_id="CVE-2021-44141" ref_url="https://www.suse.com/security/cve/CVE-2021-44141/" source="CVE"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="CVE-2022-0336" ref_url="https://www.suse.com/security/cve/CVE-2022-0336/" source="CVE"/>
		<reference ref_id="CVE-2022-2031" ref_url="https://www.suse.com/security/cve/CVE-2022-2031/" source="CVE"/>
		<reference ref_id="CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127/" source="CVE"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<reference ref_id="CVE-2022-32744" ref_url="https://www.suse.com/security/cve/CVE-2022-32744/" source="CVE"/>
		<reference ref_id="CVE-2022-32745" ref_url="https://www.suse.com/security/cve/CVE-2022-32745/" source="CVE"/>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<reference ref_id="CVE-2022-3437" ref_url="https://www.suse.com/security/cve/CVE-2022-3437/" source="CVE"/>
		<reference ref_id="CVE-2022-3592" ref_url="https://www.suse.com/security/cve/CVE-2022-3592/" source="CVE"/>
		<reference ref_id="CVE-2022-37966" ref_url="https://www.suse.com/security/cve/CVE-2022-37966/" source="CVE"/>
		<reference ref_id="CVE-2022-37967" ref_url="https://www.suse.com/security/cve/CVE-2022-37967/" source="CVE"/>
		<reference ref_id="CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023/" source="CVE"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<reference ref_id="CVE-2022-44640" ref_url="https://www.suse.com/security/cve/CVE-2022-44640/" source="CVE"/>
		<reference ref_id="CVE-2023-0225" ref_url="https://www.suse.com/security/cve/CVE-2023-0225/" source="CVE"/>
		<reference ref_id="CVE-2023-0614" ref_url="https://www.suse.com/security/cve/CVE-2023-0614/" source="CVE"/>
		<reference ref_id="CVE-2023-0922" ref_url="https://www.suse.com/security/cve/CVE-2023-0922/" source="CVE"/>
		<reference ref_id="CVE-2023-3347" ref_url="https://www.suse.com/security/cve/CVE-2023-3347/" source="CVE"/>
		<reference ref_id="CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966/" source="CVE"/>
		<reference ref_id="CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967/" source="CVE"/>
		<reference ref_id="CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968/" source="CVE"/>
		<reference ref_id="CVE-2023-3961" ref_url="https://www.suse.com/security/cve/CVE-2023-3961/" source="CVE"/>
		<reference ref_id="CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091/" source="CVE"/>
		<reference ref_id="CVE-2023-4154" ref_url="https://www.suse.com/security/cve/CVE-2023-4154/" source="CVE"/>
		<reference ref_id="CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669/" source="CVE"/>
		<reference ref_id="CVE-2023-42670" ref_url="https://www.suse.com/security/cve/CVE-2023-42670/" source="CVE"/>
		<reference ref_id="CVE-2023-5568" ref_url="https://www.suse.com/security/cve/CVE-2023-5568/" source="CVE"/>
		<reference ref_id="CVE-2025-0620" ref_url="https://www.suse.com/security/cve/CVE-2025-0620/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-4.22.3+git.401.c70158430cc-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1059/">CVE-2006-1059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1059">CVE-2006-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3403">CVE-2006-3403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0452">CVE-2007-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2444">CVE-2007-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2446">CVE-2007-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2447">CVE-2007-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4138">CVE-2007-4138 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4572">CVE-2007-4572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5398">CVE-2007-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6015">CVE-2007-6015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1105">CVE-2008-1105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3789">CVE-2008-3789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4314">CVE-2008-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0022">CVE-2009-0022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1642">CVE-2010-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0870">CVE-2012-0870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6150">CVE-2012-6150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0172">CVE-2013-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0454">CVE-2013-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1863">CVE-2013-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4124">CVE-2013-4124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4408">CVE-2013-4408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4475">CVE-2013-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4476">CVE-2013-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4496">CVE-2013-4496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6442">CVE-2013-6442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0239">CVE-2014-0239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3560">CVE-2014-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8143">CVE-2014-8143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8467">CVE-2015-8467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0771">CVE-2016-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2119">CVE-2016-2119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2123">CVE-2016-2123 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11103">CVE-2017-11103 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12151">CVE-2017-12151 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14746">CVE-2017-14746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1057">CVE-2018-1057 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10918/">CVE-2018-10918 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10918">CVE-2018-10918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10919">CVE-2018-10919 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1139">CVE-2018-1139 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1140">CVE-2018-1140 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14628/">CVE-2018-14628 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14628">CVE-2018-14628 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14629/">CVE-2018-14629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14629">CVE-2018-14629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16841/">CVE-2018-16841 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16841">CVE-2018-16841 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16851/">CVE-2018-16851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16851">CVE-2018-16851 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16852/">CVE-2018-16852 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16852">CVE-2018-16852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16853/">CVE-2018-16853 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16853">CVE-2018-16853 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16857/">CVE-2018-16857 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16857">CVE-2018-16857 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16860">CVE-2018-16860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12435/">CVE-2019-12435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12435">CVE-2019-12435 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12436/">CVE-2019-12436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12436">CVE-2019-12436 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14833/">CVE-2019-14833 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14833">CVE-2019-14833 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14847/">CVE-2019-14847 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14847">CVE-2019-14847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14861/">CVE-2019-14861 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14861">CVE-2019-14861 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14870">CVE-2019-14870 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14902/">CVE-2019-14902 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14902">CVE-2019-14902 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19344/">CVE-2019-19344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19344">CVE-2019-19344 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3824">CVE-2019-3824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3870/">CVE-2019-3870 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3870">CVE-2019-3870 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10700">CVE-2020-10700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10704">CVE-2020-10704 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10730">CVE-2020-10730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10760">CVE-2020-10760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14303">CVE-2020-14303 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-17049/">CVE-2020-17049 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17049">CVE-2020-17049 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25718/">CVE-2020-25718 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25718">CVE-2020-25718 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25719/">CVE-2020-25719 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25719">CVE-2020-25719 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25721/">CVE-2020-25721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25721">CVE-2020-25721 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25722/">CVE-2020-25722 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25722">CVE-2020-25722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27840">CVE-2020-27840 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20251/">CVE-2021-20251 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20251">CVE-2021-20251 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23192">CVE-2021-23192 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3738/">CVE-2021-3738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3738">CVE-2021-3738 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44141/">CVE-2021-44141 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44141">CVE-2021-44141 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0336/">CVE-2022-0336 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0336">CVE-2022-0336 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2031/">CVE-2022-2031 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2031">CVE-2022-2031 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32744/">CVE-2022-32744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32744">CVE-2022-32744 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32745/">CVE-2022-32745 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32745">CVE-2022-32745 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-3437/">CVE-2022-3437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3437">CVE-2022-3437 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3592/">CVE-2022-3592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3592">CVE-2022-3592 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37966/">CVE-2022-37966 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37966">CVE-2022-37966 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37967/">CVE-2022-37967 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37967">CVE-2022-37967 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44640/">CVE-2022-44640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44640">CVE-2022-44640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0225/">CVE-2023-0225 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0225">CVE-2023-0225 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0614/">CVE-2023-0614 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0614">CVE-2023-0614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0922/">CVE-2023-0922 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0922">CVE-2023-0922 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3347/">CVE-2023-3347 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3347">CVE-2023-3347 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3961/">CVE-2023-3961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3961">CVE-2023-3961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4154/">CVE-2023-4154 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4154">CVE-2023-4154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42670/">CVE-2023-42670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42670">CVE-2023-42670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5568/">CVE-2023-5568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5568">CVE-2023-5568 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0620/">CVE-2025-0620 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0620">CVE-2025-0620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026585" comment="ctdb-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026586" comment="ctdb-pcp-pmda-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026587" comment="ldb-tools-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026588" comment="libldb-devel-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026589" comment="libldb2-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026590" comment="python3-ldb-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026591" comment="samba-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026592" comment="samba-ad-dc-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026593" comment="samba-ad-dc-libs-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026594" comment="samba-client-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026595" comment="samba-client-libs-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026596" comment="samba-dcerpc-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026597" comment="samba-devel-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026598" comment="samba-doc-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026599" comment="samba-dsdb-modules-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026600" comment="samba-gpupdate-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026601" comment="samba-ldb-ldap-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026602" comment="samba-libs-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026603" comment="samba-libs-python3-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026604" comment="samba-python3-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026605" comment="samba-tool-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026606" comment="samba-winbind-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026607" comment="samba-winbind-libs-4.22.3+git.401.c70158430cc-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93769" version="1" class="patch">
	<metadata>
		<title>cups-2.4.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-3193" ref_url="https://www.suse.com/security/cve/CVE-2005-3193/" source="CVE"/>
		<reference ref_id="CVE-2005-3624" ref_url="https://www.suse.com/security/cve/CVE-2005-3624/" source="CVE"/>
		<reference ref_id="CVE-2005-3625" ref_url="https://www.suse.com/security/cve/CVE-2005-3625/" source="CVE"/>
		<reference ref_id="CVE-2005-3626" ref_url="https://www.suse.com/security/cve/CVE-2005-3626/" source="CVE"/>
		<reference ref_id="CVE-2005-3627" ref_url="https://www.suse.com/security/cve/CVE-2005-3627/" source="CVE"/>
		<reference ref_id="CVE-2005-3628" ref_url="https://www.suse.com/security/cve/CVE-2005-3628/" source="CVE"/>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="CVE-2019-2228" ref_url="https://www.suse.com/security/cve/CVE-2019-2228/" source="CVE"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842/" source="CVE"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="CVE-2022-26691" ref_url="https://www.suse.com/security/cve/CVE-2022-26691/" source="CVE"/>
		<reference ref_id="CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324/" source="CVE"/>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<reference ref_id="CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241/" source="CVE"/>
		<reference ref_id="CVE-2023-4504" ref_url="https://www.suse.com/security/cve/CVE-2023-4504/" source="CVE"/>
		<reference ref_id="CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.4.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3193/">CVE-2005-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3193">CVE-2005-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3624/">CVE-2005-3624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3624">CVE-2005-3624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3625/">CVE-2005-3625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3625">CVE-2005-3625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3626/">CVE-2005-3626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3626">CVE-2005-3626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3627/">CVE-2005-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3627">CVE-2005-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3628/">CVE-2005-3628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3628">CVE-2005-3628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3387">CVE-2007-3387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4351">CVE-2007-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0047">CVE-2008-0047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1373">CVE-2008-1373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1693">CVE-2008-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1722">CVE-2008-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3641">CVE-2008-3641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3553">CVE-2009-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0540">CVE-2010-0540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6094">CVE-2012-6094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2856">CVE-2014-2856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3537">CVE-2014-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5029">CVE-2014-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5030">CVE-2014-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5031">CVE-2014-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1158">CVE-2015-1158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1159">CVE-2015-1159 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18248">CVE-2017-18248 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-4700">CVE-2018-4700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2228/">CVE-2019-2228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2228">CVE-2019-2228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8842">CVE-2019-8842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10001">CVE-2020-10001 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26691/">CVE-2022-26691 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26691">CVE-2022-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4504/">CVE-2023-4504 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4504">CVE-2023-4504 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026608" comment="cups-2.4.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026609" comment="cups-client-2.4.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026610" comment="cups-config-2.4.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026611" comment="cups-ddk-2.4.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026612" comment="cups-devel-2.4.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026613" comment="libcups2-2.4.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026614" comment="libcupsimage2-2.4.11-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93770" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4510">CVE-2012-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026615" comment="cups-pk-helper-0.2.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026616" comment="cups-pk-helper-lang-0.2.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93771" version="1" class="patch">
	<metadata>
		<title>curl-8.14.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-1061" ref_url="https://www.suse.com/security/cve/CVE-2006-1061/" source="CVE"/>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236/" source="CVE"/>
		<reference ref_id="CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594/" source="CVE"/>
		<reference ref_id="CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629/" source="CVE"/>
		<reference ref_id="CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468/" source="CVE"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818/" source="CVE"/>
		<reference ref_id="CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502/" source="CVE"/>
		<reference ref_id="CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300/" source="CVE"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-15601" ref_url="https://www.suse.com/security/cve/CVE-2019-15601/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="CVE-2019-5435" ref_url="https://www.suse.com/security/cve/CVE-2019-5435/" source="CVE"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481/" source="CVE"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="CVE-2020-8169" ref_url="https://www.suse.com/security/cve/CVE-2020-8169/" source="CVE"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286/" source="CVE"/>
		<reference ref_id="CVE-2021-22297" ref_url="https://www.suse.com/security/cve/CVE-2021-22297/" source="CVE"/>
		<reference ref_id="CVE-2021-22298" ref_url="https://www.suse.com/security/cve/CVE-2021-22298/" source="CVE"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890/" source="CVE"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="CVE-2021-22901" ref_url="https://www.suse.com/security/cve/CVE-2021-22901/" source="CVE"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<reference ref_id="CVE-2021-22945" ref_url="https://www.suse.com/security/cve/CVE-2021-22945/" source="CVE"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27774" ref_url="https://www.suse.com/security/cve/CVE-2022-27774/" source="CVE"/>
		<reference ref_id="CVE-2022-27775" ref_url="https://www.suse.com/security/cve/CVE-2022-27775/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<reference ref_id="CVE-2022-27778" ref_url="https://www.suse.com/security/cve/CVE-2022-27778/" source="CVE"/>
		<reference ref_id="CVE-2022-27779" ref_url="https://www.suse.com/security/cve/CVE-2022-27779/" source="CVE"/>
		<reference ref_id="CVE-2022-27780" ref_url="https://www.suse.com/security/cve/CVE-2022-27780/" source="CVE"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="CVE-2022-30115" ref_url="https://www.suse.com/security/cve/CVE-2022-30115/" source="CVE"/>
		<reference ref_id="CVE-2022-32205" ref_url="https://www.suse.com/security/cve/CVE-2022-32205/" source="CVE"/>
		<reference ref_id="CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206/" source="CVE"/>
		<reference ref_id="CVE-2022-32207" ref_url="https://www.suse.com/security/cve/CVE-2022-32207/" source="CVE"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<reference ref_id="CVE-2022-35260" ref_url="https://www.suse.com/security/cve/CVE-2022-35260/" source="CVE"/>
		<reference ref_id="CVE-2022-42915" ref_url="https://www.suse.com/security/cve/CVE-2022-42915/" source="CVE"/>
		<reference ref_id="CVE-2022-42916" ref_url="https://www.suse.com/security/cve/CVE-2022-42916/" source="CVE"/>
		<reference ref_id="CVE-2022-43551" ref_url="https://www.suse.com/security/cve/CVE-2022-43551/" source="CVE"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<reference ref_id="CVE-2023-23914" ref_url="https://www.suse.com/security/cve/CVE-2023-23914/" source="CVE"/>
		<reference ref_id="CVE-2023-23915" ref_url="https://www.suse.com/security/cve/CVE-2023-23915/" source="CVE"/>
		<reference ref_id="CVE-2023-23916" ref_url="https://www.suse.com/security/cve/CVE-2023-23916/" source="CVE"/>
		<reference ref_id="CVE-2023-27533" ref_url="https://www.suse.com/security/cve/CVE-2023-27533/" source="CVE"/>
		<reference ref_id="CVE-2023-27534" ref_url="https://www.suse.com/security/cve/CVE-2023-27534/" source="CVE"/>
		<reference ref_id="CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535/" source="CVE"/>
		<reference ref_id="CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536/" source="CVE"/>
		<reference ref_id="CVE-2023-27537" ref_url="https://www.suse.com/security/cve/CVE-2023-27537/" source="CVE"/>
		<reference ref_id="CVE-2023-27538" ref_url="https://www.suse.com/security/cve/CVE-2023-27538/" source="CVE"/>
		<reference ref_id="CVE-2023-28319" ref_url="https://www.suse.com/security/cve/CVE-2023-28319/" source="CVE"/>
		<reference ref_id="CVE-2023-28320" ref_url="https://www.suse.com/security/cve/CVE-2023-28320/" source="CVE"/>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<reference ref_id="CVE-2023-32001" ref_url="https://www.suse.com/security/cve/CVE-2023-32001/" source="CVE"/>
		<reference ref_id="CVE-2023-38039" ref_url="https://www.suse.com/security/cve/CVE-2023-38039/" source="CVE"/>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<reference ref_id="CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546/" source="CVE"/>
		<reference ref_id="CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218/" source="CVE"/>
		<reference ref_id="CVE-2023-46219" ref_url="https://www.suse.com/security/cve/CVE-2023-46219/" source="CVE"/>
		<reference ref_id="CVE-2024-0853" ref_url="https://www.suse.com/security/cve/CVE-2024-0853/" source="CVE"/>
		<reference ref_id="CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053/" source="CVE"/>
		<reference ref_id="CVE-2024-2004" ref_url="https://www.suse.com/security/cve/CVE-2024-2004/" source="CVE"/>
		<reference ref_id="CVE-2024-2379" ref_url="https://www.suse.com/security/cve/CVE-2024-2379/" source="CVE"/>
		<reference ref_id="CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398/" source="CVE"/>
		<reference ref_id="CVE-2024-2466" ref_url="https://www.suse.com/security/cve/CVE-2024-2466/" source="CVE"/>
		<reference ref_id="CVE-2024-6197" ref_url="https://www.suse.com/security/cve/CVE-2024-6197/" source="CVE"/>
		<reference ref_id="CVE-2024-6874" ref_url="https://www.suse.com/security/cve/CVE-2024-6874/" source="CVE"/>
		<reference ref_id="CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264/" source="CVE"/>
		<reference ref_id="CVE-2024-8096" ref_url="https://www.suse.com/security/cve/CVE-2024-8096/" source="CVE"/>
		<reference ref_id="CVE-2024-9681" ref_url="https://www.suse.com/security/cve/CVE-2024-9681/" source="CVE"/>
		<reference ref_id="CVE-2025-0665" ref_url="https://www.suse.com/security/cve/CVE-2025-0665/" source="CVE"/>
		<reference ref_id="CVE-2025-4947" ref_url="https://www.suse.com/security/cve/CVE-2025-4947/" source="CVE"/>
		<reference ref_id="CVE-2025-5025" ref_url="https://www.suse.com/security/cve/CVE-2025-5025/" source="CVE"/>
		<reference ref_id="CVE-2025-5399" ref_url="https://www.suse.com/security/cve/CVE-2025-5399/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-8.14.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1061/">CVE-2006-1061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1061">CVE-2006-1061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0249">CVE-2013-0249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3620">CVE-2014-3620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3144">CVE-2015-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3145">CVE-2015-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3236">CVE-2015-3236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3237">CVE-2015-3237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8625">CVE-2016-8625 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9594">CVE-2016-9594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000099">CVE-2017-1000099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000101">CVE-2017-1000101 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000257">CVE-2017-1000257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2629">CVE-2017-2629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7468">CVE-2017-7468 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8816">CVE-2017-8816 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8817">CVE-2017-8817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8818">CVE-2017-8818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9502">CVE-2017-9502 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0500">CVE-2018-0500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000005">CVE-2018-1000005 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000300">CVE-2018-1000300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16839">CVE-2018-16839 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16890">CVE-2018-16890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15601/">CVE-2019-15601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15601">CVE-2019-15601 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3822">CVE-2019-3822 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3823">CVE-2019-3823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5435/">CVE-2019-5435 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5435">CVE-2019-5435 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5481">CVE-2019-5481 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8169/">CVE-2020-8169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8169">CVE-2020-8169 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8286">CVE-2020-8286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22297/">CVE-2021-22297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-22297">CVE-2021-22297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22298/">CVE-2021-22298 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22298">CVE-2021-22298 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22890">CVE-2021-22890 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22901/">CVE-2021-22901 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22901">CVE-2021-22901 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22945/">CVE-2021-22945 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22945">CVE-2021-22945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27774/">CVE-2022-27774 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27775/">CVE-2022-27775 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-27778/">CVE-2022-27778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27778">CVE-2022-27778 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27779/">CVE-2022-27779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27779">CVE-2022-27779 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27780/">CVE-2022-27780 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27780">CVE-2022-27780 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30115/">CVE-2022-30115 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30115">CVE-2022-30115 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32205/">CVE-2022-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32205">CVE-2022-32205 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32207/">CVE-2022-32207 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35260/">CVE-2022-35260 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35260">CVE-2022-35260 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42915/">CVE-2022-42915 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42915">CVE-2022-42915 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42916/">CVE-2022-42916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42916">CVE-2022-42916 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-43551/">CVE-2022-43551 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43551">CVE-2022-43551 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23914/">CVE-2023-23914 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23914">CVE-2023-23914 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23915/">CVE-2023-23915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23915">CVE-2023-23915 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23916/">CVE-2023-23916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27533/">CVE-2023-27533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27534/">CVE-2023-27534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27537/">CVE-2023-27537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27537">CVE-2023-27537 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27538/">CVE-2023-27538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28319/">CVE-2023-28319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28320/">CVE-2023-28320 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32001/">CVE-2023-32001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32001">CVE-2023-32001 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38039/">CVE-2023-38039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46219/">CVE-2023-46219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-0853/">CVE-2024-0853 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0853">CVE-2024-0853 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2004/">CVE-2024-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2379/">CVE-2024-2379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">CVE-2024-2379 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2466/">CVE-2024-2466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2466">CVE-2024-2466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6197/">CVE-2024-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6197">CVE-2024-6197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6874/">CVE-2024-6874 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6874">CVE-2024-6874 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8096/">CVE-2024-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8096">CVE-2024-8096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9681/">CVE-2024-9681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9681">CVE-2024-9681 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0665/">CVE-2025-0665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0665">CVE-2025-0665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4947/">CVE-2025-4947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4947">CVE-2025-4947 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5025/">CVE-2025-5025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5025">CVE-2025-5025 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5399/">CVE-2025-5399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5399">CVE-2025-5399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026617" comment="curl-8.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026618" comment="curl-zsh-completion-8.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026619" comment="libcurl-devel-8.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026620" comment="libcurl-devel-doc-8.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026621" comment="libcurl-mini4-8.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026622" comment="libcurl4-8.14.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93772" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.28-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="CVE-2020-8032" ref_url="https://www.suse.com/security/cve/CVE-2020-8032/" source="CVE"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.28-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0688">CVE-2009-0688 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8032/">CVE-2020-8032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8032">CVE-2020-8032 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026623" comment="cyrus-sasl-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026624" comment="cyrus-sasl-crammd5-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026625" comment="cyrus-sasl-devel-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026626" comment="cyrus-sasl-digestmd5-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026627" comment="cyrus-sasl-gs2-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026628" comment="cyrus-sasl-gssapi-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026629" comment="cyrus-sasl-ldap-auxprop-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026630" comment="cyrus-sasl-ntlm-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026631" comment="cyrus-sasl-otp-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026632" comment="cyrus-sasl-plain-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026633" comment="cyrus-sasl-saslauthd-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026634" comment="cyrus-sasl-scram-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026635" comment="cyrus-sasl-sqlauxprop-2.1.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026636" comment="libsasl2-3-2.1.28-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93773" version="1" class="patch">
	<metadata>
		<title>dav1d-1.5.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-32570" ref_url="https://www.suse.com/security/cve/CVE-2023-32570/" source="CVE"/>
		<reference ref_id="CVE-2024-1580" ref_url="https://www.suse.com/security/cve/CVE-2024-1580/" source="CVE"/>
		<description>
These are all security issues fixed in the dav1d-1.5.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32570/">CVE-2023-32570 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32570">CVE-2023-32570 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-1580/">CVE-2024-1580 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1580">CVE-2024-1580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026637" comment="dav1d-1.5.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026638" comment="dav1d-devel-1.5.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026639" comment="libdav1d7-1.5.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93774" version="1" class="patch">
	<metadata>
		<title>db48-doc-4.8.30-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-2708" ref_url="https://www.suse.com/security/cve/CVE-2019-2708/" source="CVE"/>
		<description>
These are all security issues fixed in the db48-doc-4.8.30-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2708/">CVE-2019-2708 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2708">CVE-2019-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026640" comment="db48-doc-4.8.30-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026641" comment="db48-utils-4.8.30-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026642" comment="libdb-4_8-4.8.30-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026643" comment="libdb-4_8-devel-4.8.30-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026644" comment="libdb-4_8-x86-64-v3-4.8.30-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026645" comment="libdb_java-4_8-4.8.30-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93775" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.14.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<reference ref_id="CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.14.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6107">CVE-2006-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0595">CVE-2008-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3834">CVE-2008-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2168">CVE-2013-2168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3477">CVE-2014-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3532">CVE-2014-3532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3533">CVE-2014-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3635">CVE-2014-3635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3636">CVE-2014-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3637">CVE-2014-3637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3638">CVE-2014-3638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7824">CVE-2014-7824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8148">CVE-2014-8148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0245">CVE-2015-0245 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026646" comment="dbus-1-1.14.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026647" comment="dbus-1-common-1.14.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026648" comment="dbus-1-daemon-1.14.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026649" comment="dbus-1-devel-1.14.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026650" comment="dbus-1-tools-1.14.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026651" comment="libdbus-1-3-1.14.10-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93776" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-bash-completion-0.112-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-bash-completion-0.112-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0292">CVE-2013-0292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026652" comment="dbus-1-glib-bash-completion-0.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026653" comment="dbus-1-glib-devel-0.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026654" comment="dbus-1-glib-doc-0.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026655" comment="dbus-1-glib-tool-0.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026656" comment="libdbus-glib-1-2-0.112-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93777" version="1" class="patch">
	<metadata>
		<title>dbus-1-x11-1.14.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-x11-1.14.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6107">CVE-2006-6107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0595">CVE-2008-0595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3834">CVE-2008-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4311">CVE-2008-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2168">CVE-2013-2168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3477">CVE-2014-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3532">CVE-2014-3532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3533">CVE-2014-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3635">CVE-2014-3635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3636">CVE-2014-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3637">CVE-2014-3637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3638">CVE-2014-3638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7824">CVE-2014-7824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8148">CVE-2014-8148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0245">CVE-2015-0245 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026657" comment="dbus-1-x11-1.14.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93778" version="1" class="patch">
	<metadata>
		<title>dcraw-9.28.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14608" ref_url="https://www.suse.com/security/cve/CVE-2017-14608/" source="CVE"/>
		<reference ref_id="CVE-2018-19565" ref_url="https://www.suse.com/security/cve/CVE-2018-19565/" source="CVE"/>
		<reference ref_id="CVE-2018-19566" ref_url="https://www.suse.com/security/cve/CVE-2018-19566/" source="CVE"/>
		<reference ref_id="CVE-2018-19567" ref_url="https://www.suse.com/security/cve/CVE-2018-19567/" source="CVE"/>
		<reference ref_id="CVE-2018-19568" ref_url="https://www.suse.com/security/cve/CVE-2018-19568/" source="CVE"/>
		<reference ref_id="CVE-2018-19655" ref_url="https://www.suse.com/security/cve/CVE-2018-19655/" source="CVE"/>
		<reference ref_id="CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801/" source="CVE"/>
		<reference ref_id="CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805/" source="CVE"/>
		<reference ref_id="CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806/" source="CVE"/>
		<reference ref_id="CVE-2021-3624" ref_url="https://www.suse.com/security/cve/CVE-2021-3624/" source="CVE"/>
		<description>
These are all security issues fixed in the dcraw-9.28.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13735">CVE-2017-13735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14608/">CVE-2017-14608 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14608">CVE-2017-14608 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19565/">CVE-2018-19565 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19565">CVE-2018-19565 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19566/">CVE-2018-19566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19566">CVE-2018-19566 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19567/">CVE-2018-19567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19567">CVE-2018-19567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19568/">CVE-2018-19568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19568">CVE-2018-19568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19655/">CVE-2018-19655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19655">CVE-2018-19655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5801">CVE-2018-5801 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5805">CVE-2018-5805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5806">CVE-2018-5806 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3624/">CVE-2021-3624 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3624">CVE-2021-3624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026658" comment="dcraw-9.28.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026659" comment="dcraw-lang-9.28.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93779" version="1" class="patch">
	<metadata>
		<title>dhcp-keama-4.4.2.P1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928/" source="CVE"/>
		<reference ref_id="CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-keama-4.4.2.P1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1892">CVE-2009-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2156">CVE-2010-2156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3611">CVE-2010-3611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3616">CVE-2010-3616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0413">CVE-2011-0413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2748">CVE-2011-2748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2749">CVE-2011-2749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4539">CVE-2011-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4868">CVE-2011-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3570">CVE-2012-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3571">CVE-2012-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3954">CVE-2012-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3955">CVE-2012-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8605">CVE-2015-8605 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5732">CVE-2018-5732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5733">CVE-2018-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6470">CVE-2019-6470 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2928">CVE-2022-2928 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2929">CVE-2022-2929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026660" comment="dhcp-keama-4.4.2.P1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93780" version="1" class="patch">
	<metadata>
		<title>dirmngr-2.5.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-0455" ref_url="https://www.suse.com/security/cve/CVE-2006-0455/" source="CVE"/>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234/" source="CVE"/>
		<reference ref_id="CVE-2019-14855" ref_url="https://www.suse.com/security/cve/CVE-2019-14855/" source="CVE"/>
		<reference ref_id="CVE-2020-25125" ref_url="https://www.suse.com/security/cve/CVE-2020-25125/" source="CVE"/>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<reference ref_id="CVE-2025-30258" ref_url="https://www.suse.com/security/cve/CVE-2025-30258/" source="CVE"/>
		<description>
These are all security issues fixed in the dirmngr-2.5.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0455/">CVE-2006-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0455">CVE-2006-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3746">CVE-2006-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6169">CVE-2006-6169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1530">CVE-2008-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4351">CVE-2013-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4402">CVE-2013-4402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4617">CVE-2014-4617 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9234">CVE-2018-9234 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14855/">CVE-2019-14855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14855">CVE-2019-14855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25125/">CVE-2020-25125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25125">CVE-2020-25125 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30258/">CVE-2025-30258 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30258">CVE-2025-30258 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026661" comment="dirmngr-2.5.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026662" comment="gpg2-2.5.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026663" comment="gpg2-lang-2.5.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026664" comment="gpg2-tpm-2.5.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93781" version="1" class="patch">
	<metadata>
		<title>distribution-registry-3.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-11468" ref_url="https://www.suse.com/security/cve/CVE-2017-11468/" source="CVE"/>
		<reference ref_id="CVE-2023-2253" ref_url="https://www.suse.com/security/cve/CVE-2023-2253/" source="CVE"/>
		<description>
These are all security issues fixed in the distribution-registry-3.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11468/">CVE-2017-11468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11468">CVE-2017-11468 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2253/">CVE-2023-2253 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2253">CVE-2023-2253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026665" comment="distribution-registry-3.0.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93782" version="1" class="patch">
	<metadata>
		<title>djvulibre-3.5.28-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32490" ref_url="https://www.suse.com/security/cve/CVE-2021-32490/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="CVE-2021-46310" ref_url="https://www.suse.com/security/cve/CVE-2021-46310/" source="CVE"/>
		<reference ref_id="CVE-2021-46312" ref_url="https://www.suse.com/security/cve/CVE-2021-46312/" source="CVE"/>
		<reference ref_id="CVE-2025-53367" ref_url="https://www.suse.com/security/cve/CVE-2025-53367/" source="CVE"/>
		<description>
These are all security issues fixed in the djvulibre-3.5.28-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15142">CVE-2019-15142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15143">CVE-2019-15143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15144">CVE-2019-15144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15145">CVE-2019-15145 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32490/">CVE-2021-32490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32490">CVE-2021-32490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46310/">CVE-2021-46310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46310">CVE-2021-46310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46312/">CVE-2021-46312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46312">CVE-2021-46312 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53367/">CVE-2025-53367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53367">CVE-2025-53367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026666" comment="djvulibre-3.5.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026667" comment="djvulibre-doc-3.5.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026668" comment="libdjvulibre-devel-3.5.28-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026669" comment="libdjvulibre21-3.5.28-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93783" version="1" class="patch">
	<metadata>
		<title>dnsdist-1.9.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-7069" ref_url="https://www.suse.com/security/cve/CVE-2016-7069/" source="CVE"/>
		<reference ref_id="CVE-2017-7557" ref_url="https://www.suse.com/security/cve/CVE-2017-7557/" source="CVE"/>
		<reference ref_id="CVE-2018-14663" ref_url="https://www.suse.com/security/cve/CVE-2018-14663/" source="CVE"/>
		<reference ref_id="CVE-2024-25581" ref_url="https://www.suse.com/security/cve/CVE-2024-25581/" source="CVE"/>
		<reference ref_id="CVE-2025-30193" ref_url="https://www.suse.com/security/cve/CVE-2025-30193/" source="CVE"/>
		<reference ref_id="CVE-2025-30194" ref_url="https://www.suse.com/security/cve/CVE-2025-30194/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsdist-1.9.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7069/">CVE-2016-7069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7069">CVE-2016-7069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7557/">CVE-2017-7557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7557">CVE-2017-7557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14663/">CVE-2018-14663 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14663">CVE-2018-14663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25581/">CVE-2024-25581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25581">CVE-2024-25581 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30193/">CVE-2025-30193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30193">CVE-2025-30193 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30194/">CVE-2025-30194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30194">CVE-2025-30194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026670" comment="dnsdist-1.9.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93784" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.90-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="CVE-2020-14312" ref_url="https://www.suse.com/security/cve/CVE-2020-14312/" source="CVE"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<reference ref_id="CVE-2023-49441" ref_url="https://www.suse.com/security/cve/CVE-2023-49441/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.90-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14312/">CVE-2020-14312 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14312">CVE-2020-14312 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49441/">CVE-2023-49441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49441">CVE-2023-49441 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026671" comment="dnsmasq-2.90-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026672" comment="dnsmasq-utils-2.90-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93785" version="1" class="patch">
	<metadata>
		<title>docker-28.3.2_ce-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3499" ref_url="https://www.suse.com/security/cve/CVE-2014-3499/" source="CVE"/>
		<reference ref_id="CVE-2014-5277" ref_url="https://www.suse.com/security/cve/CVE-2014-5277/" source="CVE"/>
		<reference ref_id="CVE-2014-6407" ref_url="https://www.suse.com/security/cve/CVE-2014-6407/" source="CVE"/>
		<reference ref_id="CVE-2014-6408" ref_url="https://www.suse.com/security/cve/CVE-2014-6408/" source="CVE"/>
		<reference ref_id="CVE-2014-8178" ref_url="https://www.suse.com/security/cve/CVE-2014-8178/" source="CVE"/>
		<reference ref_id="CVE-2014-8179" ref_url="https://www.suse.com/security/cve/CVE-2014-8179/" source="CVE"/>
		<reference ref_id="CVE-2014-9356" ref_url="https://www.suse.com/security/cve/CVE-2014-9356/" source="CVE"/>
		<reference ref_id="CVE-2014-9357" ref_url="https://www.suse.com/security/cve/CVE-2014-9357/" source="CVE"/>
		<reference ref_id="CVE-2014-9358" ref_url="https://www.suse.com/security/cve/CVE-2014-9358/" source="CVE"/>
		<reference ref_id="CVE-2015-3627" ref_url="https://www.suse.com/security/cve/CVE-2015-3627/" source="CVE"/>
		<reference ref_id="CVE-2015-3629" ref_url="https://www.suse.com/security/cve/CVE-2015-3629/" source="CVE"/>
		<reference ref_id="CVE-2015-3630" ref_url="https://www.suse.com/security/cve/CVE-2015-3630/" source="CVE"/>
		<reference ref_id="CVE-2015-3631" ref_url="https://www.suse.com/security/cve/CVE-2015-3631/" source="CVE"/>
		<reference ref_id="CVE-2016-3697" ref_url="https://www.suse.com/security/cve/CVE-2016-3697/" source="CVE"/>
		<reference ref_id="CVE-2016-8867" ref_url="https://www.suse.com/security/cve/CVE-2016-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2017-16539" ref_url="https://www.suse.com/security/cve/CVE-2017-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-10892" ref_url="https://www.suse.com/security/cve/CVE-2018-10892/" source="CVE"/>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-20699" ref_url="https://www.suse.com/security/cve/CVE-2018-20699/" source="CVE"/>
		<reference ref_id="CVE-2019-13509" ref_url="https://www.suse.com/security/cve/CVE-2019-13509/" source="CVE"/>
		<reference ref_id="CVE-2019-14271" ref_url="https://www.suse.com/security/cve/CVE-2019-14271/" source="CVE"/>
		<reference ref_id="CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912/" source="CVE"/>
		<reference ref_id="CVE-2020-13401" ref_url="https://www.suse.com/security/cve/CVE-2020-13401/" source="CVE"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284/" source="CVE"/>
		<reference ref_id="CVE-2021-21285" ref_url="https://www.suse.com/security/cve/CVE-2021-21285/" source="CVE"/>
		<reference ref_id="CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089/" source="CVE"/>
		<reference ref_id="CVE-2021-41091" ref_url="https://www.suse.com/security/cve/CVE-2021-41091/" source="CVE"/>
		<reference ref_id="CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092/" source="CVE"/>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-36109" ref_url="https://www.suse.com/security/cve/CVE-2022-36109/" source="CVE"/>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<reference ref_id="CVE-2023-28841" ref_url="https://www.suse.com/security/cve/CVE-2023-28841/" source="CVE"/>
		<reference ref_id="CVE-2023-28842" ref_url="https://www.suse.com/security/cve/CVE-2023-28842/" source="CVE"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="CVE-2024-29018" ref_url="https://www.suse.com/security/cve/CVE-2024-29018/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="CVE-2025-0495" ref_url="https://www.suse.com/security/cve/CVE-2025-0495/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-28.3.2_ce-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3499/">CVE-2014-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3499">CVE-2014-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5277/">CVE-2014-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5277">CVE-2014-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6407/">CVE-2014-6407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6407">CVE-2014-6407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6408/">CVE-2014-6408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6408">CVE-2014-6408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8178/">CVE-2014-8178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8178">CVE-2014-8178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8179/">CVE-2014-8179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8179">CVE-2014-8179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9356/">CVE-2014-9356 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9356">CVE-2014-9356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9357/">CVE-2014-9357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9357">CVE-2014-9357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9358/">CVE-2014-9358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9358">CVE-2014-9358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3627/">CVE-2015-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3627">CVE-2015-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3629/">CVE-2015-3629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3629">CVE-2015-3629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3630/">CVE-2015-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3630">CVE-2015-3630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3631/">CVE-2015-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3631">CVE-2015-3631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3697/">CVE-2016-3697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3697">CVE-2016-3697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8867/">CVE-2016-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8867">CVE-2016-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16539/">CVE-2017-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16539">CVE-2017-16539 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10892/">CVE-2018-10892 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10892">CVE-2018-10892 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20699/">CVE-2018-20699 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20699">CVE-2018-20699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13509/">CVE-2019-13509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13509">CVE-2019-13509 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14271/">CVE-2019-14271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14271">CVE-2019-14271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13401/">CVE-2020-13401 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13401">CVE-2020-13401 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284">CVE-2021-21284 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21285/">CVE-2021-21285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21285">CVE-2021-21285 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41091/">CVE-2021-41091 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091">CVE-2021-41091 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36109/">CVE-2022-36109 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28841/">CVE-2023-28841 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28842/">CVE-2023-28842 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-29018/">CVE-2024-29018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0495/">CVE-2025-0495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0495">CVE-2025-0495 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026673" comment="docker-28.3.2_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026674" comment="docker-bash-completion-28.3.2_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026675" comment="docker-buildx-0.25.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026676" comment="docker-fish-completion-28.3.2_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026677" comment="docker-rootless-extras-28.3.2_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026678" comment="docker-zsh-completion-28.3.2_ce-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93786" version="1" class="patch">
	<metadata>
		<title>docker-compose-2.33.1-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-compose-2.33.1-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026679" comment="docker-compose-2.33.1-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93787" version="1" class="patch">
	<metadata>
		<title>docker-stable-24.0.9_ce-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-2365" ref_url="https://www.suse.com/security/cve/CVE-2024-2365/" source="CVE"/>
		<reference ref_id="CVE-2024-23650" ref_url="https://www.suse.com/security/cve/CVE-2024-23650/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="CVE-2024-29018" ref_url="https://www.suse.com/security/cve/CVE-2024-29018/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="CVE-2025-0495" ref_url="https://www.suse.com/security/cve/CVE-2025-0495/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-stable-24.0.9_ce-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2365/">CVE-2024-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2365">CVE-2024-2365 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23650/">CVE-2024-23650 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23650">CVE-2024-23650 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-29018/">CVE-2024-29018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0495/">CVE-2025-0495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0495">CVE-2025-0495 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026680" comment="docker-stable-24.0.9_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026681" comment="docker-stable-bash-completion-24.0.9_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026682" comment="docker-stable-buildx-0.22.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026683" comment="docker-stable-fish-completion-24.0.9_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026684" comment="docker-stable-rootless-extras-24.0.9_ce-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026685" comment="docker-stable-zsh-completion-24.0.9_ce-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93788" version="1" class="patch">
	<metadata>
		<title>dom4j-2.1.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000632" ref_url="https://www.suse.com/security/cve/CVE-2018-1000632/" source="CVE"/>
		<reference ref_id="CVE-2020-10683" ref_url="https://www.suse.com/security/cve/CVE-2020-10683/" source="CVE"/>
		<description>
These are all security issues fixed in the dom4j-2.1.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000632/">CVE-2018-1000632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000632">CVE-2018-1000632 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10683/">CVE-2020-10683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10683">CVE-2020-10683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026686" comment="dom4j-2.1.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026687" comment="dom4j-demo-2.1.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026688" comment="dom4j-javadoc-2.1.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93789" version="1" class="patch">
	<metadata>
		<title>dovecot24-2.4.1-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-14461" ref_url="https://www.suse.com/security/cve/CVE-2017-14461/" source="CVE"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="CVE-2017-15132" ref_url="https://www.suse.com/security/cve/CVE-2017-15132/" source="CVE"/>
		<reference ref_id="CVE-2019-10691" ref_url="https://www.suse.com/security/cve/CVE-2019-10691/" source="CVE"/>
		<reference ref_id="CVE-2019-11494" ref_url="https://www.suse.com/security/cve/CVE-2019-11494/" source="CVE"/>
		<reference ref_id="CVE-2019-11499" ref_url="https://www.suse.com/security/cve/CVE-2019-11499/" source="CVE"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="CVE-2019-19722" ref_url="https://www.suse.com/security/cve/CVE-2019-19722/" source="CVE"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<reference ref_id="CVE-2020-10957" ref_url="https://www.suse.com/security/cve/CVE-2020-10957/" source="CVE"/>
		<reference ref_id="CVE-2020-10958" ref_url="https://www.suse.com/security/cve/CVE-2020-10958/" source="CVE"/>
		<reference ref_id="CVE-2020-10967" ref_url="https://www.suse.com/security/cve/CVE-2020-10967/" source="CVE"/>
		<reference ref_id="CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100/" source="CVE"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="CVE-2020-28200" ref_url="https://www.suse.com/security/cve/CVE-2020-28200/" source="CVE"/>
		<reference ref_id="CVE-2020-7046" ref_url="https://www.suse.com/security/cve/CVE-2020-7046/" source="CVE"/>
		<reference ref_id="CVE-2020-7957" ref_url="https://www.suse.com/security/cve/CVE-2020-7957/" source="CVE"/>
		<reference ref_id="CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157/" source="CVE"/>
		<reference ref_id="CVE-2021-33515" ref_url="https://www.suse.com/security/cve/CVE-2021-33515/" source="CVE"/>
		<reference ref_id="CVE-2024-23184" ref_url="https://www.suse.com/security/cve/CVE-2024-23184/" source="CVE"/>
		<reference ref_id="CVE-2024-23185" ref_url="https://www.suse.com/security/cve/CVE-2024-23185/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot24-2.4.1-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14461/">CVE-2017-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14461">CVE-2017-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15130">CVE-2017-15130 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15132/">CVE-2017-15132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15132">CVE-2017-15132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10691/">CVE-2019-10691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10691">CVE-2019-10691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11494/">CVE-2019-11494 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11494">CVE-2019-11494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11499/">CVE-2019-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11499">CVE-2019-11499 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19722/">CVE-2019-19722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19722">CVE-2019-19722 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10957/">CVE-2020-10957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10957">CVE-2020-10957 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10958/">CVE-2020-10958 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10958">CVE-2020-10958 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10967/">CVE-2020-10967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10967">CVE-2020-10967 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12100">CVE-2020-12100 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28200/">CVE-2020-28200 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28200">CVE-2020-28200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7046/">CVE-2020-7046 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7046">CVE-2020-7046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7957/">CVE-2020-7957 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7957">CVE-2020-7957 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29157">CVE-2021-29157 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33515/">CVE-2021-33515 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33515">CVE-2021-33515 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-23184/">CVE-2024-23184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23184">CVE-2024-23184 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23185/">CVE-2024-23185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23185">CVE-2024-23185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026689" comment="dovecot24-2.4.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026690" comment="dovecot24-backend-mysql-2.4.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026691" comment="dovecot24-backend-pgsql-2.4.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026692" comment="dovecot24-backend-sqlite-2.4.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026693" comment="dovecot24-devel-2.4.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026694" comment="dovecot24-fts-2.4.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026695" comment="dovecot24-fts-solr-2.4.1-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93790" version="1" class="patch">
	<metadata>
		<title>dpdk-24.11.1-160000.2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1059" ref_url="https://www.suse.com/security/cve/CVE-2018-1059/" source="CVE"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="CVE-2020-10723" ref_url="https://www.suse.com/security/cve/CVE-2020-10723/" source="CVE"/>
		<reference ref_id="CVE-2020-10724" ref_url="https://www.suse.com/security/cve/CVE-2020-10724/" source="CVE"/>
		<reference ref_id="CVE-2020-10725" ref_url="https://www.suse.com/security/cve/CVE-2020-10725/" source="CVE"/>
		<reference ref_id="CVE-2020-10726" ref_url="https://www.suse.com/security/cve/CVE-2020-10726/" source="CVE"/>
		<reference ref_id="CVE-2020-14374" ref_url="https://www.suse.com/security/cve/CVE-2020-14374/" source="CVE"/>
		<reference ref_id="CVE-2020-14375" ref_url="https://www.suse.com/security/cve/CVE-2020-14375/" source="CVE"/>
		<reference ref_id="CVE-2020-14376" ref_url="https://www.suse.com/security/cve/CVE-2020-14376/" source="CVE"/>
		<reference ref_id="CVE-2020-14377" ref_url="https://www.suse.com/security/cve/CVE-2020-14377/" source="CVE"/>
		<reference ref_id="CVE-2020-14378" ref_url="https://www.suse.com/security/cve/CVE-2020-14378/" source="CVE"/>
		<reference ref_id="CVE-2021-3839" ref_url="https://www.suse.com/security/cve/CVE-2021-3839/" source="CVE"/>
		<reference ref_id="CVE-2022-0669" ref_url="https://www.suse.com/security/cve/CVE-2022-0669/" source="CVE"/>
		<reference ref_id="CVE-2024-11614" ref_url="https://www.suse.com/security/cve/CVE-2024-11614/" source="CVE"/>
		<description>
These are all security issues fixed in the dpdk-24.11.1-160000.2.3 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1059/">CVE-2018-1059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1059">CVE-2018-1059 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10723/">CVE-2020-10723 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10723">CVE-2020-10723 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10724/">CVE-2020-10724 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10724">CVE-2020-10724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10725/">CVE-2020-10725 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10725">CVE-2020-10725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10726/">CVE-2020-10726 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10726">CVE-2020-10726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14374/">CVE-2020-14374 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14374">CVE-2020-14374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14375/">CVE-2020-14375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14375">CVE-2020-14375 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14376/">CVE-2020-14376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14376">CVE-2020-14376 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14377/">CVE-2020-14377 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14377">CVE-2020-14377 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14378/">CVE-2020-14378 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14378">CVE-2020-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3839/">CVE-2021-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3839">CVE-2021-3839 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0669/">CVE-2022-0669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0669">CVE-2022-0669 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11614/">CVE-2024-11614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11614">CVE-2024-11614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026696" comment="dpdk-24.11.1-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026697" comment="dpdk-devel-24.11.1-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026698" comment="dpdk-devel-static-24.11.1-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026699" comment="dpdk-doc-24.11.1-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026700" comment="dpdk-tools-24.11.1-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026701" comment="libdpdk-25-24.11.1-160000.2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93791" version="1" class="patch">
	<metadata>
		<title>dpkg-1.22.21-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<reference ref_id="CVE-2022-1664" ref_url="https://www.suse.com/security/cve/CVE-2022-1664/" source="CVE"/>
		<reference ref_id="CVE-2025-6297" ref_url="https://www.suse.com/security/cve/CVE-2025-6297/" source="CVE"/>
		<description>
These are all security issues fixed in the dpkg-1.22.21-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0840">CVE-2015-0840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1664/">CVE-2022-1664 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1664">CVE-2022-1664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6297/">CVE-2025-6297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6297">CVE-2025-6297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026702" comment="dpkg-1.22.21-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026703" comment="dpkg-devel-1.22.21-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026704" comment="dpkg-lang-1.22.21-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026705" comment="update-alternatives-1.22.21-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93792" version="1" class="patch">
	<metadata>
		<title>dracut-059+suse.696.g950c4798-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-059+suse.696.g950c4798-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4453">CVE-2012-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8637">CVE-2016-8637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026706" comment="dracut-059+suse.696.g950c4798-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026707" comment="dracut-extra-059+suse.696.g950c4798-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026708" comment="dracut-fips-059+suse.696.g950c4798-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026709" comment="dracut-ima-059+suse.696.g950c4798-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026710" comment="dracut-tools-059+suse.696.g950c4798-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93793" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.47.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<reference ref_id="CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.47.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5497">CVE-2007-5497 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5094">CVE-2019-5094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026711" comment="e2fsprogs-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026712" comment="e2fsprogs-devel-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026713" comment="e2fsprogs-scrub-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026714" comment="fuse2fs-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026715" comment="libcom_err-devel-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026716" comment="libcom_err-devel-static-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026717" comment="libcom_err2-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026718" comment="libext2fs-devel-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026719" comment="libext2fs-devel-static-1.47.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026720" comment="libext2fs2-1.47.0-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93794" version="1" class="patch">
	<metadata>
		<title>ed25519-java-0.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-36843" ref_url="https://www.suse.com/security/cve/CVE-2020-36843/" source="CVE"/>
		<description>
These are all security issues fixed in the ed25519-java-0.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2020-36843/">CVE-2020-36843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36843">CVE-2020-36843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026721" comment="ed25519-java-0.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026722" comment="ed25519-java-javadoc-0.3.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93795" version="1" class="patch">
	<metadata>
		<title>editorconfig-0.12.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-0341" ref_url="https://www.suse.com/security/cve/CVE-2023-0341/" source="CVE"/>
		<description>
These are all security issues fixed in the editorconfig-0.12.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0341/">CVE-2023-0341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0341">CVE-2023-0341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026723" comment="editorconfig-0.12.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026724" comment="libeditorconfig0-0.12.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93796" version="1" class="patch">
	<metadata>
		<title>elfutils-0.192-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146/" source="CVE"/>
		<reference ref_id="CVE-2019-7148" ref_url="https://www.suse.com/security/cve/CVE-2019-7148/" source="CVE"/>
		<reference ref_id="CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.192-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0172">CVE-2014-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7146">CVE-2019-7146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7148/">CVE-2019-7148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7148">CVE-2019-7148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7149">CVE-2019-7149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7664">CVE-2019-7664 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026725" comment="elfutils-0.192-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026726" comment="elfutils-lang-0.192-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026727" comment="libasm-devel-0.192-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026728" comment="libasm1-0.192-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026729" comment="libdw-devel-0.192-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026730" comment="libdw1-0.192-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026731" comment="libelf-devel-0.192-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026732" comment="libelf1-0.192-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93797" version="1" class="patch">
	<metadata>
		<title>emacs-30.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="CVE-2014-9483" ref_url="https://www.suse.com/security/cve/CVE-2014-9483/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<reference ref_id="CVE-2022-48337" ref_url="https://www.suse.com/security/cve/CVE-2022-48337/" source="CVE"/>
		<reference ref_id="CVE-2022-48338" ref_url="https://www.suse.com/security/cve/CVE-2022-48338/" source="CVE"/>
		<reference ref_id="CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339/" source="CVE"/>
		<reference ref_id="CVE-2023-27985" ref_url="https://www.suse.com/security/cve/CVE-2023-27985/" source="CVE"/>
		<reference ref_id="CVE-2023-27986" ref_url="https://www.suse.com/security/cve/CVE-2023-27986/" source="CVE"/>
		<reference ref_id="CVE-2024-39331" ref_url="https://www.suse.com/security/cve/CVE-2024-39331/" source="CVE"/>
		<reference ref_id="CVE-2024-53920" ref_url="https://www.suse.com/security/cve/CVE-2024-53920/" source="CVE"/>
		<reference ref_id="CVE-2025-1244" ref_url="https://www.suse.com/security/cve/CVE-2025-1244/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-30.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5795">CVE-2007-5795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0035">CVE-2012-0035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3421">CVE-2014-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3422">CVE-2014-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3423">CVE-2014-3423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3424">CVE-2014-3424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9483/">CVE-2014-9483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9483">CVE-2014-9483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48337/">CVE-2022-48337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48337">CVE-2022-48337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48338/">CVE-2022-48338 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48338">CVE-2022-48338 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27985/">CVE-2023-27985 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27985">CVE-2023-27985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27986/">CVE-2023-27986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27986">CVE-2023-27986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39331/">CVE-2024-39331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39331">CVE-2024-39331 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53920/">CVE-2024-53920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53920">CVE-2024-53920 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1244/">CVE-2025-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1244">CVE-2025-1244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026733" comment="emacs-30.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026734" comment="emacs-el-30.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026735" comment="emacs-eln-30.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026736" comment="emacs-info-30.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026737" comment="emacs-nox-30.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026738" comment="emacs-x11-30.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026739" comment="etags-30.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93798" version="1" class="patch">
	<metadata>
		<title>erlang-27.1.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25623" ref_url="https://www.suse.com/security/cve/CVE-2020-25623/" source="CVE"/>
		<reference ref_id="CVE-2020-35733" ref_url="https://www.suse.com/security/cve/CVE-2020-35733/" source="CVE"/>
		<reference ref_id="CVE-2022-37026" ref_url="https://www.suse.com/security/cve/CVE-2022-37026/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-27.1.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25623/">CVE-2020-25623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25623">CVE-2020-25623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35733/">CVE-2020-35733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35733">CVE-2020-35733 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-37026/">CVE-2022-37026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37026">CVE-2022-37026 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026740" comment="erlang-27.1.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026741" comment="erlang-epmd-27.1.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93799" version="1" class="patch">
	<metadata>
		<title>erlang-rabbitmq-client-3.13.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-9494" ref_url="https://www.suse.com/security/cve/CVE-2014-9494/" source="CVE"/>
		<reference ref_id="CVE-2015-0862" ref_url="https://www.suse.com/security/cve/CVE-2015-0862/" source="CVE"/>
		<reference ref_id="CVE-2016-9877" ref_url="https://www.suse.com/security/cve/CVE-2016-9877/" source="CVE"/>
		<reference ref_id="CVE-2025-30219" ref_url="https://www.suse.com/security/cve/CVE-2025-30219/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-rabbitmq-client-3.13.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9494/">CVE-2014-9494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9494">CVE-2014-9494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0862/">CVE-2015-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0862">CVE-2015-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9877/">CVE-2016-9877 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9877">CVE-2016-9877 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30219/">CVE-2025-30219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30219">CVE-2025-30219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026742" comment="erlang-rabbitmq-client-3.13.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026743" comment="rabbitmq-server-3.13.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026744" comment="rabbitmq-server-bash-completion-3.13.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026745" comment="rabbitmq-server-plugins-3.13.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026746" comment="rabbitmq-server-zsh-completion-3.13.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93800" version="1" class="patch">
	<metadata>
		<title>espeak-ng-1.52.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-49990" ref_url="https://www.suse.com/security/cve/CVE-2023-49990/" source="CVE"/>
		<reference ref_id="CVE-2023-49991" ref_url="https://www.suse.com/security/cve/CVE-2023-49991/" source="CVE"/>
		<reference ref_id="CVE-2023-49992" ref_url="https://www.suse.com/security/cve/CVE-2023-49992/" source="CVE"/>
		<reference ref_id="CVE-2023-49993" ref_url="https://www.suse.com/security/cve/CVE-2023-49993/" source="CVE"/>
		<reference ref_id="CVE-2023-49994" ref_url="https://www.suse.com/security/cve/CVE-2023-49994/" source="CVE"/>
		<description>
These are all security issues fixed in the espeak-ng-1.52.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49990/">CVE-2023-49990 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49990">CVE-2023-49990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49991/">CVE-2023-49991 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49991">CVE-2023-49991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49992/">CVE-2023-49992 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49992">CVE-2023-49992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49993/">CVE-2023-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49993">CVE-2023-49993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49994/">CVE-2023-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49994">CVE-2023-49994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026747" comment="espeak-ng-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026748" comment="espeak-ng-compat-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026749" comment="espeak-ng-compat-devel-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026750" comment="espeak-ng-devel-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026751" comment="espeak-ng-vim-1.52.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026752" comment="libespeak-ng1-1.52.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93801" version="1" class="patch">
	<metadata>
		<title>expat-2.7.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2013-0340" ref_url="https://www.suse.com/security/cve/CVE-2013-0340/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2023-52426" ref_url="https://www.suse.com/security/cve/CVE-2023-52426/" source="CVE"/>
		<reference ref_id="CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757/" source="CVE"/>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<reference ref_id="CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.7.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1147">CVE-2012-1147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1148">CVE-2012-1148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0340/">CVE-2013-0340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52426/">CVE-2023-52426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52426">CVE-2023-52426 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026753" comment="expat-2.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026754" comment="libexpat-devel-2.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026755" comment="libexpat1-2.7.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93802" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.5.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-0321" ref_url="https://www.suse.com/security/cve/CVE-2006-0321/" source="CVE"/>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.5.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0321/">CVE-2006-0321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0321">CVE-2006-0321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5867">CVE-2006-5867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5974">CVE-2006-5974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4565">CVE-2007-4565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1167">CVE-2010-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3482">CVE-2012-3482 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39272">CVE-2021-39272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026756" comment="fetchmail-6.5.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93803" version="1" class="patch">
	<metadata>
		<title>ffmpeg-7-7.1.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<reference ref_id="CVE-2022-3964" ref_url="https://www.suse.com/security/cve/CVE-2022-3964/" source="CVE"/>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<reference ref_id="CVE-2023-50010" ref_url="https://www.suse.com/security/cve/CVE-2023-50010/" source="CVE"/>
		<reference ref_id="CVE-2023-51793" ref_url="https://www.suse.com/security/cve/CVE-2023-51793/" source="CVE"/>
		<reference ref_id="CVE-2023-51794" ref_url="https://www.suse.com/security/cve/CVE-2023-51794/" source="CVE"/>
		<reference ref_id="CVE-2023-51798" ref_url="https://www.suse.com/security/cve/CVE-2023-51798/" source="CVE"/>
		<reference ref_id="CVE-2024-12361" ref_url="https://www.suse.com/security/cve/CVE-2024-12361/" source="CVE"/>
		<reference ref_id="CVE-2024-31578" ref_url="https://www.suse.com/security/cve/CVE-2024-31578/" source="CVE"/>
		<reference ref_id="CVE-2024-32228" ref_url="https://www.suse.com/security/cve/CVE-2024-32228/" source="CVE"/>
		<reference ref_id="CVE-2024-32229" ref_url="https://www.suse.com/security/cve/CVE-2024-32229/" source="CVE"/>
		<reference ref_id="CVE-2024-32230" ref_url="https://www.suse.com/security/cve/CVE-2024-32230/" source="CVE"/>
		<reference ref_id="CVE-2024-35365" ref_url="https://www.suse.com/security/cve/CVE-2024-35365/" source="CVE"/>
		<reference ref_id="CVE-2024-35368" ref_url="https://www.suse.com/security/cve/CVE-2024-35368/" source="CVE"/>
		<reference ref_id="CVE-2024-36613" ref_url="https://www.suse.com/security/cve/CVE-2024-36613/" source="CVE"/>
		<reference ref_id="CVE-2024-36615" ref_url="https://www.suse.com/security/cve/CVE-2024-36615/" source="CVE"/>
		<reference ref_id="CVE-2024-36616" ref_url="https://www.suse.com/security/cve/CVE-2024-36616/" source="CVE"/>
		<reference ref_id="CVE-2024-36617" ref_url="https://www.suse.com/security/cve/CVE-2024-36617/" source="CVE"/>
		<reference ref_id="CVE-2024-36618" ref_url="https://www.suse.com/security/cve/CVE-2024-36618/" source="CVE"/>
		<reference ref_id="CVE-2024-36619" ref_url="https://www.suse.com/security/cve/CVE-2024-36619/" source="CVE"/>
		<reference ref_id="CVE-2024-7055" ref_url="https://www.suse.com/security/cve/CVE-2024-7055/" source="CVE"/>
		<reference ref_id="CVE-2025-0518" ref_url="https://www.suse.com/security/cve/CVE-2025-0518/" source="CVE"/>
		<reference ref_id="CVE-2025-1816" ref_url="https://www.suse.com/security/cve/CVE-2025-1816/" source="CVE"/>
		<reference ref_id="CVE-2025-22919" ref_url="https://www.suse.com/security/cve/CVE-2025-22919/" source="CVE"/>
		<reference ref_id="CVE-2025-22920" ref_url="https://www.suse.com/security/cve/CVE-2025-22920/" source="CVE"/>
		<reference ref_id="CVE-2025-22921" ref_url="https://www.suse.com/security/cve/CVE-2025-22921/" source="CVE"/>
		<reference ref_id="CVE-2025-25473" ref_url="https://www.suse.com/security/cve/CVE-2025-25473/" source="CVE"/>
		<description>
These are all security issues fixed in the ffmpeg-7-7.1.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22046">CVE-2020-22046 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3964/">CVE-2022-3964 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3964">CVE-2022-3964 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50010/">CVE-2023-50010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50010">CVE-2023-50010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51793/">CVE-2023-51793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51793">CVE-2023-51793 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51794/">CVE-2023-51794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51794">CVE-2023-51794 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51798/">CVE-2023-51798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51798">CVE-2023-51798 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12361/">CVE-2024-12361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12361">CVE-2024-12361 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31578/">CVE-2024-31578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31578">CVE-2024-31578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32228/">CVE-2024-32228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32228">CVE-2024-32228 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32229/">CVE-2024-32229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32229">CVE-2024-32229 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32230/">CVE-2024-32230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230">CVE-2024-32230 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35365/">CVE-2024-35365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35365">CVE-2024-35365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35368/">CVE-2024-35368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35368">CVE-2024-35368 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36613/">CVE-2024-36613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36613">CVE-2024-36613 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36615/">CVE-2024-36615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36615">CVE-2024-36615 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36616/">CVE-2024-36616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36616">CVE-2024-36616 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36617/">CVE-2024-36617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36617">CVE-2024-36617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36618/">CVE-2024-36618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36618">CVE-2024-36618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36619/">CVE-2024-36619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36619">CVE-2024-36619 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7055/">CVE-2024-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7055">CVE-2024-7055 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0518/">CVE-2025-0518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0518">CVE-2025-0518 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-1816/">CVE-2025-1816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1816">CVE-2025-1816 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22919/">CVE-2025-22919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22919">CVE-2025-22919 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22920/">CVE-2025-22920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22920">CVE-2025-22920 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22921/">CVE-2025-22921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22921">CVE-2025-22921 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25473/">CVE-2025-25473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25473">CVE-2025-25473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026757" comment="ffmpeg-7-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026758" comment="libavcodec61-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026759" comment="libavdevice61-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026760" comment="libavfilter10-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026761" comment="libavformat61-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026762" comment="libavutil59-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026763" comment="libpostproc58-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026764" comment="libswresample5-7.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026765" comment="libswscale8-7.1.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93804" version="1" class="patch">
	<metadata>
		<title>file-5.46-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249/" source="CVE"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="CVE-2019-8904" ref_url="https://www.suse.com/security/cve/CVE-2019-8904/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.46-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1536">CVE-2007-1536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2799">CVE-2007-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1571">CVE-2012-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000249">CVE-2017-1000249 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8904/">CVE-2019-8904 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8904">CVE-2019-8904 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8905">CVE-2019-8905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8906">CVE-2019-8906 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8907">CVE-2019-8907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026766" comment="file-5.46-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026767" comment="file-devel-5.46-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026768" comment="file-magic-5.46-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026769" comment="libmagic1-5.46-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93805" version="1" class="patch">
	<metadata>
		<title>findutils-4.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2452">CVE-2007-2452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026770" comment="findutils-4.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026771" comment="findutils-lang-4.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93806" version="1" class="patch">
	<metadata>
		<title>firewalld-2.1.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410/" source="CVE"/>
		<description>
These are all security issues fixed in the firewalld-2.1.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5410">CVE-2016-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026772" comment="firewalld-2.1.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026773" comment="firewalld-bash-completion-2.1.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026774" comment="firewalld-lang-2.1.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026775" comment="firewalld-zsh-completion-2.1.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026776" comment="python3-firewall-2.1.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93807" version="1" class="patch">
	<metadata>
		<title>fish-4.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-2905" ref_url="https://www.suse.com/security/cve/CVE-2014-2905/" source="CVE"/>
		<reference ref_id="CVE-2014-2906" ref_url="https://www.suse.com/security/cve/CVE-2014-2906/" source="CVE"/>
		<reference ref_id="CVE-2014-2914" ref_url="https://www.suse.com/security/cve/CVE-2014-2914/" source="CVE"/>
		<reference ref_id="CVE-2014-3219" ref_url="https://www.suse.com/security/cve/CVE-2014-3219/" source="CVE"/>
		<reference ref_id="CVE-2014-3856" ref_url="https://www.suse.com/security/cve/CVE-2014-3856/" source="CVE"/>
		<reference ref_id="CVE-2022-20001" ref_url="https://www.suse.com/security/cve/CVE-2022-20001/" source="CVE"/>
		<reference ref_id="CVE-2023-49284" ref_url="https://www.suse.com/security/cve/CVE-2023-49284/" source="CVE"/>
		<description>
These are all security issues fixed in the fish-4.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2905/">CVE-2014-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2905">CVE-2014-2905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2906/">CVE-2014-2906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2906">CVE-2014-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2914/">CVE-2014-2914 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-2914">CVE-2014-2914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3219/">CVE-2014-3219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3219">CVE-2014-3219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3856/">CVE-2014-3856 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3856">CVE-2014-3856 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20001/">CVE-2022-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20001">CVE-2022-20001 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-49284/">CVE-2023-49284 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49284">CVE-2023-49284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026777" comment="fish-4.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026778" comment="fish-devel-4.0.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93808" version="1" class="patch">
	<metadata>
		<title>flac-1.4.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<reference ref_id="CVE-2017-6888" ref_url="https://www.suse.com/security/cve/CVE-2017-6888/" source="CVE"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
These are all security issues fixed in the flac-1.4.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6888/">CVE-2017-6888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6888">CVE-2017-6888 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0561">CVE-2021-0561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026779" comment="flac-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026780" comment="libFLAC++10-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026781" comment="libFLAC++10-x86-64-v3-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026782" comment="libFLAC12-1.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026783" comment="libFLAC12-x86-64-v3-1.4.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93809" version="1" class="patch">
	<metadata>
		<title>flake-pilot-3.1.19-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<description>
These are all security issues fixed in the flake-pilot-3.1.19-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026784" comment="flake-pilot-3.1.19-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026785" comment="flake-pilot-podman-3.1.19-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93810" version="1" class="patch">
	<metadata>
		<title>flatpak-1.16.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-8659" ref_url="https://www.suse.com/security/cve/CVE-2016-8659/" source="CVE"/>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-10063" ref_url="https://www.suse.com/security/cve/CVE-2019-10063/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261/" source="CVE"/>
		<reference ref_id="CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133/" source="CVE"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="CVE-2023-28100" ref_url="https://www.suse.com/security/cve/CVE-2023-28100/" source="CVE"/>
		<reference ref_id="CVE-2023-28101" ref_url="https://www.suse.com/security/cve/CVE-2023-28101/" source="CVE"/>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.16.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8659/">CVE-2016-8659 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8659">CVE-2016-8659 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5226">CVE-2017-5226 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10063/">CVE-2019-10063 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10063">CVE-2019-10063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21261">CVE-2021-21261 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41133">CVE-2021-41133 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43860">CVE-2021-43860 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21682">CVE-2022-21682 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28100/">CVE-2023-28100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28100">CVE-2023-28100 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28101/">CVE-2023-28101 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28101">CVE-2023-28101 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026786" comment="flatpak-1.16.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026787" comment="flatpak-devel-1.16.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026788" comment="flatpak-remote-flathub-1.16.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026789" comment="flatpak-selinux-1.16.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026790" comment="flatpak-zsh-completion-1.16.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026791" comment="libflatpak0-1.16.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026792" comment="system-user-flatpak-1.16.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026793" comment="typelib-1_0-Flatpak-1_0-1.16.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93811" version="1" class="patch">
	<metadata>
		<title>fontforge-20230101-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-5395" ref_url="https://www.suse.com/security/cve/CVE-2020-5395/" source="CVE"/>
		<reference ref_id="CVE-2020-5496" ref_url="https://www.suse.com/security/cve/CVE-2020-5496/" source="CVE"/>
		<reference ref_id="CVE-2024-25081" ref_url="https://www.suse.com/security/cve/CVE-2024-25081/" source="CVE"/>
		<reference ref_id="CVE-2024-25082" ref_url="https://www.suse.com/security/cve/CVE-2024-25082/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20230101-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5395/">CVE-2020-5395 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5395">CVE-2020-5395 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-5496/">CVE-2020-5496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5496">CVE-2020-5496 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25081/">CVE-2024-25081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25081">CVE-2024-25081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25082/">CVE-2024-25082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25082">CVE-2024-25082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026794" comment="fontforge-20230101-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026795" comment="fontforge-devel-20230101-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026796" comment="fontforge-doc-20230101-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93812" version="1" class="patch">
	<metadata>
		<title>freeradius-server-3.2.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<reference ref_id="CVE-2012-3547" ref_url="https://www.suse.com/security/cve/CVE-2012-3547/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2015-8763" ref_url="https://www.suse.com/security/cve/CVE-2015-8763/" source="CVE"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984/" source="CVE"/>
		<reference ref_id="CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985/" source="CVE"/>
		<reference ref_id="CVE-2017-10986" ref_url="https://www.suse.com/security/cve/CVE-2017-10986/" source="CVE"/>
		<reference ref_id="CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987/" source="CVE"/>
		<reference ref_id="CVE-2017-10988" ref_url="https://www.suse.com/security/cve/CVE-2017-10988/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="CVE-2022-41859" ref_url="https://www.suse.com/security/cve/CVE-2022-41859/" source="CVE"/>
		<reference ref_id="CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860/" source="CVE"/>
		<reference ref_id="CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-3.2.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4474">CVE-2008-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3547/">CVE-2012-3547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3547">CVE-2012-3547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2015">CVE-2014-2015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4680">CVE-2015-4680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8763/">CVE-2015-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8763">CVE-2015-8763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10984">CVE-2017-10984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10985">CVE-2017-10985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10986/">CVE-2017-10986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10986">CVE-2017-10986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10987">CVE-2017-10987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10988/">CVE-2017-10988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-10988">CVE-2017-10988 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11234">CVE-2019-11234 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11235">CVE-2019-11235 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41859/">CVE-2022-41859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41859">CVE-2022-41859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41860">CVE-2022-41860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41861">CVE-2022-41861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026797" comment="freeradius-server-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026798" comment="freeradius-server-devel-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026799" comment="freeradius-server-doc-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026800" comment="freeradius-server-krb5-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026801" comment="freeradius-server-ldap-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026802" comment="freeradius-server-libs-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026803" comment="freeradius-server-mysql-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026804" comment="freeradius-server-perl-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026805" comment="freeradius-server-postgresql-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026806" comment="freeradius-server-python3-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026807" comment="freeradius-server-sqlite-3.2.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026808" comment="freeradius-server-utils-3.2.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93813" version="1" class="patch">
	<metadata>
		<title>freerdp-3.10.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<reference ref_id="CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834/" source="CVE"/>
		<reference ref_id="CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835/" source="CVE"/>
		<reference ref_id="CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836/" source="CVE"/>
		<reference ref_id="CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837/" source="CVE"/>
		<reference ref_id="CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838/" source="CVE"/>
		<reference ref_id="CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839/" source="CVE"/>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<reference ref_id="CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852/" source="CVE"/>
		<reference ref_id="CVE-2018-8784" ref_url="https://www.suse.com/security/cve/CVE-2018-8784/" source="CVE"/>
		<reference ref_id="CVE-2018-8785" ref_url="https://www.suse.com/security/cve/CVE-2018-8785/" source="CVE"/>
		<reference ref_id="CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786/" source="CVE"/>
		<reference ref_id="CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788/" source="CVE"/>
		<reference ref_id="CVE-2018-8789" ref_url="https://www.suse.com/security/cve/CVE-2018-8789/" source="CVE"/>
		<reference ref_id="CVE-2019-17177" ref_url="https://www.suse.com/security/cve/CVE-2019-17177/" source="CVE"/>
		<reference ref_id="CVE-2019-17178" ref_url="https://www.suse.com/security/cve/CVE-2019-17178/" source="CVE"/>
		<reference ref_id="CVE-2020-11017" ref_url="https://www.suse.com/security/cve/CVE-2020-11017/" source="CVE"/>
		<reference ref_id="CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018/" source="CVE"/>
		<reference ref_id="CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019/" source="CVE"/>
		<reference ref_id="CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038/" source="CVE"/>
		<reference ref_id="CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039/" source="CVE"/>
		<reference ref_id="CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040/" source="CVE"/>
		<reference ref_id="CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041/" source="CVE"/>
		<reference ref_id="CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043/" source="CVE"/>
		<reference ref_id="CVE-2020-11095" ref_url="https://www.suse.com/security/cve/CVE-2020-11095/" source="CVE"/>
		<reference ref_id="CVE-2020-11096" ref_url="https://www.suse.com/security/cve/CVE-2020-11096/" source="CVE"/>
		<reference ref_id="CVE-2020-11097" ref_url="https://www.suse.com/security/cve/CVE-2020-11097/" source="CVE"/>
		<reference ref_id="CVE-2020-11098" ref_url="https://www.suse.com/security/cve/CVE-2020-11098/" source="CVE"/>
		<reference ref_id="CVE-2020-11099" ref_url="https://www.suse.com/security/cve/CVE-2020-11099/" source="CVE"/>
		<reference ref_id="CVE-2020-11521" ref_url="https://www.suse.com/security/cve/CVE-2020-11521/" source="CVE"/>
		<reference ref_id="CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522/" source="CVE"/>
		<reference ref_id="CVE-2020-11523" ref_url="https://www.suse.com/security/cve/CVE-2020-11523/" source="CVE"/>
		<reference ref_id="CVE-2020-11524" ref_url="https://www.suse.com/security/cve/CVE-2020-11524/" source="CVE"/>
		<reference ref_id="CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525/" source="CVE"/>
		<reference ref_id="CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526/" source="CVE"/>
		<reference ref_id="CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396/" source="CVE"/>
		<reference ref_id="CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397/" source="CVE"/>
		<reference ref_id="CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398/" source="CVE"/>
		<reference ref_id="CVE-2020-15103" ref_url="https://www.suse.com/security/cve/CVE-2020-15103/" source="CVE"/>
		<reference ref_id="CVE-2020-4030" ref_url="https://www.suse.com/security/cve/CVE-2020-4030/" source="CVE"/>
		<reference ref_id="CVE-2020-4031" ref_url="https://www.suse.com/security/cve/CVE-2020-4031/" source="CVE"/>
		<reference ref_id="CVE-2020-4032" ref_url="https://www.suse.com/security/cve/CVE-2020-4032/" source="CVE"/>
		<reference ref_id="CVE-2020-4033" ref_url="https://www.suse.com/security/cve/CVE-2020-4033/" source="CVE"/>
		<reference ref_id="CVE-2021-41159" ref_url="https://www.suse.com/security/cve/CVE-2021-41159/" source="CVE"/>
		<reference ref_id="CVE-2021-41160" ref_url="https://www.suse.com/security/cve/CVE-2021-41160/" source="CVE"/>
		<reference ref_id="CVE-2022-24882" ref_url="https://www.suse.com/security/cve/CVE-2022-24882/" source="CVE"/>
		<reference ref_id="CVE-2022-24883" ref_url="https://www.suse.com/security/cve/CVE-2022-24883/" source="CVE"/>
		<reference ref_id="CVE-2022-39282" ref_url="https://www.suse.com/security/cve/CVE-2022-39282/" source="CVE"/>
		<reference ref_id="CVE-2022-39283" ref_url="https://www.suse.com/security/cve/CVE-2022-39283/" source="CVE"/>
		<reference ref_id="CVE-2022-39316" ref_url="https://www.suse.com/security/cve/CVE-2022-39316/" source="CVE"/>
		<reference ref_id="CVE-2022-39317" ref_url="https://www.suse.com/security/cve/CVE-2022-39317/" source="CVE"/>
		<reference ref_id="CVE-2022-39318" ref_url="https://www.suse.com/security/cve/CVE-2022-39318/" source="CVE"/>
		<reference ref_id="CVE-2022-39319" ref_url="https://www.suse.com/security/cve/CVE-2022-39319/" source="CVE"/>
		<reference ref_id="CVE-2022-39320" ref_url="https://www.suse.com/security/cve/CVE-2022-39320/" source="CVE"/>
		<reference ref_id="CVE-2022-39347" ref_url="https://www.suse.com/security/cve/CVE-2022-39347/" source="CVE"/>
		<reference ref_id="CVE-2022-41877" ref_url="https://www.suse.com/security/cve/CVE-2022-41877/" source="CVE"/>
		<reference ref_id="CVE-2023-39350" ref_url="https://www.suse.com/security/cve/CVE-2023-39350/" source="CVE"/>
		<reference ref_id="CVE-2023-39351" ref_url="https://www.suse.com/security/cve/CVE-2023-39351/" source="CVE"/>
		<reference ref_id="CVE-2023-39352" ref_url="https://www.suse.com/security/cve/CVE-2023-39352/" source="CVE"/>
		<reference ref_id="CVE-2023-39353" ref_url="https://www.suse.com/security/cve/CVE-2023-39353/" source="CVE"/>
		<reference ref_id="CVE-2023-39354" ref_url="https://www.suse.com/security/cve/CVE-2023-39354/" source="CVE"/>
		<reference ref_id="CVE-2023-39356" ref_url="https://www.suse.com/security/cve/CVE-2023-39356/" source="CVE"/>
		<reference ref_id="CVE-2023-40181" ref_url="https://www.suse.com/security/cve/CVE-2023-40181/" source="CVE"/>
		<reference ref_id="CVE-2023-40186" ref_url="https://www.suse.com/security/cve/CVE-2023-40186/" source="CVE"/>
		<reference ref_id="CVE-2023-40188" ref_url="https://www.suse.com/security/cve/CVE-2023-40188/" source="CVE"/>
		<reference ref_id="CVE-2023-40567" ref_url="https://www.suse.com/security/cve/CVE-2023-40567/" source="CVE"/>
		<reference ref_id="CVE-2023-40569" ref_url="https://www.suse.com/security/cve/CVE-2023-40569/" source="CVE"/>
		<reference ref_id="CVE-2023-40574" ref_url="https://www.suse.com/security/cve/CVE-2023-40574/" source="CVE"/>
		<reference ref_id="CVE-2023-40575" ref_url="https://www.suse.com/security/cve/CVE-2023-40575/" source="CVE"/>
		<reference ref_id="CVE-2023-40576" ref_url="https://www.suse.com/security/cve/CVE-2023-40576/" source="CVE"/>
		<reference ref_id="CVE-2023-40589" ref_url="https://www.suse.com/security/cve/CVE-2023-40589/" source="CVE"/>
		<reference ref_id="CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039/" source="CVE"/>
		<reference ref_id="CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040/" source="CVE"/>
		<reference ref_id="CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041/" source="CVE"/>
		<reference ref_id="CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458/" source="CVE"/>
		<reference ref_id="CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459/" source="CVE"/>
		<reference ref_id="CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-3.10.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0250">CVE-2014-0250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0791">CVE-2014-0791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2834">CVE-2017-2834 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2835">CVE-2017-2835 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2836">CVE-2017-2836 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2837">CVE-2017-2837 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2838">CVE-2017-2838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2839">CVE-2017-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0886">CVE-2018-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000852">CVE-2018-1000852 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8784/">CVE-2018-8784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8784">CVE-2018-8784 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8785/">CVE-2018-8785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8785">CVE-2018-8785 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8786">CVE-2018-8786 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8787">CVE-2018-8787 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8788">CVE-2018-8788 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8789/">CVE-2018-8789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8789">CVE-2018-8789 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17177/">CVE-2019-17177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17177">CVE-2019-17177 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17178/">CVE-2019-17178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17178">CVE-2019-17178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11017/">CVE-2020-11017 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11017">CVE-2020-11017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11018">CVE-2020-11018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11019">CVE-2020-11019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11038">CVE-2020-11038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11039">CVE-2020-11039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11040">CVE-2020-11040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11041">CVE-2020-11041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11043">CVE-2020-11043 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11095/">CVE-2020-11095 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11095">CVE-2020-11095 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11096/">CVE-2020-11096 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11096">CVE-2020-11096 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11097/">CVE-2020-11097 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11097">CVE-2020-11097 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11098/">CVE-2020-11098 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11098">CVE-2020-11098 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11099/">CVE-2020-11099 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11099">CVE-2020-11099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11521/">CVE-2020-11521 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11521">CVE-2020-11521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11522">CVE-2020-11522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11523/">CVE-2020-11523 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11523">CVE-2020-11523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11524/">CVE-2020-11524 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11524">CVE-2020-11524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11525">CVE-2020-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11526">CVE-2020-11526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13396">CVE-2020-13396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13397">CVE-2020-13397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13398">CVE-2020-13398 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15103/">CVE-2020-15103 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15103">CVE-2020-15103 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4030/">CVE-2020-4030 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4030">CVE-2020-4030 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4031/">CVE-2020-4031 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4031">CVE-2020-4031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-4032/">CVE-2020-4032 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4032">CVE-2020-4032 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4033/">CVE-2020-4033 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4033">CVE-2020-4033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41159/">CVE-2021-41159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41159">CVE-2021-41159 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41160/">CVE-2021-41160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41160">CVE-2021-41160 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24882/">CVE-2022-24882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24882">CVE-2022-24882 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24883/">CVE-2022-24883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24883">CVE-2022-24883 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39282/">CVE-2022-39282 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39282">CVE-2022-39282 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39283/">CVE-2022-39283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39283">CVE-2022-39283 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39316/">CVE-2022-39316 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39316">CVE-2022-39316 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39317/">CVE-2022-39317 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39317">CVE-2022-39317 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39318/">CVE-2022-39318 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39318">CVE-2022-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39319/">CVE-2022-39319 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39319">CVE-2022-39319 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39320/">CVE-2022-39320 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39320">CVE-2022-39320 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39347/">CVE-2022-39347 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39347">CVE-2022-39347 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41877/">CVE-2022-41877 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41877">CVE-2022-41877 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39350/">CVE-2023-39350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39350">CVE-2023-39350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39351/">CVE-2023-39351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39351">CVE-2023-39351 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39352/">CVE-2023-39352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39352">CVE-2023-39352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39353/">CVE-2023-39353 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39353">CVE-2023-39353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39354/">CVE-2023-39354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39354">CVE-2023-39354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39356/">CVE-2023-39356 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39356">CVE-2023-39356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40181/">CVE-2023-40181 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40181">CVE-2023-40181 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40186/">CVE-2023-40186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40186">CVE-2023-40186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40188/">CVE-2023-40188 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40188">CVE-2023-40188 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40567/">CVE-2023-40567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40567">CVE-2023-40567 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40569/">CVE-2023-40569 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40569">CVE-2023-40569 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40574/">CVE-2023-40574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40574">CVE-2023-40574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40575/">CVE-2023-40575 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40575">CVE-2023-40575 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40576/">CVE-2023-40576 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40576">CVE-2023-40576 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40589/">CVE-2023-40589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40589">CVE-2023-40589 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026809" comment="freerdp-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026810" comment="freerdp-devel-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026811" comment="freerdp-proxy-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026812" comment="freerdp-proxy-plugins-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026813" comment="freerdp-sdl-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026814" comment="freerdp-server-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026815" comment="freerdp-wayland-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026816" comment="libfreerdp-server-proxy3-3-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026817" comment="libfreerdp3-3-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026818" comment="librdtk0-0-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026819" comment="libuwac0-0-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026820" comment="libwinpr3-3-3.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026821" comment="winpr-devel-3.10.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93814" version="1" class="patch">
	<metadata>
		<title>freetds-config-1.4.17-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-13508" ref_url="https://www.suse.com/security/cve/CVE-2019-13508/" source="CVE"/>
		<description>
These are all security issues fixed in the freetds-config-1.4.17-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13508/">CVE-2019-13508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-13508">CVE-2019-13508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026822" comment="freetds-config-1.4.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026823" comment="freetds-devel-1.4.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026824" comment="freetds-doc-1.4.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026825" comment="freetds-tools-1.4.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026826" comment="libct4-1.4.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026827" comment="libsybdb5-1.4.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026828" comment="libtdsodbc0-1.4.17-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93815" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.13.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405/" source="CVE"/>
		<reference ref_id="CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.13.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3855">CVE-2010-3855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3256">CVE-2011-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3439">CVE-2011-3439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1126">CVE-2012-1126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1127">CVE-2012-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1128">CVE-2012-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1129">CVE-2012-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1130">CVE-2012-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1131">CVE-2012-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1132">CVE-2012-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1133">CVE-2012-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1134">CVE-2012-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1135">CVE-2012-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1136">CVE-2012-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1137">CVE-2012-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1138">CVE-2012-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1139">CVE-2012-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1140">CVE-2012-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1141">CVE-2012-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1142">CVE-2012-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1143">CVE-2012-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1144">CVE-2012-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2241">CVE-2014-2241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6942">CVE-2018-6942 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27405">CVE-2022-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">CVE-2022-27406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026829" comment="freetype2-devel-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026830" comment="freetype2-profile-tti35-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026831" comment="ftdump-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026832" comment="libfreetype6-2.13.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93816" version="1" class="patch">
	<metadata>
		<title>fribidi-1.0.15-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<description>
These are all security issues fixed in the fribidi-1.0.15-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18397">CVE-2019-18397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026833" comment="fribidi-1.0.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026834" comment="fribidi-devel-1.0.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026835" comment="libfribidi0-1.0.15-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93817" version="1" class="patch">
	<metadata>
		<title>frr-10.2.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-25074" ref_url="https://www.suse.com/security/cve/CVE-2019-25074/" source="CVE"/>
		<reference ref_id="CVE-2020-12831" ref_url="https://www.suse.com/security/cve/CVE-2020-12831/" source="CVE"/>
		<reference ref_id="CVE-2022-26125" ref_url="https://www.suse.com/security/cve/CVE-2022-26125/" source="CVE"/>
		<reference ref_id="CVE-2022-26126" ref_url="https://www.suse.com/security/cve/CVE-2022-26126/" source="CVE"/>
		<reference ref_id="CVE-2022-26127" ref_url="https://www.suse.com/security/cve/CVE-2022-26127/" source="CVE"/>
		<reference ref_id="CVE-2022-26128" ref_url="https://www.suse.com/security/cve/CVE-2022-26128/" source="CVE"/>
		<reference ref_id="CVE-2022-26129" ref_url="https://www.suse.com/security/cve/CVE-2022-26129/" source="CVE"/>
		<reference ref_id="CVE-2022-37032" ref_url="https://www.suse.com/security/cve/CVE-2022-37032/" source="CVE"/>
		<reference ref_id="CVE-2022-37035" ref_url="https://www.suse.com/security/cve/CVE-2022-37035/" source="CVE"/>
		<reference ref_id="CVE-2022-42917" ref_url="https://www.suse.com/security/cve/CVE-2022-42917/" source="CVE"/>
		<reference ref_id="CVE-2023-31489" ref_url="https://www.suse.com/security/cve/CVE-2023-31489/" source="CVE"/>
		<reference ref_id="CVE-2023-31490" ref_url="https://www.suse.com/security/cve/CVE-2023-31490/" source="CVE"/>
		<reference ref_id="CVE-2023-3748" ref_url="https://www.suse.com/security/cve/CVE-2023-3748/" source="CVE"/>
		<reference ref_id="CVE-2023-38406" ref_url="https://www.suse.com/security/cve/CVE-2023-38406/" source="CVE"/>
		<reference ref_id="CVE-2023-38407" ref_url="https://www.suse.com/security/cve/CVE-2023-38407/" source="CVE"/>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<reference ref_id="CVE-2023-41360" ref_url="https://www.suse.com/security/cve/CVE-2023-41360/" source="CVE"/>
		<reference ref_id="CVE-2023-41909" ref_url="https://www.suse.com/security/cve/CVE-2023-41909/" source="CVE"/>
		<reference ref_id="CVE-2023-46752" ref_url="https://www.suse.com/security/cve/CVE-2023-46752/" source="CVE"/>
		<reference ref_id="CVE-2023-46753" ref_url="https://www.suse.com/security/cve/CVE-2023-46753/" source="CVE"/>
		<reference ref_id="CVE-2023-47234" ref_url="https://www.suse.com/security/cve/CVE-2023-47234/" source="CVE"/>
		<reference ref_id="CVE-2023-47235" ref_url="https://www.suse.com/security/cve/CVE-2023-47235/" source="CVE"/>
		<reference ref_id="CVE-2024-27913" ref_url="https://www.suse.com/security/cve/CVE-2024-27913/" source="CVE"/>
		<reference ref_id="CVE-2024-31948" ref_url="https://www.suse.com/security/cve/CVE-2024-31948/" source="CVE"/>
		<reference ref_id="CVE-2024-31950" ref_url="https://www.suse.com/security/cve/CVE-2024-31950/" source="CVE"/>
		<reference ref_id="CVE-2024-31951" ref_url="https://www.suse.com/security/cve/CVE-2024-31951/" source="CVE"/>
		<reference ref_id="CVE-2024-34088" ref_url="https://www.suse.com/security/cve/CVE-2024-34088/" source="CVE"/>
		<reference ref_id="CVE-2024-44070" ref_url="https://www.suse.com/security/cve/CVE-2024-44070/" source="CVE"/>
		<reference ref_id="CVE-2024-55553" ref_url="https://www.suse.com/security/cve/CVE-2024-55553/" source="CVE"/>
		<description>
These are all security issues fixed in the frr-10.2.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25074/">CVE-2019-25074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-25074">CVE-2019-25074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12831/">CVE-2020-12831 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12831">CVE-2020-12831 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26125/">CVE-2022-26125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26125">CVE-2022-26125 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26126/">CVE-2022-26126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26126">CVE-2022-26126 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26127/">CVE-2022-26127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26127">CVE-2022-26127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26128/">CVE-2022-26128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26128">CVE-2022-26128 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26129/">CVE-2022-26129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26129">CVE-2022-26129 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37032/">CVE-2022-37032 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37032">CVE-2022-37032 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37035/">CVE-2022-37035 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37035">CVE-2022-37035 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42917/">CVE-2022-42917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-42917">CVE-2022-42917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31489/">CVE-2023-31489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31489">CVE-2023-31489 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31490/">CVE-2023-31490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31490">CVE-2023-31490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3748/">CVE-2023-3748 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3748">CVE-2023-3748 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38406/">CVE-2023-38406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38406">CVE-2023-38406 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38407/">CVE-2023-38407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38407">CVE-2023-38407 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41360/">CVE-2023-41360 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41360">CVE-2023-41360 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41909/">CVE-2023-41909 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41909">CVE-2023-41909 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46752/">CVE-2023-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46752">CVE-2023-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46753/">CVE-2023-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46753">CVE-2023-46753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47234/">CVE-2023-47234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47234">CVE-2023-47234 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47235/">CVE-2023-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47235">CVE-2023-47235 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27913/">CVE-2024-27913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27913">CVE-2024-27913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31948/">CVE-2024-31948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31948">CVE-2024-31948 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31950/">CVE-2024-31950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31950">CVE-2024-31950 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31951/">CVE-2024-31951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31951">CVE-2024-31951 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34088/">CVE-2024-34088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34088">CVE-2024-34088 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44070/">CVE-2024-44070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44070">CVE-2024-44070 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55553/">CVE-2024-55553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55553">CVE-2024-55553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026836" comment="frr-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026837" comment="frr-devel-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026838" comment="libfrr0-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026839" comment="libfrr_pb0-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026840" comment="libfrrcares0-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026841" comment="libfrrfpm_pb0-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026842" comment="libfrrospfapiclient0-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026843" comment="libfrrsnmp0-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026844" comment="libfrrzmq0-10.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026845" comment="libmgmt_be_nb0-10.2.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93818" version="1" class="patch">
	<metadata>
		<title>ftbench-2.13.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="CVE-2022-31782" ref_url="https://www.suse.com/security/cve/CVE-2022-31782/" source="CVE"/>
		<description>
These are all security issues fixed in the ftbench-2.13.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1351">CVE-2007-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31782/">CVE-2022-31782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31782">CVE-2022-31782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026846" comment="ftbench-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026847" comment="ftdiff-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026848" comment="ftgamma-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026849" comment="ftgrid-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026850" comment="ftlint-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026851" comment="ftmulti-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026852" comment="ftsdf-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026853" comment="ftstring-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026854" comment="ftvalid-2.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026855" comment="ftview-2.13.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93819" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026856" comment="fuse-2.9.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026857" comment="fuse-devel-2.9.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026858" comment="fuse-devel-static-2.9.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026859" comment="fuse-doc-2.9.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026860" comment="libfuse2-2.9.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026861" comment="libulockmgr1-2.9.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93820" version="1" class="patch">
	<metadata>
		<title>fwupd-2.0.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<reference ref_id="CVE-2022-3287" ref_url="https://www.suse.com/security/cve/CVE-2022-3287/" source="CVE"/>
		<description>
These are all security issues fixed in the fwupd-2.0.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10759">CVE-2020-10759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3287/">CVE-2022-3287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3287">CVE-2022-3287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026862" comment="fwupd-2.0.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026863" comment="fwupd-bash-completion-2.0.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026864" comment="fwupd-devel-2.0.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026865" comment="fwupd-doc-2.0.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026866" comment="fwupd-lang-2.0.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026867" comment="libfwupd3-2.0.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026868" comment="typelib-1_0-Fwupd-2_0-2.0.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93821" version="1" class="patch">
	<metadata>
		<title>gc-devel-8.2.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the gc-devel-8.2.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2673">CVE-2012-2673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026869" comment="gc-devel-8.2.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026870" comment="libgc1-8.2.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93822" version="1" class="patch">
	<metadata>
		<title>gcab-1.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-0552" ref_url="https://www.suse.com/security/cve/CVE-2015-0552/" source="CVE"/>
		<reference ref_id="CVE-2018-5345" ref_url="https://www.suse.com/security/cve/CVE-2018-5345/" source="CVE"/>
		<description>
These are all security issues fixed in the gcab-1.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0552/">CVE-2015-0552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0552">CVE-2015-0552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5345/">CVE-2018-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5345">CVE-2018-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026871" comment="gcab-1.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026872" comment="gcab-lang-1.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026873" comment="libgcab-1_0-0-1.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026874" comment="typelib-1_0-GCab-1_0-1.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93823" version="1" class="patch">
	<metadata>
		<title>gd-2.3.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.3.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2756">CVE-2007-2756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10166">CVE-2016-10166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5116">CVE-2016-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6128">CVE-2016-6128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6132">CVE-2016-6132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6207">CVE-2016-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6214">CVE-2016-6214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6905">CVE-2016-6905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6912">CVE-2016-6912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9317">CVE-2016-9317 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6362">CVE-2017-6362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">CVE-2018-1000222 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14553">CVE-2018-14553 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026875" comment="gd-2.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026876" comment="gd-devel-2.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026877" comment="libgd3-2.3.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93824" version="1" class="patch">
	<metadata>
		<title>gdb-16.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="CVE-2022-4806" ref_url="https://www.suse.com/security/cve/CVE-2022-4806/" source="CVE"/>
		<description>
These are all security issues fixed in the gdb-16.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4806/">CVE-2022-4806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4806">CVE-2022-4806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026878" comment="gdb-16.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026879" comment="gdbserver-16.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93825" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.42.12-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385/" source="CVE"/>
		<reference ref_id="CVE-2021-44648" ref_url="https://www.suse.com/security/cve/CVE-2021-44648/" source="CVE"/>
		<reference ref_id="CVE-2021-46829" ref_url="https://www.suse.com/security/cve/CVE-2021-46829/" source="CVE"/>
		<reference ref_id="CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.42.12-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2485">CVE-2011-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7552">CVE-2015-7552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7673">CVE-2015-7673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7674">CVE-2015-7674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6352">CVE-2016-6352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2870">CVE-2017-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6312">CVE-2017-6312 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6313">CVE-2017-6313 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29385">CVE-2020-29385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44648/">CVE-2021-44648 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44648">CVE-2021-44648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46829/">CVE-2021-46829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46829">CVE-2021-46829 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026880" comment="gdk-pixbuf-devel-2.42.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026881" comment="gdk-pixbuf-lang-2.42.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026882" comment="gdk-pixbuf-query-loaders-2.42.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026883" comment="gdk-pixbuf-thumbnailer-2.42.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026884" comment="libgdk_pixbuf-2_0-0-2.42.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026885" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026886" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93826" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-libheif-1.19.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-23109" ref_url="https://www.suse.com/security/cve/CVE-2020-23109/" source="CVE"/>
		<reference ref_id="CVE-2023-0996" ref_url="https://www.suse.com/security/cve/CVE-2023-0996/" source="CVE"/>
		<reference ref_id="CVE-2023-29659" ref_url="https://www.suse.com/security/cve/CVE-2023-29659/" source="CVE"/>
		<reference ref_id="CVE-2023-49460" ref_url="https://www.suse.com/security/cve/CVE-2023-49460/" source="CVE"/>
		<reference ref_id="CVE-2023-49462" ref_url="https://www.suse.com/security/cve/CVE-2023-49462/" source="CVE"/>
		<reference ref_id="CVE-2023-49463" ref_url="https://www.suse.com/security/cve/CVE-2023-49463/" source="CVE"/>
		<reference ref_id="CVE-2023-49464" ref_url="https://www.suse.com/security/cve/CVE-2023-49464/" source="CVE"/>
		<reference ref_id="CVE-2024-41311" ref_url="https://www.suse.com/security/cve/CVE-2024-41311/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-libheif-1.19.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-23109/">CVE-2020-23109 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23109">CVE-2020-23109 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0996/">CVE-2023-0996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0996">CVE-2023-0996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29659/">CVE-2023-29659 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29659">CVE-2023-29659 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49460/">CVE-2023-49460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49460">CVE-2023-49460 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49462/">CVE-2023-49462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49462">CVE-2023-49462 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49463/">CVE-2023-49463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49463">CVE-2023-49463 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49464/">CVE-2023-49464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49464">CVE-2023-49464 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41311/">CVE-2024-41311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41311">CVE-2024-41311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026887" comment="gdk-pixbuf-loader-libheif-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026888" comment="libheif-aom-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026889" comment="libheif-dav1d-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026890" comment="libheif-ffmpeg-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026891" comment="libheif-jpeg-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026892" comment="libheif-openjpeg-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026893" comment="libheif-rav1e-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026894" comment="libheif-svtenc-1.19.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026895" comment="libheif1-1.19.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93827" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.60.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<reference ref_id="CVE-2021-25900" ref_url="https://www.suse.com/security/cve/CVE-2021-25900/" source="CVE"/>
		<reference ref_id="CVE-2023-38633" ref_url="https://www.suse.com/security/cve/CVE-2023-38633/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.60.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3146">CVE-2011-3146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1881">CVE-2013-1881 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11464">CVE-2017-11464 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20446">CVE-2019-20446 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25900/">CVE-2021-25900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25900">CVE-2021-25900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38633/">CVE-2023-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026896" comment="gdk-pixbuf-loader-rsvg-2.60.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026897" comment="librsvg-2-2-2.60.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026898" comment="librsvg-devel-2.60.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026899" comment="rsvg-convert-2.60.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026900" comment="rsvg-thumbnailer-2.60.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026901" comment="typelib-1_0-Rsvg-2_0-2.60.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93828" version="1" class="patch">
	<metadata>
		<title>gdm-48.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<reference ref_id="CVE-2015-7496" ref_url="https://www.suse.com/security/cve/CVE-2015-7496/" source="CVE"/>
		<reference ref_id="CVE-2017-12164" ref_url="https://www.suse.com/security/cve/CVE-2017-12164/" source="CVE"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<reference ref_id="CVE-2019-3825" ref_url="https://www.suse.com/security/cve/CVE-2019-3825/" source="CVE"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="CVE-2020-27837" ref_url="https://www.suse.com/security/cve/CVE-2020-27837/" source="CVE"/>
		<reference ref_id="CVE-2025-6018" ref_url="https://www.suse.com/security/cve/CVE-2025-6018/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-48.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1709">CVE-2011-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7496/">CVE-2015-7496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7496">CVE-2015-7496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12164/">CVE-2017-12164 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12164">CVE-2017-12164 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14424">CVE-2018-14424 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3825/">CVE-2019-3825 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3825">CVE-2019-3825 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27837/">CVE-2020-27837 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27837">CVE-2020-27837 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6018/">CVE-2025-6018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6018">CVE-2025-6018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026902" comment="gdm-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026903" comment="gdm-devel-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026904" comment="gdm-lang-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026905" comment="gdm-schema-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026906" comment="gdm-systemd-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026907" comment="gdmflexiserver-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026908" comment="libgdm1-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026909" comment="typelib-1_0-Gdm-1_0-48.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93829" version="1" class="patch">
	<metadata>
		<title>gettext-its-gtk3-3.24.49+14-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<description>
These are all security issues fixed in the gettext-its-gtk3-3.24.49+14-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026910" comment="gettext-its-gtk3-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026911" comment="gtk3-data-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026912" comment="gtk3-devel-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026913" comment="gtk3-devel-doc-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026914" comment="gtk3-immodule-amharic-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026915" comment="gtk3-immodule-broadway-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026916" comment="gtk3-immodule-inuktitut-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026917" comment="gtk3-immodule-multipress-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026918" comment="gtk3-immodule-thai-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026919" comment="gtk3-immodule-tigrigna-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026920" comment="gtk3-immodule-vietnamese-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026921" comment="gtk3-immodule-xim-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026922" comment="gtk3-lang-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026923" comment="gtk3-schema-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026924" comment="gtk3-tools-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026925" comment="libgtk-3-0-3.24.49+14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026926" comment="typelib-1_0-Gtk-3_0-3.24.49+14-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93830" version="1" class="patch">
	<metadata>
		<title>ghostscript-10.05.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-10217" ref_url="https://www.suse.com/security/cve/CVE-2016-10217/" source="CVE"/>
		<reference ref_id="CVE-2016-10218" ref_url="https://www.suse.com/security/cve/CVE-2016-10218/" source="CVE"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2016-7976" ref_url="https://www.suse.com/security/cve/CVE-2016-7976/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="CVE-2020-16305" ref_url="https://www.suse.com/security/cve/CVE-2020-16305/" source="CVE"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="CVE-2021-45944" ref_url="https://www.suse.com/security/cve/CVE-2021-45944/" source="CVE"/>
		<reference ref_id="CVE-2021-45949" ref_url="https://www.suse.com/security/cve/CVE-2021-45949/" source="CVE"/>
		<reference ref_id="CVE-2023-28879" ref_url="https://www.suse.com/security/cve/CVE-2023-28879/" source="CVE"/>
		<reference ref_id="CVE-2023-36664" ref_url="https://www.suse.com/security/cve/CVE-2023-36664/" source="CVE"/>
		<reference ref_id="CVE-2023-38559" ref_url="https://www.suse.com/security/cve/CVE-2023-38559/" source="CVE"/>
		<reference ref_id="CVE-2023-43115" ref_url="https://www.suse.com/security/cve/CVE-2023-43115/" source="CVE"/>
		<reference ref_id="CVE-2023-46751" ref_url="https://www.suse.com/security/cve/CVE-2023-46751/" source="CVE"/>
		<reference ref_id="CVE-2023-52722" ref_url="https://www.suse.com/security/cve/CVE-2023-52722/" source="CVE"/>
		<reference ref_id="CVE-2024-29510" ref_url="https://www.suse.com/security/cve/CVE-2024-29510/" source="CVE"/>
		<reference ref_id="CVE-2024-33869" ref_url="https://www.suse.com/security/cve/CVE-2024-33869/" source="CVE"/>
		<reference ref_id="CVE-2024-33870" ref_url="https://www.suse.com/security/cve/CVE-2024-33870/" source="CVE"/>
		<reference ref_id="CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871/" source="CVE"/>
		<reference ref_id="CVE-2024-46951" ref_url="https://www.suse.com/security/cve/CVE-2024-46951/" source="CVE"/>
		<reference ref_id="CVE-2024-46952" ref_url="https://www.suse.com/security/cve/CVE-2024-46952/" source="CVE"/>
		<reference ref_id="CVE-2024-46953" ref_url="https://www.suse.com/security/cve/CVE-2024-46953/" source="CVE"/>
		<reference ref_id="CVE-2024-46954" ref_url="https://www.suse.com/security/cve/CVE-2024-46954/" source="CVE"/>
		<reference ref_id="CVE-2024-46955" ref_url="https://www.suse.com/security/cve/CVE-2024-46955/" source="CVE"/>
		<reference ref_id="CVE-2024-46956" ref_url="https://www.suse.com/security/cve/CVE-2024-46956/" source="CVE"/>
		<reference ref_id="CVE-2025-27830" ref_url="https://www.suse.com/security/cve/CVE-2025-27830/" source="CVE"/>
		<reference ref_id="CVE-2025-27831" ref_url="https://www.suse.com/security/cve/CVE-2025-27831/" source="CVE"/>
		<reference ref_id="CVE-2025-27832" ref_url="https://www.suse.com/security/cve/CVE-2025-27832/" source="CVE"/>
		<reference ref_id="CVE-2025-27833" ref_url="https://www.suse.com/security/cve/CVE-2025-27833/" source="CVE"/>
		<reference ref_id="CVE-2025-27834" ref_url="https://www.suse.com/security/cve/CVE-2025-27834/" source="CVE"/>
		<reference ref_id="CVE-2025-27835" ref_url="https://www.suse.com/security/cve/CVE-2025-27835/" source="CVE"/>
		<reference ref_id="CVE-2025-27836" ref_url="https://www.suse.com/security/cve/CVE-2025-27836/" source="CVE"/>
		<reference ref_id="CVE-2025-27837" ref_url="https://www.suse.com/security/cve/CVE-2025-27837/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-10.05.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3228">CVE-2015-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10217/">CVE-2016-10217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10217">CVE-2016-10217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10218/">CVE-2016-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10218">CVE-2016-10218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10219">CVE-2016-10219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10220">CVE-2016-10220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10317">CVE-2016-10317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7976/">CVE-2016-7976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7976">CVE-2016-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7978">CVE-2016-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5951">CVE-2017-5951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9216">CVE-2017-9216 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15908">CVE-2018-15908 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15909">CVE-2018-15909 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15911">CVE-2018-15911 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16510">CVE-2018-16510 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16513">CVE-2018-16513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16539">CVE-2018-16539 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16543">CVE-2018-16543 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16585">CVE-2018-16585 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16802">CVE-2018-16802 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17961">CVE-2018-17961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18073">CVE-2018-18073 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18284">CVE-2018-18284 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19409">CVE-2018-19409 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19475">CVE-2018-19475 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19476">CVE-2018-19476 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19477">CVE-2018-19477 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6616">CVE-2018-6616 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10216">CVE-2019-10216 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6116">CVE-2019-6116 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16305/">CVE-2020-16305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16305">CVE-2020-16305 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45944/">CVE-2021-45944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45944">CVE-2021-45944 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45949/">CVE-2021-45949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45949">CVE-2021-45949 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28879/">CVE-2023-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28879">CVE-2023-28879 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36664/">CVE-2023-36664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36664">CVE-2023-36664 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38559/">CVE-2023-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38559">CVE-2023-38559 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43115/">CVE-2023-43115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115">CVE-2023-43115 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46751/">CVE-2023-46751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46751">CVE-2023-46751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52722/">CVE-2023-52722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52722">CVE-2023-52722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-29510/">CVE-2024-29510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29510">CVE-2024-29510 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-33869/">CVE-2024-33869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33869">CVE-2024-33869 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33870/">CVE-2024-33870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33870">CVE-2024-33870 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46951/">CVE-2024-46951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46951">CVE-2024-46951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46952/">CVE-2024-46952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46952">CVE-2024-46952 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46953/">CVE-2024-46953 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46953">CVE-2024-46953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46954/">CVE-2024-46954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46954">CVE-2024-46954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46955/">CVE-2024-46955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46955">CVE-2024-46955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46956/">CVE-2024-46956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46956">CVE-2024-46956 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-27830/">CVE-2025-27830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27830">CVE-2025-27830 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27831/">CVE-2025-27831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27831">CVE-2025-27831 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27832/">CVE-2025-27832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27832">CVE-2025-27832 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27833/">CVE-2025-27833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27833">CVE-2025-27833 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27834/">CVE-2025-27834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27834">CVE-2025-27834 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27835/">CVE-2025-27835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27835">CVE-2025-27835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-27836/">CVE-2025-27836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27836">CVE-2025-27836 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-27837/">CVE-2025-27837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27837">CVE-2025-27837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026927" comment="ghostscript-10.05.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026928" comment="ghostscript-devel-10.05.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026929" comment="ghostscript-x11-10.05.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93831" version="1" class="patch">
	<metadata>
		<title>giflib-devel-5.2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="CVE-2018-11490" ref_url="https://www.suse.com/security/cve/CVE-2018-11490/" source="CVE"/>
		<reference ref_id="CVE-2019-15133" ref_url="https://www.suse.com/security/cve/CVE-2019-15133/" source="CVE"/>
		<reference ref_id="CVE-2021-40633" ref_url="https://www.suse.com/security/cve/CVE-2021-40633/" source="CVE"/>
		<reference ref_id="CVE-2022-28506" ref_url="https://www.suse.com/security/cve/CVE-2022-28506/" source="CVE"/>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-devel-5.2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7555">CVE-2015-7555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3977">CVE-2016-3977 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11490/">CVE-2018-11490 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11490">CVE-2018-11490 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15133/">CVE-2019-15133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15133">CVE-2019-15133 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-40633/">CVE-2021-40633 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40633">CVE-2021-40633 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-28506/">CVE-2022-28506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28506">CVE-2022-28506 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026930" comment="giflib-devel-5.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026931" comment="giflib-progs-5.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026932" comment="libgif7-5.2.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93832" version="1" class="patch">
	<metadata>
		<title>git-2.51.0-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2011-2186" ref_url="https://www.suse.com/security/cve/CVE-2011-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<reference ref_id="CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867/" source="CVE"/>
		<reference ref_id="CVE-2017-15298" ref_url="https://www.suse.com/security/cve/CVE-2017-15298/" source="CVE"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-19486" ref_url="https://www.suse.com/security/cve/CVE-2018-19486/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521/" source="CVE"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260/" source="CVE"/>
		<reference ref_id="CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903/" source="CVE"/>
		<reference ref_id="CVE-2023-22490" ref_url="https://www.suse.com/security/cve/CVE-2023-22490/" source="CVE"/>
		<reference ref_id="CVE-2023-23946" ref_url="https://www.suse.com/security/cve/CVE-2023-23946/" source="CVE"/>
		<reference ref_id="CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652/" source="CVE"/>
		<reference ref_id="CVE-2023-25815" ref_url="https://www.suse.com/security/cve/CVE-2023-25815/" source="CVE"/>
		<reference ref_id="CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007/" source="CVE"/>
		<reference ref_id="CVE-2024-24577" ref_url="https://www.suse.com/security/cve/CVE-2024-24577/" source="CVE"/>
		<reference ref_id="CVE-2024-32002" ref_url="https://www.suse.com/security/cve/CVE-2024-32002/" source="CVE"/>
		<reference ref_id="CVE-2024-32004" ref_url="https://www.suse.com/security/cve/CVE-2024-32004/" source="CVE"/>
		<reference ref_id="CVE-2024-32020" ref_url="https://www.suse.com/security/cve/CVE-2024-32020/" source="CVE"/>
		<reference ref_id="CVE-2024-32021" ref_url="https://www.suse.com/security/cve/CVE-2024-32021/" source="CVE"/>
		<reference ref_id="CVE-2024-32465" ref_url="https://www.suse.com/security/cve/CVE-2024-32465/" source="CVE"/>
		<reference ref_id="CVE-2024-50349" ref_url="https://www.suse.com/security/cve/CVE-2024-50349/" source="CVE"/>
		<reference ref_id="CVE-2024-52006" ref_url="https://www.suse.com/security/cve/CVE-2024-52006/" source="CVE"/>
		<reference ref_id="CVE-2025-27613" ref_url="https://www.suse.com/security/cve/CVE-2025-27613/" source="CVE"/>
		<reference ref_id="CVE-2025-27614" ref_url="https://www.suse.com/security/cve/CVE-2025-27614/" source="CVE"/>
		<reference ref_id="CVE-2025-46334" ref_url="https://www.suse.com/security/cve/CVE-2025-46334/" source="CVE"/>
		<reference ref_id="CVE-2025-46835" ref_url="https://www.suse.com/security/cve/CVE-2025-46835/" source="CVE"/>
		<reference ref_id="CVE-2025-48384" ref_url="https://www.suse.com/security/cve/CVE-2025-48384/" source="CVE"/>
		<reference ref_id="CVE-2025-48385" ref_url="https://www.suse.com/security/cve/CVE-2025-48385/" source="CVE"/>
		<reference ref_id="CVE-2025-48386" ref_url="https://www.suse.com/security/cve/CVE-2025-48386/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.51.0-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2005-4900">CVE-2005-4900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2186/">CVE-2011-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2186">CVE-2011-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9390">CVE-2014-9390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2315">CVE-2016-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2324">CVE-2016-2324 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000117">CVE-2017-1000117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14867">CVE-2017-14867 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15298/">CVE-2017-15298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15298">CVE-2017-15298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8386">CVE-2017-8386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11233">CVE-2018-11233 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19486/">CVE-2018-19486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19486">CVE-2018-19486 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19604">CVE-2019-19604 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22490/">CVE-2023-22490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23946/">CVE-2023-23946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-25815/">CVE-2023-25815 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24577/">CVE-2024-24577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24577">CVE-2024-24577 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32002/">CVE-2024-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32004/">CVE-2024-32004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32020/">CVE-2024-32020 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32021/">CVE-2024-32021 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32465/">CVE-2024-32465 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-50349/">CVE-2024-50349 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50349">CVE-2024-50349 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-52006/">CVE-2024-52006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52006">CVE-2024-52006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27613/">CVE-2025-27613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27613">CVE-2025-27613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27614/">CVE-2025-27614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27614">CVE-2025-27614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46334/">CVE-2025-46334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46334">CVE-2025-46334 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46835/">CVE-2025-46835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46835">CVE-2025-46835 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48384/">CVE-2025-48384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48384">CVE-2025-48384 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48385/">CVE-2025-48385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48385">CVE-2025-48385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48386/">CVE-2025-48386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48386">CVE-2025-48386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026933" comment="git-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026934" comment="git-arch-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026935" comment="git-core-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026936" comment="git-credential-libsecret-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026937" comment="git-daemon-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026938" comment="git-doc-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026939" comment="git-email-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026940" comment="git-gui-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026941" comment="git-p4-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026942" comment="git-web-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026943" comment="gitk-2.51.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026944" comment="perl-Git-2.51.0-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93833" version="1" class="patch">
	<metadata>
		<title>glib-networking-2.80.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<description>
These are all security issues fixed in the glib-networking-2.80.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026945" comment="glib-networking-2.80.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026946" comment="glib-networking-lang-2.80.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93834" version="1" class="patch">
	<metadata>
		<title>glib2-devel-2.84.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="CVE-2020-6750" ref_url="https://www.suse.com/security/cve/CVE-2020-6750/" source="CVE"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="CVE-2023-24593" ref_url="https://www.suse.com/security/cve/CVE-2023-24593/" source="CVE"/>
		<reference ref_id="CVE-2023-25180" ref_url="https://www.suse.com/security/cve/CVE-2023-25180/" source="CVE"/>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<reference ref_id="CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533/" source="CVE"/>
		<reference ref_id="CVE-2025-3360" ref_url="https://www.suse.com/security/cve/CVE-2025-3360/" source="CVE"/>
		<reference ref_id="CVE-2025-6052" ref_url="https://www.suse.com/security/cve/CVE-2025-6052/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-devel-2.84.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2371">CVE-2008-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6750/">CVE-2020-6750 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6750">CVE-2020-6750 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24593/">CVE-2023-24593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-24593">CVE-2023-24593 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25180/">CVE-2023-25180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25180">CVE-2023-25180 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3360/">CVE-2025-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3360">CVE-2025-3360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6052/">CVE-2025-6052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6052">CVE-2025-6052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026947" comment="glib2-devel-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026948" comment="glib2-devel-static-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026949" comment="glib2-doc-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026950" comment="glib2-lang-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026951" comment="glib2-tools-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026952" comment="libgio-2_0-0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026953" comment="libgirepository-2_0-0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026954" comment="libglib-2_0-0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026955" comment="libgmodule-2_0-0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026956" comment="libgobject-2_0-0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026957" comment="libgthread-2_0-0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026958" comment="typelib-1_0-GIRepository-3_0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026959" comment="typelib-1_0-GLib-2_0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026960" comment="typelib-1_0-GLibUnix-2_0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026961" comment="typelib-1_0-GModule-2_0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026962" comment="typelib-1_0-GObject-2_0-2.84.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026963" comment="typelib-1_0-Gio-2_0-2.84.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93835" version="1" class="patch">
	<metadata>
		<title>glibc-2.40-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2009-5064" ref_url="https://www.suse.com/security/cve/CVE-2009-5064/" source="CVE"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-19591" ref_url="https://www.suse.com/security/cve/CVE-2018-19591/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2019-7309" ref_url="https://www.suse.com/security/cve/CVE-2019-7309/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751/" source="CVE"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2020-6096" ref_url="https://www.suse.com/security/cve/CVE-2020-6096/" source="CVE"/>
		<reference ref_id="CVE-2021-27645" ref_url="https://www.suse.com/security/cve/CVE-2021-27645/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="CVE-2021-3998" ref_url="https://www.suse.com/security/cve/CVE-2021-3998/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="CVE-2022-39046" ref_url="https://www.suse.com/security/cve/CVE-2022-39046/" source="CVE"/>
		<reference ref_id="CVE-2023-25139" ref_url="https://www.suse.com/security/cve/CVE-2023-25139/" source="CVE"/>
		<reference ref_id="CVE-2023-4527" ref_url="https://www.suse.com/security/cve/CVE-2023-4527/" source="CVE"/>
		<reference ref_id="CVE-2023-4806" ref_url="https://www.suse.com/security/cve/CVE-2023-4806/" source="CVE"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<reference ref_id="CVE-2023-4911" ref_url="https://www.suse.com/security/cve/CVE-2023-4911/" source="CVE"/>
		<reference ref_id="CVE-2023-5156" ref_url="https://www.suse.com/security/cve/CVE-2023-5156/" source="CVE"/>
		<reference ref_id="CVE-2023-6246" ref_url="https://www.suse.com/security/cve/CVE-2023-6246/" source="CVE"/>
		<reference ref_id="CVE-2023-6779" ref_url="https://www.suse.com/security/cve/CVE-2023-6779/" source="CVE"/>
		<reference ref_id="CVE-2023-6780" ref_url="https://www.suse.com/security/cve/CVE-2023-6780/" source="CVE"/>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<reference ref_id="CVE-2025-5702" ref_url="https://www.suse.com/security/cve/CVE-2025-5702/" source="CVE"/>
		<reference ref_id="CVE-2025-5745" ref_url="https://www.suse.com/security/cve/CVE-2025-5745/" source="CVE"/>
		<reference ref_id="CVE-2025-8058" ref_url="https://www.suse.com/security/cve/CVE-2025-8058/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.40-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5029">CVE-2009-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5064/">CVE-2009-5064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5064">CVE-2009-5064 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3192">CVE-2010-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3406">CVE-2012-3406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4412">CVE-2012-4412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0242">CVE-2013-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1914">CVE-2013-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2207">CVE-2013-2207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4237">CVE-2013-4237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4332">CVE-2013-4332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4043">CVE-2014-4043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1473">CVE-2015-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8985">CVE-2015-8985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5417">CVE-2016-5417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6323">CVE-2016-6323 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000408">CVE-2017-1000408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000409">CVE-2017-1000409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15671">CVE-2017-15671 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16997">CVE-2017-16997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17426">CVE-2017-17426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18269">CVE-2017-18269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11237">CVE-2018-11237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19591/">CVE-2018-19591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19591">CVE-2018-19591 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6551">CVE-2018-6551 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7309/">CVE-2019-7309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309">CVE-2019-7309 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">CVE-2020-1751 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6096/">CVE-2020-6096 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096">CVE-2020-6096 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27645/">CVE-2021-27645 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3998/">CVE-2021-3998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3998">CVE-2021-3998 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39046/">CVE-2022-39046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39046">CVE-2022-39046 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25139/">CVE-2023-25139 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25139">CVE-2023-25139 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4527/">CVE-2023-4527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4806/">CVE-2023-4806 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4911/">CVE-2023-4911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5156/">CVE-2023-5156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5156">CVE-2023-5156 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6246/">CVE-2023-6246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6779/">CVE-2023-6779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6780/">CVE-2023-6780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6780">CVE-2023-6780 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5702/">CVE-2025-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5702">CVE-2025-5702 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5745/">CVE-2025-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5745">CVE-2025-5745 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-8058/">CVE-2025-8058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026964" comment="glibc-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026965" comment="glibc-devel-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026966" comment="glibc-devel-static-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026967" comment="glibc-extra-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026968" comment="glibc-gconv-modules-extra-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026969" comment="glibc-html-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026970" comment="glibc-i18ndata-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026971" comment="glibc-info-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026972" comment="glibc-lang-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026973" comment="glibc-locale-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026974" comment="glibc-locale-base-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026975" comment="glibc-profile-2.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026976" comment="glibc-utils-2.40-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93836" version="1" class="patch">
	<metadata>
		<title>gmp-devel-6.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
These are all security issues fixed in the gmp-devel-6.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026977" comment="gmp-devel-6.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026978" comment="libgmp10-6.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026979" comment="libgmpxx4-6.3.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93837" version="1" class="patch">
	<metadata>
		<title>gnome-autoar-devel-0.4.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-36241" ref_url="https://www.suse.com/security/cve/CVE-2020-36241/" source="CVE"/>
		<reference ref_id="CVE-2021-28650" ref_url="https://www.suse.com/security/cve/CVE-2021-28650/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-autoar-devel-0.4.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36241/">CVE-2020-36241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36241">CVE-2020-36241 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-28650/">CVE-2021-28650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28650">CVE-2021-28650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026980" comment="gnome-autoar-devel-0.4.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026981" comment="libgnome-autoar-0-0-0.4.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026982" comment="libgnome-autoar-gtk-0-0-0.4.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026983" comment="typelib-1_0-GnomeAutoar-0_1-0.4.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026984" comment="typelib-1_0-GnomeAutoarGtk-0_1-0.4.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93838" version="1" class="patch">
	<metadata>
		<title>gnome-desktop-lang-44.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-11460" ref_url="https://www.suse.com/security/cve/CVE-2019-11460/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-desktop-lang-44.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11460/">CVE-2019-11460 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11460">CVE-2019-11460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026985" comment="gnome-desktop-lang-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026986" comment="libgnome-desktop-3-20-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026987" comment="libgnome-desktop-3-devel-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026988" comment="libgnome-desktop-3_0-common-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026989" comment="libgnome-desktop-4-2-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026990" comment="libgnome-desktop-4-devel-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026991" comment="typelib-1_0-GnomeBG-4_0-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026992" comment="typelib-1_0-GnomeDesktop-3_0-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026993" comment="typelib-1_0-GnomeDesktop-4_0-44.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026994" comment="typelib-1_0-GnomeRR-4_0-44.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93839" version="1" class="patch">
	<metadata>
		<title>gnome-extensions-48.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489/" source="CVE"/>
		<reference ref_id="CVE-2023-43090" ref_url="https://www.suse.com/security/cve/CVE-2023-43090/" source="CVE"/>
		<reference ref_id="CVE-2024-36472" ref_url="https://www.suse.com/security/cve/CVE-2024-36472/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-extensions-48.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4000">CVE-2010-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8288">CVE-2017-8288 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3820">CVE-2019-3820 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17489">CVE-2020-17489 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43090/">CVE-2023-43090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43090">CVE-2023-43090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36472/">CVE-2024-36472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36472">CVE-2024-36472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026995" comment="gnome-extensions-48.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026996" comment="gnome-shell-48.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026997" comment="gnome-shell-devel-48.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010026998" comment="gnome-shell-lang-48.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93840" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-48.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-48.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3466">CVE-2012-3466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010026999" comment="gnome-keyring-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027000" comment="gnome-keyring-lang-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027001" comment="gnome-keyring-pam-48.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027002" comment="libgck-modules-gnome-keyring-48.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93841" version="1" class="patch">
	<metadata>
		<title>gnome-remote-desktop-48.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-5148" ref_url="https://www.suse.com/security/cve/CVE-2024-5148/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-remote-desktop-48.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5148/">CVE-2024-5148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5148">CVE-2024-5148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027003" comment="gnome-remote-desktop-48.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027004" comment="gnome-remote-desktop-lang-48.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93842" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-48.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<reference ref_id="CVE-2024-38394" ref_url="https://www.suse.com/security/cve/CVE-2024-38394/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-48.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7300">CVE-2014-7300 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38394/">CVE-2024-38394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38394">CVE-2024-38394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027005" comment="gnome-settings-daemon-48.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027006" comment="gnome-settings-daemon-devel-48.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027007" comment="gnome-settings-daemon-lang-48.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93843" version="1" class="patch">
	<metadata>
		<title>gnutls-3.8.10-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829/" source="CVE"/>
		<reference ref_id="CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836/" source="CVE"/>
		<reference ref_id="CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777/" source="CVE"/>
		<reference ref_id="CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231/" source="CVE"/>
		<reference ref_id="CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232/" source="CVE"/>
		<reference ref_id="CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509/" source="CVE"/>
		<reference ref_id="CVE-2023-0361" ref_url="https://www.suse.com/security/cve/CVE-2023-0361/" source="CVE"/>
		<reference ref_id="CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981/" source="CVE"/>
		<reference ref_id="CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553/" source="CVE"/>
		<reference ref_id="CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567/" source="CVE"/>
		<reference ref_id="CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133/" source="CVE"/>
		<reference ref_id="CVE-2024-12243" ref_url="https://www.suse.com/security/cve/CVE-2024-12243/" source="CVE"/>
		<reference ref_id="CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834/" source="CVE"/>
		<reference ref_id="CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835/" source="CVE"/>
		<reference ref_id="CVE-2025-32988" ref_url="https://www.suse.com/security/cve/CVE-2025-32988/" source="CVE"/>
		<reference ref_id="CVE-2025-32989" ref_url="https://www.suse.com/security/cve/CVE-2025-32989/" source="CVE"/>
		<reference ref_id="CVE-2025-32990" ref_url="https://www.suse.com/security/cve/CVE-2025-32990/" source="CVE"/>
		<reference ref_id="CVE-2025-6395" ref_url="https://www.suse.com/security/cve/CVE-2025-6395/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.8.10-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4790">CVE-2006-4790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1948">CVE-2008-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1949">CVE-2008-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1950">CVE-2008-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4128">CVE-2011-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0390">CVE-2012-0390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1569">CVE-2012-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1573">CVE-2012-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0092">CVE-2014-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1959">CVE-2014-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8564">CVE-2014-8564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6251">CVE-2015-6251 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10790">CVE-2017-10790 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10844">CVE-2018-10844 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10845">CVE-2018-10845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3829">CVE-2019-3829 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3836">CVE-2019-3836 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13777">CVE-2020-13777 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0361/">CVE-2023-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12243/">CVE-2024-12243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32988/">CVE-2025-32988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32989/">CVE-2025-32989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32989">CVE-2025-32989 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32990/">CVE-2025-32990 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6395/">CVE-2025-6395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6395">CVE-2025-6395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027008" comment="gnutls-3.8.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027009" comment="libgnutls-devel-3.8.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027010" comment="libgnutls30-3.8.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027011" comment="libgnutlsxx-devel-3.8.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027012" comment="libgnutlsxx30-3.8.10-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93844" version="1" class="patch">
	<metadata>
		<title>go-1.24-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-7189" ref_url="https://www.suse.com/security/cve/CVE-2014-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-8618" ref_url="https://www.suse.com/security/cve/CVE-2015-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-3959" ref_url="https://www.suse.com/security/cve/CVE-2016-3959/" source="CVE"/>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<reference ref_id="CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574/" source="CVE"/>
		<reference ref_id="CVE-2018-7187" ref_url="https://www.suse.com/security/cve/CVE-2018-7187/" source="CVE"/>
		<reference ref_id="CVE-2019-6486" ref_url="https://www.suse.com/security/cve/CVE-2019-6486/" source="CVE"/>
		<description>
These are all security issues fixed in the go-1.24-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7189/">CVE-2014-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7189">CVE-2014-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8618/">CVE-2015-8618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8618">CVE-2015-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3959/">CVE-2016-3959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3959">CVE-2016-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7187/">CVE-2018-7187 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7187">CVE-2018-7187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6486/">CVE-2019-6486 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6486">CVE-2019-6486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027013" comment="go-1.24-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027014" comment="go-doc-1.24-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027015" comment="go-race-1.24-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93845" version="1" class="patch">
	<metadata>
		<title>go1.24-1.24.6-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45340" ref_url="https://www.suse.com/security/cve/CVE-2024-45340/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<reference ref_id="CVE-2025-0913" ref_url="https://www.suse.com/security/cve/CVE-2025-0913/" source="CVE"/>
		<reference ref_id="CVE-2025-22865" ref_url="https://www.suse.com/security/cve/CVE-2025-22865/" source="CVE"/>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<reference ref_id="CVE-2025-22867" ref_url="https://www.suse.com/security/cve/CVE-2025-22867/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<reference ref_id="CVE-2025-22873" ref_url="https://www.suse.com/security/cve/CVE-2025-22873/" source="CVE"/>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<reference ref_id="CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673/" source="CVE"/>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.24-1.24.6-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-45340/">CVE-2024-45340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45340">CVE-2024-45340 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0913/">CVE-2025-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0913">CVE-2025-0913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-22865/">CVE-2025-22865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22865">CVE-2025-22865 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-22867/">CVE-2025-22867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22867">CVE-2025-22867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22873/">CVE-2025-22873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22873">CVE-2025-22873 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027016" comment="go1.24-1.24.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027017" comment="go1.24-doc-1.24.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027018" comment="go1.24-libstd-1.24.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027019" comment="go1.24-openssl-1.24.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027020" comment="go1.24-openssl-race-1.24.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027021" comment="go1.24-race-1.24.6-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93846" version="1" class="patch">
	<metadata>
		<title>go1.25-1.25.0-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
These are all security issues fixed in the go1.25-1.25.0-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027022" comment="go1.25-1.25.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027023" comment="go1.25-doc-1.25.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027024" comment="go1.25-libstd-1.25.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027025" comment="go1.25-race-1.25.0-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93847" version="1" class="patch">
	<metadata>
		<title>golang-github-prometheus-prometheus-2.53.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2021-29622" ref_url="https://www.suse.com/security/cve/CVE-2021-29622/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<description>
These are all security issues fixed in the golang-github-prometheus-prometheus-2.53.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29622/">CVE-2021-29622 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29622">CVE-2021-29622 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027026" comment="golang-github-prometheus-prometheus-2.53.4-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93848" version="1" class="patch">
	<metadata>
		<title>google-cloud-sap-agent-3.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the google-cloud-sap-agent-3.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027027" comment="google-cloud-sap-agent-3.8-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93849" version="1" class="patch">
	<metadata>
		<title>google-gson-2.8.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-25647" ref_url="https://www.suse.com/security/cve/CVE-2022-25647/" source="CVE"/>
		<description>
These are all security issues fixed in the google-gson-2.8.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25647/">CVE-2022-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25647">CVE-2022-25647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027028" comment="google-gson-2.8.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027029" comment="google-gson-javadoc-2.8.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93850" version="1" class="patch">
	<metadata>
		<title>google-guest-agent-20250116.00-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the google-guest-agent-20250116.00-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027030" comment="google-guest-agent-20250116.00-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93851" version="1" class="patch">
	<metadata>
		<title>google-osconfig-agent-20250416.02-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<reference ref_id="CVE-2024-45339" ref_url="https://www.suse.com/security/cve/CVE-2024-45339/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<description>
These are all security issues fixed in the google-osconfig-agent-20250416.02-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45339/">CVE-2024-45339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45339">CVE-2024-45339 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027031" comment="google-osconfig-agent-20250416.02-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93852" version="1" class="patch">
	<metadata>
		<title>govulncheck-vulndb-0.0.20250814T182633-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-7561" ref_url="https://www.suse.com/security/cve/CVE-2015-7561/" source="CVE"/>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2017-1000056" ref_url="https://www.suse.com/security/cve/CVE-2017-1000056/" source="CVE"/>
		<reference ref_id="CVE-2017-1002102" ref_url="https://www.suse.com/security/cve/CVE-2017-1002102/" source="CVE"/>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2017-9232" ref_url="https://www.suse.com/security/cve/CVE-2017-9232/" source="CVE"/>
		<reference ref_id="CVE-2018-1002100" ref_url="https://www.suse.com/security/cve/CVE-2018-1002100/" source="CVE"/>
		<reference ref_id="CVE-2018-1002101" ref_url="https://www.suse.com/security/cve/CVE-2018-1002101/" source="CVE"/>
		<reference ref_id="CVE-2018-16733" ref_url="https://www.suse.com/security/cve/CVE-2018-16733/" source="CVE"/>
		<reference ref_id="CVE-2018-19184" ref_url="https://www.suse.com/security/cve/CVE-2018-19184/" source="CVE"/>
		<reference ref_id="CVE-2019-1002100" ref_url="https://www.suse.com/security/cve/CVE-2019-1002100/" source="CVE"/>
		<reference ref_id="CVE-2019-1002101" ref_url="https://www.suse.com/security/cve/CVE-2019-1002101/" source="CVE"/>
		<reference ref_id="CVE-2019-11243" ref_url="https://www.suse.com/security/cve/CVE-2019-11243/" source="CVE"/>
		<reference ref_id="CVE-2019-11245" ref_url="https://www.suse.com/security/cve/CVE-2019-11245/" source="CVE"/>
		<reference ref_id="CVE-2019-11251" ref_url="https://www.suse.com/security/cve/CVE-2019-11251/" source="CVE"/>
		<reference ref_id="CVE-2019-11253" ref_url="https://www.suse.com/security/cve/CVE-2019-11253/" source="CVE"/>
		<reference ref_id="CVE-2019-15119" ref_url="https://www.suse.com/security/cve/CVE-2019-15119/" source="CVE"/>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="CVE-2020-26240" ref_url="https://www.suse.com/security/cve/CVE-2020-26240/" source="CVE"/>
		<reference ref_id="CVE-2020-26241" ref_url="https://www.suse.com/security/cve/CVE-2020-26241/" source="CVE"/>
		<reference ref_id="CVE-2020-36846" ref_url="https://www.suse.com/security/cve/CVE-2020-36846/" source="CVE"/>
		<reference ref_id="CVE-2020-8551" ref_url="https://www.suse.com/security/cve/CVE-2020-8551/" source="CVE"/>
		<reference ref_id="CVE-2020-8555" ref_url="https://www.suse.com/security/cve/CVE-2020-8555/" source="CVE"/>
		<reference ref_id="CVE-2020-8557" ref_url="https://www.suse.com/security/cve/CVE-2020-8557/" source="CVE"/>
		<reference ref_id="CVE-2020-8558" ref_url="https://www.suse.com/security/cve/CVE-2020-8558/" source="CVE"/>
		<reference ref_id="CVE-2020-8562" ref_url="https://www.suse.com/security/cve/CVE-2020-8562/" source="CVE"/>
		<reference ref_id="CVE-2020-8563" ref_url="https://www.suse.com/security/cve/CVE-2020-8563/" source="CVE"/>
		<reference ref_id="CVE-2020-8566" ref_url="https://www.suse.com/security/cve/CVE-2020-8566/" source="CVE"/>
		<reference ref_id="CVE-2020-8911" ref_url="https://www.suse.com/security/cve/CVE-2020-8911/" source="CVE"/>
		<reference ref_id="CVE-2020-8912" ref_url="https://www.suse.com/security/cve/CVE-2020-8912/" source="CVE"/>
		<reference ref_id="CVE-2021-21411" ref_url="https://www.suse.com/security/cve/CVE-2021-21411/" source="CVE"/>
		<reference ref_id="CVE-2021-25735" ref_url="https://www.suse.com/security/cve/CVE-2021-25735/" source="CVE"/>
		<reference ref_id="CVE-2021-25736" ref_url="https://www.suse.com/security/cve/CVE-2021-25736/" source="CVE"/>
		<reference ref_id="CVE-2021-25737" ref_url="https://www.suse.com/security/cve/CVE-2021-25737/" source="CVE"/>
		<reference ref_id="CVE-2021-25741" ref_url="https://www.suse.com/security/cve/CVE-2021-25741/" source="CVE"/>
		<reference ref_id="CVE-2021-25743" ref_url="https://www.suse.com/security/cve/CVE-2021-25743/" source="CVE"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<reference ref_id="CVE-2022-29177" ref_url="https://www.suse.com/security/cve/CVE-2022-29177/" source="CVE"/>
		<reference ref_id="CVE-2022-31022" ref_url="https://www.suse.com/security/cve/CVE-2022-31022/" source="CVE"/>
		<reference ref_id="CVE-2022-3162" ref_url="https://www.suse.com/security/cve/CVE-2022-3162/" source="CVE"/>
		<reference ref_id="CVE-2022-31668" ref_url="https://www.suse.com/security/cve/CVE-2022-31668/" source="CVE"/>
		<reference ref_id="CVE-2022-3294" ref_url="https://www.suse.com/security/cve/CVE-2022-3294/" source="CVE"/>
		<reference ref_id="CVE-2022-45157" ref_url="https://www.suse.com/security/cve/CVE-2022-45157/" source="CVE"/>
		<reference ref_id="CVE-2022-47930" ref_url="https://www.suse.com/security/cve/CVE-2022-47930/" source="CVE"/>
		<reference ref_id="CVE-2023-0109" ref_url="https://www.suse.com/security/cve/CVE-2023-0109/" source="CVE"/>
		<reference ref_id="CVE-2023-22644" ref_url="https://www.suse.com/security/cve/CVE-2023-22644/" source="CVE"/>
		<reference ref_id="CVE-2023-2431" ref_url="https://www.suse.com/security/cve/CVE-2023-2431/" source="CVE"/>
		<reference ref_id="CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809/" source="CVE"/>
		<reference ref_id="CVE-2023-26248" ref_url="https://www.suse.com/security/cve/CVE-2023-26248/" source="CVE"/>
		<reference ref_id="CVE-2023-2727" ref_url="https://www.suse.com/security/cve/CVE-2023-2727/" source="CVE"/>
		<reference ref_id="CVE-2023-2728" ref_url="https://www.suse.com/security/cve/CVE-2023-2728/" source="CVE"/>
		<reference ref_id="CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561/" source="CVE"/>
		<reference ref_id="CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642/" source="CVE"/>
		<reference ref_id="CVE-2023-32197" ref_url="https://www.suse.com/security/cve/CVE-2023-32197/" source="CVE"/>
		<reference ref_id="CVE-2023-32198" ref_url="https://www.suse.com/security/cve/CVE-2023-32198/" source="CVE"/>
		<reference ref_id="CVE-2023-3676" ref_url="https://www.suse.com/security/cve/CVE-2023-3676/" source="CVE"/>
		<reference ref_id="CVE-2023-3955" ref_url="https://www.suse.com/security/cve/CVE-2023-3955/" source="CVE"/>
		<reference ref_id="CVE-2023-42818" ref_url="https://www.suse.com/security/cve/CVE-2023-42818/" source="CVE"/>
		<reference ref_id="CVE-2023-5528" ref_url="https://www.suse.com/security/cve/CVE-2023-5528/" source="CVE"/>
		<reference ref_id="CVE-2024-0132" ref_url="https://www.suse.com/security/cve/CVE-2024-0132/" source="CVE"/>
		<reference ref_id="CVE-2024-0133" ref_url="https://www.suse.com/security/cve/CVE-2024-0133/" source="CVE"/>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<reference ref_id="CVE-2024-10005" ref_url="https://www.suse.com/security/cve/CVE-2024-10005/" source="CVE"/>
		<reference ref_id="CVE-2024-10006" ref_url="https://www.suse.com/security/cve/CVE-2024-10006/" source="CVE"/>
		<reference ref_id="CVE-2024-10086" ref_url="https://www.suse.com/security/cve/CVE-2024-10086/" source="CVE"/>
		<reference ref_id="CVE-2024-10214" ref_url="https://www.suse.com/security/cve/CVE-2024-10214/" source="CVE"/>
		<reference ref_id="CVE-2024-10220" ref_url="https://www.suse.com/security/cve/CVE-2024-10220/" source="CVE"/>
		<reference ref_id="CVE-2024-10241" ref_url="https://www.suse.com/security/cve/CVE-2024-10241/" source="CVE"/>
		<reference ref_id="CVE-2024-10389" ref_url="https://www.suse.com/security/cve/CVE-2024-10389/" source="CVE"/>
		<reference ref_id="CVE-2024-10452" ref_url="https://www.suse.com/security/cve/CVE-2024-10452/" source="CVE"/>
		<reference ref_id="CVE-2024-10846" ref_url="https://www.suse.com/security/cve/CVE-2024-10846/" source="CVE"/>
		<reference ref_id="CVE-2024-10975" ref_url="https://www.suse.com/security/cve/CVE-2024-10975/" source="CVE"/>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<reference ref_id="CVE-2024-11741" ref_url="https://www.suse.com/security/cve/CVE-2024-11741/" source="CVE"/>
		<reference ref_id="CVE-2024-12055" ref_url="https://www.suse.com/security/cve/CVE-2024-12055/" source="CVE"/>
		<reference ref_id="CVE-2024-12289" ref_url="https://www.suse.com/security/cve/CVE-2024-12289/" source="CVE"/>
		<reference ref_id="CVE-2024-12401" ref_url="https://www.suse.com/security/cve/CVE-2024-12401/" source="CVE"/>
		<reference ref_id="CVE-2024-12678" ref_url="https://www.suse.com/security/cve/CVE-2024-12678/" source="CVE"/>
		<reference ref_id="CVE-2024-12886" ref_url="https://www.suse.com/security/cve/CVE-2024-12886/" source="CVE"/>
		<reference ref_id="CVE-2024-13484" ref_url="https://www.suse.com/security/cve/CVE-2024-13484/" source="CVE"/>
		<reference ref_id="CVE-2024-1725" ref_url="https://www.suse.com/security/cve/CVE-2024-1725/" source="CVE"/>
		<reference ref_id="CVE-2024-22030" ref_url="https://www.suse.com/security/cve/CVE-2024-22030/" source="CVE"/>
		<reference ref_id="CVE-2024-22031" ref_url="https://www.suse.com/security/cve/CVE-2024-22031/" source="CVE"/>
		<reference ref_id="CVE-2024-22036" ref_url="https://www.suse.com/security/cve/CVE-2024-22036/" source="CVE"/>
		<reference ref_id="CVE-2024-24425" ref_url="https://www.suse.com/security/cve/CVE-2024-24425/" source="CVE"/>
		<reference ref_id="CVE-2024-24426" ref_url="https://www.suse.com/security/cve/CVE-2024-24426/" source="CVE"/>
		<reference ref_id="CVE-2024-25131" ref_url="https://www.suse.com/security/cve/CVE-2024-25131/" source="CVE"/>
		<reference ref_id="CVE-2024-25132" ref_url="https://www.suse.com/security/cve/CVE-2024-25132/" source="CVE"/>
		<reference ref_id="CVE-2024-25133" ref_url="https://www.suse.com/security/cve/CVE-2024-25133/" source="CVE"/>
		<reference ref_id="CVE-2024-28053" ref_url="https://www.suse.com/security/cve/CVE-2024-28053/" source="CVE"/>
		<reference ref_id="CVE-2024-28892" ref_url="https://www.suse.com/security/cve/CVE-2024-28892/" source="CVE"/>
		<reference ref_id="CVE-2024-33662" ref_url="https://www.suse.com/security/cve/CVE-2024-33662/" source="CVE"/>
		<reference ref_id="CVE-2024-35177" ref_url="https://www.suse.com/security/cve/CVE-2024-35177/" source="CVE"/>
		<reference ref_id="CVE-2024-36402" ref_url="https://www.suse.com/security/cve/CVE-2024-36402/" source="CVE"/>
		<reference ref_id="CVE-2024-36403" ref_url="https://www.suse.com/security/cve/CVE-2024-36403/" source="CVE"/>
		<reference ref_id="CVE-2024-36620" ref_url="https://www.suse.com/security/cve/CVE-2024-36620/" source="CVE"/>
		<reference ref_id="CVE-2024-36621" ref_url="https://www.suse.com/security/cve/CVE-2024-36621/" source="CVE"/>
		<reference ref_id="CVE-2024-36623" ref_url="https://www.suse.com/security/cve/CVE-2024-36623/" source="CVE"/>
		<reference ref_id="CVE-2024-36814" ref_url="https://www.suse.com/security/cve/CVE-2024-36814/" source="CVE"/>
		<reference ref_id="CVE-2024-37032" ref_url="https://www.suse.com/security/cve/CVE-2024-37032/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-37820" ref_url="https://www.suse.com/security/cve/CVE-2024-37820/" source="CVE"/>
		<reference ref_id="CVE-2024-38365" ref_url="https://www.suse.com/security/cve/CVE-2024-38365/" source="CVE"/>
		<reference ref_id="CVE-2024-39223" ref_url="https://www.suse.com/security/cve/CVE-2024-39223/" source="CVE"/>
		<reference ref_id="CVE-2024-39720" ref_url="https://www.suse.com/security/cve/CVE-2024-39720/" source="CVE"/>
		<reference ref_id="CVE-2024-40120" ref_url="https://www.suse.com/security/cve/CVE-2024-40120/" source="CVE"/>
		<reference ref_id="CVE-2024-40635" ref_url="https://www.suse.com/security/cve/CVE-2024-40635/" source="CVE"/>
		<reference ref_id="CVE-2024-43784" ref_url="https://www.suse.com/security/cve/CVE-2024-43784/" source="CVE"/>
		<reference ref_id="CVE-2024-43803" ref_url="https://www.suse.com/security/cve/CVE-2024-43803/" source="CVE"/>
		<reference ref_id="CVE-2024-44337" ref_url="https://www.suse.com/security/cve/CVE-2024-44337/" source="CVE"/>
		<reference ref_id="CVE-2024-44625" ref_url="https://www.suse.com/security/cve/CVE-2024-44625/" source="CVE"/>
		<reference ref_id="CVE-2024-44905" ref_url="https://www.suse.com/security/cve/CVE-2024-44905/" source="CVE"/>
		<reference ref_id="CVE-2024-44906" ref_url="https://www.suse.com/security/cve/CVE-2024-44906/" source="CVE"/>
		<reference ref_id="CVE-2024-45039" ref_url="https://www.suse.com/security/cve/CVE-2024-45039/" source="CVE"/>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2024-45339" ref_url="https://www.suse.com/security/cve/CVE-2024-45339/" source="CVE"/>
		<reference ref_id="CVE-2024-45340" ref_url="https://www.suse.com/security/cve/CVE-2024-45340/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<reference ref_id="CVE-2024-45387" ref_url="https://www.suse.com/security/cve/CVE-2024-45387/" source="CVE"/>
		<reference ref_id="CVE-2024-45436" ref_url="https://www.suse.com/security/cve/CVE-2024-45436/" source="CVE"/>
		<reference ref_id="CVE-2024-45719" ref_url="https://www.suse.com/security/cve/CVE-2024-45719/" source="CVE"/>
		<reference ref_id="CVE-2024-45794" ref_url="https://www.suse.com/security/cve/CVE-2024-45794/" source="CVE"/>
		<reference ref_id="CVE-2024-46455" ref_url="https://www.suse.com/security/cve/CVE-2024-46455/" source="CVE"/>
		<reference ref_id="CVE-2024-46528" ref_url="https://www.suse.com/security/cve/CVE-2024-46528/" source="CVE"/>
		<reference ref_id="CVE-2024-46872" ref_url="https://www.suse.com/security/cve/CVE-2024-46872/" source="CVE"/>
		<reference ref_id="CVE-2024-47003" ref_url="https://www.suse.com/security/cve/CVE-2024-47003/" source="CVE"/>
		<reference ref_id="CVE-2024-47067" ref_url="https://www.suse.com/security/cve/CVE-2024-47067/" source="CVE"/>
		<reference ref_id="CVE-2024-47182" ref_url="https://www.suse.com/security/cve/CVE-2024-47182/" source="CVE"/>
		<reference ref_id="CVE-2024-47401" ref_url="https://www.suse.com/security/cve/CVE-2024-47401/" source="CVE"/>
		<reference ref_id="CVE-2024-47534" ref_url="https://www.suse.com/security/cve/CVE-2024-47534/" source="CVE"/>
		<reference ref_id="CVE-2024-47616" ref_url="https://www.suse.com/security/cve/CVE-2024-47616/" source="CVE"/>
		<reference ref_id="CVE-2024-47770" ref_url="https://www.suse.com/security/cve/CVE-2024-47770/" source="CVE"/>
		<reference ref_id="CVE-2024-47825" ref_url="https://www.suse.com/security/cve/CVE-2024-47825/" source="CVE"/>
		<reference ref_id="CVE-2024-47827" ref_url="https://www.suse.com/security/cve/CVE-2024-47827/" source="CVE"/>
		<reference ref_id="CVE-2024-47832" ref_url="https://www.suse.com/security/cve/CVE-2024-47832/" source="CVE"/>
		<reference ref_id="CVE-2024-47877" ref_url="https://www.suse.com/security/cve/CVE-2024-47877/" source="CVE"/>
		<reference ref_id="CVE-2024-48057" ref_url="https://www.suse.com/security/cve/CVE-2024-48057/" source="CVE"/>
		<reference ref_id="CVE-2024-48872" ref_url="https://www.suse.com/security/cve/CVE-2024-48872/" source="CVE"/>
		<reference ref_id="CVE-2024-48909" ref_url="https://www.suse.com/security/cve/CVE-2024-48909/" source="CVE"/>
		<reference ref_id="CVE-2024-48921" ref_url="https://www.suse.com/security/cve/CVE-2024-48921/" source="CVE"/>
		<reference ref_id="CVE-2024-49380" ref_url="https://www.suse.com/security/cve/CVE-2024-49380/" source="CVE"/>
		<reference ref_id="CVE-2024-49381" ref_url="https://www.suse.com/security/cve/CVE-2024-49381/" source="CVE"/>
		<reference ref_id="CVE-2024-49753" ref_url="https://www.suse.com/security/cve/CVE-2024-49753/" source="CVE"/>
		<reference ref_id="CVE-2024-49757" ref_url="https://www.suse.com/security/cve/CVE-2024-49757/" source="CVE"/>
		<reference ref_id="CVE-2024-50052" ref_url="https://www.suse.com/security/cve/CVE-2024-50052/" source="CVE"/>
		<reference ref_id="CVE-2024-50312" ref_url="https://www.suse.com/security/cve/CVE-2024-50312/" source="CVE"/>
		<reference ref_id="CVE-2024-50354" ref_url="https://www.suse.com/security/cve/CVE-2024-50354/" source="CVE"/>
		<reference ref_id="CVE-2024-50948" ref_url="https://www.suse.com/security/cve/CVE-2024-50948/" source="CVE"/>
		<reference ref_id="CVE-2024-51491" ref_url="https://www.suse.com/security/cve/CVE-2024-51491/" source="CVE"/>
		<reference ref_id="CVE-2024-51735" ref_url="https://www.suse.com/security/cve/CVE-2024-51735/" source="CVE"/>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2024-51746" ref_url="https://www.suse.com/security/cve/CVE-2024-51746/" source="CVE"/>
		<reference ref_id="CVE-2024-52003" ref_url="https://www.suse.com/security/cve/CVE-2024-52003/" source="CVE"/>
		<reference ref_id="CVE-2024-52009" ref_url="https://www.suse.com/security/cve/CVE-2024-52009/" source="CVE"/>
		<reference ref_id="CVE-2024-52010" ref_url="https://www.suse.com/security/cve/CVE-2024-52010/" source="CVE"/>
		<reference ref_id="CVE-2024-52280" ref_url="https://www.suse.com/security/cve/CVE-2024-52280/" source="CVE"/>
		<reference ref_id="CVE-2024-52281" ref_url="https://www.suse.com/security/cve/CVE-2024-52281/" source="CVE"/>
		<reference ref_id="CVE-2024-52282" ref_url="https://www.suse.com/security/cve/CVE-2024-52282/" source="CVE"/>
		<reference ref_id="CVE-2024-52290" ref_url="https://www.suse.com/security/cve/CVE-2024-52290/" source="CVE"/>
		<reference ref_id="CVE-2024-52308" ref_url="https://www.suse.com/security/cve/CVE-2024-52308/" source="CVE"/>
		<reference ref_id="CVE-2024-52309" ref_url="https://www.suse.com/security/cve/CVE-2024-52309/" source="CVE"/>
		<reference ref_id="CVE-2024-52522" ref_url="https://www.suse.com/security/cve/CVE-2024-52522/" source="CVE"/>
		<reference ref_id="CVE-2024-52529" ref_url="https://www.suse.com/security/cve/CVE-2024-52529/" source="CVE"/>
		<reference ref_id="CVE-2024-52594" ref_url="https://www.suse.com/security/cve/CVE-2024-52594/" source="CVE"/>
		<reference ref_id="CVE-2024-52602" ref_url="https://www.suse.com/security/cve/CVE-2024-52602/" source="CVE"/>
		<reference ref_id="CVE-2024-52791" ref_url="https://www.suse.com/security/cve/CVE-2024-52791/" source="CVE"/>
		<reference ref_id="CVE-2024-52801" ref_url="https://www.suse.com/security/cve/CVE-2024-52801/" source="CVE"/>
		<reference ref_id="CVE-2024-52812" ref_url="https://www.suse.com/security/cve/CVE-2024-52812/" source="CVE"/>
		<reference ref_id="CVE-2024-5321" ref_url="https://www.suse.com/security/cve/CVE-2024-5321/" source="CVE"/>
		<reference ref_id="CVE-2024-53257" ref_url="https://www.suse.com/security/cve/CVE-2024-53257/" source="CVE"/>
		<reference ref_id="CVE-2024-53259" ref_url="https://www.suse.com/security/cve/CVE-2024-53259/" source="CVE"/>
		<reference ref_id="CVE-2024-53263" ref_url="https://www.suse.com/security/cve/CVE-2024-53263/" source="CVE"/>
		<reference ref_id="CVE-2024-53264" ref_url="https://www.suse.com/security/cve/CVE-2024-53264/" source="CVE"/>
		<reference ref_id="CVE-2024-53348" ref_url="https://www.suse.com/security/cve/CVE-2024-53348/" source="CVE"/>
		<reference ref_id="CVE-2024-53351" ref_url="https://www.suse.com/security/cve/CVE-2024-53351/" source="CVE"/>
		<reference ref_id="CVE-2024-53858" ref_url="https://www.suse.com/security/cve/CVE-2024-53858/" source="CVE"/>
		<reference ref_id="CVE-2024-53859" ref_url="https://www.suse.com/security/cve/CVE-2024-53859/" source="CVE"/>
		<reference ref_id="CVE-2024-53862" ref_url="https://www.suse.com/security/cve/CVE-2024-53862/" source="CVE"/>
		<reference ref_id="CVE-2024-54083" ref_url="https://www.suse.com/security/cve/CVE-2024-54083/" source="CVE"/>
		<reference ref_id="CVE-2024-54131" ref_url="https://www.suse.com/security/cve/CVE-2024-54131/" source="CVE"/>
		<reference ref_id="CVE-2024-54132" ref_url="https://www.suse.com/security/cve/CVE-2024-54132/" source="CVE"/>
		<reference ref_id="CVE-2024-54148" ref_url="https://www.suse.com/security/cve/CVE-2024-54148/" source="CVE"/>
		<reference ref_id="CVE-2024-54682" ref_url="https://www.suse.com/security/cve/CVE-2024-54682/" source="CVE"/>
		<reference ref_id="CVE-2024-55196" ref_url="https://www.suse.com/security/cve/CVE-2024-55196/" source="CVE"/>
		<reference ref_id="CVE-2024-55601" ref_url="https://www.suse.com/security/cve/CVE-2024-55601/" source="CVE"/>
		<reference ref_id="CVE-2024-55657" ref_url="https://www.suse.com/security/cve/CVE-2024-55657/" source="CVE"/>
		<reference ref_id="CVE-2024-55658" ref_url="https://www.suse.com/security/cve/CVE-2024-55658/" source="CVE"/>
		<reference ref_id="CVE-2024-55659" ref_url="https://www.suse.com/security/cve/CVE-2024-55659/" source="CVE"/>
		<reference ref_id="CVE-2024-55660" ref_url="https://www.suse.com/security/cve/CVE-2024-55660/" source="CVE"/>
		<reference ref_id="CVE-2024-55885" ref_url="https://www.suse.com/security/cve/CVE-2024-55885/" source="CVE"/>
		<reference ref_id="CVE-2024-55947" ref_url="https://www.suse.com/security/cve/CVE-2024-55947/" source="CVE"/>
		<reference ref_id="CVE-2024-55949" ref_url="https://www.suse.com/security/cve/CVE-2024-55949/" source="CVE"/>
		<reference ref_id="CVE-2024-56138" ref_url="https://www.suse.com/security/cve/CVE-2024-56138/" source="CVE"/>
		<reference ref_id="CVE-2024-56323" ref_url="https://www.suse.com/security/cve/CVE-2024-56323/" source="CVE"/>
		<reference ref_id="CVE-2024-56362" ref_url="https://www.suse.com/security/cve/CVE-2024-56362/" source="CVE"/>
		<reference ref_id="CVE-2024-56513" ref_url="https://www.suse.com/security/cve/CVE-2024-56513/" source="CVE"/>
		<reference ref_id="CVE-2024-56514" ref_url="https://www.suse.com/security/cve/CVE-2024-56514/" source="CVE"/>
		<reference ref_id="CVE-2024-56515" ref_url="https://www.suse.com/security/cve/CVE-2024-56515/" source="CVE"/>
		<reference ref_id="CVE-2024-56731" ref_url="https://www.suse.com/security/cve/CVE-2024-56731/" source="CVE"/>
		<reference ref_id="CVE-2024-57603" ref_url="https://www.suse.com/security/cve/CVE-2024-57603/" source="CVE"/>
		<reference ref_id="CVE-2024-57604" ref_url="https://www.suse.com/security/cve/CVE-2024-57604/" source="CVE"/>
		<reference ref_id="CVE-2024-6156" ref_url="https://www.suse.com/security/cve/CVE-2024-6156/" source="CVE"/>
		<reference ref_id="CVE-2024-6219" ref_url="https://www.suse.com/security/cve/CVE-2024-6219/" source="CVE"/>
		<reference ref_id="CVE-2024-6538" ref_url="https://www.suse.com/security/cve/CVE-2024-6538/" source="CVE"/>
		<reference ref_id="CVE-2024-7558" ref_url="https://www.suse.com/security/cve/CVE-2024-7558/" source="CVE"/>
		<reference ref_id="CVE-2024-7594" ref_url="https://www.suse.com/security/cve/CVE-2024-7594/" source="CVE"/>
		<reference ref_id="CVE-2024-7598" ref_url="https://www.suse.com/security/cve/CVE-2024-7598/" source="CVE"/>
		<reference ref_id="CVE-2024-7631" ref_url="https://www.suse.com/security/cve/CVE-2024-7631/" source="CVE"/>
		<reference ref_id="CVE-2024-8037" ref_url="https://www.suse.com/security/cve/CVE-2024-8037/" source="CVE"/>
		<reference ref_id="CVE-2024-8038" ref_url="https://www.suse.com/security/cve/CVE-2024-8038/" source="CVE"/>
		<reference ref_id="CVE-2024-8063" ref_url="https://www.suse.com/security/cve/CVE-2024-8063/" source="CVE"/>
		<reference ref_id="CVE-2024-8185" ref_url="https://www.suse.com/security/cve/CVE-2024-8185/" source="CVE"/>
		<reference ref_id="CVE-2024-8676" ref_url="https://www.suse.com/security/cve/CVE-2024-8676/" source="CVE"/>
		<reference ref_id="CVE-2024-8901" ref_url="https://www.suse.com/security/cve/CVE-2024-8901/" source="CVE"/>
		<reference ref_id="CVE-2024-8975" ref_url="https://www.suse.com/security/cve/CVE-2024-8975/" source="CVE"/>
		<reference ref_id="CVE-2024-8986" ref_url="https://www.suse.com/security/cve/CVE-2024-8986/" source="CVE"/>
		<reference ref_id="CVE-2024-8996" ref_url="https://www.suse.com/security/cve/CVE-2024-8996/" source="CVE"/>
		<reference ref_id="CVE-2024-9042" ref_url="https://www.suse.com/security/cve/CVE-2024-9042/" source="CVE"/>
		<reference ref_id="CVE-2024-9180" ref_url="https://www.suse.com/security/cve/CVE-2024-9180/" source="CVE"/>
		<reference ref_id="CVE-2024-9264" ref_url="https://www.suse.com/security/cve/CVE-2024-9264/" source="CVE"/>
		<reference ref_id="CVE-2024-9312" ref_url="https://www.suse.com/security/cve/CVE-2024-9312/" source="CVE"/>
		<reference ref_id="CVE-2024-9313" ref_url="https://www.suse.com/security/cve/CVE-2024-9313/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9486" ref_url="https://www.suse.com/security/cve/CVE-2024-9486/" source="CVE"/>
		<reference ref_id="CVE-2024-9526" ref_url="https://www.suse.com/security/cve/CVE-2024-9526/" source="CVE"/>
		<reference ref_id="CVE-2024-9594" ref_url="https://www.suse.com/security/cve/CVE-2024-9594/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="CVE-2024-9779" ref_url="https://www.suse.com/security/cve/CVE-2024-9779/" source="CVE"/>
		<reference ref_id="CVE-2024-9900" ref_url="https://www.suse.com/security/cve/CVE-2024-9900/" source="CVE"/>
		<reference ref_id="CVE-2025-0312" ref_url="https://www.suse.com/security/cve/CVE-2025-0312/" source="CVE"/>
		<reference ref_id="CVE-2025-0315" ref_url="https://www.suse.com/security/cve/CVE-2025-0315/" source="CVE"/>
		<reference ref_id="CVE-2025-0317" ref_url="https://www.suse.com/security/cve/CVE-2025-0317/" source="CVE"/>
		<reference ref_id="CVE-2025-0377" ref_url="https://www.suse.com/security/cve/CVE-2025-0377/" source="CVE"/>
		<reference ref_id="CVE-2025-0426" ref_url="https://www.suse.com/security/cve/CVE-2025-0426/" source="CVE"/>
		<reference ref_id="CVE-2025-0495" ref_url="https://www.suse.com/security/cve/CVE-2025-0495/" source="CVE"/>
		<reference ref_id="CVE-2025-0750" ref_url="https://www.suse.com/security/cve/CVE-2025-0750/" source="CVE"/>
		<reference ref_id="CVE-2025-0913" ref_url="https://www.suse.com/security/cve/CVE-2025-0913/" source="CVE"/>
		<reference ref_id="CVE-2025-0928" ref_url="https://www.suse.com/security/cve/CVE-2025-0928/" source="CVE"/>
		<reference ref_id="CVE-2025-1088" ref_url="https://www.suse.com/security/cve/CVE-2025-1088/" source="CVE"/>
		<reference ref_id="CVE-2025-1097" ref_url="https://www.suse.com/security/cve/CVE-2025-1097/" source="CVE"/>
		<reference ref_id="CVE-2025-1098" ref_url="https://www.suse.com/security/cve/CVE-2025-1098/" source="CVE"/>
		<reference ref_id="CVE-2025-1243" ref_url="https://www.suse.com/security/cve/CVE-2025-1243/" source="CVE"/>
		<reference ref_id="CVE-2025-1293" ref_url="https://www.suse.com/security/cve/CVE-2025-1293/" source="CVE"/>
		<reference ref_id="CVE-2025-1296" ref_url="https://www.suse.com/security/cve/CVE-2025-1296/" source="CVE"/>
		<reference ref_id="CVE-2025-1386" ref_url="https://www.suse.com/security/cve/CVE-2025-1386/" source="CVE"/>
		<reference ref_id="CVE-2025-1412" ref_url="https://www.suse.com/security/cve/CVE-2025-1412/" source="CVE"/>
		<reference ref_id="CVE-2025-1472" ref_url="https://www.suse.com/security/cve/CVE-2025-1472/" source="CVE"/>
		<reference ref_id="CVE-2025-1767" ref_url="https://www.suse.com/security/cve/CVE-2025-1767/" source="CVE"/>
		<reference ref_id="CVE-2025-1792" ref_url="https://www.suse.com/security/cve/CVE-2025-1792/" source="CVE"/>
		<reference ref_id="CVE-2025-1974" ref_url="https://www.suse.com/security/cve/CVE-2025-1974/" source="CVE"/>
		<reference ref_id="CVE-2025-1975" ref_url="https://www.suse.com/security/cve/CVE-2025-1975/" source="CVE"/>
		<reference ref_id="CVE-2025-20033" ref_url="https://www.suse.com/security/cve/CVE-2025-20033/" source="CVE"/>
		<reference ref_id="CVE-2025-20051" ref_url="https://www.suse.com/security/cve/CVE-2025-20051/" source="CVE"/>
		<reference ref_id="CVE-2025-20086" ref_url="https://www.suse.com/security/cve/CVE-2025-20086/" source="CVE"/>
		<reference ref_id="CVE-2025-20088" ref_url="https://www.suse.com/security/cve/CVE-2025-20088/" source="CVE"/>
		<reference ref_id="CVE-2025-20621" ref_url="https://www.suse.com/security/cve/CVE-2025-20621/" source="CVE"/>
		<reference ref_id="CVE-2025-21088" ref_url="https://www.suse.com/security/cve/CVE-2025-21088/" source="CVE"/>
		<reference ref_id="CVE-2025-21609" ref_url="https://www.suse.com/security/cve/CVE-2025-21609/" source="CVE"/>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<reference ref_id="CVE-2025-21614" ref_url="https://www.suse.com/security/cve/CVE-2025-21614/" source="CVE"/>
		<reference ref_id="CVE-2025-22130" ref_url="https://www.suse.com/security/cve/CVE-2025-22130/" source="CVE"/>
		<reference ref_id="CVE-2025-22149" ref_url="https://www.suse.com/security/cve/CVE-2025-22149/" source="CVE"/>
		<reference ref_id="CVE-2025-2241" ref_url="https://www.suse.com/security/cve/CVE-2025-2241/" source="CVE"/>
		<reference ref_id="CVE-2025-22445" ref_url="https://www.suse.com/security/cve/CVE-2025-22445/" source="CVE"/>
		<reference ref_id="CVE-2025-22449" ref_url="https://www.suse.com/security/cve/CVE-2025-22449/" source="CVE"/>
		<reference ref_id="CVE-2025-22865" ref_url="https://www.suse.com/security/cve/CVE-2025-22865/" source="CVE"/>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<reference ref_id="CVE-2025-22867" ref_url="https://www.suse.com/security/cve/CVE-2025-22867/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<reference ref_id="CVE-2025-22952" ref_url="https://www.suse.com/security/cve/CVE-2025-22952/" source="CVE"/>
		<reference ref_id="CVE-2025-23028" ref_url="https://www.suse.com/security/cve/CVE-2025-23028/" source="CVE"/>
		<reference ref_id="CVE-2025-23047" ref_url="https://www.suse.com/security/cve/CVE-2025-23047/" source="CVE"/>
		<reference ref_id="CVE-2025-23208" ref_url="https://www.suse.com/security/cve/CVE-2025-23208/" source="CVE"/>
		<reference ref_id="CVE-2025-23216" ref_url="https://www.suse.com/security/cve/CVE-2025-23216/" source="CVE"/>
		<reference ref_id="CVE-2025-23387" ref_url="https://www.suse.com/security/cve/CVE-2025-23387/" source="CVE"/>
		<reference ref_id="CVE-2025-23388" ref_url="https://www.suse.com/security/cve/CVE-2025-23388/" source="CVE"/>
		<reference ref_id="CVE-2025-23389" ref_url="https://www.suse.com/security/cve/CVE-2025-23389/" source="CVE"/>
		<reference ref_id="CVE-2025-23390" ref_url="https://www.suse.com/security/cve/CVE-2025-23390/" source="CVE"/>
		<reference ref_id="CVE-2025-23391" ref_url="https://www.suse.com/security/cve/CVE-2025-23391/" source="CVE"/>
		<reference ref_id="CVE-2025-24016" ref_url="https://www.suse.com/security/cve/CVE-2025-24016/" source="CVE"/>
		<reference ref_id="CVE-2025-24030" ref_url="https://www.suse.com/security/cve/CVE-2025-24030/" source="CVE"/>
		<reference ref_id="CVE-2025-2424" ref_url="https://www.suse.com/security/cve/CVE-2025-2424/" source="CVE"/>
		<reference ref_id="CVE-2025-24337" ref_url="https://www.suse.com/security/cve/CVE-2025-24337/" source="CVE"/>
		<reference ref_id="CVE-2025-24354" ref_url="https://www.suse.com/security/cve/CVE-2025-24354/" source="CVE"/>
		<reference ref_id="CVE-2025-24355" ref_url="https://www.suse.com/security/cve/CVE-2025-24355/" source="CVE"/>
		<reference ref_id="CVE-2025-24358" ref_url="https://www.suse.com/security/cve/CVE-2025-24358/" source="CVE"/>
		<reference ref_id="CVE-2025-24366" ref_url="https://www.suse.com/security/cve/CVE-2025-24366/" source="CVE"/>
		<reference ref_id="CVE-2025-24369" ref_url="https://www.suse.com/security/cve/CVE-2025-24369/" source="CVE"/>
		<reference ref_id="CVE-2025-24371" ref_url="https://www.suse.com/security/cve/CVE-2025-24371/" source="CVE"/>
		<reference ref_id="CVE-2025-24376" ref_url="https://www.suse.com/security/cve/CVE-2025-24376/" source="CVE"/>
		<reference ref_id="CVE-2025-24513" ref_url="https://www.suse.com/security/cve/CVE-2025-24513/" source="CVE"/>
		<reference ref_id="CVE-2025-24514" ref_url="https://www.suse.com/security/cve/CVE-2025-24514/" source="CVE"/>
		<reference ref_id="CVE-2025-24526" ref_url="https://www.suse.com/security/cve/CVE-2025-24526/" source="CVE"/>
		<reference ref_id="CVE-2025-2475" ref_url="https://www.suse.com/security/cve/CVE-2025-2475/" source="CVE"/>
		<reference ref_id="CVE-2025-24784" ref_url="https://www.suse.com/security/cve/CVE-2025-24784/" source="CVE"/>
		<reference ref_id="CVE-2025-24786" ref_url="https://www.suse.com/security/cve/CVE-2025-24786/" source="CVE"/>
		<reference ref_id="CVE-2025-24787" ref_url="https://www.suse.com/security/cve/CVE-2025-24787/" source="CVE"/>
		<reference ref_id="CVE-2025-24806" ref_url="https://www.suse.com/security/cve/CVE-2025-24806/" source="CVE"/>
		<reference ref_id="CVE-2025-24839" ref_url="https://www.suse.com/security/cve/CVE-2025-24839/" source="CVE"/>
		<reference ref_id="CVE-2025-24866" ref_url="https://www.suse.com/security/cve/CVE-2025-24866/" source="CVE"/>
		<reference ref_id="CVE-2025-24883" ref_url="https://www.suse.com/security/cve/CVE-2025-24883/" source="CVE"/>
		<reference ref_id="CVE-2025-24884" ref_url="https://www.suse.com/security/cve/CVE-2025-24884/" source="CVE"/>
		<reference ref_id="CVE-2025-24920" ref_url="https://www.suse.com/security/cve/CVE-2025-24920/" source="CVE"/>
		<reference ref_id="CVE-2025-24976" ref_url="https://www.suse.com/security/cve/CVE-2025-24976/" source="CVE"/>
		<reference ref_id="CVE-2025-25068" ref_url="https://www.suse.com/security/cve/CVE-2025-25068/" source="CVE"/>
		<reference ref_id="CVE-2025-25196" ref_url="https://www.suse.com/security/cve/CVE-2025-25196/" source="CVE"/>
		<reference ref_id="CVE-2025-25199" ref_url="https://www.suse.com/security/cve/CVE-2025-25199/" source="CVE"/>
		<reference ref_id="CVE-2025-25204" ref_url="https://www.suse.com/security/cve/CVE-2025-25204/" source="CVE"/>
		<reference ref_id="CVE-2025-25207" ref_url="https://www.suse.com/security/cve/CVE-2025-25207/" source="CVE"/>
		<reference ref_id="CVE-2025-25208" ref_url="https://www.suse.com/security/cve/CVE-2025-25208/" source="CVE"/>
		<reference ref_id="CVE-2025-2527" ref_url="https://www.suse.com/security/cve/CVE-2025-2527/" source="CVE"/>
		<reference ref_id="CVE-2025-25274" ref_url="https://www.suse.com/security/cve/CVE-2025-25274/" source="CVE"/>
		<reference ref_id="CVE-2025-25279" ref_url="https://www.suse.com/security/cve/CVE-2025-25279/" source="CVE"/>
		<reference ref_id="CVE-2025-25294" ref_url="https://www.suse.com/security/cve/CVE-2025-25294/" source="CVE"/>
		<reference ref_id="CVE-2025-2564" ref_url="https://www.suse.com/security/cve/CVE-2025-2564/" source="CVE"/>
		<reference ref_id="CVE-2025-2570" ref_url="https://www.suse.com/security/cve/CVE-2025-2570/" source="CVE"/>
		<reference ref_id="CVE-2025-2571" ref_url="https://www.suse.com/security/cve/CVE-2025-2571/" source="CVE"/>
		<reference ref_id="CVE-2025-26260" ref_url="https://www.suse.com/security/cve/CVE-2025-26260/" source="CVE"/>
		<reference ref_id="CVE-2025-27088" ref_url="https://www.suse.com/security/cve/CVE-2025-27088/" source="CVE"/>
		<reference ref_id="CVE-2025-27090" ref_url="https://www.suse.com/security/cve/CVE-2025-27090/" source="CVE"/>
		<reference ref_id="CVE-2025-27100" ref_url="https://www.suse.com/security/cve/CVE-2025-27100/" source="CVE"/>
		<reference ref_id="CVE-2025-27112" ref_url="https://www.suse.com/security/cve/CVE-2025-27112/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-27155" ref_url="https://www.suse.com/security/cve/CVE-2025-27155/" source="CVE"/>
		<reference ref_id="CVE-2025-27403" ref_url="https://www.suse.com/security/cve/CVE-2025-27403/" source="CVE"/>
		<reference ref_id="CVE-2025-27414" ref_url="https://www.suse.com/security/cve/CVE-2025-27414/" source="CVE"/>
		<reference ref_id="CVE-2025-27421" ref_url="https://www.suse.com/security/cve/CVE-2025-27421/" source="CVE"/>
		<reference ref_id="CVE-2025-27507" ref_url="https://www.suse.com/security/cve/CVE-2025-27507/" source="CVE"/>
		<reference ref_id="CVE-2025-27509" ref_url="https://www.suse.com/security/cve/CVE-2025-27509/" source="CVE"/>
		<reference ref_id="CVE-2025-27538" ref_url="https://www.suse.com/security/cve/CVE-2025-27538/" source="CVE"/>
		<reference ref_id="CVE-2025-27571" ref_url="https://www.suse.com/security/cve/CVE-2025-27571/" source="CVE"/>
		<reference ref_id="CVE-2025-27612" ref_url="https://www.suse.com/security/cve/CVE-2025-27612/" source="CVE"/>
		<reference ref_id="CVE-2025-27616" ref_url="https://www.suse.com/security/cve/CVE-2025-27616/" source="CVE"/>
		<reference ref_id="CVE-2025-27715" ref_url="https://www.suse.com/security/cve/CVE-2025-27715/" source="CVE"/>
		<reference ref_id="CVE-2025-27933" ref_url="https://www.suse.com/security/cve/CVE-2025-27933/" source="CVE"/>
		<reference ref_id="CVE-2025-27936" ref_url="https://www.suse.com/security/cve/CVE-2025-27936/" source="CVE"/>
		<reference ref_id="CVE-2025-29072" ref_url="https://www.suse.com/security/cve/CVE-2025-29072/" source="CVE"/>
		<reference ref_id="CVE-2025-29778" ref_url="https://www.suse.com/security/cve/CVE-2025-29778/" source="CVE"/>
		<reference ref_id="CVE-2025-29781" ref_url="https://www.suse.com/security/cve/CVE-2025-29781/" source="CVE"/>
		<reference ref_id="CVE-2025-29785" ref_url="https://www.suse.com/security/cve/CVE-2025-29785/" source="CVE"/>
		<reference ref_id="CVE-2025-29786" ref_url="https://www.suse.com/security/cve/CVE-2025-29786/" source="CVE"/>
		<reference ref_id="CVE-2025-29868" ref_url="https://www.suse.com/security/cve/CVE-2025-29868/" source="CVE"/>
		<reference ref_id="CVE-2025-29914" ref_url="https://www.suse.com/security/cve/CVE-2025-29914/" source="CVE"/>
		<reference ref_id="CVE-2025-29922" ref_url="https://www.suse.com/security/cve/CVE-2025-29922/" source="CVE"/>
		<reference ref_id="CVE-2025-29923" ref_url="https://www.suse.com/security/cve/CVE-2025-29923/" source="CVE"/>
		<reference ref_id="CVE-2025-30077" ref_url="https://www.suse.com/security/cve/CVE-2025-30077/" source="CVE"/>
		<reference ref_id="CVE-2025-30086" ref_url="https://www.suse.com/security/cve/CVE-2025-30086/" source="CVE"/>
		<reference ref_id="CVE-2025-30153" ref_url="https://www.suse.com/security/cve/CVE-2025-30153/" source="CVE"/>
		<reference ref_id="CVE-2025-30162" ref_url="https://www.suse.com/security/cve/CVE-2025-30162/" source="CVE"/>
		<reference ref_id="CVE-2025-30163" ref_url="https://www.suse.com/security/cve/CVE-2025-30163/" source="CVE"/>
		<reference ref_id="CVE-2025-30179" ref_url="https://www.suse.com/security/cve/CVE-2025-30179/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<reference ref_id="CVE-2025-30206" ref_url="https://www.suse.com/security/cve/CVE-2025-30206/" source="CVE"/>
		<reference ref_id="CVE-2025-30215" ref_url="https://www.suse.com/security/cve/CVE-2025-30215/" source="CVE"/>
		<reference ref_id="CVE-2025-30223" ref_url="https://www.suse.com/security/cve/CVE-2025-30223/" source="CVE"/>
		<reference ref_id="CVE-2025-31135" ref_url="https://www.suse.com/security/cve/CVE-2025-31135/" source="CVE"/>
		<reference ref_id="CVE-2025-31363" ref_url="https://www.suse.com/security/cve/CVE-2025-31363/" source="CVE"/>
		<reference ref_id="CVE-2025-31483" ref_url="https://www.suse.com/security/cve/CVE-2025-31483/" source="CVE"/>
		<reference ref_id="CVE-2025-31489" ref_url="https://www.suse.com/security/cve/CVE-2025-31489/" source="CVE"/>
		<reference ref_id="CVE-2025-31947" ref_url="https://www.suse.com/security/cve/CVE-2025-31947/" source="CVE"/>
		<reference ref_id="CVE-2025-32019" ref_url="https://www.suse.com/security/cve/CVE-2025-32019/" source="CVE"/>
		<reference ref_id="CVE-2025-32024" ref_url="https://www.suse.com/security/cve/CVE-2025-32024/" source="CVE"/>
		<reference ref_id="CVE-2025-32025" ref_url="https://www.suse.com/security/cve/CVE-2025-32025/" source="CVE"/>
		<reference ref_id="CVE-2025-32093" ref_url="https://www.suse.com/security/cve/CVE-2025-32093/" source="CVE"/>
		<reference ref_id="CVE-2025-3227" ref_url="https://www.suse.com/security/cve/CVE-2025-3227/" source="CVE"/>
		<reference ref_id="CVE-2025-3228" ref_url="https://www.suse.com/security/cve/CVE-2025-3228/" source="CVE"/>
		<reference ref_id="CVE-2025-3230" ref_url="https://www.suse.com/security/cve/CVE-2025-3230/" source="CVE"/>
		<reference ref_id="CVE-2025-32386" ref_url="https://www.suse.com/security/cve/CVE-2025-32386/" source="CVE"/>
		<reference ref_id="CVE-2025-32387" ref_url="https://www.suse.com/security/cve/CVE-2025-32387/" source="CVE"/>
		<reference ref_id="CVE-2025-32431" ref_url="https://www.suse.com/security/cve/CVE-2025-32431/" source="CVE"/>
		<reference ref_id="CVE-2025-32445" ref_url="https://www.suse.com/security/cve/CVE-2025-32445/" source="CVE"/>
		<reference ref_id="CVE-2025-3260" ref_url="https://www.suse.com/security/cve/CVE-2025-3260/" source="CVE"/>
		<reference ref_id="CVE-2025-32777" ref_url="https://www.suse.com/security/cve/CVE-2025-32777/" source="CVE"/>
		<reference ref_id="CVE-2025-32793" ref_url="https://www.suse.com/security/cve/CVE-2025-32793/" source="CVE"/>
		<reference ref_id="CVE-2025-32963" ref_url="https://www.suse.com/security/cve/CVE-2025-32963/" source="CVE"/>
		<reference ref_id="CVE-2025-3415" ref_url="https://www.suse.com/security/cve/CVE-2025-3415/" source="CVE"/>
		<reference ref_id="CVE-2025-3445" ref_url="https://www.suse.com/security/cve/CVE-2025-3445/" source="CVE"/>
		<reference ref_id="CVE-2025-3446" ref_url="https://www.suse.com/security/cve/CVE-2025-3446/" source="CVE"/>
		<reference ref_id="CVE-2025-3454" ref_url="https://www.suse.com/security/cve/CVE-2025-3454/" source="CVE"/>
		<reference ref_id="CVE-2025-35965" ref_url="https://www.suse.com/security/cve/CVE-2025-35965/" source="CVE"/>
		<reference ref_id="CVE-2025-3611" ref_url="https://www.suse.com/security/cve/CVE-2025-3611/" source="CVE"/>
		<reference ref_id="CVE-2025-3757" ref_url="https://www.suse.com/security/cve/CVE-2025-3757/" source="CVE"/>
		<reference ref_id="CVE-2025-3801" ref_url="https://www.suse.com/security/cve/CVE-2025-3801/" source="CVE"/>
		<reference ref_id="CVE-2025-3879" ref_url="https://www.suse.com/security/cve/CVE-2025-3879/" source="CVE"/>
		<reference ref_id="CVE-2025-3913" ref_url="https://www.suse.com/security/cve/CVE-2025-3913/" source="CVE"/>
		<reference ref_id="CVE-2025-3931" ref_url="https://www.suse.com/security/cve/CVE-2025-3931/" source="CVE"/>
		<reference ref_id="CVE-2025-4057" ref_url="https://www.suse.com/security/cve/CVE-2025-4057/" source="CVE"/>
		<reference ref_id="CVE-2025-4123" ref_url="https://www.suse.com/security/cve/CVE-2025-4123/" source="CVE"/>
		<reference ref_id="CVE-2025-4128" ref_url="https://www.suse.com/security/cve/CVE-2025-4128/" source="CVE"/>
		<reference ref_id="CVE-2025-41395" ref_url="https://www.suse.com/security/cve/CVE-2025-41395/" source="CVE"/>
		<reference ref_id="CVE-2025-41423" ref_url="https://www.suse.com/security/cve/CVE-2025-41423/" source="CVE"/>
		<reference ref_id="CVE-2025-4166" ref_url="https://www.suse.com/security/cve/CVE-2025-4166/" source="CVE"/>
		<reference ref_id="CVE-2025-4210" ref_url="https://www.suse.com/security/cve/CVE-2025-4210/" source="CVE"/>
		<reference ref_id="CVE-2025-43915" ref_url="https://www.suse.com/security/cve/CVE-2025-43915/" source="CVE"/>
		<reference ref_id="CVE-2025-43970" ref_url="https://www.suse.com/security/cve/CVE-2025-43970/" source="CVE"/>
		<reference ref_id="CVE-2025-43971" ref_url="https://www.suse.com/security/cve/CVE-2025-43971/" source="CVE"/>
		<reference ref_id="CVE-2025-43972" ref_url="https://www.suse.com/security/cve/CVE-2025-43972/" source="CVE"/>
		<reference ref_id="CVE-2025-43973" ref_url="https://www.suse.com/security/cve/CVE-2025-43973/" source="CVE"/>
		<reference ref_id="CVE-2025-4432" ref_url="https://www.suse.com/security/cve/CVE-2025-4432/" source="CVE"/>
		<reference ref_id="CVE-2025-44779" ref_url="https://www.suse.com/security/cve/CVE-2025-44779/" source="CVE"/>
		<reference ref_id="CVE-2025-4563" ref_url="https://www.suse.com/security/cve/CVE-2025-4563/" source="CVE"/>
		<reference ref_id="CVE-2025-4573" ref_url="https://www.suse.com/security/cve/CVE-2025-4573/" source="CVE"/>
		<reference ref_id="CVE-2025-46327" ref_url="https://www.suse.com/security/cve/CVE-2025-46327/" source="CVE"/>
		<reference ref_id="CVE-2025-46331" ref_url="https://www.suse.com/security/cve/CVE-2025-46331/" source="CVE"/>
		<reference ref_id="CVE-2025-46342" ref_url="https://www.suse.com/security/cve/CVE-2025-46342/" source="CVE"/>
		<reference ref_id="CVE-2025-4656" ref_url="https://www.suse.com/security/cve/CVE-2025-4656/" source="CVE"/>
		<reference ref_id="CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569/" source="CVE"/>
		<reference ref_id="CVE-2025-4658" ref_url="https://www.suse.com/security/cve/CVE-2025-4658/" source="CVE"/>
		<reference ref_id="CVE-2025-46599" ref_url="https://www.suse.com/security/cve/CVE-2025-46599/" source="CVE"/>
		<reference ref_id="CVE-2025-46702" ref_url="https://www.suse.com/security/cve/CVE-2025-46702/" source="CVE"/>
		<reference ref_id="CVE-2025-46721" ref_url="https://www.suse.com/security/cve/CVE-2025-46721/" source="CVE"/>
		<reference ref_id="CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673/" source="CVE"/>
		<reference ref_id="CVE-2025-46735" ref_url="https://www.suse.com/security/cve/CVE-2025-46735/" source="CVE"/>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<reference ref_id="CVE-2025-46815" ref_url="https://www.suse.com/security/cve/CVE-2025-46815/" source="CVE"/>
		<reference ref_id="CVE-2025-46816" ref_url="https://www.suse.com/security/cve/CVE-2025-46816/" source="CVE"/>
		<reference ref_id="CVE-2025-47281" ref_url="https://www.suse.com/security/cve/CVE-2025-47281/" source="CVE"/>
		<reference ref_id="CVE-2025-47282" ref_url="https://www.suse.com/security/cve/CVE-2025-47282/" source="CVE"/>
		<reference ref_id="CVE-2025-47283" ref_url="https://www.suse.com/security/cve/CVE-2025-47283/" source="CVE"/>
		<reference ref_id="CVE-2025-47284" ref_url="https://www.suse.com/security/cve/CVE-2025-47284/" source="CVE"/>
		<reference ref_id="CVE-2025-47290" ref_url="https://www.suse.com/security/cve/CVE-2025-47290/" source="CVE"/>
		<reference ref_id="CVE-2025-47291" ref_url="https://www.suse.com/security/cve/CVE-2025-47291/" source="CVE"/>
		<reference ref_id="CVE-2025-47871" ref_url="https://www.suse.com/security/cve/CVE-2025-47871/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<reference ref_id="CVE-2025-47908" ref_url="https://www.suse.com/security/cve/CVE-2025-47908/" source="CVE"/>
		<reference ref_id="CVE-2025-47933" ref_url="https://www.suse.com/security/cve/CVE-2025-47933/" source="CVE"/>
		<reference ref_id="CVE-2025-47943" ref_url="https://www.suse.com/security/cve/CVE-2025-47943/" source="CVE"/>
		<reference ref_id="CVE-2025-47950" ref_url="https://www.suse.com/security/cve/CVE-2025-47950/" source="CVE"/>
		<reference ref_id="CVE-2025-47952" ref_url="https://www.suse.com/security/cve/CVE-2025-47952/" source="CVE"/>
		<reference ref_id="CVE-2025-48056" ref_url="https://www.suse.com/security/cve/CVE-2025-48056/" source="CVE"/>
		<reference ref_id="CVE-2025-48069" ref_url="https://www.suse.com/security/cve/CVE-2025-48069/" source="CVE"/>
		<reference ref_id="CVE-2025-48075" ref_url="https://www.suse.com/security/cve/CVE-2025-48075/" source="CVE"/>
		<reference ref_id="CVE-2025-48371" ref_url="https://www.suse.com/security/cve/CVE-2025-48371/" source="CVE"/>
		<reference ref_id="CVE-2025-48374" ref_url="https://www.suse.com/security/cve/CVE-2025-48374/" source="CVE"/>
		<reference ref_id="CVE-2025-48494" ref_url="https://www.suse.com/security/cve/CVE-2025-48494/" source="CVE"/>
		<reference ref_id="CVE-2025-48495" ref_url="https://www.suse.com/security/cve/CVE-2025-48495/" source="CVE"/>
		<reference ref_id="CVE-2025-48710" ref_url="https://www.suse.com/security/cve/CVE-2025-48710/" source="CVE"/>
		<reference ref_id="CVE-2025-48865" ref_url="https://www.suse.com/security/cve/CVE-2025-48865/" source="CVE"/>
		<reference ref_id="CVE-2025-48938" ref_url="https://www.suse.com/security/cve/CVE-2025-48938/" source="CVE"/>
		<reference ref_id="CVE-2025-48948" ref_url="https://www.suse.com/security/cve/CVE-2025-48948/" source="CVE"/>
		<reference ref_id="CVE-2025-48949" ref_url="https://www.suse.com/security/cve/CVE-2025-48949/" source="CVE"/>
		<reference ref_id="CVE-2025-49011" ref_url="https://www.suse.com/security/cve/CVE-2025-49011/" source="CVE"/>
		<reference ref_id="CVE-2025-49136" ref_url="https://www.suse.com/security/cve/CVE-2025-49136/" source="CVE"/>
		<reference ref_id="CVE-2025-49140" ref_url="https://www.suse.com/security/cve/CVE-2025-49140/" source="CVE"/>
		<reference ref_id="CVE-2025-4922" ref_url="https://www.suse.com/security/cve/CVE-2025-4922/" source="CVE"/>
		<reference ref_id="CVE-2025-4981" ref_url="https://www.suse.com/security/cve/CVE-2025-4981/" source="CVE"/>
		<reference ref_id="CVE-2025-49825" ref_url="https://www.suse.com/security/cve/CVE-2025-49825/" source="CVE"/>
		<reference ref_id="CVE-2025-5030" ref_url="https://www.suse.com/security/cve/CVE-2025-5030/" source="CVE"/>
		<reference ref_id="CVE-2025-5031" ref_url="https://www.suse.com/security/cve/CVE-2025-5031/" source="CVE"/>
		<reference ref_id="CVE-2025-50738" ref_url="https://www.suse.com/security/cve/CVE-2025-50738/" source="CVE"/>
		<reference ref_id="CVE-2025-51471" ref_url="https://www.suse.com/security/cve/CVE-2025-51471/" source="CVE"/>
		<reference ref_id="CVE-2025-52477" ref_url="https://www.suse.com/security/cve/CVE-2025-52477/" source="CVE"/>
		<reference ref_id="CVE-2025-52889" ref_url="https://www.suse.com/security/cve/CVE-2025-52889/" source="CVE"/>
		<reference ref_id="CVE-2025-52890" ref_url="https://www.suse.com/security/cve/CVE-2025-52890/" source="CVE"/>
		<reference ref_id="CVE-2025-52893" ref_url="https://www.suse.com/security/cve/CVE-2025-52893/" source="CVE"/>
		<reference ref_id="CVE-2025-52894" ref_url="https://www.suse.com/security/cve/CVE-2025-52894/" source="CVE"/>
		<reference ref_id="CVE-2025-52900" ref_url="https://www.suse.com/security/cve/CVE-2025-52900/" source="CVE"/>
		<reference ref_id="CVE-2025-52901" ref_url="https://www.suse.com/security/cve/CVE-2025-52901/" source="CVE"/>
		<reference ref_id="CVE-2025-52902" ref_url="https://www.suse.com/security/cve/CVE-2025-52902/" source="CVE"/>
		<reference ref_id="CVE-2025-52903" ref_url="https://www.suse.com/security/cve/CVE-2025-52903/" source="CVE"/>
		<reference ref_id="CVE-2025-52904" ref_url="https://www.suse.com/security/cve/CVE-2025-52904/" source="CVE"/>
		<reference ref_id="CVE-2025-52995" ref_url="https://www.suse.com/security/cve/CVE-2025-52995/" source="CVE"/>
		<reference ref_id="CVE-2025-52996" ref_url="https://www.suse.com/security/cve/CVE-2025-52996/" source="CVE"/>
		<reference ref_id="CVE-2025-52997" ref_url="https://www.suse.com/security/cve/CVE-2025-52997/" source="CVE"/>
		<reference ref_id="CVE-2025-53512" ref_url="https://www.suse.com/security/cve/CVE-2025-53512/" source="CVE"/>
		<reference ref_id="CVE-2025-53513" ref_url="https://www.suse.com/security/cve/CVE-2025-53513/" source="CVE"/>
		<reference ref_id="CVE-2025-53534" ref_url="https://www.suse.com/security/cve/CVE-2025-53534/" source="CVE"/>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<reference ref_id="CVE-2025-53632" ref_url="https://www.suse.com/security/cve/CVE-2025-53632/" source="CVE"/>
		<reference ref_id="CVE-2025-53633" ref_url="https://www.suse.com/security/cve/CVE-2025-53633/" source="CVE"/>
		<reference ref_id="CVE-2025-53634" ref_url="https://www.suse.com/security/cve/CVE-2025-53634/" source="CVE"/>
		<reference ref_id="CVE-2025-53826" ref_url="https://www.suse.com/security/cve/CVE-2025-53826/" source="CVE"/>
		<reference ref_id="CVE-2025-53893" ref_url="https://www.suse.com/security/cve/CVE-2025-53893/" source="CVE"/>
		<reference ref_id="CVE-2025-53942" ref_url="https://www.suse.com/security/cve/CVE-2025-53942/" source="CVE"/>
		<reference ref_id="CVE-2025-53945" ref_url="https://www.suse.com/security/cve/CVE-2025-53945/" source="CVE"/>
		<reference ref_id="CVE-2025-54059" ref_url="https://www.suse.com/security/cve/CVE-2025-54059/" source="CVE"/>
		<reference ref_id="CVE-2025-54379" ref_url="https://www.suse.com/security/cve/CVE-2025-54379/" source="CVE"/>
		<reference ref_id="CVE-2025-54386" ref_url="https://www.suse.com/security/cve/CVE-2025-54386/" source="CVE"/>
		<reference ref_id="CVE-2025-54388" ref_url="https://www.suse.com/security/cve/CVE-2025-54388/" source="CVE"/>
		<reference ref_id="CVE-2025-54410" ref_url="https://www.suse.com/security/cve/CVE-2025-54410/" source="CVE"/>
		<reference ref_id="CVE-2025-54424" ref_url="https://www.suse.com/security/cve/CVE-2025-54424/" source="CVE"/>
		<reference ref_id="CVE-2025-54576" ref_url="https://www.suse.com/security/cve/CVE-2025-54576/" source="CVE"/>
		<reference ref_id="CVE-2025-54799" ref_url="https://www.suse.com/security/cve/CVE-2025-54799/" source="CVE"/>
		<reference ref_id="CVE-2025-54801" ref_url="https://www.suse.com/security/cve/CVE-2025-54801/" source="CVE"/>
		<reference ref_id="CVE-2025-54996" ref_url="https://www.suse.com/security/cve/CVE-2025-54996/" source="CVE"/>
		<reference ref_id="CVE-2025-54997" ref_url="https://www.suse.com/security/cve/CVE-2025-54997/" source="CVE"/>
		<reference ref_id="CVE-2025-54998" ref_url="https://www.suse.com/security/cve/CVE-2025-54998/" source="CVE"/>
		<reference ref_id="CVE-2025-54999" ref_url="https://www.suse.com/security/cve/CVE-2025-54999/" source="CVE"/>
		<reference ref_id="CVE-2025-55000" ref_url="https://www.suse.com/security/cve/CVE-2025-55000/" source="CVE"/>
		<reference ref_id="CVE-2025-55001" ref_url="https://www.suse.com/security/cve/CVE-2025-55001/" source="CVE"/>
		<reference ref_id="CVE-2025-55003" ref_url="https://www.suse.com/security/cve/CVE-2025-55003/" source="CVE"/>
		<reference ref_id="CVE-2025-5689" ref_url="https://www.suse.com/security/cve/CVE-2025-5689/" source="CVE"/>
		<reference ref_id="CVE-2025-5981" ref_url="https://www.suse.com/security/cve/CVE-2025-5981/" source="CVE"/>
		<reference ref_id="CVE-2025-5999" ref_url="https://www.suse.com/security/cve/CVE-2025-5999/" source="CVE"/>
		<reference ref_id="CVE-2025-6000" ref_url="https://www.suse.com/security/cve/CVE-2025-6000/" source="CVE"/>
		<reference ref_id="CVE-2025-6004" ref_url="https://www.suse.com/security/cve/CVE-2025-6004/" source="CVE"/>
		<reference ref_id="CVE-2025-6011" ref_url="https://www.suse.com/security/cve/CVE-2025-6011/" source="CVE"/>
		<reference ref_id="CVE-2025-6013" ref_url="https://www.suse.com/security/cve/CVE-2025-6013/" source="CVE"/>
		<reference ref_id="CVE-2025-6014" ref_url="https://www.suse.com/security/cve/CVE-2025-6014/" source="CVE"/>
		<reference ref_id="CVE-2025-6015" ref_url="https://www.suse.com/security/cve/CVE-2025-6015/" source="CVE"/>
		<reference ref_id="CVE-2025-6023" ref_url="https://www.suse.com/security/cve/CVE-2025-6023/" source="CVE"/>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<reference ref_id="CVE-2025-6037" ref_url="https://www.suse.com/security/cve/CVE-2025-6037/" source="CVE"/>
		<reference ref_id="CVE-2025-6224" ref_url="https://www.suse.com/security/cve/CVE-2025-6224/" source="CVE"/>
		<reference ref_id="CVE-2025-6226" ref_url="https://www.suse.com/security/cve/CVE-2025-6226/" source="CVE"/>
		<reference ref_id="CVE-2025-6227" ref_url="https://www.suse.com/security/cve/CVE-2025-6227/" source="CVE"/>
		<reference ref_id="CVE-2025-6233" ref_url="https://www.suse.com/security/cve/CVE-2025-6233/" source="CVE"/>
		<reference ref_id="CVE-2025-6264" ref_url="https://www.suse.com/security/cve/CVE-2025-6264/" source="CVE"/>
		<reference ref_id="CVE-2025-6624" ref_url="https://www.suse.com/security/cve/CVE-2025-6624/" source="CVE"/>
		<reference ref_id="CVE-2025-7195" ref_url="https://www.suse.com/security/cve/CVE-2025-7195/" source="CVE"/>
		<reference ref_id="CVE-2025-8341" ref_url="https://www.suse.com/security/cve/CVE-2025-8341/" source="CVE"/>
		<description>
These are all security issues fixed in the govulncheck-vulndb-0.0.20250814T182633-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7561/">CVE-2015-7561 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7561">CVE-2015-7561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000056/">CVE-2017-1000056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000056">CVE-2017-1000056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1002102/">CVE-2017-1002102 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1002102">CVE-2017-1002102 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9232/">CVE-2017-9232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9232">CVE-2017-9232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1002100/">CVE-2018-1002100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002100">CVE-2018-1002100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1002101/">CVE-2018-1002101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002101">CVE-2018-1002101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16733/">CVE-2018-16733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16733">CVE-2018-16733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19184/">CVE-2018-19184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19184">CVE-2018-19184 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1002100/">CVE-2019-1002100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1002100">CVE-2019-1002100 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-1002101/">CVE-2019-1002101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1002101">CVE-2019-1002101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11243/">CVE-2019-11243 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11243">CVE-2019-11243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11245/">CVE-2019-11245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11245">CVE-2019-11245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11251/">CVE-2019-11251 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11251">CVE-2019-11251 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11253/">CVE-2019-11253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11253">CVE-2019-11253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15119/">CVE-2019-15119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15119">CVE-2019-15119 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10696">CVE-2020-10696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26240/">CVE-2020-26240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26240">CVE-2020-26240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26241/">CVE-2020-26241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26241">CVE-2020-26241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36846/">CVE-2020-36846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36846">CVE-2020-36846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8551/">CVE-2020-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8551">CVE-2020-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8555/">CVE-2020-8555 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8555">CVE-2020-8555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8557/">CVE-2020-8557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8557">CVE-2020-8557 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8558/">CVE-2020-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8558">CVE-2020-8558 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8562/">CVE-2020-8562 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8562">CVE-2020-8562 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8563/">CVE-2020-8563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8563">CVE-2020-8563 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8566/">CVE-2020-8566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8566">CVE-2020-8566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8911/">CVE-2020-8911 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8911">CVE-2020-8911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8912/">CVE-2020-8912 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8912">CVE-2020-8912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21411/">CVE-2021-21411 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21411">CVE-2021-21411 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25735/">CVE-2021-25735 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25735">CVE-2021-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-25736/">CVE-2021-25736 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25736">CVE-2021-25736 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25737/">CVE-2021-25737 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25737">CVE-2021-25737 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25741/">CVE-2021-25741 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25741">CVE-2021-25741 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25743/">CVE-2021-25743 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25743">CVE-2021-25743 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-29177/">CVE-2022-29177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29177">CVE-2022-29177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31022/">CVE-2022-31022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31022">CVE-2022-31022 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3162/">CVE-2022-3162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3162">CVE-2022-3162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31668/">CVE-2022-31668 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31668">CVE-2022-31668 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3294/">CVE-2022-3294 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3294">CVE-2022-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45157/">CVE-2022-45157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-45157">CVE-2022-45157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47930/">CVE-2022-47930 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47930">CVE-2022-47930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0109/">CVE-2023-0109 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0109">CVE-2023-0109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22644/">CVE-2023-22644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22644">CVE-2023-22644 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2431/">CVE-2023-2431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2431">CVE-2023-2431 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26248/">CVE-2023-26248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-26248">CVE-2023-26248 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2727/">CVE-2023-2727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2727">CVE-2023-2727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2728/">CVE-2023-2728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2728">CVE-2023-2728 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32197/">CVE-2023-32197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32197">CVE-2023-32197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32198/">CVE-2023-32198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32198">CVE-2023-32198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3676/">CVE-2023-3676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3676">CVE-2023-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3955/">CVE-2023-3955 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3955">CVE-2023-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42818/">CVE-2023-42818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42818">CVE-2023-42818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5528/">CVE-2023-5528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5528">CVE-2023-5528 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-0132/">CVE-2024-0132 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0132">CVE-2024-0132 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-0133/">CVE-2024-0133 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0133">CVE-2024-0133 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10005/">CVE-2024-10005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10005">CVE-2024-10005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10006/">CVE-2024-10006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10006">CVE-2024-10006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10086/">CVE-2024-10086 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10086">CVE-2024-10086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10214/">CVE-2024-10214 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10214">CVE-2024-10214 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-10220/">CVE-2024-10220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10220">CVE-2024-10220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10241/">CVE-2024-10241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10241">CVE-2024-10241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10389/">CVE-2024-10389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10389">CVE-2024-10389 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10452/">CVE-2024-10452 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10452">CVE-2024-10452 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-10846/">CVE-2024-10846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10846">CVE-2024-10846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10975/">CVE-2024-10975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10975">CVE-2024-10975 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11741/">CVE-2024-11741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11741">CVE-2024-11741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12055/">CVE-2024-12055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12055">CVE-2024-12055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12289/">CVE-2024-12289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12289">CVE-2024-12289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12401/">CVE-2024-12401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12401">CVE-2024-12401 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12678/">CVE-2024-12678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12678">CVE-2024-12678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12886/">CVE-2024-12886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12886">CVE-2024-12886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-13484/">CVE-2024-13484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13484">CVE-2024-13484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1725/">CVE-2024-1725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1725">CVE-2024-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22030/">CVE-2024-22030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22030">CVE-2024-22030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22031/">CVE-2024-22031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22031">CVE-2024-22031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22036/">CVE-2024-22036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22036">CVE-2024-22036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24425/">CVE-2024-24425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24425">CVE-2024-24425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24426/">CVE-2024-24426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24426">CVE-2024-24426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25131/">CVE-2024-25131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25131">CVE-2024-25131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25132/">CVE-2024-25132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25132">CVE-2024-25132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25133/">CVE-2024-25133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25133">CVE-2024-25133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28053/">CVE-2024-28053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28053">CVE-2024-28053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28892/">CVE-2024-28892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28892">CVE-2024-28892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-33662/">CVE-2024-33662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33662">CVE-2024-33662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35177/">CVE-2024-35177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35177">CVE-2024-35177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36402/">CVE-2024-36402 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36402">CVE-2024-36402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36403/">CVE-2024-36403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36403">CVE-2024-36403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36620/">CVE-2024-36620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36620">CVE-2024-36620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36621/">CVE-2024-36621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36621">CVE-2024-36621 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36623/">CVE-2024-36623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36623">CVE-2024-36623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36814/">CVE-2024-36814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36814">CVE-2024-36814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37032/">CVE-2024-37032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37032">CVE-2024-37032 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37820/">CVE-2024-37820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37820">CVE-2024-37820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38365/">CVE-2024-38365 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38365">CVE-2024-38365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39223/">CVE-2024-39223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39223">CVE-2024-39223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39720/">CVE-2024-39720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39720">CVE-2024-39720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40120/">CVE-2024-40120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40120">CVE-2024-40120 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-40635/">CVE-2024-40635 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40635">CVE-2024-40635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43784/">CVE-2024-43784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43784">CVE-2024-43784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43803/">CVE-2024-43803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43803">CVE-2024-43803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44337/">CVE-2024-44337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44337">CVE-2024-44337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44625/">CVE-2024-44625 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44625">CVE-2024-44625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44905/">CVE-2024-44905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44905">CVE-2024-44905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-44906/">CVE-2024-44906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44906">CVE-2024-44906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45039/">CVE-2024-45039 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45039">CVE-2024-45039 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45339/">CVE-2024-45339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45339">CVE-2024-45339 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-45340/">CVE-2024-45340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45340">CVE-2024-45340 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45387/">CVE-2024-45387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45387">CVE-2024-45387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45436/">CVE-2024-45436 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45436">CVE-2024-45436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45719/">CVE-2024-45719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45719">CVE-2024-45719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45794/">CVE-2024-45794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45794">CVE-2024-45794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46455/">CVE-2024-46455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46455">CVE-2024-46455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46528/">CVE-2024-46528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46528">CVE-2024-46528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46872/">CVE-2024-46872 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46872">CVE-2024-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47003/">CVE-2024-47003 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47003">CVE-2024-47003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47067/">CVE-2024-47067 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47067">CVE-2024-47067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47182/">CVE-2024-47182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47182">CVE-2024-47182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47401/">CVE-2024-47401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47401">CVE-2024-47401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47534/">CVE-2024-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47534">CVE-2024-47534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47616/">CVE-2024-47616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47616">CVE-2024-47616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47770/">CVE-2024-47770 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47770">CVE-2024-47770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47825/">CVE-2024-47825 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47825">CVE-2024-47825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47827/">CVE-2024-47827 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47827">CVE-2024-47827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47832/">CVE-2024-47832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47832">CVE-2024-47832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47877/">CVE-2024-47877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47877">CVE-2024-47877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48057/">CVE-2024-48057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48057">CVE-2024-48057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48872/">CVE-2024-48872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48872">CVE-2024-48872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48909/">CVE-2024-48909 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48909">CVE-2024-48909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48921/">CVE-2024-48921 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48921">CVE-2024-48921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49380/">CVE-2024-49380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49380">CVE-2024-49380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49381/">CVE-2024-49381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49381">CVE-2024-49381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49753/">CVE-2024-49753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49753">CVE-2024-49753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49757/">CVE-2024-49757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49757">CVE-2024-49757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50052/">CVE-2024-50052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50052">CVE-2024-50052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50312/">CVE-2024-50312 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50312">CVE-2024-50312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50354/">CVE-2024-50354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50354">CVE-2024-50354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50948/">CVE-2024-50948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50948">CVE-2024-50948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51491/">CVE-2024-51491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51491">CVE-2024-51491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51735/">CVE-2024-51735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51735">CVE-2024-51735 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51746/">CVE-2024-51746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51746">CVE-2024-51746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52003/">CVE-2024-52003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52003">CVE-2024-52003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52009/">CVE-2024-52009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52009">CVE-2024-52009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52010/">CVE-2024-52010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52010">CVE-2024-52010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52280/">CVE-2024-52280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52280">CVE-2024-52280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52281/">CVE-2024-52281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52281">CVE-2024-52281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52282/">CVE-2024-52282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52282">CVE-2024-52282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52290/">CVE-2024-52290 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52290">CVE-2024-52290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52308/">CVE-2024-52308 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52308">CVE-2024-52308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52309/">CVE-2024-52309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52309">CVE-2024-52309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52522/">CVE-2024-52522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52522">CVE-2024-52522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52529/">CVE-2024-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52529">CVE-2024-52529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52594/">CVE-2024-52594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52594">CVE-2024-52594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52602/">CVE-2024-52602 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52602">CVE-2024-52602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52791/">CVE-2024-52791 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52791">CVE-2024-52791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52801/">CVE-2024-52801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52801">CVE-2024-52801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52812/">CVE-2024-52812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52812">CVE-2024-52812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5321/">CVE-2024-5321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5321">CVE-2024-5321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53257/">CVE-2024-53257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53257">CVE-2024-53257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53259/">CVE-2024-53259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53259">CVE-2024-53259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53263/">CVE-2024-53263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53263">CVE-2024-53263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53264/">CVE-2024-53264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53264">CVE-2024-53264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53348/">CVE-2024-53348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53348">CVE-2024-53348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53351/">CVE-2024-53351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53351">CVE-2024-53351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53858/">CVE-2024-53858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53858">CVE-2024-53858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53859/">CVE-2024-53859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53859">CVE-2024-53859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53862/">CVE-2024-53862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53862">CVE-2024-53862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54083/">CVE-2024-54083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54083">CVE-2024-54083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54131/">CVE-2024-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54131">CVE-2024-54131 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-54132/">CVE-2024-54132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54132">CVE-2024-54132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54148/">CVE-2024-54148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54148">CVE-2024-54148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54682/">CVE-2024-54682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54682">CVE-2024-54682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55196/">CVE-2024-55196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55196">CVE-2024-55196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55601/">CVE-2024-55601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55601">CVE-2024-55601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55657/">CVE-2024-55657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55657">CVE-2024-55657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55658/">CVE-2024-55658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55658">CVE-2024-55658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55659/">CVE-2024-55659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55659">CVE-2024-55659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55660/">CVE-2024-55660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55660">CVE-2024-55660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55885/">CVE-2024-55885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55885">CVE-2024-55885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55947/">CVE-2024-55947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55947">CVE-2024-55947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55949/">CVE-2024-55949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55949">CVE-2024-55949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56138/">CVE-2024-56138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56138">CVE-2024-56138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56323/">CVE-2024-56323 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56323">CVE-2024-56323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56362/">CVE-2024-56362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56362">CVE-2024-56362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56513/">CVE-2024-56513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56513">CVE-2024-56513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56514/">CVE-2024-56514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56514">CVE-2024-56514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56515/">CVE-2024-56515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56515">CVE-2024-56515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56731/">CVE-2024-56731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56731">CVE-2024-56731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-57603/">CVE-2024-57603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57603">CVE-2024-57603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-57604/">CVE-2024-57604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57604">CVE-2024-57604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6156/">CVE-2024-6156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6156">CVE-2024-6156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6219/">CVE-2024-6219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6219">CVE-2024-6219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6538/">CVE-2024-6538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6538">CVE-2024-6538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7558/">CVE-2024-7558 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7558">CVE-2024-7558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7594/">CVE-2024-7594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7594">CVE-2024-7594 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7598/">CVE-2024-7598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7598">CVE-2024-7598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7631/">CVE-2024-7631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7631">CVE-2024-7631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8037/">CVE-2024-8037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8037">CVE-2024-8037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8038/">CVE-2024-8038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8038">CVE-2024-8038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8063/">CVE-2024-8063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8063">CVE-2024-8063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8185/">CVE-2024-8185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8185">CVE-2024-8185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8676/">CVE-2024-8676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8676">CVE-2024-8676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8901/">CVE-2024-8901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8901">CVE-2024-8901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8975/">CVE-2024-8975 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8975">CVE-2024-8975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8986/">CVE-2024-8986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8986">CVE-2024-8986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8996/">CVE-2024-8996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8996">CVE-2024-8996 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9042/">CVE-2024-9042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9042">CVE-2024-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9180/">CVE-2024-9180 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9180">CVE-2024-9180 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-9264/">CVE-2024-9264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9264">CVE-2024-9264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9312/">CVE-2024-9312 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9312">CVE-2024-9312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9313/">CVE-2024-9313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9313">CVE-2024-9313 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9486/">CVE-2024-9486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9486">CVE-2024-9486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9526/">CVE-2024-9526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9526">CVE-2024-9526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9594/">CVE-2024-9594 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9594">CVE-2024-9594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9779/">CVE-2024-9779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9779">CVE-2024-9779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9900/">CVE-2024-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9900">CVE-2024-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0312/">CVE-2025-0312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0312">CVE-2025-0312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0315/">CVE-2025-0315 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0315">CVE-2025-0315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0317/">CVE-2025-0317 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0317">CVE-2025-0317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0377/">CVE-2025-0377 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0377">CVE-2025-0377 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0426/">CVE-2025-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0426">CVE-2025-0426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0495/">CVE-2025-0495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0495">CVE-2025-0495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0750/">CVE-2025-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0750">CVE-2025-0750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0913/">CVE-2025-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0913">CVE-2025-0913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0928/">CVE-2025-0928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0928">CVE-2025-0928 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1088/">CVE-2025-1088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1088">CVE-2025-1088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1097/">CVE-2025-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1097">CVE-2025-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1098/">CVE-2025-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1098">CVE-2025-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1243/">CVE-2025-1243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1243">CVE-2025-1243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1293/">CVE-2025-1293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1293">CVE-2025-1293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1296/">CVE-2025-1296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1296">CVE-2025-1296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1386/">CVE-2025-1386 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1386">CVE-2025-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1412/">CVE-2025-1412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1412">CVE-2025-1412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1472/">CVE-2025-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1472">CVE-2025-1472 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1767/">CVE-2025-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1767">CVE-2025-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1792/">CVE-2025-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1792">CVE-2025-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1974/">CVE-2025-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1974">CVE-2025-1974 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-1975/">CVE-2025-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1975">CVE-2025-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20033/">CVE-2025-20033 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20033">CVE-2025-20033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20051/">CVE-2025-20051 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-20051">CVE-2025-20051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20086/">CVE-2025-20086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20086">CVE-2025-20086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20088/">CVE-2025-20088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20088">CVE-2025-20088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20621/">CVE-2025-20621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20621">CVE-2025-20621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21088/">CVE-2025-21088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21088">CVE-2025-21088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21609/">CVE-2025-21609 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21609">CVE-2025-21609 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21614/">CVE-2025-21614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21614">CVE-2025-21614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22130/">CVE-2025-22130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22130">CVE-2025-22130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22149/">CVE-2025-22149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22149">CVE-2025-22149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2241/">CVE-2025-2241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2241">CVE-2025-2241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22445/">CVE-2025-22445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22445">CVE-2025-22445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22449/">CVE-2025-22449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22449">CVE-2025-22449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-22865/">CVE-2025-22865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22865">CVE-2025-22865 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-22867/">CVE-2025-22867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22867">CVE-2025-22867 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-22952/">CVE-2025-22952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22952">CVE-2025-22952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23028/">CVE-2025-23028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23028">CVE-2025-23028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23047/">CVE-2025-23047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23047">CVE-2025-23047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23208/">CVE-2025-23208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23208">CVE-2025-23208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23216/">CVE-2025-23216 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23216">CVE-2025-23216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23387/">CVE-2025-23387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23387">CVE-2025-23387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23388/">CVE-2025-23388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23388">CVE-2025-23388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23389/">CVE-2025-23389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23389">CVE-2025-23389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-23390/">CVE-2025-23390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23390">CVE-2025-23390 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23391/">CVE-2025-23391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23391">CVE-2025-23391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24016/">CVE-2025-24016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24016">CVE-2025-24016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24030/">CVE-2025-24030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24030">CVE-2025-24030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2424/">CVE-2025-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2424">CVE-2025-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24337/">CVE-2025-24337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24337">CVE-2025-24337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24354/">CVE-2025-24354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24354">CVE-2025-24354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24355/">CVE-2025-24355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24355">CVE-2025-24355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24358/">CVE-2025-24358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24358">CVE-2025-24358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24366/">CVE-2025-24366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24366">CVE-2025-24366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24369/">CVE-2025-24369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24369">CVE-2025-24369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24371/">CVE-2025-24371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24371">CVE-2025-24371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24376/">CVE-2025-24376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24376">CVE-2025-24376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24513/">CVE-2025-24513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24513">CVE-2025-24513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24514/">CVE-2025-24514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24514">CVE-2025-24514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24526/">CVE-2025-24526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24526">CVE-2025-24526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2475/">CVE-2025-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2475">CVE-2025-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24784/">CVE-2025-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24784">CVE-2025-24784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24786/">CVE-2025-24786 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24786">CVE-2025-24786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24787/">CVE-2025-24787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24787">CVE-2025-24787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24806/">CVE-2025-24806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24806">CVE-2025-24806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24839/">CVE-2025-24839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24839">CVE-2025-24839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24866/">CVE-2025-24866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24866">CVE-2025-24866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24883/">CVE-2025-24883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24883">CVE-2025-24883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24884/">CVE-2025-24884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24884">CVE-2025-24884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24920/">CVE-2025-24920 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24920">CVE-2025-24920 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-24976/">CVE-2025-24976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24976">CVE-2025-24976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25068/">CVE-2025-25068 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25068">CVE-2025-25068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25196/">CVE-2025-25196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25196">CVE-2025-25196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25199/">CVE-2025-25199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25199">CVE-2025-25199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25204/">CVE-2025-25204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25204">CVE-2025-25204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25207/">CVE-2025-25207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25207">CVE-2025-25207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25208/">CVE-2025-25208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25208">CVE-2025-25208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2527/">CVE-2025-2527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2527">CVE-2025-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25274/">CVE-2025-25274 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25274">CVE-2025-25274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25279/">CVE-2025-25279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25279">CVE-2025-25279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-25294/">CVE-2025-25294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25294">CVE-2025-25294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2564/">CVE-2025-2564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2564">CVE-2025-2564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2570/">CVE-2025-2570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2570">CVE-2025-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2571/">CVE-2025-2571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2571">CVE-2025-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26260/">CVE-2025-26260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26260">CVE-2025-26260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27088/">CVE-2025-27088 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27088">CVE-2025-27088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27090/">CVE-2025-27090 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27090">CVE-2025-27090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27100/">CVE-2025-27100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27100">CVE-2025-27100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27112/">CVE-2025-27112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27112">CVE-2025-27112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27155/">CVE-2025-27155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27155">CVE-2025-27155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27403/">CVE-2025-27403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27403">CVE-2025-27403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27414/">CVE-2025-27414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27414">CVE-2025-27414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27421/">CVE-2025-27421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27421">CVE-2025-27421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27507/">CVE-2025-27507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27507">CVE-2025-27507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27509/">CVE-2025-27509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27509">CVE-2025-27509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27538/">CVE-2025-27538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27538">CVE-2025-27538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27571/">CVE-2025-27571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27571">CVE-2025-27571 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-27612/">CVE-2025-27612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27612">CVE-2025-27612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27616/">CVE-2025-27616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27616">CVE-2025-27616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27715/">CVE-2025-27715 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27715">CVE-2025-27715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27933/">CVE-2025-27933 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27933">CVE-2025-27933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-27936/">CVE-2025-27936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27936">CVE-2025-27936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29072/">CVE-2025-29072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29072">CVE-2025-29072 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-29778/">CVE-2025-29778 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29778">CVE-2025-29778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29781/">CVE-2025-29781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29781">CVE-2025-29781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29785/">CVE-2025-29785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29785">CVE-2025-29785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29786/">CVE-2025-29786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29786">CVE-2025-29786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29868/">CVE-2025-29868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29868">CVE-2025-29868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29914/">CVE-2025-29914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29914">CVE-2025-29914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-29922/">CVE-2025-29922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29922">CVE-2025-29922 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-29923/">CVE-2025-29923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-29923">CVE-2025-29923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30077/">CVE-2025-30077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30077">CVE-2025-30077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30086/">CVE-2025-30086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30086">CVE-2025-30086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30153/">CVE-2025-30153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30153">CVE-2025-30153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30162/">CVE-2025-30162 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30162">CVE-2025-30162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30163/">CVE-2025-30163 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30163">CVE-2025-30163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30179/">CVE-2025-30179 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30179">CVE-2025-30179 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30206/">CVE-2025-30206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30206">CVE-2025-30206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30215/">CVE-2025-30215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30215">CVE-2025-30215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30223/">CVE-2025-30223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30223">CVE-2025-30223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31135/">CVE-2025-31135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31135">CVE-2025-31135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31363/">CVE-2025-31363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31363">CVE-2025-31363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31483/">CVE-2025-31483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31483">CVE-2025-31483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31489/">CVE-2025-31489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31489">CVE-2025-31489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-31947/">CVE-2025-31947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31947">CVE-2025-31947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32019/">CVE-2025-32019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32019">CVE-2025-32019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32024/">CVE-2025-32024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32024">CVE-2025-32024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32025/">CVE-2025-32025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32025">CVE-2025-32025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32093/">CVE-2025-32093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32093">CVE-2025-32093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3227/">CVE-2025-3227 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3227">CVE-2025-3227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3228/">CVE-2025-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3228">CVE-2025-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3230/">CVE-2025-3230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3230">CVE-2025-3230 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32386/">CVE-2025-32386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32386">CVE-2025-32386 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32387/">CVE-2025-32387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32387">CVE-2025-32387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32431/">CVE-2025-32431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32431">CVE-2025-32431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32445/">CVE-2025-32445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32445">CVE-2025-32445 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-3260/">CVE-2025-3260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3260">CVE-2025-3260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32777/">CVE-2025-32777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32777">CVE-2025-32777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32793/">CVE-2025-32793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32793">CVE-2025-32793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-32963/">CVE-2025-32963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32963">CVE-2025-32963 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3415/">CVE-2025-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3415">CVE-2025-3415 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-3445/">CVE-2025-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3445">CVE-2025-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3446/">CVE-2025-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3446">CVE-2025-3446 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-3454/">CVE-2025-3454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3454">CVE-2025-3454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-35965/">CVE-2025-35965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-35965">CVE-2025-35965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3611/">CVE-2025-3611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3611">CVE-2025-3611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3757/">CVE-2025-3757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3757">CVE-2025-3757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3801/">CVE-2025-3801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3801">CVE-2025-3801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3879/">CVE-2025-3879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3879">CVE-2025-3879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3913/">CVE-2025-3913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3913">CVE-2025-3913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3931/">CVE-2025-3931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3931">CVE-2025-3931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4057/">CVE-2025-4057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4057">CVE-2025-4057 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-4123/">CVE-2025-4123 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4123">CVE-2025-4123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4128/">CVE-2025-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4128">CVE-2025-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-41395/">CVE-2025-41395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41395">CVE-2025-41395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-41423/">CVE-2025-41423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41423">CVE-2025-41423 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4166/">CVE-2025-4166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4166">CVE-2025-4166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4210/">CVE-2025-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4210">CVE-2025-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43915/">CVE-2025-43915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43915">CVE-2025-43915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43970/">CVE-2025-43970 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43970">CVE-2025-43970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43971/">CVE-2025-43971 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43971">CVE-2025-43971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43972/">CVE-2025-43972 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43972">CVE-2025-43972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-43973/">CVE-2025-43973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43973">CVE-2025-43973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4432/">CVE-2025-4432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4432">CVE-2025-4432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-44779/">CVE-2025-44779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-44779">CVE-2025-44779 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4563/">CVE-2025-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4563">CVE-2025-4563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4573/">CVE-2025-4573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4573">CVE-2025-4573 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46327/">CVE-2025-46327 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46327">CVE-2025-46327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46331/">CVE-2025-46331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46331">CVE-2025-46331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46342/">CVE-2025-46342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46342">CVE-2025-46342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4656/">CVE-2025-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4656">CVE-2025-4656 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4658/">CVE-2025-4658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4658">CVE-2025-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46599/">CVE-2025-46599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46599">CVE-2025-46599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46702/">CVE-2025-46702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46702">CVE-2025-46702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46721/">CVE-2025-46721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46721">CVE-2025-46721 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46735/">CVE-2025-46735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46735">CVE-2025-46735 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46815/">CVE-2025-46815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46815">CVE-2025-46815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-46816/">CVE-2025-46816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46816">CVE-2025-46816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47281/">CVE-2025-47281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47281">CVE-2025-47281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47282/">CVE-2025-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47282">CVE-2025-47282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47283/">CVE-2025-47283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47283">CVE-2025-47283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47284/">CVE-2025-47284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47284">CVE-2025-47284 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47290/">CVE-2025-47290 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47290">CVE-2025-47290 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47291/">CVE-2025-47291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47291">CVE-2025-47291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47871/">CVE-2025-47871 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47871">CVE-2025-47871 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47908/">CVE-2025-47908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47908">CVE-2025-47908 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-47933/">CVE-2025-47933 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47933">CVE-2025-47933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47943/">CVE-2025-47943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47943">CVE-2025-47943 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47950/">CVE-2025-47950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47950">CVE-2025-47950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47952/">CVE-2025-47952 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47952">CVE-2025-47952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48056/">CVE-2025-48056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48056">CVE-2025-48056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48069/">CVE-2025-48069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48069">CVE-2025-48069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48075/">CVE-2025-48075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48075">CVE-2025-48075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48371/">CVE-2025-48371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48371">CVE-2025-48371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48374/">CVE-2025-48374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48374">CVE-2025-48374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48494/">CVE-2025-48494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48494">CVE-2025-48494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48495/">CVE-2025-48495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48495">CVE-2025-48495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48710/">CVE-2025-48710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48710">CVE-2025-48710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48865/">CVE-2025-48865 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48865">CVE-2025-48865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48938/">CVE-2025-48938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48938">CVE-2025-48938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48948/">CVE-2025-48948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48948">CVE-2025-48948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-48949/">CVE-2025-48949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48949">CVE-2025-48949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49011/">CVE-2025-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49011">CVE-2025-49011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49136/">CVE-2025-49136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49136">CVE-2025-49136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49140/">CVE-2025-49140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49140">CVE-2025-49140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4922/">CVE-2025-4922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4922">CVE-2025-4922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4981/">CVE-2025-4981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4981">CVE-2025-4981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49825/">CVE-2025-49825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49825">CVE-2025-49825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5030/">CVE-2025-5030 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5030">CVE-2025-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5031/">CVE-2025-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5031">CVE-2025-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50738/">CVE-2025-50738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50738">CVE-2025-50738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-51471/">CVE-2025-51471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-51471">CVE-2025-51471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52477/">CVE-2025-52477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52477">CVE-2025-52477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52889/">CVE-2025-52889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52889">CVE-2025-52889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52890/">CVE-2025-52890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52890">CVE-2025-52890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52893/">CVE-2025-52893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52893">CVE-2025-52893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52894/">CVE-2025-52894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52894">CVE-2025-52894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52900/">CVE-2025-52900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52900">CVE-2025-52900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52901/">CVE-2025-52901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52901">CVE-2025-52901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52902/">CVE-2025-52902 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52902">CVE-2025-52902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52903/">CVE-2025-52903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52903">CVE-2025-52903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52904/">CVE-2025-52904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52904">CVE-2025-52904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52995/">CVE-2025-52995 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52995">CVE-2025-52995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52996/">CVE-2025-52996 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52996">CVE-2025-52996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-52997/">CVE-2025-52997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52997">CVE-2025-52997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53512/">CVE-2025-53512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53512">CVE-2025-53512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53513/">CVE-2025-53513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53513">CVE-2025-53513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53534/">CVE-2025-53534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53534">CVE-2025-53534 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53632/">CVE-2025-53632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53632">CVE-2025-53632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53633/">CVE-2025-53633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53633">CVE-2025-53633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53634/">CVE-2025-53634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53634">CVE-2025-53634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53826/">CVE-2025-53826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53826">CVE-2025-53826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53893/">CVE-2025-53893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53893">CVE-2025-53893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53942/">CVE-2025-53942 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53942">CVE-2025-53942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53945/">CVE-2025-53945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53945">CVE-2025-53945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54059/">CVE-2025-54059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54059">CVE-2025-54059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54379/">CVE-2025-54379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54379">CVE-2025-54379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54386/">CVE-2025-54386 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54386">CVE-2025-54386 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54388/">CVE-2025-54388 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54410/">CVE-2025-54410 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54410">CVE-2025-54410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54424/">CVE-2025-54424 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54424">CVE-2025-54424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54576/">CVE-2025-54576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54576">CVE-2025-54576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54799/">CVE-2025-54799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54799">CVE-2025-54799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54801/">CVE-2025-54801 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54801">CVE-2025-54801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54996/">CVE-2025-54996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54996">CVE-2025-54996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54997/">CVE-2025-54997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54997">CVE-2025-54997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54998/">CVE-2025-54998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54998">CVE-2025-54998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-54999/">CVE-2025-54999 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54999">CVE-2025-54999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55000/">CVE-2025-55000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55000">CVE-2025-55000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55001/">CVE-2025-55001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55001">CVE-2025-55001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55003/">CVE-2025-55003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55003">CVE-2025-55003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5689/">CVE-2025-5689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5689">CVE-2025-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5981/">CVE-2025-5981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5981">CVE-2025-5981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5999/">CVE-2025-5999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5999">CVE-2025-5999 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5.5/CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6000/">CVE-2025-6000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6000">CVE-2025-6000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6004/">CVE-2025-6004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6004">CVE-2025-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6011/">CVE-2025-6011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6011">CVE-2025-6011 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6013/">CVE-2025-6013 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6013">CVE-2025-6013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6014/">CVE-2025-6014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6014">CVE-2025-6014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6015/">CVE-2025-6015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6015">CVE-2025-6015 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6023/">CVE-2025-6023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6023">CVE-2025-6023 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6037/">CVE-2025-6037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6037">CVE-2025-6037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6224/">CVE-2025-6224 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6224">CVE-2025-6224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6226/">CVE-2025-6226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6226">CVE-2025-6226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6227/">CVE-2025-6227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6227">CVE-2025-6227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6233/">CVE-2025-6233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6233">CVE-2025-6233 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6264/">CVE-2025-6264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6264">CVE-2025-6264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6624/">CVE-2025-6624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6624">CVE-2025-6624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7195/">CVE-2025-7195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7195">CVE-2025-7195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-8341/">CVE-2025-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8341">CVE-2025-8341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027032" comment="govulncheck-vulndb-0.0.20250814T182633-160000.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93853" version="1" class="patch">
	<metadata>
		<title>gpgme-1.24.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.24.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3564">CVE-2014-3564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027033" comment="gpgme-1.24.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027034" comment="libgpgme-devel-1.24.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027035" comment="libgpgme11-1.24.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027036" comment="libgpgmepp-devel-1.24.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027037" comment="libgpgmepp6-1.24.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027038" comment="libqgpgmeqt6-15-1.24.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027039" comment="libqgpgmeqt6-devel-1.24.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027040" comment="python313-gpg-1.24.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93854" version="1" class="patch">
	<metadata>
		<title>gptfdisk-1.0.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-0256" ref_url="https://www.suse.com/security/cve/CVE-2020-0256/" source="CVE"/>
		<reference ref_id="CVE-2021-0308" ref_url="https://www.suse.com/security/cve/CVE-2021-0308/" source="CVE"/>
		<description>
These are all security issues fixed in the gptfdisk-1.0.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0256/">CVE-2020-0256 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0256">CVE-2020-0256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0308/">CVE-2021-0308 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0308">CVE-2021-0308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027041" comment="gptfdisk-1.0.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027042" comment="gptfdisk-fixparts-1.0.10-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93855" version="1" class="patch">
	<metadata>
		<title>graphite2-1.3.14-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<description>
These are all security issues fixed in the graphite2-1.3.14-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7999">CVE-2018-7999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027043" comment="graphite2-1.3.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027044" comment="graphite2-devel-1.3.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027045" comment="libgraphite2-3-1.3.14-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93856" version="1" class="patch">
	<metadata>
		<title>grep-3.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345/" source="CVE"/>
		<description>
These are all security issues fixed in the grep-3.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1345">CVE-2015-1345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027046" comment="grep-3.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027047" comment="grep-lang-3.11-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93857" version="1" class="patch">
	<metadata>
		<title>groff-1.23.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.23.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5044">CVE-2009-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5080">CVE-2009-5080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5081">CVE-2009-5081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027048" comment="groff-1.23.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027049" comment="groff-doc-1.23.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027050" comment="groff-full-1.23.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027051" comment="gxditview-1.23.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93858" version="1" class="patch">
	<metadata>
		<title>grpc-devel-1.59.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2024-11407" ref_url="https://www.suse.com/security/cve/CVE-2024-11407/" source="CVE"/>
		<reference ref_id="CVE-2024-7246" ref_url="https://www.suse.com/security/cve/CVE-2024-7246/" source="CVE"/>
		<description>
These are all security issues fixed in the grpc-devel-1.59.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green" href="https://www.suse.com/security/cve/CVE-2024-11407/">CVE-2024-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11407">CVE-2024-11407 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-7246/">CVE-2024-7246 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7246">CVE-2024-7246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027052" comment="grpc-devel-1.59.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027053" comment="libgrpc++1_59-1.59.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027054" comment="libgrpc1_59-1.59.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027055" comment="libgrpc36-1.59.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027056" comment="libupb36-1.59.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027057" comment="upb-devel-1.59.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93859" version="1" class="patch">
	<metadata>
		<title>grub2-2.12-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2021-3981" ref_url="https://www.suse.com/security/cve/CVE-2021-3981/" source="CVE"/>
		<reference ref_id="CVE-2021-46705" ref_url="https://www.suse.com/security/cve/CVE-2021-46705/" source="CVE"/>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28735" ref_url="https://www.suse.com/security/cve/CVE-2022-28735/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<reference ref_id="CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692/" source="CVE"/>
		<reference ref_id="CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693/" source="CVE"/>
		<reference ref_id="CVE-2024-45774" ref_url="https://www.suse.com/security/cve/CVE-2024-45774/" source="CVE"/>
		<reference ref_id="CVE-2024-45775" ref_url="https://www.suse.com/security/cve/CVE-2024-45775/" source="CVE"/>
		<reference ref_id="CVE-2024-45776" ref_url="https://www.suse.com/security/cve/CVE-2024-45776/" source="CVE"/>
		<reference ref_id="CVE-2024-45777" ref_url="https://www.suse.com/security/cve/CVE-2024-45777/" source="CVE"/>
		<reference ref_id="CVE-2024-45778" ref_url="https://www.suse.com/security/cve/CVE-2024-45778/" source="CVE"/>
		<reference ref_id="CVE-2024-45779" ref_url="https://www.suse.com/security/cve/CVE-2024-45779/" source="CVE"/>
		<reference ref_id="CVE-2024-45780" ref_url="https://www.suse.com/security/cve/CVE-2024-45780/" source="CVE"/>
		<reference ref_id="CVE-2024-45781" ref_url="https://www.suse.com/security/cve/CVE-2024-45781/" source="CVE"/>
		<reference ref_id="CVE-2024-45782" ref_url="https://www.suse.com/security/cve/CVE-2024-45782/" source="CVE"/>
		<reference ref_id="CVE-2024-45783" ref_url="https://www.suse.com/security/cve/CVE-2024-45783/" source="CVE"/>
		<reference ref_id="CVE-2024-49504" ref_url="https://www.suse.com/security/cve/CVE-2024-49504/" source="CVE"/>
		<reference ref_id="CVE-2024-56737" ref_url="https://www.suse.com/security/cve/CVE-2024-56737/" source="CVE"/>
		<reference ref_id="CVE-2025-0622" ref_url="https://www.suse.com/security/cve/CVE-2025-0622/" source="CVE"/>
		<reference ref_id="CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624/" source="CVE"/>
		<reference ref_id="CVE-2025-0677" ref_url="https://www.suse.com/security/cve/CVE-2025-0677/" source="CVE"/>
		<reference ref_id="CVE-2025-0678" ref_url="https://www.suse.com/security/cve/CVE-2025-0678/" source="CVE"/>
		<reference ref_id="CVE-2025-0684" ref_url="https://www.suse.com/security/cve/CVE-2025-0684/" source="CVE"/>
		<reference ref_id="CVE-2025-0685" ref_url="https://www.suse.com/security/cve/CVE-2025-0685/" source="CVE"/>
		<reference ref_id="CVE-2025-0686" ref_url="https://www.suse.com/security/cve/CVE-2025-0686/" source="CVE"/>
		<reference ref_id="CVE-2025-0689" ref_url="https://www.suse.com/security/cve/CVE-2025-0689/" source="CVE"/>
		<reference ref_id="CVE-2025-0690" ref_url="https://www.suse.com/security/cve/CVE-2025-0690/" source="CVE"/>
		<reference ref_id="CVE-2025-1118" ref_url="https://www.suse.com/security/cve/CVE-2025-1118/" source="CVE"/>
		<reference ref_id="CVE-2025-1125" ref_url="https://www.suse.com/security/cve/CVE-2025-1125/" source="CVE"/>
		<reference ref_id="CVE-2025-4382" ref_url="https://www.suse.com/security/cve/CVE-2025-4382/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.12-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3981/">CVE-2021-3981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46705/">CVE-2021-46705 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46705">CVE-2021-46705 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28735/">CVE-2022-28735 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45774/">CVE-2024-45774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45774">CVE-2024-45774 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45775/">CVE-2024-45775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45775">CVE-2024-45775 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45776/">CVE-2024-45776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45776">CVE-2024-45776 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45777/">CVE-2024-45777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45777">CVE-2024-45777 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-45778/">CVE-2024-45778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45778">CVE-2024-45778 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45779/">CVE-2024-45779 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45779">CVE-2024-45779 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45780/">CVE-2024-45780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45780">CVE-2024-45780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45781/">CVE-2024-45781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45781">CVE-2024-45781 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45782/">CVE-2024-45782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45782">CVE-2024-45782 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45783/">CVE-2024-45783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45783">CVE-2024-45783 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49504/">CVE-2024-49504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49504">CVE-2024-49504 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56737/">CVE-2024-56737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56737">CVE-2024-56737 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0622/">CVE-2025-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0622">CVE-2025-0622 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0677/">CVE-2025-0677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0677">CVE-2025-0677 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0678/">CVE-2025-0678 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0678">CVE-2025-0678 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0684/">CVE-2025-0684 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0684">CVE-2025-0684 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0685/">CVE-2025-0685 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0685">CVE-2025-0685 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0686/">CVE-2025-0686 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0686">CVE-2025-0686 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0689/">CVE-2025-0689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0689">CVE-2025-0689 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0690/">CVE-2025-0690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0690">CVE-2025-0690 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1118/">CVE-2025-1118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1118">CVE-2025-1118 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-1125/">CVE-2025-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1125">CVE-2025-1125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4382/">CVE-2025-4382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4382">CVE-2025-4382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027058" comment="grub2-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027059" comment="grub2-arm64-efi-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027060" comment="grub2-common-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027061" comment="grub2-i386-pc-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027062" comment="grub2-powerpc-ieee1275-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027063" comment="grub2-s390x-emu-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027064" comment="grub2-snapper-plugin-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027065" comment="grub2-systemd-sleep-plugin-2.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027066" comment="grub2-x86_64-efi-2.12-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93860" version="1" class="patch">
	<metadata>
		<title>gsasl-2.2.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-2469" ref_url="https://www.suse.com/security/cve/CVE-2022-2469/" source="CVE"/>
		<description>
These are all security issues fixed in the gsasl-2.2.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2469/">CVE-2022-2469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2469">CVE-2022-2469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027067" comment="gsasl-2.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027068" comment="gsasl-devel-2.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027069" comment="gsasl-lang-2.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027070" comment="libgsasl18-2.2.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93861" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.26.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="CVE-2017-5846" ref_url="https://www.suse.com/security/cve/CVE-2017-5846/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.26.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10198">CVE-2016-10198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10199">CVE-2016-10199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5839">CVE-2017-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5840">CVE-2017-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5841">CVE-2017-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5842">CVE-2017-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5843">CVE-2017-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5845">CVE-2017-5845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5846/">CVE-2017-5846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5846">CVE-2017-5846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027071" comment="gstreamer-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027072" comment="gstreamer-lang-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027073" comment="gstreamer-utils-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027074" comment="libgstreamer-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027075" comment="typelib-1_0-Gst-1_0-1.26.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93862" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.26.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="CVE-2023-37329" ref_url="https://www.suse.com/security/cve/CVE-2023-37329/" source="CVE"/>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<reference ref_id="CVE-2023-40475" ref_url="https://www.suse.com/security/cve/CVE-2023-40475/" source="CVE"/>
		<reference ref_id="CVE-2023-40476" ref_url="https://www.suse.com/security/cve/CVE-2023-40476/" source="CVE"/>
		<reference ref_id="CVE-2023-44429" ref_url="https://www.suse.com/security/cve/CVE-2023-44429/" source="CVE"/>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<reference ref_id="CVE-2023-50186" ref_url="https://www.suse.com/security/cve/CVE-2023-50186/" source="CVE"/>
		<reference ref_id="CVE-2024-0444" ref_url="https://www.suse.com/security/cve/CVE-2024-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.26.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37329/">CVE-2023-37329 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37329">CVE-2023-37329 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40475/">CVE-2023-40475 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40475">CVE-2023-40475 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-40476/">CVE-2023-40476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40476">CVE-2023-40476 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44429/">CVE-2023-44429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44429">CVE-2023-44429 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50186/">CVE-2023-50186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50186">CVE-2023-50186 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0444/">CVE-2024-0444 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0444">CVE-2024-0444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027076" comment="gstreamer-plugins-bad-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027077" comment="gstreamer-plugins-bad-lang-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027078" comment="gstreamer-transcoder-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027079" comment="libgstadaptivedemux-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027080" comment="libgstanalytics-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027081" comment="libgstbadaudio-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027082" comment="libgstbasecamerabinsrc-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027083" comment="libgstcodecparsers-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027084" comment="libgstcodecs-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027085" comment="libgstcuda-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027086" comment="libgstinsertbin-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027087" comment="libgstisoff-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027088" comment="libgstmpegts-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027089" comment="libgstmse-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027090" comment="libgstphotography-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027091" comment="libgstplay-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027092" comment="libgstplayer-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027093" comment="libgstsctp-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027094" comment="libgsttranscoder-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027095" comment="libgsturidownloader-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027096" comment="libgstva-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027097" comment="libgstvulkan-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027098" comment="libgstwayland-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027099" comment="libgstwebrtc-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027100" comment="libgstwebrtcnice-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027101" comment="typelib-1_0-CudaGst-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027102" comment="typelib-1_0-GstAnalytics-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027103" comment="typelib-1_0-GstBadAudio-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027104" comment="typelib-1_0-GstCodecs-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027105" comment="typelib-1_0-GstCuda-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027106" comment="typelib-1_0-GstInsertBin-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027107" comment="typelib-1_0-GstMpegts-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027108" comment="typelib-1_0-GstMse-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027109" comment="typelib-1_0-GstPlay-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027110" comment="typelib-1_0-GstPlayer-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027111" comment="typelib-1_0-GstTranscoder-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027112" comment="typelib-1_0-GstVa-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027113" comment="typelib-1_0-GstVulkan-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027114" comment="typelib-1_0-GstVulkanWayland-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027115" comment="typelib-1_0-GstVulkanXCB-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027116" comment="typelib-1_0-GstWebRTC-1_0-1.26.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93863" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.26.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<reference ref_id="CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453/" source="CVE"/>
		<reference ref_id="CVE-2024-47538" ref_url="https://www.suse.com/security/cve/CVE-2024-47538/" source="CVE"/>
		<reference ref_id="CVE-2024-47542" ref_url="https://www.suse.com/security/cve/CVE-2024-47542/" source="CVE"/>
		<reference ref_id="CVE-2024-47600" ref_url="https://www.suse.com/security/cve/CVE-2024-47600/" source="CVE"/>
		<reference ref_id="CVE-2024-47607" ref_url="https://www.suse.com/security/cve/CVE-2024-47607/" source="CVE"/>
		<reference ref_id="CVE-2024-47615" ref_url="https://www.suse.com/security/cve/CVE-2024-47615/" source="CVE"/>
		<reference ref_id="CVE-2024-47835" ref_url="https://www.suse.com/security/cve/CVE-2024-47835/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.26.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47538/">CVE-2024-47538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47538">CVE-2024-47538 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47542/">CVE-2024-47542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47542">CVE-2024-47542 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47600/">CVE-2024-47600 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47600">CVE-2024-47600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47607/">CVE-2024-47607 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47607">CVE-2024-47607 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47615/">CVE-2024-47615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47615">CVE-2024-47615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47835/">CVE-2024-47835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47835">CVE-2024-47835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027117" comment="gstreamer-plugins-base-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027118" comment="gstreamer-plugins-base-lang-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027119" comment="libgstallocators-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027120" comment="libgstapp-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027121" comment="libgstaudio-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027122" comment="libgstfft-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027123" comment="libgstgl-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027124" comment="libgstpbutils-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027125" comment="libgstriff-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027126" comment="libgstrtp-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027127" comment="libgstrtsp-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027128" comment="libgstsdp-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027129" comment="libgsttag-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027130" comment="libgstvideo-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027131" comment="typelib-1_0-GstAllocators-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027132" comment="typelib-1_0-GstApp-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027133" comment="typelib-1_0-GstAudio-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027134" comment="typelib-1_0-GstGL-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027135" comment="typelib-1_0-GstGLEGL-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027136" comment="typelib-1_0-GstGLWayland-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027137" comment="typelib-1_0-GstGLX11-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027138" comment="typelib-1_0-GstPbutils-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027139" comment="typelib-1_0-GstRtp-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027140" comment="typelib-1_0-GstRtsp-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027141" comment="typelib-1_0-GstSdp-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027142" comment="typelib-1_0-GstTag-1_0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027143" comment="typelib-1_0-GstVideo-1_0-1.26.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93864" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.26.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="CVE-2021-3497" ref_url="https://www.suse.com/security/cve/CVE-2021-3497/" source="CVE"/>
		<reference ref_id="CVE-2021-3498" ref_url="https://www.suse.com/security/cve/CVE-2021-3498/" source="CVE"/>
		<reference ref_id="CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920/" source="CVE"/>
		<reference ref_id="CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921/" source="CVE"/>
		<reference ref_id="CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922/" source="CVE"/>
		<reference ref_id="CVE-2022-1923" ref_url="https://www.suse.com/security/cve/CVE-2022-1923/" source="CVE"/>
		<reference ref_id="CVE-2022-1924" ref_url="https://www.suse.com/security/cve/CVE-2022-1924/" source="CVE"/>
		<reference ref_id="CVE-2022-1925" ref_url="https://www.suse.com/security/cve/CVE-2022-1925/" source="CVE"/>
		<reference ref_id="CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122/" source="CVE"/>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<reference ref_id="CVE-2024-47537" ref_url="https://www.suse.com/security/cve/CVE-2024-47537/" source="CVE"/>
		<reference ref_id="CVE-2024-47539" ref_url="https://www.suse.com/security/cve/CVE-2024-47539/" source="CVE"/>
		<reference ref_id="CVE-2024-47540" ref_url="https://www.suse.com/security/cve/CVE-2024-47540/" source="CVE"/>
		<reference ref_id="CVE-2024-47543" ref_url="https://www.suse.com/security/cve/CVE-2024-47543/" source="CVE"/>
		<reference ref_id="CVE-2024-47544" ref_url="https://www.suse.com/security/cve/CVE-2024-47544/" source="CVE"/>
		<reference ref_id="CVE-2024-47545" ref_url="https://www.suse.com/security/cve/CVE-2024-47545/" source="CVE"/>
		<reference ref_id="CVE-2024-47546" ref_url="https://www.suse.com/security/cve/CVE-2024-47546/" source="CVE"/>
		<reference ref_id="CVE-2024-47596" ref_url="https://www.suse.com/security/cve/CVE-2024-47596/" source="CVE"/>
		<reference ref_id="CVE-2024-47597" ref_url="https://www.suse.com/security/cve/CVE-2024-47597/" source="CVE"/>
		<reference ref_id="CVE-2024-47598" ref_url="https://www.suse.com/security/cve/CVE-2024-47598/" source="CVE"/>
		<reference ref_id="CVE-2024-47599" ref_url="https://www.suse.com/security/cve/CVE-2024-47599/" source="CVE"/>
		<reference ref_id="CVE-2024-47601" ref_url="https://www.suse.com/security/cve/CVE-2024-47601/" source="CVE"/>
		<reference ref_id="CVE-2024-47602" ref_url="https://www.suse.com/security/cve/CVE-2024-47602/" source="CVE"/>
		<reference ref_id="CVE-2024-47603" ref_url="https://www.suse.com/security/cve/CVE-2024-47603/" source="CVE"/>
		<reference ref_id="CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606/" source="CVE"/>
		<reference ref_id="CVE-2024-47613" ref_url="https://www.suse.com/security/cve/CVE-2024-47613/" source="CVE"/>
		<reference ref_id="CVE-2024-47774" ref_url="https://www.suse.com/security/cve/CVE-2024-47774/" source="CVE"/>
		<reference ref_id="CVE-2024-47775" ref_url="https://www.suse.com/security/cve/CVE-2024-47775/" source="CVE"/>
		<reference ref_id="CVE-2024-47776" ref_url="https://www.suse.com/security/cve/CVE-2024-47776/" source="CVE"/>
		<reference ref_id="CVE-2024-47777" ref_url="https://www.suse.com/security/cve/CVE-2024-47777/" source="CVE"/>
		<reference ref_id="CVE-2024-47778" ref_url="https://www.suse.com/security/cve/CVE-2024-47778/" source="CVE"/>
		<reference ref_id="CVE-2024-47834" ref_url="https://www.suse.com/security/cve/CVE-2024-47834/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.26.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3497/">CVE-2021-3497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3497">CVE-2021-3497 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3498/">CVE-2021-3498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3498">CVE-2021-3498 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1920">CVE-2022-1920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1921">CVE-2022-1921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1922">CVE-2022-1922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1923/">CVE-2022-1923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1923">CVE-2022-1923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1924/">CVE-2022-1924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1924">CVE-2022-1924 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1925/">CVE-2022-1925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1925">CVE-2022-1925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2122">CVE-2022-2122 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47537/">CVE-2024-47537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47537">CVE-2024-47537 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47539/">CVE-2024-47539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47539">CVE-2024-47539 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47540/">CVE-2024-47540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47540">CVE-2024-47540 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47543/">CVE-2024-47543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47543">CVE-2024-47543 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47544/">CVE-2024-47544 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47544">CVE-2024-47544 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47545/">CVE-2024-47545 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47545">CVE-2024-47545 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47546/">CVE-2024-47546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47546">CVE-2024-47546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47596/">CVE-2024-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47596">CVE-2024-47596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47597/">CVE-2024-47597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47597">CVE-2024-47597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47598/">CVE-2024-47598 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47598">CVE-2024-47598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47599/">CVE-2024-47599 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47599">CVE-2024-47599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47601/">CVE-2024-47601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47601">CVE-2024-47601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47602/">CVE-2024-47602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47602">CVE-2024-47602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47603/">CVE-2024-47603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47603">CVE-2024-47603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47613/">CVE-2024-47613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47613">CVE-2024-47613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47774/">CVE-2024-47774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47774">CVE-2024-47774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47775/">CVE-2024-47775 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47775">CVE-2024-47775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47776/">CVE-2024-47776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47776">CVE-2024-47776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47777/">CVE-2024-47777 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47777">CVE-2024-47777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47778/">CVE-2024-47778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47778">CVE-2024-47778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47834/">CVE-2024-47834 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47834">CVE-2024-47834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027144" comment="gstreamer-plugins-good-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027145" comment="gstreamer-plugins-good-extra-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027146" comment="gstreamer-plugins-good-gtk-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027147" comment="gstreamer-plugins-good-jack-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027148" comment="gstreamer-plugins-good-lang-1.26.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93865" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-ugly-1.26.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2023-38103" ref_url="https://www.suse.com/security/cve/CVE-2023-38103/" source="CVE"/>
		<reference ref_id="CVE-2023-38104" ref_url="https://www.suse.com/security/cve/CVE-2023-38104/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-ugly-1.26.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38103/">CVE-2023-38103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38103">CVE-2023-38103 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38104/">CVE-2023-38104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38104">CVE-2023-38104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027149" comment="gstreamer-plugins-ugly-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027150" comment="gstreamer-plugins-ugly-lang-1.26.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93866" version="1" class="patch">
	<metadata>
		<title>guava-33.2.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-8908" ref_url="https://www.suse.com/security/cve/CVE-2020-8908/" source="CVE"/>
		<reference ref_id="CVE-2023-2976" ref_url="https://www.suse.com/security/cve/CVE-2023-2976/" source="CVE"/>
		<description>
These are all security issues fixed in the guava-33.2.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8908/">CVE-2020-8908 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8908">CVE-2020-8908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2976/">CVE-2023-2976 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976">CVE-2023-2976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027151" comment="guava-33.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027152" comment="guava-javadoc-33.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027153" comment="guava-testlib-33.2.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93867" version="1" class="patch">
	<metadata>
		<title>guestfs-tools-1.54.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-tools-1.54.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027154" comment="guestfs-tools-1.54.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027155" comment="guestfs-tools-bash-completion-1.54.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027156" comment="guestfs-tools-man-pages-ja-1.54.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027157" comment="guestfs-tools-man-pages-uk-1.54.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027158" comment="virt-v2v-2.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027159" comment="virt-v2v-bash-completion-2.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027160" comment="virt-v2v-man-pages-ja-2.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027161" comment="virt-v2v-man-pages-uk-2.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027162" comment="virt-win-reg-1.54.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93868" version="1" class="patch">
	<metadata>
		<title>guile-3.0.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="CVE-2016-8606" ref_url="https://www.suse.com/security/cve/CVE-2016-8606/" source="CVE"/>
		<description>
These are all security issues fixed in the guile-3.0.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8605">CVE-2016-8605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8606/">CVE-2016-8606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8606">CVE-2016-8606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027163" comment="guile-3.0.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027164" comment="guile-devel-3.0.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027165" comment="guile-modules-3_0-3.0.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027166" comment="libguile-3_0-1-3.0.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93869" version="1" class="patch">
	<metadata>
		<title>gupnp-doc-1.6.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-12695" ref_url="https://www.suse.com/security/cve/CVE-2020-12695/" source="CVE"/>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<description>
These are all security issues fixed in the gupnp-doc-1.6.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12695/">CVE-2020-12695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12695">CVE-2020-12695 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33516">CVE-2021-33516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027167" comment="gupnp-doc-1.6.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027168" comment="libgupnp-1_6-0-1.6.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027169" comment="typelib-1_0-GUPnP-1_0-1.6.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93870" version="1" class="patch">
	<metadata>
		<title>gvfs-1.57.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-12447" ref_url="https://www.suse.com/security/cve/CVE-2019-12447/" source="CVE"/>
		<reference ref_id="CVE-2019-12448" ref_url="https://www.suse.com/security/cve/CVE-2019-12448/" source="CVE"/>
		<reference ref_id="CVE-2019-12449" ref_url="https://www.suse.com/security/cve/CVE-2019-12449/" source="CVE"/>
		<reference ref_id="CVE-2019-12795" ref_url="https://www.suse.com/security/cve/CVE-2019-12795/" source="CVE"/>
		<reference ref_id="CVE-2019-3827" ref_url="https://www.suse.com/security/cve/CVE-2019-3827/" source="CVE"/>
		<description>
These are all security issues fixed in the gvfs-1.57.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12447/">CVE-2019-12447 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12447">CVE-2019-12447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12448/">CVE-2019-12448 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12448">CVE-2019-12448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12449/">CVE-2019-12449 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12449">CVE-2019-12449 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12795/">CVE-2019-12795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12795">CVE-2019-12795 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3827/">CVE-2019-3827 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3827">CVE-2019-3827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027170" comment="gvfs-1.57.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027171" comment="gvfs-backends-1.57.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027172" comment="gvfs-fuse-1.57.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027173" comment="gvfs-lang-1.57.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93871" version="1" class="patch">
	<metadata>
		<title>gvim-9.1.1406-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0156" ref_url="https://www.suse.com/security/cve/CVE-2022-0156/" source="CVE"/>
		<reference ref_id="CVE-2022-0213" ref_url="https://www.suse.com/security/cve/CVE-2022-0213/" source="CVE"/>
		<reference ref_id="CVE-2022-0261" ref_url="https://www.suse.com/security/cve/CVE-2022-0261/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0359" ref_url="https://www.suse.com/security/cve/CVE-2022-0359/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0368" ref_url="https://www.suse.com/security/cve/CVE-2022-0368/" source="CVE"/>
		<reference ref_id="CVE-2022-0392" ref_url="https://www.suse.com/security/cve/CVE-2022-0392/" source="CVE"/>
		<reference ref_id="CVE-2022-0393" ref_url="https://www.suse.com/security/cve/CVE-2022-0393/" source="CVE"/>
		<reference ref_id="CVE-2022-0407" ref_url="https://www.suse.com/security/cve/CVE-2022-0407/" source="CVE"/>
		<reference ref_id="CVE-2022-0408" ref_url="https://www.suse.com/security/cve/CVE-2022-0408/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="CVE-2022-0417" ref_url="https://www.suse.com/security/cve/CVE-2022-0417/" source="CVE"/>
		<reference ref_id="CVE-2022-0443" ref_url="https://www.suse.com/security/cve/CVE-2022-0443/" source="CVE"/>
		<reference ref_id="CVE-2022-0554" ref_url="https://www.suse.com/security/cve/CVE-2022-0554/" source="CVE"/>
		<reference ref_id="CVE-2022-0572" ref_url="https://www.suse.com/security/cve/CVE-2022-0572/" source="CVE"/>
		<reference ref_id="CVE-2022-0629" ref_url="https://www.suse.com/security/cve/CVE-2022-0629/" source="CVE"/>
		<reference ref_id="CVE-2022-0685" ref_url="https://www.suse.com/security/cve/CVE-2022-0685/" source="CVE"/>
		<reference ref_id="CVE-2022-0696" ref_url="https://www.suse.com/security/cve/CVE-2022-0696/" source="CVE"/>
		<reference ref_id="CVE-2022-0714" ref_url="https://www.suse.com/security/cve/CVE-2022-0714/" source="CVE"/>
		<reference ref_id="CVE-2022-0729" ref_url="https://www.suse.com/security/cve/CVE-2022-0729/" source="CVE"/>
		<reference ref_id="CVE-2022-0943" ref_url="https://www.suse.com/security/cve/CVE-2022-0943/" source="CVE"/>
		<reference ref_id="CVE-2022-1154" ref_url="https://www.suse.com/security/cve/CVE-2022-1154/" source="CVE"/>
		<reference ref_id="CVE-2022-1160" ref_url="https://www.suse.com/security/cve/CVE-2022-1160/" source="CVE"/>
		<reference ref_id="CVE-2022-1381" ref_url="https://www.suse.com/security/cve/CVE-2022-1381/" source="CVE"/>
		<reference ref_id="CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420/" source="CVE"/>
		<reference ref_id="CVE-2022-1616" ref_url="https://www.suse.com/security/cve/CVE-2022-1616/" source="CVE"/>
		<reference ref_id="CVE-2022-1619" ref_url="https://www.suse.com/security/cve/CVE-2022-1619/" source="CVE"/>
		<reference ref_id="CVE-2022-1620" ref_url="https://www.suse.com/security/cve/CVE-2022-1620/" source="CVE"/>
		<reference ref_id="CVE-2022-1621" ref_url="https://www.suse.com/security/cve/CVE-2022-1621/" source="CVE"/>
		<reference ref_id="CVE-2022-1629" ref_url="https://www.suse.com/security/cve/CVE-2022-1629/" source="CVE"/>
		<reference ref_id="CVE-2022-1674" ref_url="https://www.suse.com/security/cve/CVE-2022-1674/" source="CVE"/>
		<reference ref_id="CVE-2022-1720" ref_url="https://www.suse.com/security/cve/CVE-2022-1720/" source="CVE"/>
		<reference ref_id="CVE-2022-1733" ref_url="https://www.suse.com/security/cve/CVE-2022-1733/" source="CVE"/>
		<reference ref_id="CVE-2022-1735" ref_url="https://www.suse.com/security/cve/CVE-2022-1735/" source="CVE"/>
		<reference ref_id="CVE-2022-1769" ref_url="https://www.suse.com/security/cve/CVE-2022-1769/" source="CVE"/>
		<reference ref_id="CVE-2022-1771" ref_url="https://www.suse.com/security/cve/CVE-2022-1771/" source="CVE"/>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1796" ref_url="https://www.suse.com/security/cve/CVE-2022-1796/" source="CVE"/>
		<reference ref_id="CVE-2022-1851" ref_url="https://www.suse.com/security/cve/CVE-2022-1851/" source="CVE"/>
		<reference ref_id="CVE-2022-1886" ref_url="https://www.suse.com/security/cve/CVE-2022-1886/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1898" ref_url="https://www.suse.com/security/cve/CVE-2022-1898/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<reference ref_id="CVE-2022-1942" ref_url="https://www.suse.com/security/cve/CVE-2022-1942/" source="CVE"/>
		<reference ref_id="CVE-2022-1968" ref_url="https://www.suse.com/security/cve/CVE-2022-1968/" source="CVE"/>
		<reference ref_id="CVE-2022-2000" ref_url="https://www.suse.com/security/cve/CVE-2022-2000/" source="CVE"/>
		<reference ref_id="CVE-2022-2042" ref_url="https://www.suse.com/security/cve/CVE-2022-2042/" source="CVE"/>
		<reference ref_id="CVE-2022-2124" ref_url="https://www.suse.com/security/cve/CVE-2022-2124/" source="CVE"/>
		<reference ref_id="CVE-2022-2125" ref_url="https://www.suse.com/security/cve/CVE-2022-2125/" source="CVE"/>
		<reference ref_id="CVE-2022-2126" ref_url="https://www.suse.com/security/cve/CVE-2022-2126/" source="CVE"/>
		<reference ref_id="CVE-2022-2129" ref_url="https://www.suse.com/security/cve/CVE-2022-2129/" source="CVE"/>
		<reference ref_id="CVE-2022-2175" ref_url="https://www.suse.com/security/cve/CVE-2022-2175/" source="CVE"/>
		<reference ref_id="CVE-2022-2182" ref_url="https://www.suse.com/security/cve/CVE-2022-2182/" source="CVE"/>
		<reference ref_id="CVE-2022-2183" ref_url="https://www.suse.com/security/cve/CVE-2022-2183/" source="CVE"/>
		<reference ref_id="CVE-2022-2206" ref_url="https://www.suse.com/security/cve/CVE-2022-2206/" source="CVE"/>
		<reference ref_id="CVE-2022-2207" ref_url="https://www.suse.com/security/cve/CVE-2022-2207/" source="CVE"/>
		<reference ref_id="CVE-2022-2208" ref_url="https://www.suse.com/security/cve/CVE-2022-2208/" source="CVE"/>
		<reference ref_id="CVE-2022-2210" ref_url="https://www.suse.com/security/cve/CVE-2022-2210/" source="CVE"/>
		<reference ref_id="CVE-2022-2231" ref_url="https://www.suse.com/security/cve/CVE-2022-2231/" source="CVE"/>
		<reference ref_id="CVE-2022-2257" ref_url="https://www.suse.com/security/cve/CVE-2022-2257/" source="CVE"/>
		<reference ref_id="CVE-2022-2264" ref_url="https://www.suse.com/security/cve/CVE-2022-2264/" source="CVE"/>
		<reference ref_id="CVE-2022-2284" ref_url="https://www.suse.com/security/cve/CVE-2022-2284/" source="CVE"/>
		<reference ref_id="CVE-2022-2285" ref_url="https://www.suse.com/security/cve/CVE-2022-2285/" source="CVE"/>
		<reference ref_id="CVE-2022-2286" ref_url="https://www.suse.com/security/cve/CVE-2022-2286/" source="CVE"/>
		<reference ref_id="CVE-2022-2287" ref_url="https://www.suse.com/security/cve/CVE-2022-2287/" source="CVE"/>
		<reference ref_id="CVE-2022-2288" ref_url="https://www.suse.com/security/cve/CVE-2022-2288/" source="CVE"/>
		<reference ref_id="CVE-2022-2289" ref_url="https://www.suse.com/security/cve/CVE-2022-2289/" source="CVE"/>
		<reference ref_id="CVE-2022-2304" ref_url="https://www.suse.com/security/cve/CVE-2022-2304/" source="CVE"/>
		<reference ref_id="CVE-2022-2343" ref_url="https://www.suse.com/security/cve/CVE-2022-2343/" source="CVE"/>
		<reference ref_id="CVE-2022-2344" ref_url="https://www.suse.com/security/cve/CVE-2022-2344/" source="CVE"/>
		<reference ref_id="CVE-2022-2345" ref_url="https://www.suse.com/security/cve/CVE-2022-2345/" source="CVE"/>
		<reference ref_id="CVE-2022-2522" ref_url="https://www.suse.com/security/cve/CVE-2022-2522/" source="CVE"/>
		<reference ref_id="CVE-2022-2571" ref_url="https://www.suse.com/security/cve/CVE-2022-2571/" source="CVE"/>
		<reference ref_id="CVE-2022-2580" ref_url="https://www.suse.com/security/cve/CVE-2022-2580/" source="CVE"/>
		<reference ref_id="CVE-2022-2581" ref_url="https://www.suse.com/security/cve/CVE-2022-2581/" source="CVE"/>
		<reference ref_id="CVE-2022-2598" ref_url="https://www.suse.com/security/cve/CVE-2022-2598/" source="CVE"/>
		<reference ref_id="CVE-2022-2816" ref_url="https://www.suse.com/security/cve/CVE-2022-2816/" source="CVE"/>
		<reference ref_id="CVE-2022-2817" ref_url="https://www.suse.com/security/cve/CVE-2022-2817/" source="CVE"/>
		<reference ref_id="CVE-2022-2819" ref_url="https://www.suse.com/security/cve/CVE-2022-2819/" source="CVE"/>
		<reference ref_id="CVE-2022-2845" ref_url="https://www.suse.com/security/cve/CVE-2022-2845/" source="CVE"/>
		<reference ref_id="CVE-2022-2849" ref_url="https://www.suse.com/security/cve/CVE-2022-2849/" source="CVE"/>
		<reference ref_id="CVE-2022-2862" ref_url="https://www.suse.com/security/cve/CVE-2022-2862/" source="CVE"/>
		<reference ref_id="CVE-2022-2874" ref_url="https://www.suse.com/security/cve/CVE-2022-2874/" source="CVE"/>
		<reference ref_id="CVE-2022-2889" ref_url="https://www.suse.com/security/cve/CVE-2022-2889/" source="CVE"/>
		<reference ref_id="CVE-2022-2923" ref_url="https://www.suse.com/security/cve/CVE-2022-2923/" source="CVE"/>
		<reference ref_id="CVE-2022-2946" ref_url="https://www.suse.com/security/cve/CVE-2022-2946/" source="CVE"/>
		<reference ref_id="CVE-2022-2980" ref_url="https://www.suse.com/security/cve/CVE-2022-2980/" source="CVE"/>
		<reference ref_id="CVE-2022-2982" ref_url="https://www.suse.com/security/cve/CVE-2022-2982/" source="CVE"/>
		<reference ref_id="CVE-2022-3016" ref_url="https://www.suse.com/security/cve/CVE-2022-3016/" source="CVE"/>
		<reference ref_id="CVE-2022-3037" ref_url="https://www.suse.com/security/cve/CVE-2022-3037/" source="CVE"/>
		<reference ref_id="CVE-2022-3099" ref_url="https://www.suse.com/security/cve/CVE-2022-3099/" source="CVE"/>
		<reference ref_id="CVE-2022-3134" ref_url="https://www.suse.com/security/cve/CVE-2022-3134/" source="CVE"/>
		<reference ref_id="CVE-2022-3153" ref_url="https://www.suse.com/security/cve/CVE-2022-3153/" source="CVE"/>
		<reference ref_id="CVE-2022-3234" ref_url="https://www.suse.com/security/cve/CVE-2022-3234/" source="CVE"/>
		<reference ref_id="CVE-2022-3235" ref_url="https://www.suse.com/security/cve/CVE-2022-3235/" source="CVE"/>
		<reference ref_id="CVE-2022-3352" ref_url="https://www.suse.com/security/cve/CVE-2022-3352/" source="CVE"/>
		<reference ref_id="CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127/" source="CVE"/>
		<reference ref_id="CVE-2023-1170" ref_url="https://www.suse.com/security/cve/CVE-2023-1170/" source="CVE"/>
		<reference ref_id="CVE-2023-1175" ref_url="https://www.suse.com/security/cve/CVE-2023-1175/" source="CVE"/>
		<reference ref_id="CVE-2023-1264" ref_url="https://www.suse.com/security/cve/CVE-2023-1264/" source="CVE"/>
		<reference ref_id="CVE-2023-1355" ref_url="https://www.suse.com/security/cve/CVE-2023-1355/" source="CVE"/>
		<reference ref_id="CVE-2023-2426" ref_url="https://www.suse.com/security/cve/CVE-2023-2426/" source="CVE"/>
		<reference ref_id="CVE-2023-2609" ref_url="https://www.suse.com/security/cve/CVE-2023-2609/" source="CVE"/>
		<reference ref_id="CVE-2023-46246" ref_url="https://www.suse.com/security/cve/CVE-2023-46246/" source="CVE"/>
		<reference ref_id="CVE-2023-4733" ref_url="https://www.suse.com/security/cve/CVE-2023-4733/" source="CVE"/>
		<reference ref_id="CVE-2023-4734" ref_url="https://www.suse.com/security/cve/CVE-2023-4734/" source="CVE"/>
		<reference ref_id="CVE-2023-4735" ref_url="https://www.suse.com/security/cve/CVE-2023-4735/" source="CVE"/>
		<reference ref_id="CVE-2023-4738" ref_url="https://www.suse.com/security/cve/CVE-2023-4738/" source="CVE"/>
		<reference ref_id="CVE-2023-4750" ref_url="https://www.suse.com/security/cve/CVE-2023-4750/" source="CVE"/>
		<reference ref_id="CVE-2023-4751" ref_url="https://www.suse.com/security/cve/CVE-2023-4751/" source="CVE"/>
		<reference ref_id="CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752/" source="CVE"/>
		<reference ref_id="CVE-2023-4781" ref_url="https://www.suse.com/security/cve/CVE-2023-4781/" source="CVE"/>
		<reference ref_id="CVE-2023-48231" ref_url="https://www.suse.com/security/cve/CVE-2023-48231/" source="CVE"/>
		<reference ref_id="CVE-2023-48232" ref_url="https://www.suse.com/security/cve/CVE-2023-48232/" source="CVE"/>
		<reference ref_id="CVE-2023-48233" ref_url="https://www.suse.com/security/cve/CVE-2023-48233/" source="CVE"/>
		<reference ref_id="CVE-2023-48234" ref_url="https://www.suse.com/security/cve/CVE-2023-48234/" source="CVE"/>
		<reference ref_id="CVE-2023-48235" ref_url="https://www.suse.com/security/cve/CVE-2023-48235/" source="CVE"/>
		<reference ref_id="CVE-2023-48236" ref_url="https://www.suse.com/security/cve/CVE-2023-48236/" source="CVE"/>
		<reference ref_id="CVE-2023-48237" ref_url="https://www.suse.com/security/cve/CVE-2023-48237/" source="CVE"/>
		<reference ref_id="CVE-2023-48706" ref_url="https://www.suse.com/security/cve/CVE-2023-48706/" source="CVE"/>
		<reference ref_id="CVE-2023-5344" ref_url="https://www.suse.com/security/cve/CVE-2023-5344/" source="CVE"/>
		<reference ref_id="CVE-2023-5441" ref_url="https://www.suse.com/security/cve/CVE-2023-5441/" source="CVE"/>
		<reference ref_id="CVE-2023-5535" ref_url="https://www.suse.com/security/cve/CVE-2023-5535/" source="CVE"/>
		<reference ref_id="CVE-2024-22667" ref_url="https://www.suse.com/security/cve/CVE-2024-22667/" source="CVE"/>
		<reference ref_id="CVE-2024-41965" ref_url="https://www.suse.com/security/cve/CVE-2024-41965/" source="CVE"/>
		<reference ref_id="CVE-2024-43374" ref_url="https://www.suse.com/security/cve/CVE-2024-43374/" source="CVE"/>
		<reference ref_id="CVE-2024-43790" ref_url="https://www.suse.com/security/cve/CVE-2024-43790/" source="CVE"/>
		<reference ref_id="CVE-2024-43802" ref_url="https://www.suse.com/security/cve/CVE-2024-43802/" source="CVE"/>
		<reference ref_id="CVE-2024-45306" ref_url="https://www.suse.com/security/cve/CVE-2024-45306/" source="CVE"/>
		<reference ref_id="CVE-2024-47814" ref_url="https://www.suse.com/security/cve/CVE-2024-47814/" source="CVE"/>
		<reference ref_id="CVE-2025-1215" ref_url="https://www.suse.com/security/cve/CVE-2025-1215/" source="CVE"/>
		<reference ref_id="CVE-2025-22134" ref_url="https://www.suse.com/security/cve/CVE-2025-22134/" source="CVE"/>
		<reference ref_id="CVE-2025-24014" ref_url="https://www.suse.com/security/cve/CVE-2025-24014/" source="CVE"/>
		<reference ref_id="CVE-2025-29768" ref_url="https://www.suse.com/security/cve/CVE-2025-29768/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-9.1.1406-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2438">CVE-2007-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2953">CVE-2007-2953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0316">CVE-2009-0316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000382">CVE-2017-1000382 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46059">CVE-2021-46059 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0156/">CVE-2022-0156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0156">CVE-2022-0156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0213/">CVE-2022-0213 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0261/">CVE-2022-0261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0359/">CVE-2022-0359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0368/">CVE-2022-0368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">CVE-2022-0368 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0392/">CVE-2022-0392 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0393/">CVE-2022-0393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0393">CVE-2022-0393 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0407/">CVE-2022-0407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0408/">CVE-2022-0408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">CVE-2022-0408 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0417/">CVE-2022-0417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">CVE-2022-0417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0443/">CVE-2022-0443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">CVE-2022-0443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0554/">CVE-2022-0554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">CVE-2022-0554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0572/">CVE-2022-0572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">CVE-2022-0572 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0629/">CVE-2022-0629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">CVE-2022-0629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0685/">CVE-2022-0685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">CVE-2022-0685 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0696/">CVE-2022-0696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0696">CVE-2022-0696 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0714/">CVE-2022-0714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">CVE-2022-0714 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0729/">CVE-2022-0729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">CVE-2022-0729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0943/">CVE-2022-0943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1154/">CVE-2022-1154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1160/">CVE-2022-1160 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1160">CVE-2022-1160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1381/">CVE-2022-1381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1616/">CVE-2022-1616 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1619/">CVE-2022-1619 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1620/">CVE-2022-1620 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1621/">CVE-2022-1621 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1629/">CVE-2022-1629 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1674/">CVE-2022-1674 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1674">CVE-2022-1674 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1720/">CVE-2022-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1720">CVE-2022-1720 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1733/">CVE-2022-1733 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1735/">CVE-2022-1735 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1769/">CVE-2022-1769 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">CVE-2022-1769 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1771/">CVE-2022-1771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1796/">CVE-2022-1796 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1851/">CVE-2022-1851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1886/">CVE-2022-1886 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1886">CVE-2022-1886 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1898/">CVE-2022-1898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1942/">CVE-2022-1942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1942">CVE-2022-1942 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1968/">CVE-2022-1968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2000/">CVE-2022-2000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2000">CVE-2022-2000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2042/">CVE-2022-2042 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2042">CVE-2022-2042 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2124/">CVE-2022-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2125/">CVE-2022-2125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2126/">CVE-2022-2126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2129/">CVE-2022-2129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2175/">CVE-2022-2175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2182/">CVE-2022-2182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2183/">CVE-2022-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2206/">CVE-2022-2206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2207/">CVE-2022-2207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2208/">CVE-2022-2208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2210/">CVE-2022-2210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2231/">CVE-2022-2231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2257/">CVE-2022-2257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2264/">CVE-2022-2264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2284/">CVE-2022-2284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2285/">CVE-2022-2285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2286/">CVE-2022-2286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2287/">CVE-2022-2287 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2288/">CVE-2022-2288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2288">CVE-2022-2288 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2289/">CVE-2022-2289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2289">CVE-2022-2289 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2304/">CVE-2022-2304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2343/">CVE-2022-2343 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2344/">CVE-2022-2344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2345/">CVE-2022-2345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2522/">CVE-2022-2522 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2571/">CVE-2022-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2571">CVE-2022-2571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2580/">CVE-2022-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2580">CVE-2022-2580 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2581/">CVE-2022-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2581">CVE-2022-2581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2598/">CVE-2022-2598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2598">CVE-2022-2598 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2816/">CVE-2022-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2817/">CVE-2022-2817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2819/">CVE-2022-2819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2845/">CVE-2022-2845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2849/">CVE-2022-2849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2862/">CVE-2022-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2874/">CVE-2022-2874 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2889/">CVE-2022-2889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2923/">CVE-2022-2923 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2946/">CVE-2022-2946 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2980/">CVE-2022-2980 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2982/">CVE-2022-2982 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3016/">CVE-2022-3016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3037/">CVE-2022-3037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3037">CVE-2022-3037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3099/">CVE-2022-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3134/">CVE-2022-3134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3153/">CVE-2022-3153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3234/">CVE-2022-3234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3235/">CVE-2022-3235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3352/">CVE-2022-3352 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1170/">CVE-2023-1170 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1175/">CVE-2023-1175 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1264/">CVE-2023-1264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1264">CVE-2023-1264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1355/">CVE-2023-1355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1355">CVE-2023-1355 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2426/">CVE-2023-2426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2609/">CVE-2023-2609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46246/">CVE-2023-46246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4733/">CVE-2023-4733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4733">CVE-2023-4733 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4734/">CVE-2023-4734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4734">CVE-2023-4734 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4735/">CVE-2023-4735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4735">CVE-2023-4735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4738/">CVE-2023-4738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4738">CVE-2023-4738 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4750/">CVE-2023-4750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4750">CVE-2023-4750 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4751/">CVE-2023-4751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4751">CVE-2023-4751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4781/">CVE-2023-4781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4781">CVE-2023-4781 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48231/">CVE-2023-48231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48232/">CVE-2023-48232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48233/">CVE-2023-48233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48234/">CVE-2023-48234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48235/">CVE-2023-48235 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-48236/">CVE-2023-48236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48237/">CVE-2023-48237 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48706/">CVE-2023-48706 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5344/">CVE-2023-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5441/">CVE-2023-5441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5535/">CVE-2023-5535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22667/">CVE-2024-22667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22667">CVE-2024-22667 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41965/">CVE-2024-41965 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41965">CVE-2024-41965 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43374/">CVE-2024-43374 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43374">CVE-2024-43374 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-43790/">CVE-2024-43790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43790">CVE-2024-43790 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43802/">CVE-2024-43802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43802">CVE-2024-43802 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45306/">CVE-2024-45306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45306">CVE-2024-45306 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-47814/">CVE-2024-47814 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47814">CVE-2024-47814 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1215/">CVE-2025-1215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1215">CVE-2025-1215 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22134/">CVE-2025-22134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22134">CVE-2025-22134 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24014/">CVE-2025-24014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24014">CVE-2025-24014 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29768/">CVE-2025-29768 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29768">CVE-2025-29768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027174" comment="gvim-9.1.1406-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027175" comment="vim-9.1.1406-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027176" comment="vim-data-9.1.1406-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027177" comment="vim-data-common-9.1.1406-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027178" comment="vim-small-9.1.1406-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027179" comment="xxd-9.1.1406-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93872" version="1" class="patch">
	<metadata>
		<title>gzip-1.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027180" comment="gzip-1.13-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93873" version="1" class="patch">
	<metadata>
		<title>harfbuzz-devel-11.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<reference ref_id="CVE-2024-56732" ref_url="https://www.suse.com/security/cve/CVE-2024-56732/" source="CVE"/>
		<description>
These are all security issues fixed in the harfbuzz-devel-11.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56732/">CVE-2024-56732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56732">CVE-2024-56732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027181" comment="harfbuzz-devel-11.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027182" comment="harfbuzz-tools-11.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027183" comment="libharfbuzz-cairo0-11.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027184" comment="libharfbuzz-gobject0-11.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027185" comment="libharfbuzz-icu0-11.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027186" comment="libharfbuzz-subset0-11.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027187" comment="libharfbuzz0-11.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027188" comment="typelib-1_0-HarfBuzz-0_0-11.0.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93874" version="1" class="patch">
	<metadata>
		<title>helm-3.18.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2021-21272" ref_url="https://www.suse.com/security/cve/CVE-2021-21272/" source="CVE"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-23524" ref_url="https://www.suse.com/security/cve/CVE-2022-23524/" source="CVE"/>
		<reference ref_id="CVE-2022-23525" ref_url="https://www.suse.com/security/cve/CVE-2022-23525/" source="CVE"/>
		<reference ref_id="CVE-2022-23526" ref_url="https://www.suse.com/security/cve/CVE-2022-23526/" source="CVE"/>
		<reference ref_id="CVE-2022-36055" ref_url="https://www.suse.com/security/cve/CVE-2022-36055/" source="CVE"/>
		<reference ref_id="CVE-2023-25165" ref_url="https://www.suse.com/security/cve/CVE-2023-25165/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<reference ref_id="CVE-2024-25620" ref_url="https://www.suse.com/security/cve/CVE-2024-25620/" source="CVE"/>
		<reference ref_id="CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147/" source="CVE"/>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547/" source="CVE"/>
		<description>
These are all security issues fixed in the helm-3.18.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21272/">CVE-2021-21272 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21272">CVE-2021-21272 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23524/">CVE-2022-23524 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23524">CVE-2022-23524 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23525/">CVE-2022-23525 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23525">CVE-2022-23525 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23526/">CVE-2022-23526 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23526">CVE-2022-23526 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36055/">CVE-2022-36055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36055">CVE-2022-36055 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-25165/">CVE-2023-25165 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25165">CVE-2023-25165 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-25620/">CVE-2024-25620 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25620">CVE-2024-25620 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027189" comment="helm-3.18.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027190" comment="helm-bash-completion-3.18.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027191" comment="helm-fish-completion-3.18.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027192" comment="helm-zsh-completion-3.18.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93875" version="1" class="patch">
	<metadata>
		<title>himmelblau-0.9.22+git.0.d41f700-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-11738" ref_url="https://www.suse.com/security/cve/CVE-2024-11738/" source="CVE"/>
		<reference ref_id="CVE-2025-53013" ref_url="https://www.suse.com/security/cve/CVE-2025-53013/" source="CVE"/>
		<reference ref_id="CVE-2025-54882" ref_url="https://www.suse.com/security/cve/CVE-2025-54882/" source="CVE"/>
		<description>
These are all security issues fixed in the himmelblau-0.9.22+git.0.d41f700-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11738/">CVE-2024-11738 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11738">CVE-2024-11738 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="4.3/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53013/">CVE-2025-53013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53013">CVE-2025-53013 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54882/">CVE-2025-54882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54882">CVE-2025-54882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027193" comment="himmelblau-0.9.22+git.0.d41f700-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027194" comment="himmelblau-qr-greeter-0.9.22+git.0.d41f700-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027195" comment="himmelblau-sshd-config-0.9.22+git.0.d41f700-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027196" comment="himmelblau-sso-0.9.22+git.0.d41f700-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027197" comment="libnss_himmelblau2-0.9.22+git.0.d41f700-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027198" comment="pam-himmelblau-0.9.22+git.0.d41f700-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93876" version="1" class="patch">
	<metadata>
		<title>hivex-1.3.24-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<description>
These are all security issues fixed in the hivex-1.3.24-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3504">CVE-2021-3504 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3622">CVE-2021-3622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027199" comment="hivex-1.3.24-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027200" comment="hivex-devel-1.3.24-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027201" comment="hivex-lang-1.3.24-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027202" comment="libhivex0-1.3.24-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027203" comment="perl-Win-Hivex-1.3.24-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027204" comment="python3-hivex-1.3.24-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93877" version="1" class="patch">
	<metadata>
		<title>hsqldb-2.7.4-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-41853" ref_url="https://www.suse.com/security/cve/CVE-2022-41853/" source="CVE"/>
		<description>
These are all security issues fixed in the hsqldb-2.7.4-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41853/">CVE-2022-41853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41853">CVE-2022-41853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027205" comment="hsqldb-2.7.4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027206" comment="hsqldb-demo-2.7.4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027207" comment="hsqldb-javadoc-2.7.4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027208" comment="hsqldb-manual-2.7.4-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93878" version="1" class="patch">
	<metadata>
		<title>httpcomponents-client-4.5.14-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956/" source="CVE"/>
		<description>
These are all security issues fixed in the httpcomponents-client-4.5.14-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13956">CVE-2020-13956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027209" comment="httpcomponents-client-4.5.14-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027210" comment="httpcomponents-client-cache-4.5.14-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027211" comment="httpcomponents-client-javadoc-4.5.14-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93879" version="1" class="patch">
	<metadata>
		<title>hunspell-1.7.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
These are all security issues fixed in the hunspell-1.7.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16707">CVE-2019-16707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027212" comment="hunspell-1.7.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027213" comment="hunspell-devel-1.7.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027214" comment="hunspell-tools-1.7.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027215" comment="libhunspell-1_7-0-1.7.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93880" version="1" class="patch">
	<metadata>
		<title>hwloc-2.11.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-47022" ref_url="https://www.suse.com/security/cve/CVE-2022-47022/" source="CVE"/>
		<description>
These are all security issues fixed in the hwloc-2.11.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47022/">CVE-2022-47022 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47022">CVE-2022-47022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027216" comment="hwloc-2.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027217" comment="hwloc-data-2.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027218" comment="hwloc-devel-2.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027219" comment="hwloc-doc-2.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027220" comment="hwloc-gl-2.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027221" comment="hwloc-gui-2.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027222" comment="libhwloc15-2.11.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93881" version="1" class="patch">
	<metadata>
		<title>hyper-v-9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2669">CVE-2012-2669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5532">CVE-2012-5532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027223" comment="hyper-v-9-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93882" version="1" class="patch">
	<metadata>
		<title>ibus-1.5.32-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-1.5.32-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027224" comment="ibus-1.5.32-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027225" comment="ibus-dict-emoji-1.5.32-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027226" comment="ibus-gtk3-1.5.32-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027227" comment="ibus-gtk4-1.5.32-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027228" comment="ibus-lang-1.5.32-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027229" comment="libibus-1_0-5-1.5.32-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027230" comment="typelib-1_0-IBus-1_0-1.5.32-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93883" version="1" class="patch">
	<metadata>
		<title>icu-77.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<reference ref_id="CVE-2025-5222" ref_url="https://www.suse.com/security/cve/CVE-2025-5222/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-77.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4770">CVE-2007-4770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4771">CVE-2007-4771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1036">CVE-2008-1036 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-5222/">CVE-2025-5222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5222">CVE-2025-5222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027231" comment="icu-77.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027232" comment="libicu-devel-77.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027233" comment="libicu-doc-77.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027234" comment="libicu77-77.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027235" comment="libicu77-bedata-77.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027236" comment="libicu77-ledata-77.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93884" version="1" class="patch">
	<metadata>
		<title>imlib2-1.12.3-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-2426" ref_url="https://www.suse.com/security/cve/CVE-2008-2426/" source="CVE"/>
		<reference ref_id="CVE-2008-5187" ref_url="https://www.suse.com/security/cve/CVE-2008-5187/" source="CVE"/>
		<reference ref_id="CVE-2010-0991" ref_url="https://www.suse.com/security/cve/CVE-2010-0991/" source="CVE"/>
		<reference ref_id="CVE-2020-12761" ref_url="https://www.suse.com/security/cve/CVE-2020-12761/" source="CVE"/>
		<description>
These are all security issues fixed in the imlib2-1.12.3-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2426/">CVE-2008-2426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2426">CVE-2008-2426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5187/">CVE-2008-5187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5187">CVE-2008-5187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0991/">CVE-2010-0991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0991">CVE-2010-0991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12761/">CVE-2020-12761 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12761">CVE-2020-12761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027237" comment="imlib2-1.12.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027238" comment="imlib2-filters-1.12.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027239" comment="imlib2-loaders-1.12.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027240" comment="libImlib2-1-1.12.3-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93885" version="1" class="patch">
	<metadata>
		<title>indent-2.2.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-40305" ref_url="https://www.suse.com/security/cve/CVE-2023-40305/" source="CVE"/>
		<reference ref_id="CVE-2024-0911" ref_url="https://www.suse.com/security/cve/CVE-2024-0911/" source="CVE"/>
		<description>
These are all security issues fixed in the indent-2.2.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40305/">CVE-2023-40305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40305">CVE-2023-40305 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0911/">CVE-2024-0911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0911">CVE-2024-0911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027241" comment="indent-2.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027242" comment="indent-lang-2.2.13-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93886" version="1" class="patch">
	<metadata>
		<title>iperf-3.19.1-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-4303" ref_url="https://www.suse.com/security/cve/CVE-2016-4303/" source="CVE"/>
		<reference ref_id="CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403/" source="CVE"/>
		<reference ref_id="CVE-2024-26306" ref_url="https://www.suse.com/security/cve/CVE-2024-26306/" source="CVE"/>
		<reference ref_id="CVE-2024-53580" ref_url="https://www.suse.com/security/cve/CVE-2024-53580/" source="CVE"/>
		<reference ref_id="CVE-2025-54349" ref_url="https://www.suse.com/security/cve/CVE-2025-54349/" source="CVE"/>
		<reference ref_id="CVE-2025-54350" ref_url="https://www.suse.com/security/cve/CVE-2025-54350/" source="CVE"/>
		<reference ref_id="CVE-2025-54351" ref_url="https://www.suse.com/security/cve/CVE-2025-54351/" source="CVE"/>
		<description>
These are all security issues fixed in the iperf-3.19.1-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4303/">CVE-2016-4303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4303">CVE-2016-4303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26306/">CVE-2024-26306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26306">CVE-2024-26306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53580/">CVE-2024-53580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53580">CVE-2024-53580 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-54349/">CVE-2025-54349 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54349">CVE-2025-54349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-54350/">CVE-2025-54350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54350">CVE-2025-54350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-54351/">CVE-2025-54351 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54351">CVE-2025-54351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027243" comment="iperf-3.19.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027244" comment="iperf-devel-3.19.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027245" comment="libiperf0-3.19.1-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93887" version="1" class="patch">
	<metadata>
		<title>ipmitool-1.8.19.13.gbe11d94-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
These are all security issues fixed in the ipmitool-1.8.19.13.gbe11d94-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027246" comment="ipmitool-1.8.19.13.gbe11d94-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027247" comment="ipmitool-bmc-snmp-proxy-1.8.19.13.gbe11d94-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93888" version="1" class="patch">
	<metadata>
		<title>iputils-20240905-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<reference ref_id="CVE-2025-47268" ref_url="https://www.suse.com/security/cve/CVE-2025-47268/" source="CVE"/>
		<reference ref_id="CVE-2025-48964" ref_url="https://www.suse.com/security/cve/CVE-2025-48964/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-20240905-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2529">CVE-2010-2529 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47268/">CVE-2025-47268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47268">CVE-2025-47268 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48964/">CVE-2025-48964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48964">CVE-2025-48964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027248" comment="iputils-20240905-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93889" version="1" class="patch">
	<metadata>
		<title>iscsiuio-0.7.8.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987/" source="CVE"/>
		<reference ref_id="CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988/" source="CVE"/>
		<reference ref_id="CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437/" source="CVE"/>
		<reference ref_id="CVE-2020-17438" ref_url="https://www.suse.com/security/cve/CVE-2020-17438/" source="CVE"/>
		<description>
These are all security issues fixed in the iscsiuio-0.7.8.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13987">CVE-2020-13987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13988">CVE-2020-13988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17437">CVE-2020-17437 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-17438/">CVE-2020-17438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17438">CVE-2020-17438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027249" comment="iscsiuio-0.7.8.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027250" comment="libopeniscsiusr0-0.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027251" comment="open-iscsi-2.1.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027252" comment="open-iscsi-devel-2.1.11-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93890" version="1" class="patch">
	<metadata>
		<title>jackson-annotations-2.17.3-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-annotations-2.17.3-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027253" comment="jackson-annotations-2.17.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027254" comment="jackson-annotations-javadoc-2.17.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027255" comment="jackson-core-2.17.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027256" comment="jackson-core-javadoc-2.17.3-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93891" version="1" class="patch">
	<metadata>
		<title>jackson-databind-2.17.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-11307" ref_url="https://www.suse.com/security/cve/CVE-2018-11307/" source="CVE"/>
		<reference ref_id="CVE-2018-12022" ref_url="https://www.suse.com/security/cve/CVE-2018-12022/" source="CVE"/>
		<reference ref_id="CVE-2018-12023" ref_url="https://www.suse.com/security/cve/CVE-2018-12023/" source="CVE"/>
		<reference ref_id="CVE-2018-14718" ref_url="https://www.suse.com/security/cve/CVE-2018-14718/" source="CVE"/>
		<reference ref_id="CVE-2018-14721" ref_url="https://www.suse.com/security/cve/CVE-2018-14721/" source="CVE"/>
		<reference ref_id="CVE-2018-19360" ref_url="https://www.suse.com/security/cve/CVE-2018-19360/" source="CVE"/>
		<reference ref_id="CVE-2018-19361" ref_url="https://www.suse.com/security/cve/CVE-2018-19361/" source="CVE"/>
		<reference ref_id="CVE-2018-19362" ref_url="https://www.suse.com/security/cve/CVE-2018-19362/" source="CVE"/>
		<reference ref_id="CVE-2018-7489" ref_url="https://www.suse.com/security/cve/CVE-2018-7489/" source="CVE"/>
		<reference ref_id="CVE-2019-12086" ref_url="https://www.suse.com/security/cve/CVE-2019-12086/" source="CVE"/>
		<reference ref_id="CVE-2019-12384" ref_url="https://www.suse.com/security/cve/CVE-2019-12384/" source="CVE"/>
		<reference ref_id="CVE-2019-12814" ref_url="https://www.suse.com/security/cve/CVE-2019-12814/" source="CVE"/>
		<reference ref_id="CVE-2019-14379" ref_url="https://www.suse.com/security/cve/CVE-2019-14379/" source="CVE"/>
		<reference ref_id="CVE-2019-14439" ref_url="https://www.suse.com/security/cve/CVE-2019-14439/" source="CVE"/>
		<reference ref_id="CVE-2019-14540" ref_url="https://www.suse.com/security/cve/CVE-2019-14540/" source="CVE"/>
		<reference ref_id="CVE-2019-14893" ref_url="https://www.suse.com/security/cve/CVE-2019-14893/" source="CVE"/>
		<reference ref_id="CVE-2019-16942" ref_url="https://www.suse.com/security/cve/CVE-2019-16942/" source="CVE"/>
		<reference ref_id="CVE-2019-16943" ref_url="https://www.suse.com/security/cve/CVE-2019-16943/" source="CVE"/>
		<reference ref_id="CVE-2019-17267" ref_url="https://www.suse.com/security/cve/CVE-2019-17267/" source="CVE"/>
		<reference ref_id="CVE-2019-17531" ref_url="https://www.suse.com/security/cve/CVE-2019-17531/" source="CVE"/>
		<reference ref_id="CVE-2019-20330" ref_url="https://www.suse.com/security/cve/CVE-2019-20330/" source="CVE"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-35728" ref_url="https://www.suse.com/security/cve/CVE-2020-35728/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<reference ref_id="CVE-2021-20190" ref_url="https://www.suse.com/security/cve/CVE-2021-20190/" source="CVE"/>
		<reference ref_id="CVE-2022-42003" ref_url="https://www.suse.com/security/cve/CVE-2022-42003/" source="CVE"/>
		<reference ref_id="CVE-2022-42004" ref_url="https://www.suse.com/security/cve/CVE-2022-42004/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-databind-2.17.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11307/">CVE-2018-11307 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11307">CVE-2018-11307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12022/">CVE-2018-12022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12022">CVE-2018-12022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12023/">CVE-2018-12023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12023">CVE-2018-12023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14718/">CVE-2018-14718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14718">CVE-2018-14718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14721/">CVE-2018-14721 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14721">CVE-2018-14721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19360/">CVE-2018-19360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19360">CVE-2018-19360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19361/">CVE-2018-19361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19361">CVE-2018-19361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19362/">CVE-2018-19362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19362">CVE-2018-19362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7489/">CVE-2018-7489 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7489">CVE-2018-7489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12086/">CVE-2019-12086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12086">CVE-2019-12086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12384/">CVE-2019-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12384">CVE-2019-12384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12814/">CVE-2019-12814 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12814">CVE-2019-12814 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14379/">CVE-2019-14379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14379">CVE-2019-14379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14439/">CVE-2019-14439 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14439">CVE-2019-14439 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14540/">CVE-2019-14540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14540">CVE-2019-14540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14893/">CVE-2019-14893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14893">CVE-2019-14893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16942/">CVE-2019-16942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16942">CVE-2019-16942 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-16943/">CVE-2019-16943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16943">CVE-2019-16943 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17267/">CVE-2019-17267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17267">CVE-2019-17267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17531/">CVE-2019-17531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17531">CVE-2019-17531 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20330/">CVE-2019-20330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20330">CVE-2019-20330 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25649">CVE-2020-25649 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-35728/">CVE-2020-35728 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35728">CVE-2020-35728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20190/">CVE-2021-20190 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20190">CVE-2021-20190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42003/">CVE-2022-42003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42003">CVE-2022-42003 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42004/">CVE-2022-42004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42004">CVE-2022-42004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027257" comment="jackson-databind-2.17.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027258" comment="jackson-databind-javadoc-2.17.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93892" version="1" class="patch">
	<metadata>
		<title>jakarta-taglibs-standard-1.1.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-taglibs-standard-1.1.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027259" comment="jakarta-taglibs-standard-1.1.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027260" comment="jakarta-taglibs-standard-javadoc-1.1.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93893" version="1" class="patch">
	<metadata>
		<title>jasper-4.2.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="CVE-2017-13748" ref_url="https://www.suse.com/security/cve/CVE-2017-13748/" source="CVE"/>
		<reference ref_id="CVE-2017-13750" ref_url="https://www.suse.com/security/cve/CVE-2017-13750/" source="CVE"/>
		<reference ref_id="CVE-2017-13751" ref_url="https://www.suse.com/security/cve/CVE-2017-13751/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="CVE-2021-3443" ref_url="https://www.suse.com/security/cve/CVE-2021-3443/" source="CVE"/>
		<reference ref_id="CVE-2021-3467" ref_url="https://www.suse.com/security/cve/CVE-2021-3467/" source="CVE"/>
		<reference ref_id="CVE-2022-2963" ref_url="https://www.suse.com/security/cve/CVE-2022-2963/" source="CVE"/>
		<reference ref_id="CVE-2022-40755" ref_url="https://www.suse.com/security/cve/CVE-2022-40755/" source="CVE"/>
		<reference ref_id="CVE-2023-51257" ref_url="https://www.suse.com/security/cve/CVE-2023-51257/" source="CVE"/>
		<reference ref_id="CVE-2024-31744" ref_url="https://www.suse.com/security/cve/CVE-2024-31744/" source="CVE"/>
		<description>
These are all security issues fixed in the jasper-4.2.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3522">CVE-2008-3522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4516">CVE-2011-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4517">CVE-2011-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8157">CVE-2014-8157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8158">CVE-2014-8158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8880">CVE-2016-8880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8881">CVE-2016-8881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8882">CVE-2016-8882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8886">CVE-2016-8886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8887">CVE-2016-8887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9387">CVE-2016-9387 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9395">CVE-2016-9395 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9396">CVE-2016-9396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9399">CVE-2016-9399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9557">CVE-2016-9557 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13748/">CVE-2017-13748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13748">CVE-2017-13748 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13750/">CVE-2017-13750 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13750">CVE-2017-13750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13751/">CVE-2017-13751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13751">CVE-2017-13751 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14132">CVE-2017-14132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5498">CVE-2017-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5499">CVE-2017-5499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5503">CVE-2017-5503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5504">CVE-2017-5504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5505">CVE-2017-5505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6850">CVE-2017-6850 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9782">CVE-2017-9782 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18873">CVE-2018-18873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19139">CVE-2018-19139 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19539">CVE-2018-19539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19540">CVE-2018-19540 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19541">CVE-2018-19541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19542">CVE-2018-19542 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19543">CVE-2018-19543 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20570">CVE-2018-20570 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20622">CVE-2018-20622 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9055">CVE-2018-9055 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9154">CVE-2018-9154 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9252">CVE-2018-9252 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26926">CVE-2021-26926 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26927">CVE-2021-26927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27845">CVE-2021-27845 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3443/">CVE-2021-3443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3443">CVE-2021-3443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3467/">CVE-2021-3467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3467">CVE-2021-3467 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2963/">CVE-2022-2963 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2963">CVE-2022-2963 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40755/">CVE-2022-40755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40755">CVE-2022-40755 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-51257/">CVE-2023-51257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51257">CVE-2023-51257 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31744/">CVE-2024-31744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31744">CVE-2024-31744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027261" comment="jasper-4.2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027262" comment="libjasper7-4.2.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93894" version="1" class="patch">
	<metadata>
		<title>java-17-openjdk-17.0.16.0-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-17-openjdk-17.0.16.0-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027263" comment="java-17-openjdk-17.0.16.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027264" comment="java-17-openjdk-demo-17.0.16.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027265" comment="java-17-openjdk-devel-17.0.16.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027266" comment="java-17-openjdk-headless-17.0.16.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027267" comment="java-17-openjdk-javadoc-17.0.16.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027268" comment="java-17-openjdk-jmods-17.0.16.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027269" comment="java-17-openjdk-src-17.0.16.0-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93895" version="1" class="patch">
	<metadata>
		<title>java-21-openjdk-21.0.8.0-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
These are all security issues fixed in the java-21-openjdk-21.0.8.0-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027270" comment="java-21-openjdk-21.0.8.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027271" comment="java-21-openjdk-demo-21.0.8.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027272" comment="java-21-openjdk-devel-21.0.8.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027273" comment="java-21-openjdk-headless-21.0.8.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027274" comment="java-21-openjdk-javadoc-21.0.8.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027275" comment="java-21-openjdk-jmods-21.0.8.0-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027276" comment="java-21-openjdk-src-21.0.8.0-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93896" version="1" class="patch">
	<metadata>
		<title>javamail-1.6.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-7962" ref_url="https://www.suse.com/security/cve/CVE-2025-7962/" source="CVE"/>
		<description>
These are all security issues fixed in the javamail-1.6.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7962/">CVE-2025-7962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7962">CVE-2025-7962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027277" comment="javamail-1.6.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027278" comment="javamail-javadoc-1.6.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93897" version="1" class="patch">
	<metadata>
		<title>jbigkit-2.1-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<reference ref_id="CVE-2022-1210" ref_url="https://www.suse.com/security/cve/CVE-2022-1210/" source="CVE"/>
		<description>
These are all security issues fixed in the jbigkit-2.1-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6369">CVE-2013-6369 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1210/">CVE-2022-1210 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">CVE-2022-1210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027279" comment="jbigkit-2.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027280" comment="libjbig-devel-2.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027281" comment="libjbig2-2.1-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93898" version="1" class="patch">
	<metadata>
		<title>jcat-tool-0.2.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<description>
These are all security issues fixed in the jcat-tool-0.2.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10759">CVE-2020-10759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027282" comment="jcat-tool-0.2.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027283" comment="libjcat-devel-0.2.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027284" comment="libjcat1-0.2.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027285" comment="typelib-1_0-Jcat-1_0-0.2.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93899" version="1" class="patch">
	<metadata>
		<title>jcl-over-slf4j-1.7.36-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-8088" ref_url="https://www.suse.com/security/cve/CVE-2018-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the jcl-over-slf4j-1.7.36-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8088/">CVE-2018-8088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8088">CVE-2018-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027286" comment="jcl-over-slf4j-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027287" comment="jul-to-slf4j-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027288" comment="log4j-over-slf4j-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027289" comment="slf4j-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027290" comment="slf4j-ext-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027291" comment="slf4j-javadoc-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027292" comment="slf4j-jcl-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027293" comment="slf4j-jdk14-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027294" comment="slf4j-manual-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027295" comment="slf4j-reload4j-1.7.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027296" comment="slf4j-sources-1.7.36-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93900" version="1" class="patch">
	<metadata>
		<title>jdom-1.1.3-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-33813" ref_url="https://www.suse.com/security/cve/CVE-2021-33813/" source="CVE"/>
		<description>
These are all security issues fixed in the jdom-1.1.3-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33813/">CVE-2021-33813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33813">CVE-2021-33813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027297" comment="jdom-1.1.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027298" comment="jdom-demo-1.1.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027299" comment="jdom-javadoc-1.1.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027300" comment="jdom2-2.0.6.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027301" comment="jdom2-javadoc-2.0.6.1-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93901" version="1" class="patch">
	<metadata>
		<title>jq-1.7.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-8863" ref_url="https://www.suse.com/security/cve/CVE-2015-8863/" source="CVE"/>
		<reference ref_id="CVE-2016-4074" ref_url="https://www.suse.com/security/cve/CVE-2016-4074/" source="CVE"/>
		<reference ref_id="CVE-2023-50246" ref_url="https://www.suse.com/security/cve/CVE-2023-50246/" source="CVE"/>
		<reference ref_id="CVE-2023-50268" ref_url="https://www.suse.com/security/cve/CVE-2023-50268/" source="CVE"/>
		<reference ref_id="CVE-2024-23337" ref_url="https://www.suse.com/security/cve/CVE-2024-23337/" source="CVE"/>
		<reference ref_id="CVE-2024-53427" ref_url="https://www.suse.com/security/cve/CVE-2024-53427/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.7.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8863/">CVE-2015-8863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8863">CVE-2015-8863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4074/">CVE-2016-4074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4074">CVE-2016-4074 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50246/">CVE-2023-50246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50246">CVE-2023-50246 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50268/">CVE-2023-50268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50268">CVE-2023-50268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23337/">CVE-2024-23337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23337">CVE-2024-23337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-53427/">CVE-2024-53427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53427">CVE-2024-53427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027302" comment="jq-1.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027303" comment="libjq-devel-1.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027304" comment="libjq1-1.7.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93902" version="1" class="patch">
	<metadata>
		<title>jsch-0.2.22-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the jsch-0.2.22-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027305" comment="jsch-0.2.22-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027306" comment="jsch-agent-proxy-connector-factory-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027307" comment="jsch-agent-proxy-core-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027308" comment="jsch-agent-proxy-javadoc-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027309" comment="jsch-agent-proxy-jsch-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027310" comment="jsch-agent-proxy-pageant-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027311" comment="jsch-agent-proxy-sshagent-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027312" comment="jsch-agent-proxy-svnkit-trilead-ssh2-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027313" comment="jsch-agent-proxy-usocket-jna-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027314" comment="jsch-agent-proxy-usocket-nc-0.0.9-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027315" comment="jsch-demo-0.2.22-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027316" comment="jsch-javadoc-0.2.22-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027317" comment="trilead-ssh2-217.293.v56de4d4d3515-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027318" comment="trilead-ssh2-javadoc-217.293.v56de4d4d3515-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93903" version="1" class="patch">
	<metadata>
		<title>jsoup-1.15.3-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="CVE-2022-36033" ref_url="https://www.suse.com/security/cve/CVE-2022-36033/" source="CVE"/>
		<description>
These are all security issues fixed in the jsoup-1.15.3-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37714">CVE-2021-37714 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36033/">CVE-2022-36033 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36033">CVE-2022-36033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027319" comment="jsoup-1.15.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027320" comment="jsoup-javadoc-1.15.3-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93904" version="1" class="patch">
	<metadata>
		<title>jsr-305-3.0.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<description>
These are all security issues fixed in the jsr-305-3.0.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37714">CVE-2021-37714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027321" comment="jsr-305-3.0.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027322" comment="jsr-305-javadoc-3.0.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93905" version="1" class="patch">
	<metadata>
		<title>jtidy-1.0.4-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-34623" ref_url="https://www.suse.com/security/cve/CVE-2023-34623/" source="CVE"/>
		<description>
These are all security issues fixed in the jtidy-1.0.4-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34623/">CVE-2023-34623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34623">CVE-2023-34623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027323" comment="jtidy-1.0.4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027324" comment="jtidy-javadoc-1.0.4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027325" comment="jtidy-scripts-1.0.4-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93906" version="1" class="patch">
	<metadata>
		<title>junit-4.13.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-1945" ref_url="https://www.suse.com/security/cve/CVE-2020-1945/" source="CVE"/>
		<description>
These are all security issues fixed in the junit-4.13.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1945/">CVE-2020-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1945">CVE-2020-1945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027326" comment="junit-4.13.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027327" comment="junit-javadoc-4.13.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027328" comment="junit-manual-4.13.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93907" version="1" class="patch">
	<metadata>
		<title>kbd-2.7.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-2.7.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0460">CVE-2011-0460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027329" comment="kbd-2.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027330" comment="kbd-legacy-2.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027331" comment="libkbdfile1-2.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027332" comment="libkeymap1-2.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027333" comment="libkfont0-2.7.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93908" version="1" class="patch">
	<metadata>
		<title>kdump-2.1.6-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-2.1.6-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5759">CVE-2016-5759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027334" comment="kdump-2.1.6-160000.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93909" version="1" class="patch">
	<metadata>
		<title>kea-3.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-32801" ref_url="https://www.suse.com/security/cve/CVE-2025-32801/" source="CVE"/>
		<reference ref_id="CVE-2025-32802" ref_url="https://www.suse.com/security/cve/CVE-2025-32802/" source="CVE"/>
		<reference ref_id="CVE-2025-32803" ref_url="https://www.suse.com/security/cve/CVE-2025-32803/" source="CVE"/>
		<description>
These are all security issues fixed in the kea-3.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32801/">CVE-2025-32801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32801">CVE-2025-32801 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32802/">CVE-2025-32802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32802">CVE-2025-32802 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32803/">CVE-2025-32803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32803">CVE-2025-32803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027335" comment="kea-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027336" comment="kea-devel-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027337" comment="kea-doc-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027338" comment="kea-hooks-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027339" comment="libkea-asiodns62-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027340" comment="libkea-asiolink87-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027341" comment="libkea-cc82-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027342" comment="libkea-cfgrpt3-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027343" comment="libkea-config83-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027344" comment="libkea-cryptolink63-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027345" comment="libkea-d2srv63-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027346" comment="libkea-database76-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027347" comment="libkea-dhcp109-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027348" comment="libkea-dhcp_ddns68-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027349" comment="libkea-dhcpsrv129-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027350" comment="libkea-dns71-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027351" comment="libkea-eval84-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027352" comment="libkea-exceptions45-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027353" comment="libkea-hooks118-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027354" comment="libkea-http87-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027355" comment="libkea-log-interprocess3-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027356" comment="libkea-log75-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027357" comment="libkea-mysql88-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027358" comment="libkea-pgsql88-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027359" comment="libkea-process90-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027360" comment="libkea-stats53-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027361" comment="libkea-tcp33-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027362" comment="libkea-util-io12-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027363" comment="libkea-util101-3.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027364" comment="python3-kea-3.0.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93910" version="1" class="patch">
	<metadata>
		<title>kernel-64kb-6.12.0-160000.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432/" source="CVE"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-48628" ref_url="https://www.suse.com/security/cve/CVE-2022-48628/" source="CVE"/>
		<reference ref_id="CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669/" source="CVE"/>
		<reference ref_id="CVE-2022-48772" ref_url="https://www.suse.com/security/cve/CVE-2022-48772/" source="CVE"/>
		<reference ref_id="CVE-2022-49145" ref_url="https://www.suse.com/security/cve/CVE-2022-49145/" source="CVE"/>
		<reference ref_id="CVE-2022-49320" ref_url="https://www.suse.com/security/cve/CVE-2022-49320/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3269" ref_url="https://www.suse.com/security/cve/CVE-2023-3269/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3773" ref_url="https://www.suse.com/security/cve/CVE-2023-3773/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-38417" ref_url="https://www.suse.com/security/cve/CVE-2023-38417/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-42752" ref_url="https://www.suse.com/security/cve/CVE-2023-42752/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-42756" ref_url="https://www.suse.com/security/cve/CVE-2023-42756/" source="CVE"/>
		<reference ref_id="CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-4611" ref_url="https://www.suse.com/security/cve/CVE-2023-4611/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-47210" ref_url="https://www.suse.com/security/cve/CVE-2023-47210/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-50431" ref_url="https://www.suse.com/security/cve/CVE-2023-50431/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52433" ref_url="https://www.suse.com/security/cve/CVE-2023-52433/" source="CVE"/>
		<reference ref_id="CVE-2023-52434" ref_url="https://www.suse.com/security/cve/CVE-2023-52434/" source="CVE"/>
		<reference ref_id="CVE-2023-52435" ref_url="https://www.suse.com/security/cve/CVE-2023-52435/" source="CVE"/>
		<reference ref_id="CVE-2023-52437" ref_url="https://www.suse.com/security/cve/CVE-2023-52437/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52440" ref_url="https://www.suse.com/security/cve/CVE-2023-52440/" source="CVE"/>
		<reference ref_id="CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52446" ref_url="https://www.suse.com/security/cve/CVE-2023-52446/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452/" source="CVE"/>
		<reference ref_id="CVE-2023-52453" ref_url="https://www.suse.com/security/cve/CVE-2023-52453/" source="CVE"/>
		<reference ref_id="CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454/" source="CVE"/>
		<reference ref_id="CVE-2023-52455" ref_url="https://www.suse.com/security/cve/CVE-2023-52455/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458/" source="CVE"/>
		<reference ref_id="CVE-2023-52460" ref_url="https://www.suse.com/security/cve/CVE-2023-52460/" source="CVE"/>
		<reference ref_id="CVE-2023-52461" ref_url="https://www.suse.com/security/cve/CVE-2023-52461/" source="CVE"/>
		<reference ref_id="CVE-2023-52462" ref_url="https://www.suse.com/security/cve/CVE-2023-52462/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467/" source="CVE"/>
		<reference ref_id="CVE-2023-52468" ref_url="https://www.suse.com/security/cve/CVE-2023-52468/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52471" ref_url="https://www.suse.com/security/cve/CVE-2023-52471/" source="CVE"/>
		<reference ref_id="CVE-2023-52472" ref_url="https://www.suse.com/security/cve/CVE-2023-52472/" source="CVE"/>
		<reference ref_id="CVE-2023-52473" ref_url="https://www.suse.com/security/cve/CVE-2023-52473/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-52481" ref_url="https://www.suse.com/security/cve/CVE-2023-52481/" source="CVE"/>
		<reference ref_id="CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482/" source="CVE"/>
		<reference ref_id="CVE-2023-52483" ref_url="https://www.suse.com/security/cve/CVE-2023-52483/" source="CVE"/>
		<reference ref_id="CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484/" source="CVE"/>
		<reference ref_id="CVE-2023-52485" ref_url="https://www.suse.com/security/cve/CVE-2023-52485/" source="CVE"/>
		<reference ref_id="CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486/" source="CVE"/>
		<reference ref_id="CVE-2023-52487" ref_url="https://www.suse.com/security/cve/CVE-2023-52487/" source="CVE"/>
		<reference ref_id="CVE-2023-52488" ref_url="https://www.suse.com/security/cve/CVE-2023-52488/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52490" ref_url="https://www.suse.com/security/cve/CVE-2023-52490/" source="CVE"/>
		<reference ref_id="CVE-2023-52491" ref_url="https://www.suse.com/security/cve/CVE-2023-52491/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2023-52493" ref_url="https://www.suse.com/security/cve/CVE-2023-52493/" source="CVE"/>
		<reference ref_id="CVE-2023-52494" ref_url="https://www.suse.com/security/cve/CVE-2023-52494/" source="CVE"/>
		<reference ref_id="CVE-2023-52495" ref_url="https://www.suse.com/security/cve/CVE-2023-52495/" source="CVE"/>
		<reference ref_id="CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497/" source="CVE"/>
		<reference ref_id="CVE-2023-52498" ref_url="https://www.suse.com/security/cve/CVE-2023-52498/" source="CVE"/>
		<reference ref_id="CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500/" source="CVE"/>
		<reference ref_id="CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501/" source="CVE"/>
		<reference ref_id="CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502/" source="CVE"/>
		<reference ref_id="CVE-2023-52503" ref_url="https://www.suse.com/security/cve/CVE-2023-52503/" source="CVE"/>
		<reference ref_id="CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504/" source="CVE"/>
		<reference ref_id="CVE-2023-52505" ref_url="https://www.suse.com/security/cve/CVE-2023-52505/" source="CVE"/>
		<reference ref_id="CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507/" source="CVE"/>
		<reference ref_id="CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508/" source="CVE"/>
		<reference ref_id="CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509/" source="CVE"/>
		<reference ref_id="CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510/" source="CVE"/>
		<reference ref_id="CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511/" source="CVE"/>
		<reference ref_id="CVE-2023-52512" ref_url="https://www.suse.com/security/cve/CVE-2023-52512/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515/" source="CVE"/>
		<reference ref_id="CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517/" source="CVE"/>
		<reference ref_id="CVE-2023-52518" ref_url="https://www.suse.com/security/cve/CVE-2023-52518/" source="CVE"/>
		<reference ref_id="CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52522" ref_url="https://www.suse.com/security/cve/CVE-2023-52522/" source="CVE"/>
		<reference ref_id="CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523/" source="CVE"/>
		<reference ref_id="CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524/" source="CVE"/>
		<reference ref_id="CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525/" source="CVE"/>
		<reference ref_id="CVE-2023-52526" ref_url="https://www.suse.com/security/cve/CVE-2023-52526/" source="CVE"/>
		<reference ref_id="CVE-2023-52527" ref_url="https://www.suse.com/security/cve/CVE-2023-52527/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531/" source="CVE"/>
		<reference ref_id="CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532/" source="CVE"/>
		<reference ref_id="CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559/" source="CVE"/>
		<reference ref_id="CVE-2023-52561" ref_url="https://www.suse.com/security/cve/CVE-2023-52561/" source="CVE"/>
		<reference ref_id="CVE-2023-52562" ref_url="https://www.suse.com/security/cve/CVE-2023-52562/" source="CVE"/>
		<reference ref_id="CVE-2023-52563" ref_url="https://www.suse.com/security/cve/CVE-2023-52563/" source="CVE"/>
		<reference ref_id="CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564/" source="CVE"/>
		<reference ref_id="CVE-2023-52565" ref_url="https://www.suse.com/security/cve/CVE-2023-52565/" source="CVE"/>
		<reference ref_id="CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566/" source="CVE"/>
		<reference ref_id="CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567/" source="CVE"/>
		<reference ref_id="CVE-2023-52568" ref_url="https://www.suse.com/security/cve/CVE-2023-52568/" source="CVE"/>
		<reference ref_id="CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569/" source="CVE"/>
		<reference ref_id="CVE-2023-52570" ref_url="https://www.suse.com/security/cve/CVE-2023-52570/" source="CVE"/>
		<reference ref_id="CVE-2023-52571" ref_url="https://www.suse.com/security/cve/CVE-2023-52571/" source="CVE"/>
		<reference ref_id="CVE-2023-52572" ref_url="https://www.suse.com/security/cve/CVE-2023-52572/" source="CVE"/>
		<reference ref_id="CVE-2023-52573" ref_url="https://www.suse.com/security/cve/CVE-2023-52573/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575/" source="CVE"/>
		<reference ref_id="CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576/" source="CVE"/>
		<reference ref_id="CVE-2023-52577" ref_url="https://www.suse.com/security/cve/CVE-2023-52577/" source="CVE"/>
		<reference ref_id="CVE-2023-52578" ref_url="https://www.suse.com/security/cve/CVE-2023-52578/" source="CVE"/>
		<reference ref_id="CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580/" source="CVE"/>
		<reference ref_id="CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581/" source="CVE"/>
		<reference ref_id="CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582/" source="CVE"/>
		<reference ref_id="CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583/" source="CVE"/>
		<reference ref_id="CVE-2023-52584" ref_url="https://www.suse.com/security/cve/CVE-2023-52584/" source="CVE"/>
		<reference ref_id="CVE-2023-52585" ref_url="https://www.suse.com/security/cve/CVE-2023-52585/" source="CVE"/>
		<reference ref_id="CVE-2023-52586" ref_url="https://www.suse.com/security/cve/CVE-2023-52586/" source="CVE"/>
		<reference ref_id="CVE-2023-52587" ref_url="https://www.suse.com/security/cve/CVE-2023-52587/" source="CVE"/>
		<reference ref_id="CVE-2023-52589" ref_url="https://www.suse.com/security/cve/CVE-2023-52589/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52593" ref_url="https://www.suse.com/security/cve/CVE-2023-52593/" source="CVE"/>
		<reference ref_id="CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594/" source="CVE"/>
		<reference ref_id="CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598/" source="CVE"/>
		<reference ref_id="CVE-2023-52599" ref_url="https://www.suse.com/security/cve/CVE-2023-52599/" source="CVE"/>
		<reference ref_id="CVE-2023-52600" ref_url="https://www.suse.com/security/cve/CVE-2023-52600/" source="CVE"/>
		<reference ref_id="CVE-2023-52601" ref_url="https://www.suse.com/security/cve/CVE-2023-52601/" source="CVE"/>
		<reference ref_id="CVE-2023-52602" ref_url="https://www.suse.com/security/cve/CVE-2023-52602/" source="CVE"/>
		<reference ref_id="CVE-2023-52603" ref_url="https://www.suse.com/security/cve/CVE-2023-52603/" source="CVE"/>
		<reference ref_id="CVE-2023-52604" ref_url="https://www.suse.com/security/cve/CVE-2023-52604/" source="CVE"/>
		<reference ref_id="CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52608" ref_url="https://www.suse.com/security/cve/CVE-2023-52608/" source="CVE"/>
		<reference ref_id="CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610/" source="CVE"/>
		<reference ref_id="CVE-2023-52611" ref_url="https://www.suse.com/security/cve/CVE-2023-52611/" source="CVE"/>
		<reference ref_id="CVE-2023-52612" ref_url="https://www.suse.com/security/cve/CVE-2023-52612/" source="CVE"/>
		<reference ref_id="CVE-2023-52614" ref_url="https://www.suse.com/security/cve/CVE-2023-52614/" source="CVE"/>
		<reference ref_id="CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615/" source="CVE"/>
		<reference ref_id="CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616/" source="CVE"/>
		<reference ref_id="CVE-2023-52617" ref_url="https://www.suse.com/security/cve/CVE-2023-52617/" source="CVE"/>
		<reference ref_id="CVE-2023-52618" ref_url="https://www.suse.com/security/cve/CVE-2023-52618/" source="CVE"/>
		<reference ref_id="CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619/" source="CVE"/>
		<reference ref_id="CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621/" source="CVE"/>
		<reference ref_id="CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622/" source="CVE"/>
		<reference ref_id="CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623/" source="CVE"/>
		<reference ref_id="CVE-2023-52624" ref_url="https://www.suse.com/security/cve/CVE-2023-52624/" source="CVE"/>
		<reference ref_id="CVE-2023-52625" ref_url="https://www.suse.com/security/cve/CVE-2023-52625/" source="CVE"/>
		<reference ref_id="CVE-2023-52626" ref_url="https://www.suse.com/security/cve/CVE-2023-52626/" source="CVE"/>
		<reference ref_id="CVE-2023-52627" ref_url="https://www.suse.com/security/cve/CVE-2023-52627/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-52631" ref_url="https://www.suse.com/security/cve/CVE-2023-52631/" source="CVE"/>
		<reference ref_id="CVE-2023-52632" ref_url="https://www.suse.com/security/cve/CVE-2023-52632/" source="CVE"/>
		<reference ref_id="CVE-2023-52634" ref_url="https://www.suse.com/security/cve/CVE-2023-52634/" source="CVE"/>
		<reference ref_id="CVE-2023-52635" ref_url="https://www.suse.com/security/cve/CVE-2023-52635/" source="CVE"/>
		<reference ref_id="CVE-2023-52636" ref_url="https://www.suse.com/security/cve/CVE-2023-52636/" source="CVE"/>
		<reference ref_id="CVE-2023-52637" ref_url="https://www.suse.com/security/cve/CVE-2023-52637/" source="CVE"/>
		<reference ref_id="CVE-2023-52638" ref_url="https://www.suse.com/security/cve/CVE-2023-52638/" source="CVE"/>
		<reference ref_id="CVE-2023-52639" ref_url="https://www.suse.com/security/cve/CVE-2023-52639/" source="CVE"/>
		<reference ref_id="CVE-2023-52640" ref_url="https://www.suse.com/security/cve/CVE-2023-52640/" source="CVE"/>
		<reference ref_id="CVE-2023-52641" ref_url="https://www.suse.com/security/cve/CVE-2023-52641/" source="CVE"/>
		<reference ref_id="CVE-2023-52642" ref_url="https://www.suse.com/security/cve/CVE-2023-52642/" source="CVE"/>
		<reference ref_id="CVE-2023-52643" ref_url="https://www.suse.com/security/cve/CVE-2023-52643/" source="CVE"/>
		<reference ref_id="CVE-2023-52644" ref_url="https://www.suse.com/security/cve/CVE-2023-52644/" source="CVE"/>
		<reference ref_id="CVE-2023-52645" ref_url="https://www.suse.com/security/cve/CVE-2023-52645/" source="CVE"/>
		<reference ref_id="CVE-2023-52647" ref_url="https://www.suse.com/security/cve/CVE-2023-52647/" source="CVE"/>
		<reference ref_id="CVE-2023-52648" ref_url="https://www.suse.com/security/cve/CVE-2023-52648/" source="CVE"/>
		<reference ref_id="CVE-2023-52649" ref_url="https://www.suse.com/security/cve/CVE-2023-52649/" source="CVE"/>
		<reference ref_id="CVE-2023-52650" ref_url="https://www.suse.com/security/cve/CVE-2023-52650/" source="CVE"/>
		<reference ref_id="CVE-2023-52652" ref_url="https://www.suse.com/security/cve/CVE-2023-52652/" source="CVE"/>
		<reference ref_id="CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52656" ref_url="https://www.suse.com/security/cve/CVE-2023-52656/" source="CVE"/>
		<reference ref_id="CVE-2023-52657" ref_url="https://www.suse.com/security/cve/CVE-2023-52657/" source="CVE"/>
		<reference ref_id="CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658/" source="CVE"/>
		<reference ref_id="CVE-2023-52659" ref_url="https://www.suse.com/security/cve/CVE-2023-52659/" source="CVE"/>
		<reference ref_id="CVE-2023-52660" ref_url="https://www.suse.com/security/cve/CVE-2023-52660/" source="CVE"/>
		<reference ref_id="CVE-2023-52661" ref_url="https://www.suse.com/security/cve/CVE-2023-52661/" source="CVE"/>
		<reference ref_id="CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662/" source="CVE"/>
		<reference ref_id="CVE-2023-52663" ref_url="https://www.suse.com/security/cve/CVE-2023-52663/" source="CVE"/>
		<reference ref_id="CVE-2023-52664" ref_url="https://www.suse.com/security/cve/CVE-2023-52664/" source="CVE"/>
		<reference ref_id="CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667/" source="CVE"/>
		<reference ref_id="CVE-2023-52668" ref_url="https://www.suse.com/security/cve/CVE-2023-52668/" source="CVE"/>
		<reference ref_id="CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669/" source="CVE"/>
		<reference ref_id="CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670/" source="CVE"/>
		<reference ref_id="CVE-2023-52671" ref_url="https://www.suse.com/security/cve/CVE-2023-52671/" source="CVE"/>
		<reference ref_id="CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672/" source="CVE"/>
		<reference ref_id="CVE-2023-52673" ref_url="https://www.suse.com/security/cve/CVE-2023-52673/" source="CVE"/>
		<reference ref_id="CVE-2023-52674" ref_url="https://www.suse.com/security/cve/CVE-2023-52674/" source="CVE"/>
		<reference ref_id="CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-52678" ref_url="https://www.suse.com/security/cve/CVE-2023-52678/" source="CVE"/>
		<reference ref_id="CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679/" source="CVE"/>
		<reference ref_id="CVE-2023-52680" ref_url="https://www.suse.com/security/cve/CVE-2023-52680/" source="CVE"/>
		<reference ref_id="CVE-2023-52681" ref_url="https://www.suse.com/security/cve/CVE-2023-52681/" source="CVE"/>
		<reference ref_id="CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683/" source="CVE"/>
		<reference ref_id="CVE-2023-52685" ref_url="https://www.suse.com/security/cve/CVE-2023-52685/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52687" ref_url="https://www.suse.com/security/cve/CVE-2023-52687/" source="CVE"/>
		<reference ref_id="CVE-2023-52688" ref_url="https://www.suse.com/security/cve/CVE-2023-52688/" source="CVE"/>
		<reference ref_id="CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690/" source="CVE"/>
		<reference ref_id="CVE-2023-52691" ref_url="https://www.suse.com/security/cve/CVE-2023-52691/" source="CVE"/>
		<reference ref_id="CVE-2023-52692" ref_url="https://www.suse.com/security/cve/CVE-2023-52692/" source="CVE"/>
		<reference ref_id="CVE-2023-52693" ref_url="https://www.suse.com/security/cve/CVE-2023-52693/" source="CVE"/>
		<reference ref_id="CVE-2023-52694" ref_url="https://www.suse.com/security/cve/CVE-2023-52694/" source="CVE"/>
		<reference ref_id="CVE-2023-52695" ref_url="https://www.suse.com/security/cve/CVE-2023-52695/" source="CVE"/>
		<reference ref_id="CVE-2023-52696" ref_url="https://www.suse.com/security/cve/CVE-2023-52696/" source="CVE"/>
		<reference ref_id="CVE-2023-52697" ref_url="https://www.suse.com/security/cve/CVE-2023-52697/" source="CVE"/>
		<reference ref_id="CVE-2023-52698" ref_url="https://www.suse.com/security/cve/CVE-2023-52698/" source="CVE"/>
		<reference ref_id="CVE-2023-52699" ref_url="https://www.suse.com/security/cve/CVE-2023-52699/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52749" ref_url="https://www.suse.com/security/cve/CVE-2023-52749/" source="CVE"/>
		<reference ref_id="CVE-2023-52750" ref_url="https://www.suse.com/security/cve/CVE-2023-52750/" source="CVE"/>
		<reference ref_id="CVE-2023-52751" ref_url="https://www.suse.com/security/cve/CVE-2023-52751/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753/" source="CVE"/>
		<reference ref_id="CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754/" source="CVE"/>
		<reference ref_id="CVE-2023-52757" ref_url="https://www.suse.com/security/cve/CVE-2023-52757/" source="CVE"/>
		<reference ref_id="CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52765" ref_url="https://www.suse.com/security/cve/CVE-2023-52765/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52767" ref_url="https://www.suse.com/security/cve/CVE-2023-52767/" source="CVE"/>
		<reference ref_id="CVE-2023-52768" ref_url="https://www.suse.com/security/cve/CVE-2023-52768/" source="CVE"/>
		<reference ref_id="CVE-2023-52769" ref_url="https://www.suse.com/security/cve/CVE-2023-52769/" source="CVE"/>
		<reference ref_id="CVE-2023-52771" ref_url="https://www.suse.com/security/cve/CVE-2023-52771/" source="CVE"/>
		<reference ref_id="CVE-2023-52772" ref_url="https://www.suse.com/security/cve/CVE-2023-52772/" source="CVE"/>
		<reference ref_id="CVE-2023-52773" ref_url="https://www.suse.com/security/cve/CVE-2023-52773/" source="CVE"/>
		<reference ref_id="CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774/" source="CVE"/>
		<reference ref_id="CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775/" source="CVE"/>
		<reference ref_id="CVE-2023-52776" ref_url="https://www.suse.com/security/cve/CVE-2023-52776/" source="CVE"/>
		<reference ref_id="CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777/" source="CVE"/>
		<reference ref_id="CVE-2023-52778" ref_url="https://www.suse.com/security/cve/CVE-2023-52778/" source="CVE"/>
		<reference ref_id="CVE-2023-52780" ref_url="https://www.suse.com/security/cve/CVE-2023-52780/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52782" ref_url="https://www.suse.com/security/cve/CVE-2023-52782/" source="CVE"/>
		<reference ref_id="CVE-2023-52783" ref_url="https://www.suse.com/security/cve/CVE-2023-52783/" source="CVE"/>
		<reference ref_id="CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784/" source="CVE"/>
		<reference ref_id="CVE-2023-52786" ref_url="https://www.suse.com/security/cve/CVE-2023-52786/" source="CVE"/>
		<reference ref_id="CVE-2023-52787" ref_url="https://www.suse.com/security/cve/CVE-2023-52787/" source="CVE"/>
		<reference ref_id="CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788/" source="CVE"/>
		<reference ref_id="CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52792" ref_url="https://www.suse.com/security/cve/CVE-2023-52792/" source="CVE"/>
		<reference ref_id="CVE-2023-52794" ref_url="https://www.suse.com/security/cve/CVE-2023-52794/" source="CVE"/>
		<reference ref_id="CVE-2023-52795" ref_url="https://www.suse.com/security/cve/CVE-2023-52795/" source="CVE"/>
		<reference ref_id="CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52801" ref_url="https://www.suse.com/security/cve/CVE-2023-52801/" source="CVE"/>
		<reference ref_id="CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803/" source="CVE"/>
		<reference ref_id="CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804/" source="CVE"/>
		<reference ref_id="CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805/" source="CVE"/>
		<reference ref_id="CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806/" source="CVE"/>
		<reference ref_id="CVE-2023-52807" ref_url="https://www.suse.com/security/cve/CVE-2023-52807/" source="CVE"/>
		<reference ref_id="CVE-2023-52808" ref_url="https://www.suse.com/security/cve/CVE-2023-52808/" source="CVE"/>
		<reference ref_id="CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809/" source="CVE"/>
		<reference ref_id="CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52812" ref_url="https://www.suse.com/security/cve/CVE-2023-52812/" source="CVE"/>
		<reference ref_id="CVE-2023-52813" ref_url="https://www.suse.com/security/cve/CVE-2023-52813/" source="CVE"/>
		<reference ref_id="CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814/" source="CVE"/>
		<reference ref_id="CVE-2023-52815" ref_url="https://www.suse.com/security/cve/CVE-2023-52815/" source="CVE"/>
		<reference ref_id="CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818/" source="CVE"/>
		<reference ref_id="CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819/" source="CVE"/>
		<reference ref_id="CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821/" source="CVE"/>
		<reference ref_id="CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825/" source="CVE"/>
		<reference ref_id="CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826/" source="CVE"/>
		<reference ref_id="CVE-2023-52827" ref_url="https://www.suse.com/security/cve/CVE-2023-52827/" source="CVE"/>
		<reference ref_id="CVE-2023-52829" ref_url="https://www.suse.com/security/cve/CVE-2023-52829/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835/" source="CVE"/>
		<reference ref_id="CVE-2023-52836" ref_url="https://www.suse.com/security/cve/CVE-2023-52836/" source="CVE"/>
		<reference ref_id="CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837/" source="CVE"/>
		<reference ref_id="CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841/" source="CVE"/>
		<reference ref_id="CVE-2023-52842" ref_url="https://www.suse.com/security/cve/CVE-2023-52842/" source="CVE"/>
		<reference ref_id="CVE-2023-52843" ref_url="https://www.suse.com/security/cve/CVE-2023-52843/" source="CVE"/>
		<reference ref_id="CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844/" source="CVE"/>
		<reference ref_id="CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845/" source="CVE"/>
		<reference ref_id="CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52849" ref_url="https://www.suse.com/security/cve/CVE-2023-52849/" source="CVE"/>
		<reference ref_id="CVE-2023-52850" ref_url="https://www.suse.com/security/cve/CVE-2023-52850/" source="CVE"/>
		<reference ref_id="CVE-2023-52851" ref_url="https://www.suse.com/security/cve/CVE-2023-52851/" source="CVE"/>
		<reference ref_id="CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853/" source="CVE"/>
		<reference ref_id="CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854/" source="CVE"/>
		<reference ref_id="CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855/" source="CVE"/>
		<reference ref_id="CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856/" source="CVE"/>
		<reference ref_id="CVE-2023-52857" ref_url="https://www.suse.com/security/cve/CVE-2023-52857/" source="CVE"/>
		<reference ref_id="CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858/" source="CVE"/>
		<reference ref_id="CVE-2023-52859" ref_url="https://www.suse.com/security/cve/CVE-2023-52859/" source="CVE"/>
		<reference ref_id="CVE-2023-52860" ref_url="https://www.suse.com/security/cve/CVE-2023-52860/" source="CVE"/>
		<reference ref_id="CVE-2023-52861" ref_url="https://www.suse.com/security/cve/CVE-2023-52861/" source="CVE"/>
		<reference ref_id="CVE-2023-52862" ref_url="https://www.suse.com/security/cve/CVE-2023-52862/" source="CVE"/>
		<reference ref_id="CVE-2023-52863" ref_url="https://www.suse.com/security/cve/CVE-2023-52863/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865/" source="CVE"/>
		<reference ref_id="CVE-2023-52866" ref_url="https://www.suse.com/security/cve/CVE-2023-52866/" source="CVE"/>
		<reference ref_id="CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867/" source="CVE"/>
		<reference ref_id="CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868/" source="CVE"/>
		<reference ref_id="CVE-2023-52869" ref_url="https://www.suse.com/security/cve/CVE-2023-52869/" source="CVE"/>
		<reference ref_id="CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870/" source="CVE"/>
		<reference ref_id="CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871/" source="CVE"/>
		<reference ref_id="CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872/" source="CVE"/>
		<reference ref_id="CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873/" source="CVE"/>
		<reference ref_id="CVE-2023-52874" ref_url="https://www.suse.com/security/cve/CVE-2023-52874/" source="CVE"/>
		<reference ref_id="CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875/" source="CVE"/>
		<reference ref_id="CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52879" ref_url="https://www.suse.com/security/cve/CVE-2023-52879/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52882" ref_url="https://www.suse.com/security/cve/CVE-2023-52882/" source="CVE"/>
		<reference ref_id="CVE-2023-52883" ref_url="https://www.suse.com/security/cve/CVE-2023-52883/" source="CVE"/>
		<reference ref_id="CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884/" source="CVE"/>
		<reference ref_id="CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885/" source="CVE"/>
		<reference ref_id="CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886/" source="CVE"/>
		<reference ref_id="CVE-2023-52887" ref_url="https://www.suse.com/security/cve/CVE-2023-52887/" source="CVE"/>
		<reference ref_id="CVE-2023-52889" ref_url="https://www.suse.com/security/cve/CVE-2023-52889/" source="CVE"/>
		<reference ref_id="CVE-2023-52915" ref_url="https://www.suse.com/security/cve/CVE-2023-52915/" source="CVE"/>
		<reference ref_id="CVE-2023-52916" ref_url="https://www.suse.com/security/cve/CVE-2023-52916/" source="CVE"/>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2023-52918" ref_url="https://www.suse.com/security/cve/CVE-2023-52918/" source="CVE"/>
		<reference ref_id="CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919/" source="CVE"/>
		<reference ref_id="CVE-2023-53034" ref_url="https://www.suse.com/security/cve/CVE-2023-53034/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-5972" ref_url="https://www.suse.com/security/cve/CVE-2023-5972/" source="CVE"/>
		<reference ref_id="CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6238" ref_url="https://www.suse.com/security/cve/CVE-2023-6238/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6679" ref_url="https://www.suse.com/security/cve/CVE-2023-6679/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2024-0193" ref_url="https://www.suse.com/security/cve/CVE-2024-0193/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607/" source="CVE"/>
		<reference ref_id="CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639/" source="CVE"/>
		<reference ref_id="CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641/" source="CVE"/>
		<reference ref_id="CVE-2024-0646" ref_url="https://www.suse.com/security/cve/CVE-2024-0646/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151/" source="CVE"/>
		<reference ref_id="CVE-2024-1312" ref_url="https://www.suse.com/security/cve/CVE-2024-1312/" source="CVE"/>
		<reference ref_id="CVE-2024-21823" ref_url="https://www.suse.com/security/cve/CVE-2024-21823/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<reference ref_id="CVE-2024-24861" ref_url="https://www.suse.com/security/cve/CVE-2024-24861/" source="CVE"/>
		<reference ref_id="CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739/" source="CVE"/>
		<reference ref_id="CVE-2024-25741" ref_url="https://www.suse.com/security/cve/CVE-2024-25741/" source="CVE"/>
		<reference ref_id="CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744/" source="CVE"/>
		<reference ref_id="CVE-2024-26581" ref_url="https://www.suse.com/security/cve/CVE-2024-26581/" source="CVE"/>
		<reference ref_id="CVE-2024-26582" ref_url="https://www.suse.com/security/cve/CVE-2024-26582/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589/" source="CVE"/>
		<reference ref_id="CVE-2024-26590" ref_url="https://www.suse.com/security/cve/CVE-2024-26590/" source="CVE"/>
		<reference ref_id="CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26597" ref_url="https://www.suse.com/security/cve/CVE-2024-26597/" source="CVE"/>
		<reference ref_id="CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598/" source="CVE"/>
		<reference ref_id="CVE-2024-26599" ref_url="https://www.suse.com/security/cve/CVE-2024-26599/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26605" ref_url="https://www.suse.com/security/cve/CVE-2024-26605/" source="CVE"/>
		<reference ref_id="CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26611" ref_url="https://www.suse.com/security/cve/CVE-2024-26611/" source="CVE"/>
		<reference ref_id="CVE-2024-26612" ref_url="https://www.suse.com/security/cve/CVE-2024-26612/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615/" source="CVE"/>
		<reference ref_id="CVE-2024-26616" ref_url="https://www.suse.com/security/cve/CVE-2024-26616/" source="CVE"/>
		<reference ref_id="CVE-2024-26618" ref_url="https://www.suse.com/security/cve/CVE-2024-26618/" source="CVE"/>
		<reference ref_id="CVE-2024-26620" ref_url="https://www.suse.com/security/cve/CVE-2024-26620/" source="CVE"/>
		<reference ref_id="CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622/" source="CVE"/>
		<reference ref_id="CVE-2024-26623" ref_url="https://www.suse.com/security/cve/CVE-2024-26623/" source="CVE"/>
		<reference ref_id="CVE-2024-26625" ref_url="https://www.suse.com/security/cve/CVE-2024-26625/" source="CVE"/>
		<reference ref_id="CVE-2024-26627" ref_url="https://www.suse.com/security/cve/CVE-2024-26627/" source="CVE"/>
		<reference ref_id="CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629/" source="CVE"/>
		<reference ref_id="CVE-2024-26631" ref_url="https://www.suse.com/security/cve/CVE-2024-26631/" source="CVE"/>
		<reference ref_id="CVE-2024-26632" ref_url="https://www.suse.com/security/cve/CVE-2024-26632/" source="CVE"/>
		<reference ref_id="CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633/" source="CVE"/>
		<reference ref_id="CVE-2024-26635" ref_url="https://www.suse.com/security/cve/CVE-2024-26635/" source="CVE"/>
		<reference ref_id="CVE-2024-26636" ref_url="https://www.suse.com/security/cve/CVE-2024-26636/" source="CVE"/>
		<reference ref_id="CVE-2024-26637" ref_url="https://www.suse.com/security/cve/CVE-2024-26637/" source="CVE"/>
		<reference ref_id="CVE-2024-26638" ref_url="https://www.suse.com/security/cve/CVE-2024-26638/" source="CVE"/>
		<reference ref_id="CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640/" source="CVE"/>
		<reference ref_id="CVE-2024-26641" ref_url="https://www.suse.com/security/cve/CVE-2024-26641/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-26644" ref_url="https://www.suse.com/security/cve/CVE-2024-26644/" source="CVE"/>
		<reference ref_id="CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645/" source="CVE"/>
		<reference ref_id="CVE-2024-26646" ref_url="https://www.suse.com/security/cve/CVE-2024-26646/" source="CVE"/>
		<reference ref_id="CVE-2024-26647" ref_url="https://www.suse.com/security/cve/CVE-2024-26647/" source="CVE"/>
		<reference ref_id="CVE-2024-26648" ref_url="https://www.suse.com/security/cve/CVE-2024-26648/" source="CVE"/>
		<reference ref_id="CVE-2024-26649" ref_url="https://www.suse.com/security/cve/CVE-2024-26649/" source="CVE"/>
		<reference ref_id="CVE-2024-26650" ref_url="https://www.suse.com/security/cve/CVE-2024-26650/" source="CVE"/>
		<reference ref_id="CVE-2024-26651" ref_url="https://www.suse.com/security/cve/CVE-2024-26651/" source="CVE"/>
		<reference ref_id="CVE-2024-26652" ref_url="https://www.suse.com/security/cve/CVE-2024-26652/" source="CVE"/>
		<reference ref_id="CVE-2024-26654" ref_url="https://www.suse.com/security/cve/CVE-2024-26654/" source="CVE"/>
		<reference ref_id="CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656/" source="CVE"/>
		<reference ref_id="CVE-2024-26657" ref_url="https://www.suse.com/security/cve/CVE-2024-26657/" source="CVE"/>
		<reference ref_id="CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659/" source="CVE"/>
		<reference ref_id="CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660/" source="CVE"/>
		<reference ref_id="CVE-2024-26661" ref_url="https://www.suse.com/security/cve/CVE-2024-26661/" source="CVE"/>
		<reference ref_id="CVE-2024-26662" ref_url="https://www.suse.com/security/cve/CVE-2024-26662/" source="CVE"/>
		<reference ref_id="CVE-2024-26663" ref_url="https://www.suse.com/security/cve/CVE-2024-26663/" source="CVE"/>
		<reference ref_id="CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664/" source="CVE"/>
		<reference ref_id="CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665/" source="CVE"/>
		<reference ref_id="CVE-2024-26666" ref_url="https://www.suse.com/security/cve/CVE-2024-26666/" source="CVE"/>
		<reference ref_id="CVE-2024-26667" ref_url="https://www.suse.com/security/cve/CVE-2024-26667/" source="CVE"/>
		<reference ref_id="CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668/" source="CVE"/>
		<reference ref_id="CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669/" source="CVE"/>
		<reference ref_id="CVE-2024-26670" ref_url="https://www.suse.com/security/cve/CVE-2024-26670/" source="CVE"/>
		<reference ref_id="CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671/" source="CVE"/>
		<reference ref_id="CVE-2024-26672" ref_url="https://www.suse.com/security/cve/CVE-2024-26672/" source="CVE"/>
		<reference ref_id="CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673/" source="CVE"/>
		<reference ref_id="CVE-2024-26674" ref_url="https://www.suse.com/security/cve/CVE-2024-26674/" source="CVE"/>
		<reference ref_id="CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675/" source="CVE"/>
		<reference ref_id="CVE-2024-26676" ref_url="https://www.suse.com/security/cve/CVE-2024-26676/" source="CVE"/>
		<reference ref_id="CVE-2024-26677" ref_url="https://www.suse.com/security/cve/CVE-2024-26677/" source="CVE"/>
		<reference ref_id="CVE-2024-26679" ref_url="https://www.suse.com/security/cve/CVE-2024-26679/" source="CVE"/>
		<reference ref_id="CVE-2024-26680" ref_url="https://www.suse.com/security/cve/CVE-2024-26680/" source="CVE"/>
		<reference ref_id="CVE-2024-26681" ref_url="https://www.suse.com/security/cve/CVE-2024-26681/" source="CVE"/>
		<reference ref_id="CVE-2024-26682" ref_url="https://www.suse.com/security/cve/CVE-2024-26682/" source="CVE"/>
		<reference ref_id="CVE-2024-26683" ref_url="https://www.suse.com/security/cve/CVE-2024-26683/" source="CVE"/>
		<reference ref_id="CVE-2024-26684" ref_url="https://www.suse.com/security/cve/CVE-2024-26684/" source="CVE"/>
		<reference ref_id="CVE-2024-26685" ref_url="https://www.suse.com/security/cve/CVE-2024-26685/" source="CVE"/>
		<reference ref_id="CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687/" source="CVE"/>
		<reference ref_id="CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688/" source="CVE"/>
		<reference ref_id="CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689/" source="CVE"/>
		<reference ref_id="CVE-2024-26691" ref_url="https://www.suse.com/security/cve/CVE-2024-26691/" source="CVE"/>
		<reference ref_id="CVE-2024-26692" ref_url="https://www.suse.com/security/cve/CVE-2024-26692/" source="CVE"/>
		<reference ref_id="CVE-2024-26693" ref_url="https://www.suse.com/security/cve/CVE-2024-26693/" source="CVE"/>
		<reference ref_id="CVE-2024-26694" ref_url="https://www.suse.com/security/cve/CVE-2024-26694/" source="CVE"/>
		<reference ref_id="CVE-2024-26695" ref_url="https://www.suse.com/security/cve/CVE-2024-26695/" source="CVE"/>
		<reference ref_id="CVE-2024-26696" ref_url="https://www.suse.com/security/cve/CVE-2024-26696/" source="CVE"/>
		<reference ref_id="CVE-2024-26697" ref_url="https://www.suse.com/security/cve/CVE-2024-26697/" source="CVE"/>
		<reference ref_id="CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698/" source="CVE"/>
		<reference ref_id="CVE-2024-26699" ref_url="https://www.suse.com/security/cve/CVE-2024-26699/" source="CVE"/>
		<reference ref_id="CVE-2024-26700" ref_url="https://www.suse.com/security/cve/CVE-2024-26700/" source="CVE"/>
		<reference ref_id="CVE-2024-26702" ref_url="https://www.suse.com/security/cve/CVE-2024-26702/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26709" ref_url="https://www.suse.com/security/cve/CVE-2024-26709/" source="CVE"/>
		<reference ref_id="CVE-2024-26710" ref_url="https://www.suse.com/security/cve/CVE-2024-26710/" source="CVE"/>
		<reference ref_id="CVE-2024-26711" ref_url="https://www.suse.com/security/cve/CVE-2024-26711/" source="CVE"/>
		<reference ref_id="CVE-2024-26714" ref_url="https://www.suse.com/security/cve/CVE-2024-26714/" source="CVE"/>
		<reference ref_id="CVE-2024-26715" ref_url="https://www.suse.com/security/cve/CVE-2024-26715/" source="CVE"/>
		<reference ref_id="CVE-2024-26716" ref_url="https://www.suse.com/security/cve/CVE-2024-26716/" source="CVE"/>
		<reference ref_id="CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717/" source="CVE"/>
		<reference ref_id="CVE-2024-26718" ref_url="https://www.suse.com/security/cve/CVE-2024-26718/" source="CVE"/>
		<reference ref_id="CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720/" source="CVE"/>
		<reference ref_id="CVE-2024-26721" ref_url="https://www.suse.com/security/cve/CVE-2024-26721/" source="CVE"/>
		<reference ref_id="CVE-2024-26722" ref_url="https://www.suse.com/security/cve/CVE-2024-26722/" source="CVE"/>
		<reference ref_id="CVE-2024-26723" ref_url="https://www.suse.com/security/cve/CVE-2024-26723/" source="CVE"/>
		<reference ref_id="CVE-2024-26724" ref_url="https://www.suse.com/security/cve/CVE-2024-26724/" source="CVE"/>
		<reference ref_id="CVE-2024-26725" ref_url="https://www.suse.com/security/cve/CVE-2024-26725/" source="CVE"/>
		<reference ref_id="CVE-2024-26726" ref_url="https://www.suse.com/security/cve/CVE-2024-26726/" source="CVE"/>
		<reference ref_id="CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727/" source="CVE"/>
		<reference ref_id="CVE-2024-26728" ref_url="https://www.suse.com/security/cve/CVE-2024-26728/" source="CVE"/>
		<reference ref_id="CVE-2024-26729" ref_url="https://www.suse.com/security/cve/CVE-2024-26729/" source="CVE"/>
		<reference ref_id="CVE-2024-26731" ref_url="https://www.suse.com/security/cve/CVE-2024-26731/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26734" ref_url="https://www.suse.com/security/cve/CVE-2024-26734/" source="CVE"/>
		<reference ref_id="CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735/" source="CVE"/>
		<reference ref_id="CVE-2024-26736" ref_url="https://www.suse.com/security/cve/CVE-2024-26736/" source="CVE"/>
		<reference ref_id="CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737/" source="CVE"/>
		<reference ref_id="CVE-2024-26738" ref_url="https://www.suse.com/security/cve/CVE-2024-26738/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26740" ref_url="https://www.suse.com/security/cve/CVE-2024-26740/" source="CVE"/>
		<reference ref_id="CVE-2024-26742" ref_url="https://www.suse.com/security/cve/CVE-2024-26742/" source="CVE"/>
		<reference ref_id="CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743/" source="CVE"/>
		<reference ref_id="CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744/" source="CVE"/>
		<reference ref_id="CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745/" source="CVE"/>
		<reference ref_id="CVE-2024-26746" ref_url="https://www.suse.com/security/cve/CVE-2024-26746/" source="CVE"/>
		<reference ref_id="CVE-2024-26747" ref_url="https://www.suse.com/security/cve/CVE-2024-26747/" source="CVE"/>
		<reference ref_id="CVE-2024-26748" ref_url="https://www.suse.com/security/cve/CVE-2024-26748/" source="CVE"/>
		<reference ref_id="CVE-2024-26749" ref_url="https://www.suse.com/security/cve/CVE-2024-26749/" source="CVE"/>
		<reference ref_id="CVE-2024-26750" ref_url="https://www.suse.com/security/cve/CVE-2024-26750/" source="CVE"/>
		<reference ref_id="CVE-2024-26751" ref_url="https://www.suse.com/security/cve/CVE-2024-26751/" source="CVE"/>
		<reference ref_id="CVE-2024-26752" ref_url="https://www.suse.com/security/cve/CVE-2024-26752/" source="CVE"/>
		<reference ref_id="CVE-2024-26753" ref_url="https://www.suse.com/security/cve/CVE-2024-26753/" source="CVE"/>
		<reference ref_id="CVE-2024-26754" ref_url="https://www.suse.com/security/cve/CVE-2024-26754/" source="CVE"/>
		<reference ref_id="CVE-2024-26755" ref_url="https://www.suse.com/security/cve/CVE-2024-26755/" source="CVE"/>
		<reference ref_id="CVE-2024-26756" ref_url="https://www.suse.com/security/cve/CVE-2024-26756/" source="CVE"/>
		<reference ref_id="CVE-2024-26757" ref_url="https://www.suse.com/security/cve/CVE-2024-26757/" source="CVE"/>
		<reference ref_id="CVE-2024-26758" ref_url="https://www.suse.com/security/cve/CVE-2024-26758/" source="CVE"/>
		<reference ref_id="CVE-2024-26759" ref_url="https://www.suse.com/security/cve/CVE-2024-26759/" source="CVE"/>
		<reference ref_id="CVE-2024-26761" ref_url="https://www.suse.com/security/cve/CVE-2024-26761/" source="CVE"/>
		<reference ref_id="CVE-2024-26763" ref_url="https://www.suse.com/security/cve/CVE-2024-26763/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26767" ref_url="https://www.suse.com/security/cve/CVE-2024-26767/" source="CVE"/>
		<reference ref_id="CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769/" source="CVE"/>
		<reference ref_id="CVE-2024-26771" ref_url="https://www.suse.com/security/cve/CVE-2024-26771/" source="CVE"/>
		<reference ref_id="CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26774" ref_url="https://www.suse.com/security/cve/CVE-2024-26774/" source="CVE"/>
		<reference ref_id="CVE-2024-26775" ref_url="https://www.suse.com/security/cve/CVE-2024-26775/" source="CVE"/>
		<reference ref_id="CVE-2024-26776" ref_url="https://www.suse.com/security/cve/CVE-2024-26776/" source="CVE"/>
		<reference ref_id="CVE-2024-26777" ref_url="https://www.suse.com/security/cve/CVE-2024-26777/" source="CVE"/>
		<reference ref_id="CVE-2024-26778" ref_url="https://www.suse.com/security/cve/CVE-2024-26778/" source="CVE"/>
		<reference ref_id="CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779/" source="CVE"/>
		<reference ref_id="CVE-2024-26780" ref_url="https://www.suse.com/security/cve/CVE-2024-26780/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783/" source="CVE"/>
		<reference ref_id="CVE-2024-26785" ref_url="https://www.suse.com/security/cve/CVE-2024-26785/" source="CVE"/>
		<reference ref_id="CVE-2024-26786" ref_url="https://www.suse.com/security/cve/CVE-2024-26786/" source="CVE"/>
		<reference ref_id="CVE-2024-26787" ref_url="https://www.suse.com/security/cve/CVE-2024-26787/" source="CVE"/>
		<reference ref_id="CVE-2024-26788" ref_url="https://www.suse.com/security/cve/CVE-2024-26788/" source="CVE"/>
		<reference ref_id="CVE-2024-26789" ref_url="https://www.suse.com/security/cve/CVE-2024-26789/" source="CVE"/>
		<reference ref_id="CVE-2024-26790" ref_url="https://www.suse.com/security/cve/CVE-2024-26790/" source="CVE"/>
		<reference ref_id="CVE-2024-26791" ref_url="https://www.suse.com/security/cve/CVE-2024-26791/" source="CVE"/>
		<reference ref_id="CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792/" source="CVE"/>
		<reference ref_id="CVE-2024-26793" ref_url="https://www.suse.com/security/cve/CVE-2024-26793/" source="CVE"/>
		<reference ref_id="CVE-2024-26794" ref_url="https://www.suse.com/security/cve/CVE-2024-26794/" source="CVE"/>
		<reference ref_id="CVE-2024-26797" ref_url="https://www.suse.com/security/cve/CVE-2024-26797/" source="CVE"/>
		<reference ref_id="CVE-2024-26798" ref_url="https://www.suse.com/security/cve/CVE-2024-26798/" source="CVE"/>
		<reference ref_id="CVE-2024-26799" ref_url="https://www.suse.com/security/cve/CVE-2024-26799/" source="CVE"/>
		<reference ref_id="CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800/" source="CVE"/>
		<reference ref_id="CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801/" source="CVE"/>
		<reference ref_id="CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802/" source="CVE"/>
		<reference ref_id="CVE-2024-26803" ref_url="https://www.suse.com/security/cve/CVE-2024-26803/" source="CVE"/>
		<reference ref_id="CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804/" source="CVE"/>
		<reference ref_id="CVE-2024-26805" ref_url="https://www.suse.com/security/cve/CVE-2024-26805/" source="CVE"/>
		<reference ref_id="CVE-2024-26807" ref_url="https://www.suse.com/security/cve/CVE-2024-26807/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26809" ref_url="https://www.suse.com/security/cve/CVE-2024-26809/" source="CVE"/>
		<reference ref_id="CVE-2024-26812" ref_url="https://www.suse.com/security/cve/CVE-2024-26812/" source="CVE"/>
		<reference ref_id="CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813/" source="CVE"/>
		<reference ref_id="CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814/" source="CVE"/>
		<reference ref_id="CVE-2024-26815" ref_url="https://www.suse.com/security/cve/CVE-2024-26815/" source="CVE"/>
		<reference ref_id="CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816/" source="CVE"/>
		<reference ref_id="CVE-2024-26820" ref_url="https://www.suse.com/security/cve/CVE-2024-26820/" source="CVE"/>
		<reference ref_id="CVE-2024-26822" ref_url="https://www.suse.com/security/cve/CVE-2024-26822/" source="CVE"/>
		<reference ref_id="CVE-2024-26824" ref_url="https://www.suse.com/security/cve/CVE-2024-26824/" source="CVE"/>
		<reference ref_id="CVE-2024-26825" ref_url="https://www.suse.com/security/cve/CVE-2024-26825/" source="CVE"/>
		<reference ref_id="CVE-2024-26826" ref_url="https://www.suse.com/security/cve/CVE-2024-26826/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26829" ref_url="https://www.suse.com/security/cve/CVE-2024-26829/" source="CVE"/>
		<reference ref_id="CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830/" source="CVE"/>
		<reference ref_id="CVE-2024-26832" ref_url="https://www.suse.com/security/cve/CVE-2024-26832/" source="CVE"/>
		<reference ref_id="CVE-2024-26833" ref_url="https://www.suse.com/security/cve/CVE-2024-26833/" source="CVE"/>
		<reference ref_id="CVE-2024-26835" ref_url="https://www.suse.com/security/cve/CVE-2024-26835/" source="CVE"/>
		<reference ref_id="CVE-2024-26836" ref_url="https://www.suse.com/security/cve/CVE-2024-26836/" source="CVE"/>
		<reference ref_id="CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837/" source="CVE"/>
		<reference ref_id="CVE-2024-26838" ref_url="https://www.suse.com/security/cve/CVE-2024-26838/" source="CVE"/>
		<reference ref_id="CVE-2024-26839" ref_url="https://www.suse.com/security/cve/CVE-2024-26839/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843/" source="CVE"/>
		<reference ref_id="CVE-2024-26844" ref_url="https://www.suse.com/security/cve/CVE-2024-26844/" source="CVE"/>
		<reference ref_id="CVE-2024-26845" ref_url="https://www.suse.com/security/cve/CVE-2024-26845/" source="CVE"/>
		<reference ref_id="CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846/" source="CVE"/>
		<reference ref_id="CVE-2024-26847" ref_url="https://www.suse.com/security/cve/CVE-2024-26847/" source="CVE"/>
		<reference ref_id="CVE-2024-26848" ref_url="https://www.suse.com/security/cve/CVE-2024-26848/" source="CVE"/>
		<reference ref_id="CVE-2024-26849" ref_url="https://www.suse.com/security/cve/CVE-2024-26849/" source="CVE"/>
		<reference ref_id="CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853/" source="CVE"/>
		<reference ref_id="CVE-2024-26854" ref_url="https://www.suse.com/security/cve/CVE-2024-26854/" source="CVE"/>
		<reference ref_id="CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855/" source="CVE"/>
		<reference ref_id="CVE-2024-26856" ref_url="https://www.suse.com/security/cve/CVE-2024-26856/" source="CVE"/>
		<reference ref_id="CVE-2024-26857" ref_url="https://www.suse.com/security/cve/CVE-2024-26857/" source="CVE"/>
		<reference ref_id="CVE-2024-26858" ref_url="https://www.suse.com/security/cve/CVE-2024-26858/" source="CVE"/>
		<reference ref_id="CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859/" source="CVE"/>
		<reference ref_id="CVE-2024-26860" ref_url="https://www.suse.com/security/cve/CVE-2024-26860/" source="CVE"/>
		<reference ref_id="CVE-2024-26861" ref_url="https://www.suse.com/security/cve/CVE-2024-26861/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26863" ref_url="https://www.suse.com/security/cve/CVE-2024-26863/" source="CVE"/>
		<reference ref_id="CVE-2024-26865" ref_url="https://www.suse.com/security/cve/CVE-2024-26865/" source="CVE"/>
		<reference ref_id="CVE-2024-26866" ref_url="https://www.suse.com/security/cve/CVE-2024-26866/" source="CVE"/>
		<reference ref_id="CVE-2024-26868" ref_url="https://www.suse.com/security/cve/CVE-2024-26868/" source="CVE"/>
		<reference ref_id="CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870/" source="CVE"/>
		<reference ref_id="CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872/" source="CVE"/>
		<reference ref_id="CVE-2024-26874" ref_url="https://www.suse.com/security/cve/CVE-2024-26874/" source="CVE"/>
		<reference ref_id="CVE-2024-26875" ref_url="https://www.suse.com/security/cve/CVE-2024-26875/" source="CVE"/>
		<reference ref_id="CVE-2024-26876" ref_url="https://www.suse.com/security/cve/CVE-2024-26876/" source="CVE"/>
		<reference ref_id="CVE-2024-26877" ref_url="https://www.suse.com/security/cve/CVE-2024-26877/" source="CVE"/>
		<reference ref_id="CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878/" source="CVE"/>
		<reference ref_id="CVE-2024-26879" ref_url="https://www.suse.com/security/cve/CVE-2024-26879/" source="CVE"/>
		<reference ref_id="CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880/" source="CVE"/>
		<reference ref_id="CVE-2024-26881" ref_url="https://www.suse.com/security/cve/CVE-2024-26881/" source="CVE"/>
		<reference ref_id="CVE-2024-26882" ref_url="https://www.suse.com/security/cve/CVE-2024-26882/" source="CVE"/>
		<reference ref_id="CVE-2024-26883" ref_url="https://www.suse.com/security/cve/CVE-2024-26883/" source="CVE"/>
		<reference ref_id="CVE-2024-26884" ref_url="https://www.suse.com/security/cve/CVE-2024-26884/" source="CVE"/>
		<reference ref_id="CVE-2024-26885" ref_url="https://www.suse.com/security/cve/CVE-2024-26885/" source="CVE"/>
		<reference ref_id="CVE-2024-26886" ref_url="https://www.suse.com/security/cve/CVE-2024-26886/" source="CVE"/>
		<reference ref_id="CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889/" source="CVE"/>
		<reference ref_id="CVE-2024-26890" ref_url="https://www.suse.com/security/cve/CVE-2024-26890/" source="CVE"/>
		<reference ref_id="CVE-2024-26891" ref_url="https://www.suse.com/security/cve/CVE-2024-26891/" source="CVE"/>
		<reference ref_id="CVE-2024-26892" ref_url="https://www.suse.com/security/cve/CVE-2024-26892/" source="CVE"/>
		<reference ref_id="CVE-2024-26893" ref_url="https://www.suse.com/security/cve/CVE-2024-26893/" source="CVE"/>
		<reference ref_id="CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894/" source="CVE"/>
		<reference ref_id="CVE-2024-26895" ref_url="https://www.suse.com/security/cve/CVE-2024-26895/" source="CVE"/>
		<reference ref_id="CVE-2024-26896" ref_url="https://www.suse.com/security/cve/CVE-2024-26896/" source="CVE"/>
		<reference ref_id="CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-26899" ref_url="https://www.suse.com/security/cve/CVE-2024-26899/" source="CVE"/>
		<reference ref_id="CVE-2024-26900" ref_url="https://www.suse.com/security/cve/CVE-2024-26900/" source="CVE"/>
		<reference ref_id="CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901/" source="CVE"/>
		<reference ref_id="CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903/" source="CVE"/>
		<reference ref_id="CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906/" source="CVE"/>
		<reference ref_id="CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907/" source="CVE"/>
		<reference ref_id="CVE-2024-26909" ref_url="https://www.suse.com/security/cve/CVE-2024-26909/" source="CVE"/>
		<reference ref_id="CVE-2024-26911" ref_url="https://www.suse.com/security/cve/CVE-2024-26911/" source="CVE"/>
		<reference ref_id="CVE-2024-26912" ref_url="https://www.suse.com/security/cve/CVE-2024-26912/" source="CVE"/>
		<reference ref_id="CVE-2024-26913" ref_url="https://www.suse.com/security/cve/CVE-2024-26913/" source="CVE"/>
		<reference ref_id="CVE-2024-26914" ref_url="https://www.suse.com/security/cve/CVE-2024-26914/" source="CVE"/>
		<reference ref_id="CVE-2024-26915" ref_url="https://www.suse.com/security/cve/CVE-2024-26915/" source="CVE"/>
		<reference ref_id="CVE-2024-26916" ref_url="https://www.suse.com/security/cve/CVE-2024-26916/" source="CVE"/>
		<reference ref_id="CVE-2024-26917" ref_url="https://www.suse.com/security/cve/CVE-2024-26917/" source="CVE"/>
		<reference ref_id="CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919/" source="CVE"/>
		<reference ref_id="CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26922" ref_url="https://www.suse.com/security/cve/CVE-2024-26922/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26927" ref_url="https://www.suse.com/security/cve/CVE-2024-26927/" source="CVE"/>
		<reference ref_id="CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931/" source="CVE"/>
		<reference ref_id="CVE-2024-26932" ref_url="https://www.suse.com/security/cve/CVE-2024-26932/" source="CVE"/>
		<reference ref_id="CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933/" source="CVE"/>
		<reference ref_id="CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26937" ref_url="https://www.suse.com/security/cve/CVE-2024-26937/" source="CVE"/>
		<reference ref_id="CVE-2024-26938" ref_url="https://www.suse.com/security/cve/CVE-2024-26938/" source="CVE"/>
		<reference ref_id="CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939/" source="CVE"/>
		<reference ref_id="CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940/" source="CVE"/>
		<reference ref_id="CVE-2024-26943" ref_url="https://www.suse.com/security/cve/CVE-2024-26943/" source="CVE"/>
		<reference ref_id="CVE-2024-26944" ref_url="https://www.suse.com/security/cve/CVE-2024-26944/" source="CVE"/>
		<reference ref_id="CVE-2024-26945" ref_url="https://www.suse.com/security/cve/CVE-2024-26945/" source="CVE"/>
		<reference ref_id="CVE-2024-26946" ref_url="https://www.suse.com/security/cve/CVE-2024-26946/" source="CVE"/>
		<reference ref_id="CVE-2024-26948" ref_url="https://www.suse.com/security/cve/CVE-2024-26948/" source="CVE"/>
		<reference ref_id="CVE-2024-26949" ref_url="https://www.suse.com/security/cve/CVE-2024-26949/" source="CVE"/>
		<reference ref_id="CVE-2024-26950" ref_url="https://www.suse.com/security/cve/CVE-2024-26950/" source="CVE"/>
		<reference ref_id="CVE-2024-26951" ref_url="https://www.suse.com/security/cve/CVE-2024-26951/" source="CVE"/>
		<reference ref_id="CVE-2024-26955" ref_url="https://www.suse.com/security/cve/CVE-2024-26955/" source="CVE"/>
		<reference ref_id="CVE-2024-26956" ref_url="https://www.suse.com/security/cve/CVE-2024-26956/" source="CVE"/>
		<reference ref_id="CVE-2024-26957" ref_url="https://www.suse.com/security/cve/CVE-2024-26957/" source="CVE"/>
		<reference ref_id="CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958/" source="CVE"/>
		<reference ref_id="CVE-2024-26959" ref_url="https://www.suse.com/security/cve/CVE-2024-26959/" source="CVE"/>
		<reference ref_id="CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960/" source="CVE"/>
		<reference ref_id="CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961/" source="CVE"/>
		<reference ref_id="CVE-2024-26962" ref_url="https://www.suse.com/security/cve/CVE-2024-26962/" source="CVE"/>
		<reference ref_id="CVE-2024-26963" ref_url="https://www.suse.com/security/cve/CVE-2024-26963/" source="CVE"/>
		<reference ref_id="CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-26965" ref_url="https://www.suse.com/security/cve/CVE-2024-26965/" source="CVE"/>
		<reference ref_id="CVE-2024-26966" ref_url="https://www.suse.com/security/cve/CVE-2024-26966/" source="CVE"/>
		<reference ref_id="CVE-2024-26968" ref_url="https://www.suse.com/security/cve/CVE-2024-26968/" source="CVE"/>
		<reference ref_id="CVE-2024-26969" ref_url="https://www.suse.com/security/cve/CVE-2024-26969/" source="CVE"/>
		<reference ref_id="CVE-2024-26970" ref_url="https://www.suse.com/security/cve/CVE-2024-26970/" source="CVE"/>
		<reference ref_id="CVE-2024-26972" ref_url="https://www.suse.com/security/cve/CVE-2024-26972/" source="CVE"/>
		<reference ref_id="CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973/" source="CVE"/>
		<reference ref_id="CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974/" source="CVE"/>
		<reference ref_id="CVE-2024-26975" ref_url="https://www.suse.com/security/cve/CVE-2024-26975/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-26977" ref_url="https://www.suse.com/security/cve/CVE-2024-26977/" source="CVE"/>
		<reference ref_id="CVE-2024-26978" ref_url="https://www.suse.com/security/cve/CVE-2024-26978/" source="CVE"/>
		<reference ref_id="CVE-2024-26979" ref_url="https://www.suse.com/security/cve/CVE-2024-26979/" source="CVE"/>
		<reference ref_id="CVE-2024-26981" ref_url="https://www.suse.com/security/cve/CVE-2024-26981/" source="CVE"/>
		<reference ref_id="CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982/" source="CVE"/>
		<reference ref_id="CVE-2024-26983" ref_url="https://www.suse.com/security/cve/CVE-2024-26983/" source="CVE"/>
		<reference ref_id="CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984/" source="CVE"/>
		<reference ref_id="CVE-2024-26986" ref_url="https://www.suse.com/security/cve/CVE-2024-26986/" source="CVE"/>
		<reference ref_id="CVE-2024-26988" ref_url="https://www.suse.com/security/cve/CVE-2024-26988/" source="CVE"/>
		<reference ref_id="CVE-2024-26989" ref_url="https://www.suse.com/security/cve/CVE-2024-26989/" source="CVE"/>
		<reference ref_id="CVE-2024-26990" ref_url="https://www.suse.com/security/cve/CVE-2024-26990/" source="CVE"/>
		<reference ref_id="CVE-2024-26991" ref_url="https://www.suse.com/security/cve/CVE-2024-26991/" source="CVE"/>
		<reference ref_id="CVE-2024-26992" ref_url="https://www.suse.com/security/cve/CVE-2024-26992/" source="CVE"/>
		<reference ref_id="CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993/" source="CVE"/>
		<reference ref_id="CVE-2024-26994" ref_url="https://www.suse.com/security/cve/CVE-2024-26994/" source="CVE"/>
		<reference ref_id="CVE-2024-26995" ref_url="https://www.suse.com/security/cve/CVE-2024-26995/" source="CVE"/>
		<reference ref_id="CVE-2024-26996" ref_url="https://www.suse.com/security/cve/CVE-2024-26996/" source="CVE"/>
		<reference ref_id="CVE-2024-26997" ref_url="https://www.suse.com/security/cve/CVE-2024-26997/" source="CVE"/>
		<reference ref_id="CVE-2024-26999" ref_url="https://www.suse.com/security/cve/CVE-2024-26999/" source="CVE"/>
		<reference ref_id="CVE-2024-27000" ref_url="https://www.suse.com/security/cve/CVE-2024-27000/" source="CVE"/>
		<reference ref_id="CVE-2024-27001" ref_url="https://www.suse.com/security/cve/CVE-2024-27001/" source="CVE"/>
		<reference ref_id="CVE-2024-27002" ref_url="https://www.suse.com/security/cve/CVE-2024-27002/" source="CVE"/>
		<reference ref_id="CVE-2024-27003" ref_url="https://www.suse.com/security/cve/CVE-2024-27003/" source="CVE"/>
		<reference ref_id="CVE-2024-27004" ref_url="https://www.suse.com/security/cve/CVE-2024-27004/" source="CVE"/>
		<reference ref_id="CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008/" source="CVE"/>
		<reference ref_id="CVE-2024-27009" ref_url="https://www.suse.com/security/cve/CVE-2024-27009/" source="CVE"/>
		<reference ref_id="CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010/" source="CVE"/>
		<reference ref_id="CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011/" source="CVE"/>
		<reference ref_id="CVE-2024-27012" ref_url="https://www.suse.com/security/cve/CVE-2024-27012/" source="CVE"/>
		<reference ref_id="CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013/" source="CVE"/>
		<reference ref_id="CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014/" source="CVE"/>
		<reference ref_id="CVE-2024-27015" ref_url="https://www.suse.com/security/cve/CVE-2024-27015/" source="CVE"/>
		<reference ref_id="CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016/" source="CVE"/>
		<reference ref_id="CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019/" source="CVE"/>
		<reference ref_id="CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020/" source="CVE"/>
		<reference ref_id="CVE-2024-27022" ref_url="https://www.suse.com/security/cve/CVE-2024-27022/" source="CVE"/>
		<reference ref_id="CVE-2024-27023" ref_url="https://www.suse.com/security/cve/CVE-2024-27023/" source="CVE"/>
		<reference ref_id="CVE-2024-27024" ref_url="https://www.suse.com/security/cve/CVE-2024-27024/" source="CVE"/>
		<reference ref_id="CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025/" source="CVE"/>
		<reference ref_id="CVE-2024-27026" ref_url="https://www.suse.com/security/cve/CVE-2024-27026/" source="CVE"/>
		<reference ref_id="CVE-2024-27027" ref_url="https://www.suse.com/security/cve/CVE-2024-27027/" source="CVE"/>
		<reference ref_id="CVE-2024-27028" ref_url="https://www.suse.com/security/cve/CVE-2024-27028/" source="CVE"/>
		<reference ref_id="CVE-2024-27029" ref_url="https://www.suse.com/security/cve/CVE-2024-27029/" source="CVE"/>
		<reference ref_id="CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030/" source="CVE"/>
		<reference ref_id="CVE-2024-27031" ref_url="https://www.suse.com/security/cve/CVE-2024-27031/" source="CVE"/>
		<reference ref_id="CVE-2024-27036" ref_url="https://www.suse.com/security/cve/CVE-2024-27036/" source="CVE"/>
		<reference ref_id="CVE-2024-27037" ref_url="https://www.suse.com/security/cve/CVE-2024-27037/" source="CVE"/>
		<reference ref_id="CVE-2024-27038" ref_url="https://www.suse.com/security/cve/CVE-2024-27038/" source="CVE"/>
		<reference ref_id="CVE-2024-27039" ref_url="https://www.suse.com/security/cve/CVE-2024-27039/" source="CVE"/>
		<reference ref_id="CVE-2024-27040" ref_url="https://www.suse.com/security/cve/CVE-2024-27040/" source="CVE"/>
		<reference ref_id="CVE-2024-27041" ref_url="https://www.suse.com/security/cve/CVE-2024-27041/" source="CVE"/>
		<reference ref_id="CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27044" ref_url="https://www.suse.com/security/cve/CVE-2024-27044/" source="CVE"/>
		<reference ref_id="CVE-2024-27045" ref_url="https://www.suse.com/security/cve/CVE-2024-27045/" source="CVE"/>
		<reference ref_id="CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046/" source="CVE"/>
		<reference ref_id="CVE-2024-27047" ref_url="https://www.suse.com/security/cve/CVE-2024-27047/" source="CVE"/>
		<reference ref_id="CVE-2024-27048" ref_url="https://www.suse.com/security/cve/CVE-2024-27048/" source="CVE"/>
		<reference ref_id="CVE-2024-27049" ref_url="https://www.suse.com/security/cve/CVE-2024-27049/" source="CVE"/>
		<reference ref_id="CVE-2024-27050" ref_url="https://www.suse.com/security/cve/CVE-2024-27050/" source="CVE"/>
		<reference ref_id="CVE-2024-27051" ref_url="https://www.suse.com/security/cve/CVE-2024-27051/" source="CVE"/>
		<reference ref_id="CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052/" source="CVE"/>
		<reference ref_id="CVE-2024-27053" ref_url="https://www.suse.com/security/cve/CVE-2024-27053/" source="CVE"/>
		<reference ref_id="CVE-2024-27054" ref_url="https://www.suse.com/security/cve/CVE-2024-27054/" source="CVE"/>
		<reference ref_id="CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056/" source="CVE"/>
		<reference ref_id="CVE-2024-27057" ref_url="https://www.suse.com/security/cve/CVE-2024-27057/" source="CVE"/>
		<reference ref_id="CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059/" source="CVE"/>
		<reference ref_id="CVE-2024-27060" ref_url="https://www.suse.com/security/cve/CVE-2024-27060/" source="CVE"/>
		<reference ref_id="CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062/" source="CVE"/>
		<reference ref_id="CVE-2024-27064" ref_url="https://www.suse.com/security/cve/CVE-2024-27064/" source="CVE"/>
		<reference ref_id="CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065/" source="CVE"/>
		<reference ref_id="CVE-2024-27067" ref_url="https://www.suse.com/security/cve/CVE-2024-27067/" source="CVE"/>
		<reference ref_id="CVE-2024-27068" ref_url="https://www.suse.com/security/cve/CVE-2024-27068/" source="CVE"/>
		<reference ref_id="CVE-2024-27071" ref_url="https://www.suse.com/security/cve/CVE-2024-27071/" source="CVE"/>
		<reference ref_id="CVE-2024-27072" ref_url="https://www.suse.com/security/cve/CVE-2024-27072/" source="CVE"/>
		<reference ref_id="CVE-2024-27073" ref_url="https://www.suse.com/security/cve/CVE-2024-27073/" source="CVE"/>
		<reference ref_id="CVE-2024-27074" ref_url="https://www.suse.com/security/cve/CVE-2024-27074/" source="CVE"/>
		<reference ref_id="CVE-2024-27075" ref_url="https://www.suse.com/security/cve/CVE-2024-27075/" source="CVE"/>
		<reference ref_id="CVE-2024-27076" ref_url="https://www.suse.com/security/cve/CVE-2024-27076/" source="CVE"/>
		<reference ref_id="CVE-2024-27077" ref_url="https://www.suse.com/security/cve/CVE-2024-27077/" source="CVE"/>
		<reference ref_id="CVE-2024-27078" ref_url="https://www.suse.com/security/cve/CVE-2024-27078/" source="CVE"/>
		<reference ref_id="CVE-2024-27079" ref_url="https://www.suse.com/security/cve/CVE-2024-27079/" source="CVE"/>
		<reference ref_id="CVE-2024-27080" ref_url="https://www.suse.com/security/cve/CVE-2024-27080/" source="CVE"/>
		<reference ref_id="CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388/" source="CVE"/>
		<reference ref_id="CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389/" source="CVE"/>
		<reference ref_id="CVE-2024-27391" ref_url="https://www.suse.com/security/cve/CVE-2024-27391/" source="CVE"/>
		<reference ref_id="CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393/" source="CVE"/>
		<reference ref_id="CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395/" source="CVE"/>
		<reference ref_id="CVE-2024-27396" ref_url="https://www.suse.com/security/cve/CVE-2024-27396/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399/" source="CVE"/>
		<reference ref_id="CVE-2024-27400" ref_url="https://www.suse.com/security/cve/CVE-2024-27400/" source="CVE"/>
		<reference ref_id="CVE-2024-27401" ref_url="https://www.suse.com/security/cve/CVE-2024-27401/" source="CVE"/>
		<reference ref_id="CVE-2024-27402" ref_url="https://www.suse.com/security/cve/CVE-2024-27402/" source="CVE"/>
		<reference ref_id="CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403/" source="CVE"/>
		<reference ref_id="CVE-2024-27404" ref_url="https://www.suse.com/security/cve/CVE-2024-27404/" source="CVE"/>
		<reference ref_id="CVE-2024-27405" ref_url="https://www.suse.com/security/cve/CVE-2024-27405/" source="CVE"/>
		<reference ref_id="CVE-2024-27408" ref_url="https://www.suse.com/security/cve/CVE-2024-27408/" source="CVE"/>
		<reference ref_id="CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410/" source="CVE"/>
		<reference ref_id="CVE-2024-27411" ref_url="https://www.suse.com/security/cve/CVE-2024-27411/" source="CVE"/>
		<reference ref_id="CVE-2024-27412" ref_url="https://www.suse.com/security/cve/CVE-2024-27412/" source="CVE"/>
		<reference ref_id="CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413/" source="CVE"/>
		<reference ref_id="CVE-2024-27414" ref_url="https://www.suse.com/security/cve/CVE-2024-27414/" source="CVE"/>
		<reference ref_id="CVE-2024-27416" ref_url="https://www.suse.com/security/cve/CVE-2024-27416/" source="CVE"/>
		<reference ref_id="CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417/" source="CVE"/>
		<reference ref_id="CVE-2024-27418" ref_url="https://www.suse.com/security/cve/CVE-2024-27418/" source="CVE"/>
		<reference ref_id="CVE-2024-27431" ref_url="https://www.suse.com/security/cve/CVE-2024-27431/" source="CVE"/>
		<reference ref_id="CVE-2024-27432" ref_url="https://www.suse.com/security/cve/CVE-2024-27432/" source="CVE"/>
		<reference ref_id="CVE-2024-27433" ref_url="https://www.suse.com/security/cve/CVE-2024-27433/" source="CVE"/>
		<reference ref_id="CVE-2024-27434" ref_url="https://www.suse.com/security/cve/CVE-2024-27434/" source="CVE"/>
		<reference ref_id="CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435/" source="CVE"/>
		<reference ref_id="CVE-2024-27436" ref_url="https://www.suse.com/security/cve/CVE-2024-27436/" source="CVE"/>
		<reference ref_id="CVE-2024-27437" ref_url="https://www.suse.com/security/cve/CVE-2024-27437/" source="CVE"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076/" source="CVE"/>
		<reference ref_id="CVE-2024-33619" ref_url="https://www.suse.com/security/cve/CVE-2024-33619/" source="CVE"/>
		<reference ref_id="CVE-2024-34777" ref_url="https://www.suse.com/security/cve/CVE-2024-34777/" source="CVE"/>
		<reference ref_id="CVE-2024-35247" ref_url="https://www.suse.com/security/cve/CVE-2024-35247/" source="CVE"/>
		<reference ref_id="CVE-2024-35784" ref_url="https://www.suse.com/security/cve/CVE-2024-35784/" source="CVE"/>
		<reference ref_id="CVE-2024-35786" ref_url="https://www.suse.com/security/cve/CVE-2024-35786/" source="CVE"/>
		<reference ref_id="CVE-2024-35788" ref_url="https://www.suse.com/security/cve/CVE-2024-35788/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790/" source="CVE"/>
		<reference ref_id="CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791/" source="CVE"/>
		<reference ref_id="CVE-2024-35794" ref_url="https://www.suse.com/security/cve/CVE-2024-35794/" source="CVE"/>
		<reference ref_id="CVE-2024-35795" ref_url="https://www.suse.com/security/cve/CVE-2024-35795/" source="CVE"/>
		<reference ref_id="CVE-2024-35796" ref_url="https://www.suse.com/security/cve/CVE-2024-35796/" source="CVE"/>
		<reference ref_id="CVE-2024-35799" ref_url="https://www.suse.com/security/cve/CVE-2024-35799/" source="CVE"/>
		<reference ref_id="CVE-2024-35800" ref_url="https://www.suse.com/security/cve/CVE-2024-35800/" source="CVE"/>
		<reference ref_id="CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801/" source="CVE"/>
		<reference ref_id="CVE-2024-35803" ref_url="https://www.suse.com/security/cve/CVE-2024-35803/" source="CVE"/>
		<reference ref_id="CVE-2024-35804" ref_url="https://www.suse.com/security/cve/CVE-2024-35804/" source="CVE"/>
		<reference ref_id="CVE-2024-35805" ref_url="https://www.suse.com/security/cve/CVE-2024-35805/" source="CVE"/>
		<reference ref_id="CVE-2024-35806" ref_url="https://www.suse.com/security/cve/CVE-2024-35806/" source="CVE"/>
		<reference ref_id="CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807/" source="CVE"/>
		<reference ref_id="CVE-2024-35808" ref_url="https://www.suse.com/security/cve/CVE-2024-35808/" source="CVE"/>
		<reference ref_id="CVE-2024-35809" ref_url="https://www.suse.com/security/cve/CVE-2024-35809/" source="CVE"/>
		<reference ref_id="CVE-2024-35810" ref_url="https://www.suse.com/security/cve/CVE-2024-35810/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35812" ref_url="https://www.suse.com/security/cve/CVE-2024-35812/" source="CVE"/>
		<reference ref_id="CVE-2024-35813" ref_url="https://www.suse.com/security/cve/CVE-2024-35813/" source="CVE"/>
		<reference ref_id="CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-35819" ref_url="https://www.suse.com/security/cve/CVE-2024-35819/" source="CVE"/>
		<reference ref_id="CVE-2024-35821" ref_url="https://www.suse.com/security/cve/CVE-2024-35821/" source="CVE"/>
		<reference ref_id="CVE-2024-35822" ref_url="https://www.suse.com/security/cve/CVE-2024-35822/" source="CVE"/>
		<reference ref_id="CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823/" source="CVE"/>
		<reference ref_id="CVE-2024-35824" ref_url="https://www.suse.com/security/cve/CVE-2024-35824/" source="CVE"/>
		<reference ref_id="CVE-2024-35825" ref_url="https://www.suse.com/security/cve/CVE-2024-35825/" source="CVE"/>
		<reference ref_id="CVE-2024-35827" ref_url="https://www.suse.com/security/cve/CVE-2024-35827/" source="CVE"/>
		<reference ref_id="CVE-2024-35828" ref_url="https://www.suse.com/security/cve/CVE-2024-35828/" source="CVE"/>
		<reference ref_id="CVE-2024-35829" ref_url="https://www.suse.com/security/cve/CVE-2024-35829/" source="CVE"/>
		<reference ref_id="CVE-2024-35830" ref_url="https://www.suse.com/security/cve/CVE-2024-35830/" source="CVE"/>
		<reference ref_id="CVE-2024-35831" ref_url="https://www.suse.com/security/cve/CVE-2024-35831/" source="CVE"/>
		<reference ref_id="CVE-2024-35833" ref_url="https://www.suse.com/security/cve/CVE-2024-35833/" source="CVE"/>
		<reference ref_id="CVE-2024-35834" ref_url="https://www.suse.com/security/cve/CVE-2024-35834/" source="CVE"/>
		<reference ref_id="CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835/" source="CVE"/>
		<reference ref_id="CVE-2024-35836" ref_url="https://www.suse.com/security/cve/CVE-2024-35836/" source="CVE"/>
		<reference ref_id="CVE-2024-35837" ref_url="https://www.suse.com/security/cve/CVE-2024-35837/" source="CVE"/>
		<reference ref_id="CVE-2024-35838" ref_url="https://www.suse.com/security/cve/CVE-2024-35838/" source="CVE"/>
		<reference ref_id="CVE-2024-35841" ref_url="https://www.suse.com/security/cve/CVE-2024-35841/" source="CVE"/>
		<reference ref_id="CVE-2024-35842" ref_url="https://www.suse.com/security/cve/CVE-2024-35842/" source="CVE"/>
		<reference ref_id="CVE-2024-35843" ref_url="https://www.suse.com/security/cve/CVE-2024-35843/" source="CVE"/>
		<reference ref_id="CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845/" source="CVE"/>
		<reference ref_id="CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847/" source="CVE"/>
		<reference ref_id="CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848/" source="CVE"/>
		<reference ref_id="CVE-2024-35849" ref_url="https://www.suse.com/security/cve/CVE-2024-35849/" source="CVE"/>
		<reference ref_id="CVE-2024-35850" ref_url="https://www.suse.com/security/cve/CVE-2024-35850/" source="CVE"/>
		<reference ref_id="CVE-2024-35851" ref_url="https://www.suse.com/security/cve/CVE-2024-35851/" source="CVE"/>
		<reference ref_id="CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852/" source="CVE"/>
		<reference ref_id="CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855/" source="CVE"/>
		<reference ref_id="CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857/" source="CVE"/>
		<reference ref_id="CVE-2024-35860" ref_url="https://www.suse.com/security/cve/CVE-2024-35860/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35865" ref_url="https://www.suse.com/security/cve/CVE-2024-35865/" source="CVE"/>
		<reference ref_id="CVE-2024-35866" ref_url="https://www.suse.com/security/cve/CVE-2024-35866/" source="CVE"/>
		<reference ref_id="CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867/" source="CVE"/>
		<reference ref_id="CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870/" source="CVE"/>
		<reference ref_id="CVE-2024-35872" ref_url="https://www.suse.com/security/cve/CVE-2024-35872/" source="CVE"/>
		<reference ref_id="CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875/" source="CVE"/>
		<reference ref_id="CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35879" ref_url="https://www.suse.com/security/cve/CVE-2024-35879/" source="CVE"/>
		<reference ref_id="CVE-2024-35880" ref_url="https://www.suse.com/security/cve/CVE-2024-35880/" source="CVE"/>
		<reference ref_id="CVE-2024-35883" ref_url="https://www.suse.com/security/cve/CVE-2024-35883/" source="CVE"/>
		<reference ref_id="CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884/" source="CVE"/>
		<reference ref_id="CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885/" source="CVE"/>
		<reference ref_id="CVE-2024-35886" ref_url="https://www.suse.com/security/cve/CVE-2024-35886/" source="CVE"/>
		<reference ref_id="CVE-2024-35887" ref_url="https://www.suse.com/security/cve/CVE-2024-35887/" source="CVE"/>
		<reference ref_id="CVE-2024-35889" ref_url="https://www.suse.com/security/cve/CVE-2024-35889/" source="CVE"/>
		<reference ref_id="CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890/" source="CVE"/>
		<reference ref_id="CVE-2024-35891" ref_url="https://www.suse.com/security/cve/CVE-2024-35891/" source="CVE"/>
		<reference ref_id="CVE-2024-35892" ref_url="https://www.suse.com/security/cve/CVE-2024-35892/" source="CVE"/>
		<reference ref_id="CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896/" source="CVE"/>
		<reference ref_id="CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897/" source="CVE"/>
		<reference ref_id="CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898/" source="CVE"/>
		<reference ref_id="CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899/" source="CVE"/>
		<reference ref_id="CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900/" source="CVE"/>
		<reference ref_id="CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901/" source="CVE"/>
		<reference ref_id="CVE-2024-35902" ref_url="https://www.suse.com/security/cve/CVE-2024-35902/" source="CVE"/>
		<reference ref_id="CVE-2024-35903" ref_url="https://www.suse.com/security/cve/CVE-2024-35903/" source="CVE"/>
		<reference ref_id="CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907/" source="CVE"/>
		<reference ref_id="CVE-2024-35908" ref_url="https://www.suse.com/security/cve/CVE-2024-35908/" source="CVE"/>
		<reference ref_id="CVE-2024-35909" ref_url="https://www.suse.com/security/cve/CVE-2024-35909/" source="CVE"/>
		<reference ref_id="CVE-2024-35911" ref_url="https://www.suse.com/security/cve/CVE-2024-35911/" source="CVE"/>
		<reference ref_id="CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912/" source="CVE"/>
		<reference ref_id="CVE-2024-35913" ref_url="https://www.suse.com/security/cve/CVE-2024-35913/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-35915" ref_url="https://www.suse.com/security/cve/CVE-2024-35915/" source="CVE"/>
		<reference ref_id="CVE-2024-35916" ref_url="https://www.suse.com/security/cve/CVE-2024-35916/" source="CVE"/>
		<reference ref_id="CVE-2024-35917" ref_url="https://www.suse.com/security/cve/CVE-2024-35917/" source="CVE"/>
		<reference ref_id="CVE-2024-35921" ref_url="https://www.suse.com/security/cve/CVE-2024-35921/" source="CVE"/>
		<reference ref_id="CVE-2024-35922" ref_url="https://www.suse.com/security/cve/CVE-2024-35922/" source="CVE"/>
		<reference ref_id="CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924/" source="CVE"/>
		<reference ref_id="CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925/" source="CVE"/>
		<reference ref_id="CVE-2024-35926" ref_url="https://www.suse.com/security/cve/CVE-2024-35926/" source="CVE"/>
		<reference ref_id="CVE-2024-35927" ref_url="https://www.suse.com/security/cve/CVE-2024-35927/" source="CVE"/>
		<reference ref_id="CVE-2024-35928" ref_url="https://www.suse.com/security/cve/CVE-2024-35928/" source="CVE"/>
		<reference ref_id="CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930/" source="CVE"/>
		<reference ref_id="CVE-2024-35931" ref_url="https://www.suse.com/security/cve/CVE-2024-35931/" source="CVE"/>
		<reference ref_id="CVE-2024-35932" ref_url="https://www.suse.com/security/cve/CVE-2024-35932/" source="CVE"/>
		<reference ref_id="CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933/" source="CVE"/>
		<reference ref_id="CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934/" source="CVE"/>
		<reference ref_id="CVE-2024-35935" ref_url="https://www.suse.com/security/cve/CVE-2024-35935/" source="CVE"/>
		<reference ref_id="CVE-2024-35936" ref_url="https://www.suse.com/security/cve/CVE-2024-35936/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938/" source="CVE"/>
		<reference ref_id="CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939/" source="CVE"/>
		<reference ref_id="CVE-2024-35940" ref_url="https://www.suse.com/security/cve/CVE-2024-35940/" source="CVE"/>
		<reference ref_id="CVE-2024-35942" ref_url="https://www.suse.com/security/cve/CVE-2024-35942/" source="CVE"/>
		<reference ref_id="CVE-2024-35943" ref_url="https://www.suse.com/security/cve/CVE-2024-35943/" source="CVE"/>
		<reference ref_id="CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944/" source="CVE"/>
		<reference ref_id="CVE-2024-35945" ref_url="https://www.suse.com/security/cve/CVE-2024-35945/" source="CVE"/>
		<reference ref_id="CVE-2024-35946" ref_url="https://www.suse.com/security/cve/CVE-2024-35946/" source="CVE"/>
		<reference ref_id="CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947/" source="CVE"/>
		<reference ref_id="CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35951" ref_url="https://www.suse.com/security/cve/CVE-2024-35951/" source="CVE"/>
		<reference ref_id="CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952/" source="CVE"/>
		<reference ref_id="CVE-2024-35953" ref_url="https://www.suse.com/security/cve/CVE-2024-35953/" source="CVE"/>
		<reference ref_id="CVE-2024-35954" ref_url="https://www.suse.com/security/cve/CVE-2024-35954/" source="CVE"/>
		<reference ref_id="CVE-2024-35955" ref_url="https://www.suse.com/security/cve/CVE-2024-35955/" source="CVE"/>
		<reference ref_id="CVE-2024-35956" ref_url="https://www.suse.com/security/cve/CVE-2024-35956/" source="CVE"/>
		<reference ref_id="CVE-2024-35957" ref_url="https://www.suse.com/security/cve/CVE-2024-35957/" source="CVE"/>
		<reference ref_id="CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958/" source="CVE"/>
		<reference ref_id="CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959/" source="CVE"/>
		<reference ref_id="CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960/" source="CVE"/>
		<reference ref_id="CVE-2024-35961" ref_url="https://www.suse.com/security/cve/CVE-2024-35961/" source="CVE"/>
		<reference ref_id="CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962/" source="CVE"/>
		<reference ref_id="CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963/" source="CVE"/>
		<reference ref_id="CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964/" source="CVE"/>
		<reference ref_id="CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965/" source="CVE"/>
		<reference ref_id="CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966/" source="CVE"/>
		<reference ref_id="CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967/" source="CVE"/>
		<reference ref_id="CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969/" source="CVE"/>
		<reference ref_id="CVE-2024-35970" ref_url="https://www.suse.com/security/cve/CVE-2024-35970/" source="CVE"/>
		<reference ref_id="CVE-2024-35971" ref_url="https://www.suse.com/security/cve/CVE-2024-35971/" source="CVE"/>
		<reference ref_id="CVE-2024-35972" ref_url="https://www.suse.com/security/cve/CVE-2024-35972/" source="CVE"/>
		<reference ref_id="CVE-2024-35973" ref_url="https://www.suse.com/security/cve/CVE-2024-35973/" source="CVE"/>
		<reference ref_id="CVE-2024-35974" ref_url="https://www.suse.com/security/cve/CVE-2024-35974/" source="CVE"/>
		<reference ref_id="CVE-2024-35975" ref_url="https://www.suse.com/security/cve/CVE-2024-35975/" source="CVE"/>
		<reference ref_id="CVE-2024-35976" ref_url="https://www.suse.com/security/cve/CVE-2024-35976/" source="CVE"/>
		<reference ref_id="CVE-2024-35977" ref_url="https://www.suse.com/security/cve/CVE-2024-35977/" source="CVE"/>
		<reference ref_id="CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978/" source="CVE"/>
		<reference ref_id="CVE-2024-35979" ref_url="https://www.suse.com/security/cve/CVE-2024-35979/" source="CVE"/>
		<reference ref_id="CVE-2024-35980" ref_url="https://www.suse.com/security/cve/CVE-2024-35980/" source="CVE"/>
		<reference ref_id="CVE-2024-35981" ref_url="https://www.suse.com/security/cve/CVE-2024-35981/" source="CVE"/>
		<reference ref_id="CVE-2024-35982" ref_url="https://www.suse.com/security/cve/CVE-2024-35982/" source="CVE"/>
		<reference ref_id="CVE-2024-35984" ref_url="https://www.suse.com/security/cve/CVE-2024-35984/" source="CVE"/>
		<reference ref_id="CVE-2024-35986" ref_url="https://www.suse.com/security/cve/CVE-2024-35986/" source="CVE"/>
		<reference ref_id="CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989/" source="CVE"/>
		<reference ref_id="CVE-2024-35990" ref_url="https://www.suse.com/security/cve/CVE-2024-35990/" source="CVE"/>
		<reference ref_id="CVE-2024-35991" ref_url="https://www.suse.com/security/cve/CVE-2024-35991/" source="CVE"/>
		<reference ref_id="CVE-2024-35992" ref_url="https://www.suse.com/security/cve/CVE-2024-35992/" source="CVE"/>
		<reference ref_id="CVE-2024-35995" ref_url="https://www.suse.com/security/cve/CVE-2024-35995/" source="CVE"/>
		<reference ref_id="CVE-2024-35997" ref_url="https://www.suse.com/security/cve/CVE-2024-35997/" source="CVE"/>
		<reference ref_id="CVE-2024-35998" ref_url="https://www.suse.com/security/cve/CVE-2024-35998/" source="CVE"/>
		<reference ref_id="CVE-2024-35999" ref_url="https://www.suse.com/security/cve/CVE-2024-35999/" source="CVE"/>
		<reference ref_id="CVE-2024-36002" ref_url="https://www.suse.com/security/cve/CVE-2024-36002/" source="CVE"/>
		<reference ref_id="CVE-2024-36003" ref_url="https://www.suse.com/security/cve/CVE-2024-36003/" source="CVE"/>
		<reference ref_id="CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004/" source="CVE"/>
		<reference ref_id="CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005/" source="CVE"/>
		<reference ref_id="CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006/" source="CVE"/>
		<reference ref_id="CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007/" source="CVE"/>
		<reference ref_id="CVE-2024-36008" ref_url="https://www.suse.com/security/cve/CVE-2024-36008/" source="CVE"/>
		<reference ref_id="CVE-2024-36009" ref_url="https://www.suse.com/security/cve/CVE-2024-36009/" source="CVE"/>
		<reference ref_id="CVE-2024-36010" ref_url="https://www.suse.com/security/cve/CVE-2024-36010/" source="CVE"/>
		<reference ref_id="CVE-2024-36011" ref_url="https://www.suse.com/security/cve/CVE-2024-36011/" source="CVE"/>
		<reference ref_id="CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012/" source="CVE"/>
		<reference ref_id="CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013/" source="CVE"/>
		<reference ref_id="CVE-2024-36014" ref_url="https://www.suse.com/security/cve/CVE-2024-36014/" source="CVE"/>
		<reference ref_id="CVE-2024-36015" ref_url="https://www.suse.com/security/cve/CVE-2024-36015/" source="CVE"/>
		<reference ref_id="CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016/" source="CVE"/>
		<reference ref_id="CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017/" source="CVE"/>
		<reference ref_id="CVE-2024-36018" ref_url="https://www.suse.com/security/cve/CVE-2024-36018/" source="CVE"/>
		<reference ref_id="CVE-2024-36019" ref_url="https://www.suse.com/security/cve/CVE-2024-36019/" source="CVE"/>
		<reference ref_id="CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020/" source="CVE"/>
		<reference ref_id="CVE-2024-36021" ref_url="https://www.suse.com/security/cve/CVE-2024-36021/" source="CVE"/>
		<reference ref_id="CVE-2024-36024" ref_url="https://www.suse.com/security/cve/CVE-2024-36024/" source="CVE"/>
		<reference ref_id="CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025/" source="CVE"/>
		<reference ref_id="CVE-2024-36026" ref_url="https://www.suse.com/security/cve/CVE-2024-36026/" source="CVE"/>
		<reference ref_id="CVE-2024-36029" ref_url="https://www.suse.com/security/cve/CVE-2024-36029/" source="CVE"/>
		<reference ref_id="CVE-2024-36030" ref_url="https://www.suse.com/security/cve/CVE-2024-36030/" source="CVE"/>
		<reference ref_id="CVE-2024-36032" ref_url="https://www.suse.com/security/cve/CVE-2024-36032/" source="CVE"/>
		<reference ref_id="CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244/" source="CVE"/>
		<reference ref_id="CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270/" source="CVE"/>
		<reference ref_id="CVE-2024-36281" ref_url="https://www.suse.com/security/cve/CVE-2024-36281/" source="CVE"/>
		<reference ref_id="CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286/" source="CVE"/>
		<reference ref_id="CVE-2024-36288" ref_url="https://www.suse.com/security/cve/CVE-2024-36288/" source="CVE"/>
		<reference ref_id="CVE-2024-36348" ref_url="https://www.suse.com/security/cve/CVE-2024-36348/" source="CVE"/>
		<reference ref_id="CVE-2024-36349" ref_url="https://www.suse.com/security/cve/CVE-2024-36349/" source="CVE"/>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<reference ref_id="CVE-2024-36476" ref_url="https://www.suse.com/security/cve/CVE-2024-36476/" source="CVE"/>
		<reference ref_id="CVE-2024-36477" ref_url="https://www.suse.com/security/cve/CVE-2024-36477/" source="CVE"/>
		<reference ref_id="CVE-2024-36478" ref_url="https://www.suse.com/security/cve/CVE-2024-36478/" source="CVE"/>
		<reference ref_id="CVE-2024-36479" ref_url="https://www.suse.com/security/cve/CVE-2024-36479/" source="CVE"/>
		<reference ref_id="CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489/" source="CVE"/>
		<reference ref_id="CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880/" source="CVE"/>
		<reference ref_id="CVE-2024-36881" ref_url="https://www.suse.com/security/cve/CVE-2024-36881/" source="CVE"/>
		<reference ref_id="CVE-2024-36882" ref_url="https://www.suse.com/security/cve/CVE-2024-36882/" source="CVE"/>
		<reference ref_id="CVE-2024-36885" ref_url="https://www.suse.com/security/cve/CVE-2024-36885/" source="CVE"/>
		<reference ref_id="CVE-2024-36887" ref_url="https://www.suse.com/security/cve/CVE-2024-36887/" source="CVE"/>
		<reference ref_id="CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889/" source="CVE"/>
		<reference ref_id="CVE-2024-36890" ref_url="https://www.suse.com/security/cve/CVE-2024-36890/" source="CVE"/>
		<reference ref_id="CVE-2024-36891" ref_url="https://www.suse.com/security/cve/CVE-2024-36891/" source="CVE"/>
		<reference ref_id="CVE-2024-36893" ref_url="https://www.suse.com/security/cve/CVE-2024-36893/" source="CVE"/>
		<reference ref_id="CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894/" source="CVE"/>
		<reference ref_id="CVE-2024-36895" ref_url="https://www.suse.com/security/cve/CVE-2024-36895/" source="CVE"/>
		<reference ref_id="CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896/" source="CVE"/>
		<reference ref_id="CVE-2024-36897" ref_url="https://www.suse.com/security/cve/CVE-2024-36897/" source="CVE"/>
		<reference ref_id="CVE-2024-36898" ref_url="https://www.suse.com/security/cve/CVE-2024-36898/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-36900" ref_url="https://www.suse.com/security/cve/CVE-2024-36900/" source="CVE"/>
		<reference ref_id="CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901/" source="CVE"/>
		<reference ref_id="CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902/" source="CVE"/>
		<reference ref_id="CVE-2024-36903" ref_url="https://www.suse.com/security/cve/CVE-2024-36903/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36906" ref_url="https://www.suse.com/security/cve/CVE-2024-36906/" source="CVE"/>
		<reference ref_id="CVE-2024-36907" ref_url="https://www.suse.com/security/cve/CVE-2024-36907/" source="CVE"/>
		<reference ref_id="CVE-2024-36909" ref_url="https://www.suse.com/security/cve/CVE-2024-36909/" source="CVE"/>
		<reference ref_id="CVE-2024-36910" ref_url="https://www.suse.com/security/cve/CVE-2024-36910/" source="CVE"/>
		<reference ref_id="CVE-2024-36911" ref_url="https://www.suse.com/security/cve/CVE-2024-36911/" source="CVE"/>
		<reference ref_id="CVE-2024-36912" ref_url="https://www.suse.com/security/cve/CVE-2024-36912/" source="CVE"/>
		<reference ref_id="CVE-2024-36913" ref_url="https://www.suse.com/security/cve/CVE-2024-36913/" source="CVE"/>
		<reference ref_id="CVE-2024-36914" ref_url="https://www.suse.com/security/cve/CVE-2024-36914/" source="CVE"/>
		<reference ref_id="CVE-2024-36915" ref_url="https://www.suse.com/security/cve/CVE-2024-36915/" source="CVE"/>
		<reference ref_id="CVE-2024-36916" ref_url="https://www.suse.com/security/cve/CVE-2024-36916/" source="CVE"/>
		<reference ref_id="CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917/" source="CVE"/>
		<reference ref_id="CVE-2024-36918" ref_url="https://www.suse.com/security/cve/CVE-2024-36918/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36921" ref_url="https://www.suse.com/security/cve/CVE-2024-36921/" source="CVE"/>
		<reference ref_id="CVE-2024-36922" ref_url="https://www.suse.com/security/cve/CVE-2024-36922/" source="CVE"/>
		<reference ref_id="CVE-2024-36923" ref_url="https://www.suse.com/security/cve/CVE-2024-36923/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928/" source="CVE"/>
		<reference ref_id="CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929/" source="CVE"/>
		<reference ref_id="CVE-2024-36930" ref_url="https://www.suse.com/security/cve/CVE-2024-36930/" source="CVE"/>
		<reference ref_id="CVE-2024-36931" ref_url="https://www.suse.com/security/cve/CVE-2024-36931/" source="CVE"/>
		<reference ref_id="CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933/" source="CVE"/>
		<reference ref_id="CVE-2024-36934" ref_url="https://www.suse.com/security/cve/CVE-2024-36934/" source="CVE"/>
		<reference ref_id="CVE-2024-36935" ref_url="https://www.suse.com/security/cve/CVE-2024-36935/" source="CVE"/>
		<reference ref_id="CVE-2024-36936" ref_url="https://www.suse.com/security/cve/CVE-2024-36936/" source="CVE"/>
		<reference ref_id="CVE-2024-36937" ref_url="https://www.suse.com/security/cve/CVE-2024-36937/" source="CVE"/>
		<reference ref_id="CVE-2024-36938" ref_url="https://www.suse.com/security/cve/CVE-2024-36938/" source="CVE"/>
		<reference ref_id="CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942/" source="CVE"/>
		<reference ref_id="CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944/" source="CVE"/>
		<reference ref_id="CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945/" source="CVE"/>
		<reference ref_id="CVE-2024-36946" ref_url="https://www.suse.com/security/cve/CVE-2024-36946/" source="CVE"/>
		<reference ref_id="CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947/" source="CVE"/>
		<reference ref_id="CVE-2024-36949" ref_url="https://www.suse.com/security/cve/CVE-2024-36949/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36951" ref_url="https://www.suse.com/security/cve/CVE-2024-36951/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953/" source="CVE"/>
		<reference ref_id="CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955/" source="CVE"/>
		<reference ref_id="CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957/" source="CVE"/>
		<reference ref_id="CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959/" source="CVE"/>
		<reference ref_id="CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960/" source="CVE"/>
		<reference ref_id="CVE-2024-36962" ref_url="https://www.suse.com/security/cve/CVE-2024-36962/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-36965" ref_url="https://www.suse.com/security/cve/CVE-2024-36965/" source="CVE"/>
		<reference ref_id="CVE-2024-36967" ref_url="https://www.suse.com/security/cve/CVE-2024-36967/" source="CVE"/>
		<reference ref_id="CVE-2024-36968" ref_url="https://www.suse.com/security/cve/CVE-2024-36968/" source="CVE"/>
		<reference ref_id="CVE-2024-36969" ref_url="https://www.suse.com/security/cve/CVE-2024-36969/" source="CVE"/>
		<reference ref_id="CVE-2024-36970" ref_url="https://www.suse.com/security/cve/CVE-2024-36970/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-36972" ref_url="https://www.suse.com/security/cve/CVE-2024-36972/" source="CVE"/>
		<reference ref_id="CVE-2024-36973" ref_url="https://www.suse.com/security/cve/CVE-2024-36973/" source="CVE"/>
		<reference ref_id="CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974/" source="CVE"/>
		<reference ref_id="CVE-2024-36975" ref_url="https://www.suse.com/security/cve/CVE-2024-36975/" source="CVE"/>
		<reference ref_id="CVE-2024-36977" ref_url="https://www.suse.com/security/cve/CVE-2024-36977/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-36979" ref_url="https://www.suse.com/security/cve/CVE-2024-36979/" source="CVE"/>
		<reference ref_id="CVE-2024-37021" ref_url="https://www.suse.com/security/cve/CVE-2024-37021/" source="CVE"/>
		<reference ref_id="CVE-2024-37078" ref_url="https://www.suse.com/security/cve/CVE-2024-37078/" source="CVE"/>
		<reference ref_id="CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353/" source="CVE"/>
		<reference ref_id="CVE-2024-37354" ref_url="https://www.suse.com/security/cve/CVE-2024-37354/" source="CVE"/>
		<reference ref_id="CVE-2024-38381" ref_url="https://www.suse.com/security/cve/CVE-2024-38381/" source="CVE"/>
		<reference ref_id="CVE-2024-38384" ref_url="https://www.suse.com/security/cve/CVE-2024-38384/" source="CVE"/>
		<reference ref_id="CVE-2024-38385" ref_url="https://www.suse.com/security/cve/CVE-2024-38385/" source="CVE"/>
		<reference ref_id="CVE-2024-38388" ref_url="https://www.suse.com/security/cve/CVE-2024-38388/" source="CVE"/>
		<reference ref_id="CVE-2024-38390" ref_url="https://www.suse.com/security/cve/CVE-2024-38390/" source="CVE"/>
		<reference ref_id="CVE-2024-38391" ref_url="https://www.suse.com/security/cve/CVE-2024-38391/" source="CVE"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-38539" ref_url="https://www.suse.com/security/cve/CVE-2024-38539/" source="CVE"/>
		<reference ref_id="CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38543" ref_url="https://www.suse.com/security/cve/CVE-2024-38543/" source="CVE"/>
		<reference ref_id="CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544/" source="CVE"/>
		<reference ref_id="CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545/" source="CVE"/>
		<reference ref_id="CVE-2024-38546" ref_url="https://www.suse.com/security/cve/CVE-2024-38546/" source="CVE"/>
		<reference ref_id="CVE-2024-38547" ref_url="https://www.suse.com/security/cve/CVE-2024-38547/" source="CVE"/>
		<reference ref_id="CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548/" source="CVE"/>
		<reference ref_id="CVE-2024-38549" ref_url="https://www.suse.com/security/cve/CVE-2024-38549/" source="CVE"/>
		<reference ref_id="CVE-2024-38550" ref_url="https://www.suse.com/security/cve/CVE-2024-38550/" source="CVE"/>
		<reference ref_id="CVE-2024-38551" ref_url="https://www.suse.com/security/cve/CVE-2024-38551/" source="CVE"/>
		<reference ref_id="CVE-2024-38552" ref_url="https://www.suse.com/security/cve/CVE-2024-38552/" source="CVE"/>
		<reference ref_id="CVE-2024-38553" ref_url="https://www.suse.com/security/cve/CVE-2024-38553/" source="CVE"/>
		<reference ref_id="CVE-2024-38554" ref_url="https://www.suse.com/security/cve/CVE-2024-38554/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556/" source="CVE"/>
		<reference ref_id="CVE-2024-38557" ref_url="https://www.suse.com/security/cve/CVE-2024-38557/" source="CVE"/>
		<reference ref_id="CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560/" source="CVE"/>
		<reference ref_id="CVE-2024-38562" ref_url="https://www.suse.com/security/cve/CVE-2024-38562/" source="CVE"/>
		<reference ref_id="CVE-2024-38563" ref_url="https://www.suse.com/security/cve/CVE-2024-38563/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-38565" ref_url="https://www.suse.com/security/cve/CVE-2024-38565/" source="CVE"/>
		<reference ref_id="CVE-2024-38566" ref_url="https://www.suse.com/security/cve/CVE-2024-38566/" source="CVE"/>
		<reference ref_id="CVE-2024-38567" ref_url="https://www.suse.com/security/cve/CVE-2024-38567/" source="CVE"/>
		<reference ref_id="CVE-2024-38568" ref_url="https://www.suse.com/security/cve/CVE-2024-38568/" source="CVE"/>
		<reference ref_id="CVE-2024-38569" ref_url="https://www.suse.com/security/cve/CVE-2024-38569/" source="CVE"/>
		<reference ref_id="CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570/" source="CVE"/>
		<reference ref_id="CVE-2024-38571" ref_url="https://www.suse.com/security/cve/CVE-2024-38571/" source="CVE"/>
		<reference ref_id="CVE-2024-38572" ref_url="https://www.suse.com/security/cve/CVE-2024-38572/" source="CVE"/>
		<reference ref_id="CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573/" source="CVE"/>
		<reference ref_id="CVE-2024-38575" ref_url="https://www.suse.com/security/cve/CVE-2024-38575/" source="CVE"/>
		<reference ref_id="CVE-2024-38576" ref_url="https://www.suse.com/security/cve/CVE-2024-38576/" source="CVE"/>
		<reference ref_id="CVE-2024-38577" ref_url="https://www.suse.com/security/cve/CVE-2024-38577/" source="CVE"/>
		<reference ref_id="CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578/" source="CVE"/>
		<reference ref_id="CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579/" source="CVE"/>
		<reference ref_id="CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580/" source="CVE"/>
		<reference ref_id="CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581/" source="CVE"/>
		<reference ref_id="CVE-2024-38582" ref_url="https://www.suse.com/security/cve/CVE-2024-38582/" source="CVE"/>
		<reference ref_id="CVE-2024-38583" ref_url="https://www.suse.com/security/cve/CVE-2024-38583/" source="CVE"/>
		<reference ref_id="CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586/" source="CVE"/>
		<reference ref_id="CVE-2024-38587" ref_url="https://www.suse.com/security/cve/CVE-2024-38587/" source="CVE"/>
		<reference ref_id="CVE-2024-38588" ref_url="https://www.suse.com/security/cve/CVE-2024-38588/" source="CVE"/>
		<reference ref_id="CVE-2024-38590" ref_url="https://www.suse.com/security/cve/CVE-2024-38590/" source="CVE"/>
		<reference ref_id="CVE-2024-38591" ref_url="https://www.suse.com/security/cve/CVE-2024-38591/" source="CVE"/>
		<reference ref_id="CVE-2024-38592" ref_url="https://www.suse.com/security/cve/CVE-2024-38592/" source="CVE"/>
		<reference ref_id="CVE-2024-38594" ref_url="https://www.suse.com/security/cve/CVE-2024-38594/" source="CVE"/>
		<reference ref_id="CVE-2024-38595" ref_url="https://www.suse.com/security/cve/CVE-2024-38595/" source="CVE"/>
		<reference ref_id="CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596/" source="CVE"/>
		<reference ref_id="CVE-2024-38597" ref_url="https://www.suse.com/security/cve/CVE-2024-38597/" source="CVE"/>
		<reference ref_id="CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598/" source="CVE"/>
		<reference ref_id="CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599/" source="CVE"/>
		<reference ref_id="CVE-2024-38600" ref_url="https://www.suse.com/security/cve/CVE-2024-38600/" source="CVE"/>
		<reference ref_id="CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601/" source="CVE"/>
		<reference ref_id="CVE-2024-38602" ref_url="https://www.suse.com/security/cve/CVE-2024-38602/" source="CVE"/>
		<reference ref_id="CVE-2024-38603" ref_url="https://www.suse.com/security/cve/CVE-2024-38603/" source="CVE"/>
		<reference ref_id="CVE-2024-38604" ref_url="https://www.suse.com/security/cve/CVE-2024-38604/" source="CVE"/>
		<reference ref_id="CVE-2024-38605" ref_url="https://www.suse.com/security/cve/CVE-2024-38605/" source="CVE"/>
		<reference ref_id="CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608/" source="CVE"/>
		<reference ref_id="CVE-2024-38609" ref_url="https://www.suse.com/security/cve/CVE-2024-38609/" source="CVE"/>
		<reference ref_id="CVE-2024-38610" ref_url="https://www.suse.com/security/cve/CVE-2024-38610/" source="CVE"/>
		<reference ref_id="CVE-2024-38611" ref_url="https://www.suse.com/security/cve/CVE-2024-38611/" source="CVE"/>
		<reference ref_id="CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615/" source="CVE"/>
		<reference ref_id="CVE-2024-38616" ref_url="https://www.suse.com/security/cve/CVE-2024-38616/" source="CVE"/>
		<reference ref_id="CVE-2024-38617" ref_url="https://www.suse.com/security/cve/CVE-2024-38617/" source="CVE"/>
		<reference ref_id="CVE-2024-38618" ref_url="https://www.suse.com/security/cve/CVE-2024-38618/" source="CVE"/>
		<reference ref_id="CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619/" source="CVE"/>
		<reference ref_id="CVE-2024-38621" ref_url="https://www.suse.com/security/cve/CVE-2024-38621/" source="CVE"/>
		<reference ref_id="CVE-2024-38622" ref_url="https://www.suse.com/security/cve/CVE-2024-38622/" source="CVE"/>
		<reference ref_id="CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627/" source="CVE"/>
		<reference ref_id="CVE-2024-38628" ref_url="https://www.suse.com/security/cve/CVE-2024-38628/" source="CVE"/>
		<reference ref_id="CVE-2024-38629" ref_url="https://www.suse.com/security/cve/CVE-2024-38629/" source="CVE"/>
		<reference ref_id="CVE-2024-38630" ref_url="https://www.suse.com/security/cve/CVE-2024-38630/" source="CVE"/>
		<reference ref_id="CVE-2024-38632" ref_url="https://www.suse.com/security/cve/CVE-2024-38632/" source="CVE"/>
		<reference ref_id="CVE-2024-38633" ref_url="https://www.suse.com/security/cve/CVE-2024-38633/" source="CVE"/>
		<reference ref_id="CVE-2024-38634" ref_url="https://www.suse.com/security/cve/CVE-2024-38634/" source="CVE"/>
		<reference ref_id="CVE-2024-38635" ref_url="https://www.suse.com/security/cve/CVE-2024-38635/" source="CVE"/>
		<reference ref_id="CVE-2024-38636" ref_url="https://www.suse.com/security/cve/CVE-2024-38636/" source="CVE"/>
		<reference ref_id="CVE-2024-38659" ref_url="https://www.suse.com/security/cve/CVE-2024-38659/" source="CVE"/>
		<reference ref_id="CVE-2024-38661" ref_url="https://www.suse.com/security/cve/CVE-2024-38661/" source="CVE"/>
		<reference ref_id="CVE-2024-38662" ref_url="https://www.suse.com/security/cve/CVE-2024-38662/" source="CVE"/>
		<reference ref_id="CVE-2024-38663" ref_url="https://www.suse.com/security/cve/CVE-2024-38663/" source="CVE"/>
		<reference ref_id="CVE-2024-38664" ref_url="https://www.suse.com/security/cve/CVE-2024-38664/" source="CVE"/>
		<reference ref_id="CVE-2024-38780" ref_url="https://www.suse.com/security/cve/CVE-2024-38780/" source="CVE"/>
		<reference ref_id="CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276/" source="CVE"/>
		<reference ref_id="CVE-2024-39277" ref_url="https://www.suse.com/security/cve/CVE-2024-39277/" source="CVE"/>
		<reference ref_id="CVE-2024-39282" ref_url="https://www.suse.com/security/cve/CVE-2024-39282/" source="CVE"/>
		<reference ref_id="CVE-2024-39291" ref_url="https://www.suse.com/security/cve/CVE-2024-39291/" source="CVE"/>
		<reference ref_id="CVE-2024-39296" ref_url="https://www.suse.com/security/cve/CVE-2024-39296/" source="CVE"/>
		<reference ref_id="CVE-2024-39301" ref_url="https://www.suse.com/security/cve/CVE-2024-39301/" source="CVE"/>
		<reference ref_id="CVE-2024-39362" ref_url="https://www.suse.com/security/cve/CVE-2024-39362/" source="CVE"/>
		<reference ref_id="CVE-2024-39371" ref_url="https://www.suse.com/security/cve/CVE-2024-39371/" source="CVE"/>
		<reference ref_id="CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463/" source="CVE"/>
		<reference ref_id="CVE-2024-39466" ref_url="https://www.suse.com/security/cve/CVE-2024-39466/" source="CVE"/>
		<reference ref_id="CVE-2024-39468" ref_url="https://www.suse.com/security/cve/CVE-2024-39468/" source="CVE"/>
		<reference ref_id="CVE-2024-39469" ref_url="https://www.suse.com/security/cve/CVE-2024-39469/" source="CVE"/>
		<reference ref_id="CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471/" source="CVE"/>
		<reference ref_id="CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472/" source="CVE"/>
		<reference ref_id="CVE-2024-39473" ref_url="https://www.suse.com/security/cve/CVE-2024-39473/" source="CVE"/>
		<reference ref_id="CVE-2024-39474" ref_url="https://www.suse.com/security/cve/CVE-2024-39474/" source="CVE"/>
		<reference ref_id="CVE-2024-39475" ref_url="https://www.suse.com/security/cve/CVE-2024-39475/" source="CVE"/>
		<reference ref_id="CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476/" source="CVE"/>
		<reference ref_id="CVE-2024-39479" ref_url="https://www.suse.com/security/cve/CVE-2024-39479/" source="CVE"/>
		<reference ref_id="CVE-2024-39481" ref_url="https://www.suse.com/security/cve/CVE-2024-39481/" source="CVE"/>
		<reference ref_id="CVE-2024-39482" ref_url="https://www.suse.com/security/cve/CVE-2024-39482/" source="CVE"/>
		<reference ref_id="CVE-2024-39483" ref_url="https://www.suse.com/security/cve/CVE-2024-39483/" source="CVE"/>
		<reference ref_id="CVE-2024-39484" ref_url="https://www.suse.com/security/cve/CVE-2024-39484/" source="CVE"/>
		<reference ref_id="CVE-2024-39486" ref_url="https://www.suse.com/security/cve/CVE-2024-39486/" source="CVE"/>
		<reference ref_id="CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487/" source="CVE"/>
		<reference ref_id="CVE-2024-39488" ref_url="https://www.suse.com/security/cve/CVE-2024-39488/" source="CVE"/>
		<reference ref_id="CVE-2024-39489" ref_url="https://www.suse.com/security/cve/CVE-2024-39489/" source="CVE"/>
		<reference ref_id="CVE-2024-39490" ref_url="https://www.suse.com/security/cve/CVE-2024-39490/" source="CVE"/>
		<reference ref_id="CVE-2024-39491" ref_url="https://www.suse.com/security/cve/CVE-2024-39491/" source="CVE"/>
		<reference ref_id="CVE-2024-39493" ref_url="https://www.suse.com/security/cve/CVE-2024-39493/" source="CVE"/>
		<reference ref_id="CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494/" source="CVE"/>
		<reference ref_id="CVE-2024-39496" ref_url="https://www.suse.com/security/cve/CVE-2024-39496/" source="CVE"/>
		<reference ref_id="CVE-2024-39497" ref_url="https://www.suse.com/security/cve/CVE-2024-39497/" source="CVE"/>
		<reference ref_id="CVE-2024-39498" ref_url="https://www.suse.com/security/cve/CVE-2024-39498/" source="CVE"/>
		<reference ref_id="CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499/" source="CVE"/>
		<reference ref_id="CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500/" source="CVE"/>
		<reference ref_id="CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501/" source="CVE"/>
		<reference ref_id="CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502/" source="CVE"/>
		<reference ref_id="CVE-2024-39504" ref_url="https://www.suse.com/security/cve/CVE-2024-39504/" source="CVE"/>
		<reference ref_id="CVE-2024-39505" ref_url="https://www.suse.com/security/cve/CVE-2024-39505/" source="CVE"/>
		<reference ref_id="CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506/" source="CVE"/>
		<reference ref_id="CVE-2024-39507" ref_url="https://www.suse.com/security/cve/CVE-2024-39507/" source="CVE"/>
		<reference ref_id="CVE-2024-39508" ref_url="https://www.suse.com/security/cve/CVE-2024-39508/" source="CVE"/>
		<reference ref_id="CVE-2024-39509" ref_url="https://www.suse.com/security/cve/CVE-2024-39509/" source="CVE"/>
		<reference ref_id="CVE-2024-39510" ref_url="https://www.suse.com/security/cve/CVE-2024-39510/" source="CVE"/>
		<reference ref_id="CVE-2024-40899" ref_url="https://www.suse.com/security/cve/CVE-2024-40899/" source="CVE"/>
		<reference ref_id="CVE-2024-40900" ref_url="https://www.suse.com/security/cve/CVE-2024-40900/" source="CVE"/>
		<reference ref_id="CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-40903" ref_url="https://www.suse.com/security/cve/CVE-2024-40903/" source="CVE"/>
		<reference ref_id="CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904/" source="CVE"/>
		<reference ref_id="CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905/" source="CVE"/>
		<reference ref_id="CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906/" source="CVE"/>
		<reference ref_id="CVE-2024-40908" ref_url="https://www.suse.com/security/cve/CVE-2024-40908/" source="CVE"/>
		<reference ref_id="CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909/" source="CVE"/>
		<reference ref_id="CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910/" source="CVE"/>
		<reference ref_id="CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911/" source="CVE"/>
		<reference ref_id="CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912/" source="CVE"/>
		<reference ref_id="CVE-2024-40913" ref_url="https://www.suse.com/security/cve/CVE-2024-40913/" source="CVE"/>
		<reference ref_id="CVE-2024-40916" ref_url="https://www.suse.com/security/cve/CVE-2024-40916/" source="CVE"/>
		<reference ref_id="CVE-2024-40919" ref_url="https://www.suse.com/security/cve/CVE-2024-40919/" source="CVE"/>
		<reference ref_id="CVE-2024-40920" ref_url="https://www.suse.com/security/cve/CVE-2024-40920/" source="CVE"/>
		<reference ref_id="CVE-2024-40921" ref_url="https://www.suse.com/security/cve/CVE-2024-40921/" source="CVE"/>
		<reference ref_id="CVE-2024-40922" ref_url="https://www.suse.com/security/cve/CVE-2024-40922/" source="CVE"/>
		<reference ref_id="CVE-2024-40923" ref_url="https://www.suse.com/security/cve/CVE-2024-40923/" source="CVE"/>
		<reference ref_id="CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924/" source="CVE"/>
		<reference ref_id="CVE-2024-40925" ref_url="https://www.suse.com/security/cve/CVE-2024-40925/" source="CVE"/>
		<reference ref_id="CVE-2024-40926" ref_url="https://www.suse.com/security/cve/CVE-2024-40926/" source="CVE"/>
		<reference ref_id="CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927/" source="CVE"/>
		<reference ref_id="CVE-2024-40928" ref_url="https://www.suse.com/security/cve/CVE-2024-40928/" source="CVE"/>
		<reference ref_id="CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929/" source="CVE"/>
		<reference ref_id="CVE-2024-40930" ref_url="https://www.suse.com/security/cve/CVE-2024-40930/" source="CVE"/>
		<reference ref_id="CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931/" source="CVE"/>
		<reference ref_id="CVE-2024-40932" ref_url="https://www.suse.com/security/cve/CVE-2024-40932/" source="CVE"/>
		<reference ref_id="CVE-2024-40934" ref_url="https://www.suse.com/security/cve/CVE-2024-40934/" source="CVE"/>
		<reference ref_id="CVE-2024-40935" ref_url="https://www.suse.com/security/cve/CVE-2024-40935/" source="CVE"/>
		<reference ref_id="CVE-2024-40936" ref_url="https://www.suse.com/security/cve/CVE-2024-40936/" source="CVE"/>
		<reference ref_id="CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937/" source="CVE"/>
		<reference ref_id="CVE-2024-40938" ref_url="https://www.suse.com/security/cve/CVE-2024-40938/" source="CVE"/>
		<reference ref_id="CVE-2024-40939" ref_url="https://www.suse.com/security/cve/CVE-2024-40939/" source="CVE"/>
		<reference ref_id="CVE-2024-40940" ref_url="https://www.suse.com/security/cve/CVE-2024-40940/" source="CVE"/>
		<reference ref_id="CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941/" source="CVE"/>
		<reference ref_id="CVE-2024-40942" ref_url="https://www.suse.com/security/cve/CVE-2024-40942/" source="CVE"/>
		<reference ref_id="CVE-2024-40943" ref_url="https://www.suse.com/security/cve/CVE-2024-40943/" source="CVE"/>
		<reference ref_id="CVE-2024-40944" ref_url="https://www.suse.com/security/cve/CVE-2024-40944/" source="CVE"/>
		<reference ref_id="CVE-2024-40945" ref_url="https://www.suse.com/security/cve/CVE-2024-40945/" source="CVE"/>
		<reference ref_id="CVE-2024-40947" ref_url="https://www.suse.com/security/cve/CVE-2024-40947/" source="CVE"/>
		<reference ref_id="CVE-2024-40948" ref_url="https://www.suse.com/security/cve/CVE-2024-40948/" source="CVE"/>
		<reference ref_id="CVE-2024-40953" ref_url="https://www.suse.com/security/cve/CVE-2024-40953/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-40957" ref_url="https://www.suse.com/security/cve/CVE-2024-40957/" source="CVE"/>
		<reference ref_id="CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958/" source="CVE"/>
		<reference ref_id="CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959/" source="CVE"/>
		<reference ref_id="CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960/" source="CVE"/>
		<reference ref_id="CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961/" source="CVE"/>
		<reference ref_id="CVE-2024-40962" ref_url="https://www.suse.com/security/cve/CVE-2024-40962/" source="CVE"/>
		<reference ref_id="CVE-2024-40964" ref_url="https://www.suse.com/security/cve/CVE-2024-40964/" source="CVE"/>
		<reference ref_id="CVE-2024-40965" ref_url="https://www.suse.com/security/cve/CVE-2024-40965/" source="CVE"/>
		<reference ref_id="CVE-2024-40966" ref_url="https://www.suse.com/security/cve/CVE-2024-40966/" source="CVE"/>
		<reference ref_id="CVE-2024-40967" ref_url="https://www.suse.com/security/cve/CVE-2024-40967/" source="CVE"/>
		<reference ref_id="CVE-2024-40970" ref_url="https://www.suse.com/security/cve/CVE-2024-40970/" source="CVE"/>
		<reference ref_id="CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972/" source="CVE"/>
		<reference ref_id="CVE-2024-40973" ref_url="https://www.suse.com/security/cve/CVE-2024-40973/" source="CVE"/>
		<reference ref_id="CVE-2024-40975" ref_url="https://www.suse.com/security/cve/CVE-2024-40975/" source="CVE"/>
		<reference ref_id="CVE-2024-40976" ref_url="https://www.suse.com/security/cve/CVE-2024-40976/" source="CVE"/>
		<reference ref_id="CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977/" source="CVE"/>
		<reference ref_id="CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978/" source="CVE"/>
		<reference ref_id="CVE-2024-40979" ref_url="https://www.suse.com/security/cve/CVE-2024-40979/" source="CVE"/>
		<reference ref_id="CVE-2024-40981" ref_url="https://www.suse.com/security/cve/CVE-2024-40981/" source="CVE"/>
		<reference ref_id="CVE-2024-40982" ref_url="https://www.suse.com/security/cve/CVE-2024-40982/" source="CVE"/>
		<reference ref_id="CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983/" source="CVE"/>
		<reference ref_id="CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984/" source="CVE"/>
		<reference ref_id="CVE-2024-40987" ref_url="https://www.suse.com/security/cve/CVE-2024-40987/" source="CVE"/>
		<reference ref_id="CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40990" ref_url="https://www.suse.com/security/cve/CVE-2024-40990/" source="CVE"/>
		<reference ref_id="CVE-2024-40992" ref_url="https://www.suse.com/security/cve/CVE-2024-40992/" source="CVE"/>
		<reference ref_id="CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994/" source="CVE"/>
		<reference ref_id="CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995/" source="CVE"/>
		<reference ref_id="CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997/" source="CVE"/>
		<reference ref_id="CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998/" source="CVE"/>
		<reference ref_id="CVE-2024-40999" ref_url="https://www.suse.com/security/cve/CVE-2024-40999/" source="CVE"/>
		<reference ref_id="CVE-2024-41000" ref_url="https://www.suse.com/security/cve/CVE-2024-41000/" source="CVE"/>
		<reference ref_id="CVE-2024-41001" ref_url="https://www.suse.com/security/cve/CVE-2024-41001/" source="CVE"/>
		<reference ref_id="CVE-2024-41002" ref_url="https://www.suse.com/security/cve/CVE-2024-41002/" source="CVE"/>
		<reference ref_id="CVE-2024-41004" ref_url="https://www.suse.com/security/cve/CVE-2024-41004/" source="CVE"/>
		<reference ref_id="CVE-2024-41006" ref_url="https://www.suse.com/security/cve/CVE-2024-41006/" source="CVE"/>
		<reference ref_id="CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41010" ref_url="https://www.suse.com/security/cve/CVE-2024-41010/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013/" source="CVE"/>
		<reference ref_id="CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014/" source="CVE"/>
		<reference ref_id="CVE-2024-41015" ref_url="https://www.suse.com/security/cve/CVE-2024-41015/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41017" ref_url="https://www.suse.com/security/cve/CVE-2024-41017/" source="CVE"/>
		<reference ref_id="CVE-2024-41020" ref_url="https://www.suse.com/security/cve/CVE-2024-41020/" source="CVE"/>
		<reference ref_id="CVE-2024-41022" ref_url="https://www.suse.com/security/cve/CVE-2024-41022/" source="CVE"/>
		<reference ref_id="CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023/" source="CVE"/>
		<reference ref_id="CVE-2024-41024" ref_url="https://www.suse.com/security/cve/CVE-2024-41024/" source="CVE"/>
		<reference ref_id="CVE-2024-41025" ref_url="https://www.suse.com/security/cve/CVE-2024-41025/" source="CVE"/>
		<reference ref_id="CVE-2024-41028" ref_url="https://www.suse.com/security/cve/CVE-2024-41028/" source="CVE"/>
		<reference ref_id="CVE-2024-41031" ref_url="https://www.suse.com/security/cve/CVE-2024-41031/" source="CVE"/>
		<reference ref_id="CVE-2024-41032" ref_url="https://www.suse.com/security/cve/CVE-2024-41032/" source="CVE"/>
		<reference ref_id="CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035/" source="CVE"/>
		<reference ref_id="CVE-2024-41036" ref_url="https://www.suse.com/security/cve/CVE-2024-41036/" source="CVE"/>
		<reference ref_id="CVE-2024-41037" ref_url="https://www.suse.com/security/cve/CVE-2024-41037/" source="CVE"/>
		<reference ref_id="CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038/" source="CVE"/>
		<reference ref_id="CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039/" source="CVE"/>
		<reference ref_id="CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040/" source="CVE"/>
		<reference ref_id="CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041/" source="CVE"/>
		<reference ref_id="CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044/" source="CVE"/>
		<reference ref_id="CVE-2024-41045" ref_url="https://www.suse.com/security/cve/CVE-2024-41045/" source="CVE"/>
		<reference ref_id="CVE-2024-41047" ref_url="https://www.suse.com/security/cve/CVE-2024-41047/" source="CVE"/>
		<reference ref_id="CVE-2024-41048" ref_url="https://www.suse.com/security/cve/CVE-2024-41048/" source="CVE"/>
		<reference ref_id="CVE-2024-41049" ref_url="https://www.suse.com/security/cve/CVE-2024-41049/" source="CVE"/>
		<reference ref_id="CVE-2024-41050" ref_url="https://www.suse.com/security/cve/CVE-2024-41050/" source="CVE"/>
		<reference ref_id="CVE-2024-41051" ref_url="https://www.suse.com/security/cve/CVE-2024-41051/" source="CVE"/>
		<reference ref_id="CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056/" source="CVE"/>
		<reference ref_id="CVE-2024-41057" ref_url="https://www.suse.com/security/cve/CVE-2024-41057/" source="CVE"/>
		<reference ref_id="CVE-2024-41058" ref_url="https://www.suse.com/security/cve/CVE-2024-41058/" source="CVE"/>
		<reference ref_id="CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059/" source="CVE"/>
		<reference ref_id="CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060/" source="CVE"/>
		<reference ref_id="CVE-2024-41061" ref_url="https://www.suse.com/security/cve/CVE-2024-41061/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41063" ref_url="https://www.suse.com/security/cve/CVE-2024-41063/" source="CVE"/>
		<reference ref_id="CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064/" source="CVE"/>
		<reference ref_id="CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065/" source="CVE"/>
		<reference ref_id="CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066/" source="CVE"/>
		<reference ref_id="CVE-2024-41068" ref_url="https://www.suse.com/security/cve/CVE-2024-41068/" source="CVE"/>
		<reference ref_id="CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069/" source="CVE"/>
		<reference ref_id="CVE-2024-41070" ref_url="https://www.suse.com/security/cve/CVE-2024-41070/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<reference ref_id="CVE-2024-41072" ref_url="https://www.suse.com/security/cve/CVE-2024-41072/" source="CVE"/>
		<reference ref_id="CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073/" source="CVE"/>
		<reference ref_id="CVE-2024-41074" ref_url="https://www.suse.com/security/cve/CVE-2024-41074/" source="CVE"/>
		<reference ref_id="CVE-2024-41075" ref_url="https://www.suse.com/security/cve/CVE-2024-41075/" source="CVE"/>
		<reference ref_id="CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076/" source="CVE"/>
		<reference ref_id="CVE-2024-41078" ref_url="https://www.suse.com/security/cve/CVE-2024-41078/" source="CVE"/>
		<reference ref_id="CVE-2024-41079" ref_url="https://www.suse.com/security/cve/CVE-2024-41079/" source="CVE"/>
		<reference ref_id="CVE-2024-41080" ref_url="https://www.suse.com/security/cve/CVE-2024-41080/" source="CVE"/>
		<reference ref_id="CVE-2024-41081" ref_url="https://www.suse.com/security/cve/CVE-2024-41081/" source="CVE"/>
		<reference ref_id="CVE-2024-41082" ref_url="https://www.suse.com/security/cve/CVE-2024-41082/" source="CVE"/>
		<reference ref_id="CVE-2024-41084" ref_url="https://www.suse.com/security/cve/CVE-2024-41084/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41088" ref_url="https://www.suse.com/security/cve/CVE-2024-41088/" source="CVE"/>
		<reference ref_id="CVE-2024-41089" ref_url="https://www.suse.com/security/cve/CVE-2024-41089/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093/" source="CVE"/>
		<reference ref_id="CVE-2024-41094" ref_url="https://www.suse.com/security/cve/CVE-2024-41094/" source="CVE"/>
		<reference ref_id="CVE-2024-41095" ref_url="https://www.suse.com/security/cve/CVE-2024-41095/" source="CVE"/>
		<reference ref_id="CVE-2024-41096" ref_url="https://www.suse.com/security/cve/CVE-2024-41096/" source="CVE"/>
		<reference ref_id="CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097/" source="CVE"/>
		<reference ref_id="CVE-2024-41098" ref_url="https://www.suse.com/security/cve/CVE-2024-41098/" source="CVE"/>
		<reference ref_id="CVE-2024-41149" ref_url="https://www.suse.com/security/cve/CVE-2024-41149/" source="CVE"/>
		<reference ref_id="CVE-2024-41932" ref_url="https://www.suse.com/security/cve/CVE-2024-41932/" source="CVE"/>
		<reference ref_id="CVE-2024-42064" ref_url="https://www.suse.com/security/cve/CVE-2024-42064/" source="CVE"/>
		<reference ref_id="CVE-2024-42069" ref_url="https://www.suse.com/security/cve/CVE-2024-42069/" source="CVE"/>
		<reference ref_id="CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070/" source="CVE"/>
		<reference ref_id="CVE-2024-42073" ref_url="https://www.suse.com/security/cve/CVE-2024-42073/" source="CVE"/>
		<reference ref_id="CVE-2024-42074" ref_url="https://www.suse.com/security/cve/CVE-2024-42074/" source="CVE"/>
		<reference ref_id="CVE-2024-42076" ref_url="https://www.suse.com/security/cve/CVE-2024-42076/" source="CVE"/>
		<reference ref_id="CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077/" source="CVE"/>
		<reference ref_id="CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079/" source="CVE"/>
		<reference ref_id="CVE-2024-42080" ref_url="https://www.suse.com/security/cve/CVE-2024-42080/" source="CVE"/>
		<reference ref_id="CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082/" source="CVE"/>
		<reference ref_id="CVE-2024-42085" ref_url="https://www.suse.com/security/cve/CVE-2024-42085/" source="CVE"/>
		<reference ref_id="CVE-2024-42086" ref_url="https://www.suse.com/security/cve/CVE-2024-42086/" source="CVE"/>
		<reference ref_id="CVE-2024-42087" ref_url="https://www.suse.com/security/cve/CVE-2024-42087/" source="CVE"/>
		<reference ref_id="CVE-2024-42089" ref_url="https://www.suse.com/security/cve/CVE-2024-42089/" source="CVE"/>
		<reference ref_id="CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090/" source="CVE"/>
		<reference ref_id="CVE-2024-42092" ref_url="https://www.suse.com/security/cve/CVE-2024-42092/" source="CVE"/>
		<reference ref_id="CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093/" source="CVE"/>
		<reference ref_id="CVE-2024-42095" ref_url="https://www.suse.com/security/cve/CVE-2024-42095/" source="CVE"/>
		<reference ref_id="CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096/" source="CVE"/>
		<reference ref_id="CVE-2024-42097" ref_url="https://www.suse.com/security/cve/CVE-2024-42097/" source="CVE"/>
		<reference ref_id="CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098/" source="CVE"/>
		<reference ref_id="CVE-2024-42101" ref_url="https://www.suse.com/security/cve/CVE-2024-42101/" source="CVE"/>
		<reference ref_id="CVE-2024-42102" ref_url="https://www.suse.com/security/cve/CVE-2024-42102/" source="CVE"/>
		<reference ref_id="CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104/" source="CVE"/>
		<reference ref_id="CVE-2024-42105" ref_url="https://www.suse.com/security/cve/CVE-2024-42105/" source="CVE"/>
		<reference ref_id="CVE-2024-42106" ref_url="https://www.suse.com/security/cve/CVE-2024-42106/" source="CVE"/>
		<reference ref_id="CVE-2024-42107" ref_url="https://www.suse.com/security/cve/CVE-2024-42107/" source="CVE"/>
		<reference ref_id="CVE-2024-42109" ref_url="https://www.suse.com/security/cve/CVE-2024-42109/" source="CVE"/>
		<reference ref_id="CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110/" source="CVE"/>
		<reference ref_id="CVE-2024-42113" ref_url="https://www.suse.com/security/cve/CVE-2024-42113/" source="CVE"/>
		<reference ref_id="CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114/" source="CVE"/>
		<reference ref_id="CVE-2024-42115" ref_url="https://www.suse.com/security/cve/CVE-2024-42115/" source="CVE"/>
		<reference ref_id="CVE-2024-42117" ref_url="https://www.suse.com/security/cve/CVE-2024-42117/" source="CVE"/>
		<reference ref_id="CVE-2024-42119" ref_url="https://www.suse.com/security/cve/CVE-2024-42119/" source="CVE"/>
		<reference ref_id="CVE-2024-42120" ref_url="https://www.suse.com/security/cve/CVE-2024-42120/" source="CVE"/>
		<reference ref_id="CVE-2024-42121" ref_url="https://www.suse.com/security/cve/CVE-2024-42121/" source="CVE"/>
		<reference ref_id="CVE-2024-42122" ref_url="https://www.suse.com/security/cve/CVE-2024-42122/" source="CVE"/>
		<reference ref_id="CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124/" source="CVE"/>
		<reference ref_id="CVE-2024-42125" ref_url="https://www.suse.com/security/cve/CVE-2024-42125/" source="CVE"/>
		<reference ref_id="CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126/" source="CVE"/>
		<reference ref_id="CVE-2024-42127" ref_url="https://www.suse.com/security/cve/CVE-2024-42127/" source="CVE"/>
		<reference ref_id="CVE-2024-42130" ref_url="https://www.suse.com/security/cve/CVE-2024-42130/" source="CVE"/>
		<reference ref_id="CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131/" source="CVE"/>
		<reference ref_id="CVE-2024-42132" ref_url="https://www.suse.com/security/cve/CVE-2024-42132/" source="CVE"/>
		<reference ref_id="CVE-2024-42133" ref_url="https://www.suse.com/security/cve/CVE-2024-42133/" source="CVE"/>
		<reference ref_id="CVE-2024-42136" ref_url="https://www.suse.com/security/cve/CVE-2024-42136/" source="CVE"/>
		<reference ref_id="CVE-2024-42137" ref_url="https://www.suse.com/security/cve/CVE-2024-42137/" source="CVE"/>
		<reference ref_id="CVE-2024-42138" ref_url="https://www.suse.com/security/cve/CVE-2024-42138/" source="CVE"/>
		<reference ref_id="CVE-2024-42139" ref_url="https://www.suse.com/security/cve/CVE-2024-42139/" source="CVE"/>
		<reference ref_id="CVE-2024-42141" ref_url="https://www.suse.com/security/cve/CVE-2024-42141/" source="CVE"/>
		<reference ref_id="CVE-2024-42142" ref_url="https://www.suse.com/security/cve/CVE-2024-42142/" source="CVE"/>
		<reference ref_id="CVE-2024-42143" ref_url="https://www.suse.com/security/cve/CVE-2024-42143/" source="CVE"/>
		<reference ref_id="CVE-2024-42144" ref_url="https://www.suse.com/security/cve/CVE-2024-42144/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42147" ref_url="https://www.suse.com/security/cve/CVE-2024-42147/" source="CVE"/>
		<reference ref_id="CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148/" source="CVE"/>
		<reference ref_id="CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152/" source="CVE"/>
		<reference ref_id="CVE-2024-42153" ref_url="https://www.suse.com/security/cve/CVE-2024-42153/" source="CVE"/>
		<reference ref_id="CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154/" source="CVE"/>
		<reference ref_id="CVE-2024-42155" ref_url="https://www.suse.com/security/cve/CVE-2024-42155/" source="CVE"/>
		<reference ref_id="CVE-2024-42156" ref_url="https://www.suse.com/security/cve/CVE-2024-42156/" source="CVE"/>
		<reference ref_id="CVE-2024-42157" ref_url="https://www.suse.com/security/cve/CVE-2024-42157/" source="CVE"/>
		<reference ref_id="CVE-2024-42158" ref_url="https://www.suse.com/security/cve/CVE-2024-42158/" source="CVE"/>
		<reference ref_id="CVE-2024-42159" ref_url="https://www.suse.com/security/cve/CVE-2024-42159/" source="CVE"/>
		<reference ref_id="CVE-2024-42161" ref_url="https://www.suse.com/security/cve/CVE-2024-42161/" source="CVE"/>
		<reference ref_id="CVE-2024-42162" ref_url="https://www.suse.com/security/cve/CVE-2024-42162/" source="CVE"/>
		<reference ref_id="CVE-2024-42223" ref_url="https://www.suse.com/security/cve/CVE-2024-42223/" source="CVE"/>
		<reference ref_id="CVE-2024-42224" ref_url="https://www.suse.com/security/cve/CVE-2024-42224/" source="CVE"/>
		<reference ref_id="CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225/" source="CVE"/>
		<reference ref_id="CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226/" source="CVE"/>
		<reference ref_id="CVE-2024-42227" ref_url="https://www.suse.com/security/cve/CVE-2024-42227/" source="CVE"/>
		<reference ref_id="CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228/" source="CVE"/>
		<reference ref_id="CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-42236" ref_url="https://www.suse.com/security/cve/CVE-2024-42236/" source="CVE"/>
		<reference ref_id="CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237/" source="CVE"/>
		<reference ref_id="CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238/" source="CVE"/>
		<reference ref_id="CVE-2024-42239" ref_url="https://www.suse.com/security/cve/CVE-2024-42239/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-42241" ref_url="https://www.suse.com/security/cve/CVE-2024-42241/" source="CVE"/>
		<reference ref_id="CVE-2024-42243" ref_url="https://www.suse.com/security/cve/CVE-2024-42243/" source="CVE"/>
		<reference ref_id="CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244/" source="CVE"/>
		<reference ref_id="CVE-2024-42245" ref_url="https://www.suse.com/security/cve/CVE-2024-42245/" source="CVE"/>
		<reference ref_id="CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246/" source="CVE"/>
		<reference ref_id="CVE-2024-42247" ref_url="https://www.suse.com/security/cve/CVE-2024-42247/" source="CVE"/>
		<reference ref_id="CVE-2024-42250" ref_url="https://www.suse.com/security/cve/CVE-2024-42250/" source="CVE"/>
		<reference ref_id="CVE-2024-42252" ref_url="https://www.suse.com/security/cve/CVE-2024-42252/" source="CVE"/>
		<reference ref_id="CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253/" source="CVE"/>
		<reference ref_id="CVE-2024-42259" ref_url="https://www.suse.com/security/cve/CVE-2024-42259/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-42268" ref_url="https://www.suse.com/security/cve/CVE-2024-42268/" source="CVE"/>
		<reference ref_id="CVE-2024-42269" ref_url="https://www.suse.com/security/cve/CVE-2024-42269/" source="CVE"/>
		<reference ref_id="CVE-2024-42270" ref_url="https://www.suse.com/security/cve/CVE-2024-42270/" source="CVE"/>
		<reference ref_id="CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271/" source="CVE"/>
		<reference ref_id="CVE-2024-42274" ref_url="https://www.suse.com/security/cve/CVE-2024-42274/" source="CVE"/>
		<reference ref_id="CVE-2024-42276" ref_url="https://www.suse.com/security/cve/CVE-2024-42276/" source="CVE"/>
		<reference ref_id="CVE-2024-42277" ref_url="https://www.suse.com/security/cve/CVE-2024-42277/" source="CVE"/>
		<reference ref_id="CVE-2024-42278" ref_url="https://www.suse.com/security/cve/CVE-2024-42278/" source="CVE"/>
		<reference ref_id="CVE-2024-42279" ref_url="https://www.suse.com/security/cve/CVE-2024-42279/" source="CVE"/>
		<reference ref_id="CVE-2024-42280" ref_url="https://www.suse.com/security/cve/CVE-2024-42280/" source="CVE"/>
		<reference ref_id="CVE-2024-42281" ref_url="https://www.suse.com/security/cve/CVE-2024-42281/" source="CVE"/>
		<reference ref_id="CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283/" source="CVE"/>
		<reference ref_id="CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284/" source="CVE"/>
		<reference ref_id="CVE-2024-42285" ref_url="https://www.suse.com/security/cve/CVE-2024-42285/" source="CVE"/>
		<reference ref_id="CVE-2024-42286" ref_url="https://www.suse.com/security/cve/CVE-2024-42286/" source="CVE"/>
		<reference ref_id="CVE-2024-42287" ref_url="https://www.suse.com/security/cve/CVE-2024-42287/" source="CVE"/>
		<reference ref_id="CVE-2024-42288" ref_url="https://www.suse.com/security/cve/CVE-2024-42288/" source="CVE"/>
		<reference ref_id="CVE-2024-42289" ref_url="https://www.suse.com/security/cve/CVE-2024-42289/" source="CVE"/>
		<reference ref_id="CVE-2024-42290" ref_url="https://www.suse.com/security/cve/CVE-2024-42290/" source="CVE"/>
		<reference ref_id="CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291/" source="CVE"/>
		<reference ref_id="CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292/" source="CVE"/>
		<reference ref_id="CVE-2024-42294" ref_url="https://www.suse.com/security/cve/CVE-2024-42294/" source="CVE"/>
		<reference ref_id="CVE-2024-42295" ref_url="https://www.suse.com/security/cve/CVE-2024-42295/" source="CVE"/>
		<reference ref_id="CVE-2024-42298" ref_url="https://www.suse.com/security/cve/CVE-2024-42298/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302/" source="CVE"/>
		<reference ref_id="CVE-2024-42303" ref_url="https://www.suse.com/security/cve/CVE-2024-42303/" source="CVE"/>
		<reference ref_id="CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304/" source="CVE"/>
		<reference ref_id="CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305/" source="CVE"/>
		<reference ref_id="CVE-2024-42306" ref_url="https://www.suse.com/security/cve/CVE-2024-42306/" source="CVE"/>
		<reference ref_id="CVE-2024-42308" ref_url="https://www.suse.com/security/cve/CVE-2024-42308/" source="CVE"/>
		<reference ref_id="CVE-2024-42309" ref_url="https://www.suse.com/security/cve/CVE-2024-42309/" source="CVE"/>
		<reference ref_id="CVE-2024-42310" ref_url="https://www.suse.com/security/cve/CVE-2024-42310/" source="CVE"/>
		<reference ref_id="CVE-2024-42311" ref_url="https://www.suse.com/security/cve/CVE-2024-42311/" source="CVE"/>
		<reference ref_id="CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312/" source="CVE"/>
		<reference ref_id="CVE-2024-42313" ref_url="https://www.suse.com/security/cve/CVE-2024-42313/" source="CVE"/>
		<reference ref_id="CVE-2024-42314" ref_url="https://www.suse.com/security/cve/CVE-2024-42314/" source="CVE"/>
		<reference ref_id="CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315/" source="CVE"/>
		<reference ref_id="CVE-2024-42316" ref_url="https://www.suse.com/security/cve/CVE-2024-42316/" source="CVE"/>
		<reference ref_id="CVE-2024-42318" ref_url="https://www.suse.com/security/cve/CVE-2024-42318/" source="CVE"/>
		<reference ref_id="CVE-2024-42319" ref_url="https://www.suse.com/security/cve/CVE-2024-42319/" source="CVE"/>
		<reference ref_id="CVE-2024-42320" ref_url="https://www.suse.com/security/cve/CVE-2024-42320/" source="CVE"/>
		<reference ref_id="CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322/" source="CVE"/>
		<reference ref_id="CVE-2024-43098" ref_url="https://www.suse.com/security/cve/CVE-2024-43098/" source="CVE"/>
		<reference ref_id="CVE-2024-43816" ref_url="https://www.suse.com/security/cve/CVE-2024-43816/" source="CVE"/>
		<reference ref_id="CVE-2024-43817" ref_url="https://www.suse.com/security/cve/CVE-2024-43817/" source="CVE"/>
		<reference ref_id="CVE-2024-43818" ref_url="https://www.suse.com/security/cve/CVE-2024-43818/" source="CVE"/>
		<reference ref_id="CVE-2024-43819" ref_url="https://www.suse.com/security/cve/CVE-2024-43819/" source="CVE"/>
		<reference ref_id="CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821/" source="CVE"/>
		<reference ref_id="CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823/" source="CVE"/>
		<reference ref_id="CVE-2024-43824" ref_url="https://www.suse.com/security/cve/CVE-2024-43824/" source="CVE"/>
		<reference ref_id="CVE-2024-43825" ref_url="https://www.suse.com/security/cve/CVE-2024-43825/" source="CVE"/>
		<reference ref_id="CVE-2024-43826" ref_url="https://www.suse.com/security/cve/CVE-2024-43826/" source="CVE"/>
		<reference ref_id="CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828/" source="CVE"/>
		<reference ref_id="CVE-2024-43829" ref_url="https://www.suse.com/security/cve/CVE-2024-43829/" source="CVE"/>
		<reference ref_id="CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830/" source="CVE"/>
		<reference ref_id="CVE-2024-43831" ref_url="https://www.suse.com/security/cve/CVE-2024-43831/" source="CVE"/>
		<reference ref_id="CVE-2024-43832" ref_url="https://www.suse.com/security/cve/CVE-2024-43832/" source="CVE"/>
		<reference ref_id="CVE-2024-43833" ref_url="https://www.suse.com/security/cve/CVE-2024-43833/" source="CVE"/>
		<reference ref_id="CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834/" source="CVE"/>
		<reference ref_id="CVE-2024-43835" ref_url="https://www.suse.com/security/cve/CVE-2024-43835/" source="CVE"/>
		<reference ref_id="CVE-2024-43837" ref_url="https://www.suse.com/security/cve/CVE-2024-43837/" source="CVE"/>
		<reference ref_id="CVE-2024-43839" ref_url="https://www.suse.com/security/cve/CVE-2024-43839/" source="CVE"/>
		<reference ref_id="CVE-2024-43840" ref_url="https://www.suse.com/security/cve/CVE-2024-43840/" source="CVE"/>
		<reference ref_id="CVE-2024-43841" ref_url="https://www.suse.com/security/cve/CVE-2024-43841/" source="CVE"/>
		<reference ref_id="CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842/" source="CVE"/>
		<reference ref_id="CVE-2024-43845" ref_url="https://www.suse.com/security/cve/CVE-2024-43845/" source="CVE"/>
		<reference ref_id="CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846/" source="CVE"/>
		<reference ref_id="CVE-2024-43847" ref_url="https://www.suse.com/security/cve/CVE-2024-43847/" source="CVE"/>
		<reference ref_id="CVE-2024-43849" ref_url="https://www.suse.com/security/cve/CVE-2024-43849/" source="CVE"/>
		<reference ref_id="CVE-2024-43850" ref_url="https://www.suse.com/security/cve/CVE-2024-43850/" source="CVE"/>
		<reference ref_id="CVE-2024-43851" ref_url="https://www.suse.com/security/cve/CVE-2024-43851/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-43855" ref_url="https://www.suse.com/security/cve/CVE-2024-43855/" source="CVE"/>
		<reference ref_id="CVE-2024-43856" ref_url="https://www.suse.com/security/cve/CVE-2024-43856/" source="CVE"/>
		<reference ref_id="CVE-2024-43858" ref_url="https://www.suse.com/security/cve/CVE-2024-43858/" source="CVE"/>
		<reference ref_id="CVE-2024-43860" ref_url="https://www.suse.com/security/cve/CVE-2024-43860/" source="CVE"/>
		<reference ref_id="CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861/" source="CVE"/>
		<reference ref_id="CVE-2024-43863" ref_url="https://www.suse.com/security/cve/CVE-2024-43863/" source="CVE"/>
		<reference ref_id="CVE-2024-43864" ref_url="https://www.suse.com/security/cve/CVE-2024-43864/" source="CVE"/>
		<reference ref_id="CVE-2024-43866" ref_url="https://www.suse.com/security/cve/CVE-2024-43866/" source="CVE"/>
		<reference ref_id="CVE-2024-43867" ref_url="https://www.suse.com/security/cve/CVE-2024-43867/" source="CVE"/>
		<reference ref_id="CVE-2024-43870" ref_url="https://www.suse.com/security/cve/CVE-2024-43870/" source="CVE"/>
		<reference ref_id="CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871/" source="CVE"/>
		<reference ref_id="CVE-2024-43872" ref_url="https://www.suse.com/security/cve/CVE-2024-43872/" source="CVE"/>
		<reference ref_id="CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873/" source="CVE"/>
		<reference ref_id="CVE-2024-43874" ref_url="https://www.suse.com/security/cve/CVE-2024-43874/" source="CVE"/>
		<reference ref_id="CVE-2024-43875" ref_url="https://www.suse.com/security/cve/CVE-2024-43875/" source="CVE"/>
		<reference ref_id="CVE-2024-43876" ref_url="https://www.suse.com/security/cve/CVE-2024-43876/" source="CVE"/>
		<reference ref_id="CVE-2024-43877" ref_url="https://www.suse.com/security/cve/CVE-2024-43877/" source="CVE"/>
		<reference ref_id="CVE-2024-43879" ref_url="https://www.suse.com/security/cve/CVE-2024-43879/" source="CVE"/>
		<reference ref_id="CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880/" source="CVE"/>
		<reference ref_id="CVE-2024-43881" ref_url="https://www.suse.com/security/cve/CVE-2024-43881/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884/" source="CVE"/>
		<reference ref_id="CVE-2024-43885" ref_url="https://www.suse.com/security/cve/CVE-2024-43885/" source="CVE"/>
		<reference ref_id="CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889/" source="CVE"/>
		<reference ref_id="CVE-2024-43890" ref_url="https://www.suse.com/security/cve/CVE-2024-43890/" source="CVE"/>
		<reference ref_id="CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892/" source="CVE"/>
		<reference ref_id="CVE-2024-43893" ref_url="https://www.suse.com/security/cve/CVE-2024-43893/" source="CVE"/>
		<reference ref_id="CVE-2024-43894" ref_url="https://www.suse.com/security/cve/CVE-2024-43894/" source="CVE"/>
		<reference ref_id="CVE-2024-43895" ref_url="https://www.suse.com/security/cve/CVE-2024-43895/" source="CVE"/>
		<reference ref_id="CVE-2024-43897" ref_url="https://www.suse.com/security/cve/CVE-2024-43897/" source="CVE"/>
		<reference ref_id="CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898/" source="CVE"/>
		<reference ref_id="CVE-2024-43899" ref_url="https://www.suse.com/security/cve/CVE-2024-43899/" source="CVE"/>
		<reference ref_id="CVE-2024-43900" ref_url="https://www.suse.com/security/cve/CVE-2024-43900/" source="CVE"/>
		<reference ref_id="CVE-2024-43902" ref_url="https://www.suse.com/security/cve/CVE-2024-43902/" source="CVE"/>
		<reference ref_id="CVE-2024-43903" ref_url="https://www.suse.com/security/cve/CVE-2024-43903/" source="CVE"/>
		<reference ref_id="CVE-2024-43904" ref_url="https://www.suse.com/security/cve/CVE-2024-43904/" source="CVE"/>
		<reference ref_id="CVE-2024-43905" ref_url="https://www.suse.com/security/cve/CVE-2024-43905/" source="CVE"/>
		<reference ref_id="CVE-2024-43906" ref_url="https://www.suse.com/security/cve/CVE-2024-43906/" source="CVE"/>
		<reference ref_id="CVE-2024-43907" ref_url="https://www.suse.com/security/cve/CVE-2024-43907/" source="CVE"/>
		<reference ref_id="CVE-2024-43908" ref_url="https://www.suse.com/security/cve/CVE-2024-43908/" source="CVE"/>
		<reference ref_id="CVE-2024-43909" ref_url="https://www.suse.com/security/cve/CVE-2024-43909/" source="CVE"/>
		<reference ref_id="CVE-2024-43911" ref_url="https://www.suse.com/security/cve/CVE-2024-43911/" source="CVE"/>
		<reference ref_id="CVE-2024-43912" ref_url="https://www.suse.com/security/cve/CVE-2024-43912/" source="CVE"/>
		<reference ref_id="CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914/" source="CVE"/>
		<reference ref_id="CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935/" source="CVE"/>
		<reference ref_id="CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938/" source="CVE"/>
		<reference ref_id="CVE-2024-44939" ref_url="https://www.suse.com/security/cve/CVE-2024-44939/" source="CVE"/>
		<reference ref_id="CVE-2024-44944" ref_url="https://www.suse.com/security/cve/CVE-2024-44944/" source="CVE"/>
		<reference ref_id="CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-44948" ref_url="https://www.suse.com/security/cve/CVE-2024-44948/" source="CVE"/>
		<reference ref_id="CVE-2024-44950" ref_url="https://www.suse.com/security/cve/CVE-2024-44950/" source="CVE"/>
		<reference ref_id="CVE-2024-44951" ref_url="https://www.suse.com/security/cve/CVE-2024-44951/" source="CVE"/>
		<reference ref_id="CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952/" source="CVE"/>
		<reference ref_id="CVE-2024-44954" ref_url="https://www.suse.com/security/cve/CVE-2024-44954/" source="CVE"/>
		<reference ref_id="CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958/" source="CVE"/>
		<reference ref_id="CVE-2024-44960" ref_url="https://www.suse.com/security/cve/CVE-2024-44960/" source="CVE"/>
		<reference ref_id="CVE-2024-44961" ref_url="https://www.suse.com/security/cve/CVE-2024-44961/" source="CVE"/>
		<reference ref_id="CVE-2024-44962" ref_url="https://www.suse.com/security/cve/CVE-2024-44962/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-44965" ref_url="https://www.suse.com/security/cve/CVE-2024-44965/" source="CVE"/>
		<reference ref_id="CVE-2024-44967" ref_url="https://www.suse.com/security/cve/CVE-2024-44967/" source="CVE"/>
		<reference ref_id="CVE-2024-44969" ref_url="https://www.suse.com/security/cve/CVE-2024-44969/" source="CVE"/>
		<reference ref_id="CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970/" source="CVE"/>
		<reference ref_id="CVE-2024-44971" ref_url="https://www.suse.com/security/cve/CVE-2024-44971/" source="CVE"/>
		<reference ref_id="CVE-2024-44977" ref_url="https://www.suse.com/security/cve/CVE-2024-44977/" source="CVE"/>
		<reference ref_id="CVE-2024-44982" ref_url="https://www.suse.com/security/cve/CVE-2024-44982/" source="CVE"/>
		<reference ref_id="CVE-2024-44984" ref_url="https://www.suse.com/security/cve/CVE-2024-44984/" source="CVE"/>
		<reference ref_id="CVE-2024-44985" ref_url="https://www.suse.com/security/cve/CVE-2024-44985/" source="CVE"/>
		<reference ref_id="CVE-2024-44986" ref_url="https://www.suse.com/security/cve/CVE-2024-44986/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2024-44988" ref_url="https://www.suse.com/security/cve/CVE-2024-44988/" source="CVE"/>
		<reference ref_id="CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989/" source="CVE"/>
		<reference ref_id="CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990/" source="CVE"/>
		<reference ref_id="CVE-2024-44991" ref_url="https://www.suse.com/security/cve/CVE-2024-44991/" source="CVE"/>
		<reference ref_id="CVE-2024-44997" ref_url="https://www.suse.com/security/cve/CVE-2024-44997/" source="CVE"/>
		<reference ref_id="CVE-2024-44998" ref_url="https://www.suse.com/security/cve/CVE-2024-44998/" source="CVE"/>
		<reference ref_id="CVE-2024-44999" ref_url="https://www.suse.com/security/cve/CVE-2024-44999/" source="CVE"/>
		<reference ref_id="CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000/" source="CVE"/>
		<reference ref_id="CVE-2024-45001" ref_url="https://www.suse.com/security/cve/CVE-2024-45001/" source="CVE"/>
		<reference ref_id="CVE-2024-45002" ref_url="https://www.suse.com/security/cve/CVE-2024-45002/" source="CVE"/>
		<reference ref_id="CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003/" source="CVE"/>
		<reference ref_id="CVE-2024-45005" ref_url="https://www.suse.com/security/cve/CVE-2024-45005/" source="CVE"/>
		<reference ref_id="CVE-2024-45006" ref_url="https://www.suse.com/security/cve/CVE-2024-45006/" source="CVE"/>
		<reference ref_id="CVE-2024-45007" ref_url="https://www.suse.com/security/cve/CVE-2024-45007/" source="CVE"/>
		<reference ref_id="CVE-2024-45008" ref_url="https://www.suse.com/security/cve/CVE-2024-45008/" source="CVE"/>
		<reference ref_id="CVE-2024-45011" ref_url="https://www.suse.com/security/cve/CVE-2024-45011/" source="CVE"/>
		<reference ref_id="CVE-2024-45012" ref_url="https://www.suse.com/security/cve/CVE-2024-45012/" source="CVE"/>
		<reference ref_id="CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013/" source="CVE"/>
		<reference ref_id="CVE-2024-45015" ref_url="https://www.suse.com/security/cve/CVE-2024-45015/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45017" ref_url="https://www.suse.com/security/cve/CVE-2024-45017/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<reference ref_id="CVE-2024-45019" ref_url="https://www.suse.com/security/cve/CVE-2024-45019/" source="CVE"/>
		<reference ref_id="CVE-2024-45020" ref_url="https://www.suse.com/security/cve/CVE-2024-45020/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="CVE-2024-45022" ref_url="https://www.suse.com/security/cve/CVE-2024-45022/" source="CVE"/>
		<reference ref_id="CVE-2024-45023" ref_url="https://www.suse.com/security/cve/CVE-2024-45023/" source="CVE"/>
		<reference ref_id="CVE-2024-45025" ref_url="https://www.suse.com/security/cve/CVE-2024-45025/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<reference ref_id="CVE-2024-45028" ref_url="https://www.suse.com/security/cve/CVE-2024-45028/" source="CVE"/>
		<reference ref_id="CVE-2024-45029" ref_url="https://www.suse.com/security/cve/CVE-2024-45029/" source="CVE"/>
		<reference ref_id="CVE-2024-45030" ref_url="https://www.suse.com/security/cve/CVE-2024-45030/" source="CVE"/>
		<reference ref_id="CVE-2024-45828" ref_url="https://www.suse.com/security/cve/CVE-2024-45828/" source="CVE"/>
		<reference ref_id="CVE-2024-46672" ref_url="https://www.suse.com/security/cve/CVE-2024-46672/" source="CVE"/>
		<reference ref_id="CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673/" source="CVE"/>
		<reference ref_id="CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674/" source="CVE"/>
		<reference ref_id="CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675/" source="CVE"/>
		<reference ref_id="CVE-2024-46676" ref_url="https://www.suse.com/security/cve/CVE-2024-46676/" source="CVE"/>
		<reference ref_id="CVE-2024-46677" ref_url="https://www.suse.com/security/cve/CVE-2024-46677/" source="CVE"/>
		<reference ref_id="CVE-2024-46678" ref_url="https://www.suse.com/security/cve/CVE-2024-46678/" source="CVE"/>
		<reference ref_id="CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679/" source="CVE"/>
		<reference ref_id="CVE-2024-46685" ref_url="https://www.suse.com/security/cve/CVE-2024-46685/" source="CVE"/>
		<reference ref_id="CVE-2024-46686" ref_url="https://www.suse.com/security/cve/CVE-2024-46686/" source="CVE"/>
		<reference ref_id="CVE-2024-46687" ref_url="https://www.suse.com/security/cve/CVE-2024-46687/" source="CVE"/>
		<reference ref_id="CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689/" source="CVE"/>
		<reference ref_id="CVE-2024-46691" ref_url="https://www.suse.com/security/cve/CVE-2024-46691/" source="CVE"/>
		<reference ref_id="CVE-2024-46692" ref_url="https://www.suse.com/security/cve/CVE-2024-46692/" source="CVE"/>
		<reference ref_id="CVE-2024-46693" ref_url="https://www.suse.com/security/cve/CVE-2024-46693/" source="CVE"/>
		<reference ref_id="CVE-2024-46694" ref_url="https://www.suse.com/security/cve/CVE-2024-46694/" source="CVE"/>
		<reference ref_id="CVE-2024-46695" ref_url="https://www.suse.com/security/cve/CVE-2024-46695/" source="CVE"/>
		<reference ref_id="CVE-2024-46702" ref_url="https://www.suse.com/security/cve/CVE-2024-46702/" source="CVE"/>
		<reference ref_id="CVE-2024-46706" ref_url="https://www.suse.com/security/cve/CVE-2024-46706/" source="CVE"/>
		<reference ref_id="CVE-2024-46707" ref_url="https://www.suse.com/security/cve/CVE-2024-46707/" source="CVE"/>
		<reference ref_id="CVE-2024-46709" ref_url="https://www.suse.com/security/cve/CVE-2024-46709/" source="CVE"/>
		<reference ref_id="CVE-2024-46710" ref_url="https://www.suse.com/security/cve/CVE-2024-46710/" source="CVE"/>
		<reference ref_id="CVE-2024-46714" ref_url="https://www.suse.com/security/cve/CVE-2024-46714/" source="CVE"/>
		<reference ref_id="CVE-2024-46715" ref_url="https://www.suse.com/security/cve/CVE-2024-46715/" source="CVE"/>
		<reference ref_id="CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716/" source="CVE"/>
		<reference ref_id="CVE-2024-46717" ref_url="https://www.suse.com/security/cve/CVE-2024-46717/" source="CVE"/>
		<reference ref_id="CVE-2024-46719" ref_url="https://www.suse.com/security/cve/CVE-2024-46719/" source="CVE"/>
		<reference ref_id="CVE-2024-46720" ref_url="https://www.suse.com/security/cve/CVE-2024-46720/" source="CVE"/>
		<reference ref_id="CVE-2024-46721" ref_url="https://www.suse.com/security/cve/CVE-2024-46721/" source="CVE"/>
		<reference ref_id="CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722/" source="CVE"/>
		<reference ref_id="CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723/" source="CVE"/>
		<reference ref_id="CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724/" source="CVE"/>
		<reference ref_id="CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725/" source="CVE"/>
		<reference ref_id="CVE-2024-46726" ref_url="https://www.suse.com/security/cve/CVE-2024-46726/" source="CVE"/>
		<reference ref_id="CVE-2024-46728" ref_url="https://www.suse.com/security/cve/CVE-2024-46728/" source="CVE"/>
		<reference ref_id="CVE-2024-46729" ref_url="https://www.suse.com/security/cve/CVE-2024-46729/" source="CVE"/>
		<reference ref_id="CVE-2024-46730" ref_url="https://www.suse.com/security/cve/CVE-2024-46730/" source="CVE"/>
		<reference ref_id="CVE-2024-46731" ref_url="https://www.suse.com/security/cve/CVE-2024-46731/" source="CVE"/>
		<reference ref_id="CVE-2024-46732" ref_url="https://www.suse.com/security/cve/CVE-2024-46732/" source="CVE"/>
		<reference ref_id="CVE-2024-46734" ref_url="https://www.suse.com/security/cve/CVE-2024-46734/" source="CVE"/>
		<reference ref_id="CVE-2024-46735" ref_url="https://www.suse.com/security/cve/CVE-2024-46735/" source="CVE"/>
		<reference ref_id="CVE-2024-46737" ref_url="https://www.suse.com/security/cve/CVE-2024-46737/" source="CVE"/>
		<reference ref_id="CVE-2024-46738" ref_url="https://www.suse.com/security/cve/CVE-2024-46738/" source="CVE"/>
		<reference ref_id="CVE-2024-46739" ref_url="https://www.suse.com/security/cve/CVE-2024-46739/" source="CVE"/>
		<reference ref_id="CVE-2024-46741" ref_url="https://www.suse.com/security/cve/CVE-2024-46741/" source="CVE"/>
		<reference ref_id="CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743/" source="CVE"/>
		<reference ref_id="CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744/" source="CVE"/>
		<reference ref_id="CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745/" source="CVE"/>
		<reference ref_id="CVE-2024-46746" ref_url="https://www.suse.com/security/cve/CVE-2024-46746/" source="CVE"/>
		<reference ref_id="CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747/" source="CVE"/>
		<reference ref_id="CVE-2024-46749" ref_url="https://www.suse.com/security/cve/CVE-2024-46749/" source="CVE"/>
		<reference ref_id="CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750/" source="CVE"/>
		<reference ref_id="CVE-2024-46751" ref_url="https://www.suse.com/security/cve/CVE-2024-46751/" source="CVE"/>
		<reference ref_id="CVE-2024-46752" ref_url="https://www.suse.com/security/cve/CVE-2024-46752/" source="CVE"/>
		<reference ref_id="CVE-2024-46753" ref_url="https://www.suse.com/security/cve/CVE-2024-46753/" source="CVE"/>
		<reference ref_id="CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754/" source="CVE"/>
		<reference ref_id="CVE-2024-46755" ref_url="https://www.suse.com/security/cve/CVE-2024-46755/" source="CVE"/>
		<reference ref_id="CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756/" source="CVE"/>
		<reference ref_id="CVE-2024-46757" ref_url="https://www.suse.com/security/cve/CVE-2024-46757/" source="CVE"/>
		<reference ref_id="CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758/" source="CVE"/>
		<reference ref_id="CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759/" source="CVE"/>
		<reference ref_id="CVE-2024-46760" ref_url="https://www.suse.com/security/cve/CVE-2024-46760/" source="CVE"/>
		<reference ref_id="CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761/" source="CVE"/>
		<reference ref_id="CVE-2024-46766" ref_url="https://www.suse.com/security/cve/CVE-2024-46766/" source="CVE"/>
		<reference ref_id="CVE-2024-46767" ref_url="https://www.suse.com/security/cve/CVE-2024-46767/" source="CVE"/>
		<reference ref_id="CVE-2024-46770" ref_url="https://www.suse.com/security/cve/CVE-2024-46770/" source="CVE"/>
		<reference ref_id="CVE-2024-46771" ref_url="https://www.suse.com/security/cve/CVE-2024-46771/" source="CVE"/>
		<reference ref_id="CVE-2024-46772" ref_url="https://www.suse.com/security/cve/CVE-2024-46772/" source="CVE"/>
		<reference ref_id="CVE-2024-46773" ref_url="https://www.suse.com/security/cve/CVE-2024-46773/" source="CVE"/>
		<reference ref_id="CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774/" source="CVE"/>
		<reference ref_id="CVE-2024-46775" ref_url="https://www.suse.com/security/cve/CVE-2024-46775/" source="CVE"/>
		<reference ref_id="CVE-2024-46776" ref_url="https://www.suse.com/security/cve/CVE-2024-46776/" source="CVE"/>
		<reference ref_id="CVE-2024-46777" ref_url="https://www.suse.com/security/cve/CVE-2024-46777/" source="CVE"/>
		<reference ref_id="CVE-2024-46778" ref_url="https://www.suse.com/security/cve/CVE-2024-46778/" source="CVE"/>
		<reference ref_id="CVE-2024-46780" ref_url="https://www.suse.com/security/cve/CVE-2024-46780/" source="CVE"/>
		<reference ref_id="CVE-2024-46781" ref_url="https://www.suse.com/security/cve/CVE-2024-46781/" source="CVE"/>
		<reference ref_id="CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783/" source="CVE"/>
		<reference ref_id="CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784/" source="CVE"/>
		<reference ref_id="CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786/" source="CVE"/>
		<reference ref_id="CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787/" source="CVE"/>
		<reference ref_id="CVE-2024-46791" ref_url="https://www.suse.com/security/cve/CVE-2024-46791/" source="CVE"/>
		<reference ref_id="CVE-2024-46794" ref_url="https://www.suse.com/security/cve/CVE-2024-46794/" source="CVE"/>
		<reference ref_id="CVE-2024-46797" ref_url="https://www.suse.com/security/cve/CVE-2024-46797/" source="CVE"/>
		<reference ref_id="CVE-2024-46798" ref_url="https://www.suse.com/security/cve/CVE-2024-46798/" source="CVE"/>
		<reference ref_id="CVE-2024-46802" ref_url="https://www.suse.com/security/cve/CVE-2024-46802/" source="CVE"/>
		<reference ref_id="CVE-2024-46803" ref_url="https://www.suse.com/security/cve/CVE-2024-46803/" source="CVE"/>
		<reference ref_id="CVE-2024-46804" ref_url="https://www.suse.com/security/cve/CVE-2024-46804/" source="CVE"/>
		<reference ref_id="CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805/" source="CVE"/>
		<reference ref_id="CVE-2024-46806" ref_url="https://www.suse.com/security/cve/CVE-2024-46806/" source="CVE"/>
		<reference ref_id="CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807/" source="CVE"/>
		<reference ref_id="CVE-2024-46809" ref_url="https://www.suse.com/security/cve/CVE-2024-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-46810" ref_url="https://www.suse.com/security/cve/CVE-2024-46810/" source="CVE"/>
		<reference ref_id="CVE-2024-46811" ref_url="https://www.suse.com/security/cve/CVE-2024-46811/" source="CVE"/>
		<reference ref_id="CVE-2024-46812" ref_url="https://www.suse.com/security/cve/CVE-2024-46812/" source="CVE"/>
		<reference ref_id="CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813/" source="CVE"/>
		<reference ref_id="CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814/" source="CVE"/>
		<reference ref_id="CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815/" source="CVE"/>
		<reference ref_id="CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816/" source="CVE"/>
		<reference ref_id="CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817/" source="CVE"/>
		<reference ref_id="CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818/" source="CVE"/>
		<reference ref_id="CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819/" source="CVE"/>
		<reference ref_id="CVE-2024-46821" ref_url="https://www.suse.com/security/cve/CVE-2024-46821/" source="CVE"/>
		<reference ref_id="CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822/" source="CVE"/>
		<reference ref_id="CVE-2024-46825" ref_url="https://www.suse.com/security/cve/CVE-2024-46825/" source="CVE"/>
		<reference ref_id="CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826/" source="CVE"/>
		<reference ref_id="CVE-2024-46827" ref_url="https://www.suse.com/security/cve/CVE-2024-46827/" source="CVE"/>
		<reference ref_id="CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828/" source="CVE"/>
		<reference ref_id="CVE-2024-46830" ref_url="https://www.suse.com/security/cve/CVE-2024-46830/" source="CVE"/>
		<reference ref_id="CVE-2024-46831" ref_url="https://www.suse.com/security/cve/CVE-2024-46831/" source="CVE"/>
		<reference ref_id="CVE-2024-46834" ref_url="https://www.suse.com/security/cve/CVE-2024-46834/" source="CVE"/>
		<reference ref_id="CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835/" source="CVE"/>
		<reference ref_id="CVE-2024-46836" ref_url="https://www.suse.com/security/cve/CVE-2024-46836/" source="CVE"/>
		<reference ref_id="CVE-2024-46840" ref_url="https://www.suse.com/security/cve/CVE-2024-46840/" source="CVE"/>
		<reference ref_id="CVE-2024-46841" ref_url="https://www.suse.com/security/cve/CVE-2024-46841/" source="CVE"/>
		<reference ref_id="CVE-2024-46842" ref_url="https://www.suse.com/security/cve/CVE-2024-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-46843" ref_url="https://www.suse.com/security/cve/CVE-2024-46843/" source="CVE"/>
		<reference ref_id="CVE-2024-46846" ref_url="https://www.suse.com/security/cve/CVE-2024-46846/" source="CVE"/>
		<reference ref_id="CVE-2024-46848" ref_url="https://www.suse.com/security/cve/CVE-2024-46848/" source="CVE"/>
		<reference ref_id="CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849/" source="CVE"/>
		<reference ref_id="CVE-2024-46851" ref_url="https://www.suse.com/security/cve/CVE-2024-46851/" source="CVE"/>
		<reference ref_id="CVE-2024-46852" ref_url="https://www.suse.com/security/cve/CVE-2024-46852/" source="CVE"/>
		<reference ref_id="CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853/" source="CVE"/>
		<reference ref_id="CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854/" source="CVE"/>
		<reference ref_id="CVE-2024-46855" ref_url="https://www.suse.com/security/cve/CVE-2024-46855/" source="CVE"/>
		<reference ref_id="CVE-2024-46857" ref_url="https://www.suse.com/security/cve/CVE-2024-46857/" source="CVE"/>
		<reference ref_id="CVE-2024-46859" ref_url="https://www.suse.com/security/cve/CVE-2024-46859/" source="CVE"/>
		<reference ref_id="CVE-2024-46860" ref_url="https://www.suse.com/security/cve/CVE-2024-46860/" source="CVE"/>
		<reference ref_id="CVE-2024-46861" ref_url="https://www.suse.com/security/cve/CVE-2024-46861/" source="CVE"/>
		<reference ref_id="CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864/" source="CVE"/>
		<reference ref_id="CVE-2024-46870" ref_url="https://www.suse.com/security/cve/CVE-2024-46870/" source="CVE"/>
		<reference ref_id="CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871/" source="CVE"/>
		<reference ref_id="CVE-2024-46896" ref_url="https://www.suse.com/security/cve/CVE-2024-46896/" source="CVE"/>
		<reference ref_id="CVE-2024-47141" ref_url="https://www.suse.com/security/cve/CVE-2024-47141/" source="CVE"/>
		<reference ref_id="CVE-2024-47143" ref_url="https://www.suse.com/security/cve/CVE-2024-47143/" source="CVE"/>
		<reference ref_id="CVE-2024-47408" ref_url="https://www.suse.com/security/cve/CVE-2024-47408/" source="CVE"/>
		<reference ref_id="CVE-2024-47658" ref_url="https://www.suse.com/security/cve/CVE-2024-47658/" source="CVE"/>
		<reference ref_id="CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660/" source="CVE"/>
		<reference ref_id="CVE-2024-47661" ref_url="https://www.suse.com/security/cve/CVE-2024-47661/" source="CVE"/>
		<reference ref_id="CVE-2024-47662" ref_url="https://www.suse.com/security/cve/CVE-2024-47662/" source="CVE"/>
		<reference ref_id="CVE-2024-47663" ref_url="https://www.suse.com/security/cve/CVE-2024-47663/" source="CVE"/>
		<reference ref_id="CVE-2024-47664" ref_url="https://www.suse.com/security/cve/CVE-2024-47664/" source="CVE"/>
		<reference ref_id="CVE-2024-47665" ref_url="https://www.suse.com/security/cve/CVE-2024-47665/" source="CVE"/>
		<reference ref_id="CVE-2024-47667" ref_url="https://www.suse.com/security/cve/CVE-2024-47667/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47669" ref_url="https://www.suse.com/security/cve/CVE-2024-47669/" source="CVE"/>
		<reference ref_id="CVE-2024-47670" ref_url="https://www.suse.com/security/cve/CVE-2024-47670/" source="CVE"/>
		<reference ref_id="CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671/" source="CVE"/>
		<reference ref_id="CVE-2024-47672" ref_url="https://www.suse.com/security/cve/CVE-2024-47672/" source="CVE"/>
		<reference ref_id="CVE-2024-47673" ref_url="https://www.suse.com/security/cve/CVE-2024-47673/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47675" ref_url="https://www.suse.com/security/cve/CVE-2024-47675/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47681" ref_url="https://www.suse.com/security/cve/CVE-2024-47681/" source="CVE"/>
		<reference ref_id="CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47686" ref_url="https://www.suse.com/security/cve/CVE-2024-47686/" source="CVE"/>
		<reference ref_id="CVE-2024-47687" ref_url="https://www.suse.com/security/cve/CVE-2024-47687/" source="CVE"/>
		<reference ref_id="CVE-2024-47688" ref_url="https://www.suse.com/security/cve/CVE-2024-47688/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693/" source="CVE"/>
		<reference ref_id="CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695/" source="CVE"/>
		<reference ref_id="CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696/" source="CVE"/>
		<reference ref_id="CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697/" source="CVE"/>
		<reference ref_id="CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698/" source="CVE"/>
		<reference ref_id="CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699/" source="CVE"/>
		<reference ref_id="CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701/" source="CVE"/>
		<reference ref_id="CVE-2024-47702" ref_url="https://www.suse.com/security/cve/CVE-2024-47702/" source="CVE"/>
		<reference ref_id="CVE-2024-47703" ref_url="https://www.suse.com/security/cve/CVE-2024-47703/" source="CVE"/>
		<reference ref_id="CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707/" source="CVE"/>
		<reference ref_id="CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47714" ref_url="https://www.suse.com/security/cve/CVE-2024-47714/" source="CVE"/>
		<reference ref_id="CVE-2024-47715" ref_url="https://www.suse.com/security/cve/CVE-2024-47715/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47719" ref_url="https://www.suse.com/security/cve/CVE-2024-47719/" source="CVE"/>
		<reference ref_id="CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720/" source="CVE"/>
		<reference ref_id="CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728/" source="CVE"/>
		<reference ref_id="CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730/" source="CVE"/>
		<reference ref_id="CVE-2024-47731" ref_url="https://www.suse.com/security/cve/CVE-2024-47731/" source="CVE"/>
		<reference ref_id="CVE-2024-47732" ref_url="https://www.suse.com/security/cve/CVE-2024-47732/" source="CVE"/>
		<reference ref_id="CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47741" ref_url="https://www.suse.com/security/cve/CVE-2024-47741/" source="CVE"/>
		<reference ref_id="CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742/" source="CVE"/>
		<reference ref_id="CVE-2024-47743" ref_url="https://www.suse.com/security/cve/CVE-2024-47743/" source="CVE"/>
		<reference ref_id="CVE-2024-47744" ref_url="https://www.suse.com/security/cve/CVE-2024-47744/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749/" source="CVE"/>
		<reference ref_id="CVE-2024-47750" ref_url="https://www.suse.com/security/cve/CVE-2024-47750/" source="CVE"/>
		<reference ref_id="CVE-2024-47751" ref_url="https://www.suse.com/security/cve/CVE-2024-47751/" source="CVE"/>
		<reference ref_id="CVE-2024-47752" ref_url="https://www.suse.com/security/cve/CVE-2024-47752/" source="CVE"/>
		<reference ref_id="CVE-2024-47753" ref_url="https://www.suse.com/security/cve/CVE-2024-47753/" source="CVE"/>
		<reference ref_id="CVE-2024-47754" ref_url="https://www.suse.com/security/cve/CVE-2024-47754/" source="CVE"/>
		<reference ref_id="CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-47794" ref_url="https://www.suse.com/security/cve/CVE-2024-47794/" source="CVE"/>
		<reference ref_id="CVE-2024-47809" ref_url="https://www.suse.com/security/cve/CVE-2024-47809/" source="CVE"/>
		<reference ref_id="CVE-2024-48873" ref_url="https://www.suse.com/security/cve/CVE-2024-48873/" source="CVE"/>
		<reference ref_id="CVE-2024-48876" ref_url="https://www.suse.com/security/cve/CVE-2024-48876/" source="CVE"/>
		<reference ref_id="CVE-2024-48881" ref_url="https://www.suse.com/security/cve/CVE-2024-48881/" source="CVE"/>
		<reference ref_id="CVE-2024-49568" ref_url="https://www.suse.com/security/cve/CVE-2024-49568/" source="CVE"/>
		<reference ref_id="CVE-2024-49569" ref_url="https://www.suse.com/security/cve/CVE-2024-49569/" source="CVE"/>
		<reference ref_id="CVE-2024-49570" ref_url="https://www.suse.com/security/cve/CVE-2024-49570/" source="CVE"/>
		<reference ref_id="CVE-2024-49571" ref_url="https://www.suse.com/security/cve/CVE-2024-49571/" source="CVE"/>
		<reference ref_id="CVE-2024-49573" ref_url="https://www.suse.com/security/cve/CVE-2024-49573/" source="CVE"/>
		<reference ref_id="CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852/" source="CVE"/>
		<reference ref_id="CVE-2024-49853" ref_url="https://www.suse.com/security/cve/CVE-2024-49853/" source="CVE"/>
		<reference ref_id="CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855/" source="CVE"/>
		<reference ref_id="CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49862" ref_url="https://www.suse.com/security/cve/CVE-2024-49862/" source="CVE"/>
		<reference ref_id="CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863/" source="CVE"/>
		<reference ref_id="CVE-2024-49864" ref_url="https://www.suse.com/security/cve/CVE-2024-49864/" source="CVE"/>
		<reference ref_id="CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871/" source="CVE"/>
		<reference ref_id="CVE-2024-49874" ref_url="https://www.suse.com/security/cve/CVE-2024-49874/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877/" source="CVE"/>
		<reference ref_id="CVE-2024-49878" ref_url="https://www.suse.com/security/cve/CVE-2024-49878/" source="CVE"/>
		<reference ref_id="CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49888" ref_url="https://www.suse.com/security/cve/CVE-2024-49888/" source="CVE"/>
		<reference ref_id="CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890/" source="CVE"/>
		<reference ref_id="CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891/" source="CVE"/>
		<reference ref_id="CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892/" source="CVE"/>
		<reference ref_id="CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894/" source="CVE"/>
		<reference ref_id="CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895/" source="CVE"/>
		<reference ref_id="CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896/" source="CVE"/>
		<reference ref_id="CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897/" source="CVE"/>
		<reference ref_id="CVE-2024-49898" ref_url="https://www.suse.com/security/cve/CVE-2024-49898/" source="CVE"/>
		<reference ref_id="CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899/" source="CVE"/>
		<reference ref_id="CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900/" source="CVE"/>
		<reference ref_id="CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901/" source="CVE"/>
		<reference ref_id="CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902/" source="CVE"/>
		<reference ref_id="CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903/" source="CVE"/>
		<reference ref_id="CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906/" source="CVE"/>
		<reference ref_id="CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909/" source="CVE"/>
		<reference ref_id="CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911/" source="CVE"/>
		<reference ref_id="CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912/" source="CVE"/>
		<reference ref_id="CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913/" source="CVE"/>
		<reference ref_id="CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914/" source="CVE"/>
		<reference ref_id="CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917/" source="CVE"/>
		<reference ref_id="CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918/" source="CVE"/>
		<reference ref_id="CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919/" source="CVE"/>
		<reference ref_id="CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920/" source="CVE"/>
		<reference ref_id="CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921/" source="CVE"/>
		<reference ref_id="CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922/" source="CVE"/>
		<reference ref_id="CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49928" ref_url="https://www.suse.com/security/cve/CVE-2024-49928/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49931" ref_url="https://www.suse.com/security/cve/CVE-2024-49931/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49937" ref_url="https://www.suse.com/security/cve/CVE-2024-49937/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49953" ref_url="https://www.suse.com/security/cve/CVE-2024-49953/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955/" source="CVE"/>
		<reference ref_id="CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957/" source="CVE"/>
		<reference ref_id="CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49961" ref_url="https://www.suse.com/security/cve/CVE-2024-49961/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963/" source="CVE"/>
		<reference ref_id="CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965/" source="CVE"/>
		<reference ref_id="CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49972" ref_url="https://www.suse.com/security/cve/CVE-2024-49972/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985/" source="CVE"/>
		<reference ref_id="CVE-2024-49986" ref_url="https://www.suse.com/security/cve/CVE-2024-49986/" source="CVE"/>
		<reference ref_id="CVE-2024-49987" ref_url="https://www.suse.com/security/cve/CVE-2024-49987/" source="CVE"/>
		<reference ref_id="CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996/" source="CVE"/>
		<reference ref_id="CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000/" source="CVE"/>
		<reference ref_id="CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003/" source="CVE"/>
		<reference ref_id="CVE-2024-50004" ref_url="https://www.suse.com/security/cve/CVE-2024-50004/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50012" ref_url="https://www.suse.com/security/cve/CVE-2024-50012/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50015" ref_url="https://www.suse.com/security/cve/CVE-2024-50015/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50020" ref_url="https://www.suse.com/security/cve/CVE-2024-50020/" source="CVE"/>
		<reference ref_id="CVE-2024-50021" ref_url="https://www.suse.com/security/cve/CVE-2024-50021/" source="CVE"/>
		<reference ref_id="CVE-2024-50022" ref_url="https://www.suse.com/security/cve/CVE-2024-50022/" source="CVE"/>
		<reference ref_id="CVE-2024-50023" ref_url="https://www.suse.com/security/cve/CVE-2024-50023/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025/" source="CVE"/>
		<reference ref_id="CVE-2024-50027" ref_url="https://www.suse.com/security/cve/CVE-2024-50027/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50040" ref_url="https://www.suse.com/security/cve/CVE-2024-50040/" source="CVE"/>
		<reference ref_id="CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041/" source="CVE"/>
		<reference ref_id="CVE-2024-50042" ref_url="https://www.suse.com/security/cve/CVE-2024-50042/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048/" source="CVE"/>
		<reference ref_id="CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049/" source="CVE"/>
		<reference ref_id="CVE-2024-50051" ref_url="https://www.suse.com/security/cve/CVE-2024-50051/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059/" source="CVE"/>
		<reference ref_id="CVE-2024-50060" ref_url="https://www.suse.com/security/cve/CVE-2024-50060/" source="CVE"/>
		<reference ref_id="CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061/" source="CVE"/>
		<reference ref_id="CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062/" source="CVE"/>
		<reference ref_id="CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063/" source="CVE"/>
		<reference ref_id="CVE-2024-50064" ref_url="https://www.suse.com/security/cve/CVE-2024-50064/" source="CVE"/>
		<reference ref_id="CVE-2024-50069" ref_url="https://www.suse.com/security/cve/CVE-2024-50069/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50075" ref_url="https://www.suse.com/security/cve/CVE-2024-50075/" source="CVE"/>
		<reference ref_id="CVE-2024-50076" ref_url="https://www.suse.com/security/cve/CVE-2024-50076/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50080" ref_url="https://www.suse.com/security/cve/CVE-2024-50080/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50084" ref_url="https://www.suse.com/security/cve/CVE-2024-50084/" source="CVE"/>
		<reference ref_id="CVE-2024-50087" ref_url="https://www.suse.com/security/cve/CVE-2024-50087/" source="CVE"/>
		<reference ref_id="CVE-2024-50088" ref_url="https://www.suse.com/security/cve/CVE-2024-50088/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50130" ref_url="https://www.suse.com/security/cve/CVE-2024-50130/" source="CVE"/>
		<reference ref_id="CVE-2024-50139" ref_url="https://www.suse.com/security/cve/CVE-2024-50139/" source="CVE"/>
		<reference ref_id="CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50228" ref_url="https://www.suse.com/security/cve/CVE-2024-50228/" source="CVE"/>
		<reference ref_id="CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230/" source="CVE"/>
		<reference ref_id="CVE-2024-50250" ref_url="https://www.suse.com/security/cve/CVE-2024-50250/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-51729" ref_url="https://www.suse.com/security/cve/CVE-2024-51729/" source="CVE"/>
		<reference ref_id="CVE-2024-52319" ref_url="https://www.suse.com/security/cve/CVE-2024-52319/" source="CVE"/>
		<reference ref_id="CVE-2024-52332" ref_url="https://www.suse.com/security/cve/CVE-2024-52332/" source="CVE"/>
		<reference ref_id="CVE-2024-52559" ref_url="https://www.suse.com/security/cve/CVE-2024-52559/" source="CVE"/>
		<reference ref_id="CVE-2024-53103" ref_url="https://www.suse.com/security/cve/CVE-2024-53103/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<reference ref_id="CVE-2024-53142" ref_url="https://www.suse.com/security/cve/CVE-2024-53142/" source="CVE"/>
		<reference ref_id="CVE-2024-53143" ref_url="https://www.suse.com/security/cve/CVE-2024-53143/" source="CVE"/>
		<reference ref_id="CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146/" source="CVE"/>
		<reference ref_id="CVE-2024-53147" ref_url="https://www.suse.com/security/cve/CVE-2024-53147/" source="CVE"/>
		<reference ref_id="CVE-2024-53148" ref_url="https://www.suse.com/security/cve/CVE-2024-53148/" source="CVE"/>
		<reference ref_id="CVE-2024-53149" ref_url="https://www.suse.com/security/cve/CVE-2024-53149/" source="CVE"/>
		<reference ref_id="CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150/" source="CVE"/>
		<reference ref_id="CVE-2024-53151" ref_url="https://www.suse.com/security/cve/CVE-2024-53151/" source="CVE"/>
		<reference ref_id="CVE-2024-53152" ref_url="https://www.suse.com/security/cve/CVE-2024-53152/" source="CVE"/>
		<reference ref_id="CVE-2024-53153" ref_url="https://www.suse.com/security/cve/CVE-2024-53153/" source="CVE"/>
		<reference ref_id="CVE-2024-53154" ref_url="https://www.suse.com/security/cve/CVE-2024-53154/" source="CVE"/>
		<reference ref_id="CVE-2024-53155" ref_url="https://www.suse.com/security/cve/CVE-2024-53155/" source="CVE"/>
		<reference ref_id="CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156/" source="CVE"/>
		<reference ref_id="CVE-2024-53157" ref_url="https://www.suse.com/security/cve/CVE-2024-53157/" source="CVE"/>
		<reference ref_id="CVE-2024-53158" ref_url="https://www.suse.com/security/cve/CVE-2024-53158/" source="CVE"/>
		<reference ref_id="CVE-2024-53160" ref_url="https://www.suse.com/security/cve/CVE-2024-53160/" source="CVE"/>
		<reference ref_id="CVE-2024-53161" ref_url="https://www.suse.com/security/cve/CVE-2024-53161/" source="CVE"/>
		<reference ref_id="CVE-2024-53162" ref_url="https://www.suse.com/security/cve/CVE-2024-53162/" source="CVE"/>
		<reference ref_id="CVE-2024-53163" ref_url="https://www.suse.com/security/cve/CVE-2024-53163/" source="CVE"/>
		<reference ref_id="CVE-2024-53166" ref_url="https://www.suse.com/security/cve/CVE-2024-53166/" source="CVE"/>
		<reference ref_id="CVE-2024-53167" ref_url="https://www.suse.com/security/cve/CVE-2024-53167/" source="CVE"/>
		<reference ref_id="CVE-2024-53168" ref_url="https://www.suse.com/security/cve/CVE-2024-53168/" source="CVE"/>
		<reference ref_id="CVE-2024-53169" ref_url="https://www.suse.com/security/cve/CVE-2024-53169/" source="CVE"/>
		<reference ref_id="CVE-2024-53170" ref_url="https://www.suse.com/security/cve/CVE-2024-53170/" source="CVE"/>
		<reference ref_id="CVE-2024-53172" ref_url="https://www.suse.com/security/cve/CVE-2024-53172/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53174" ref_url="https://www.suse.com/security/cve/CVE-2024-53174/" source="CVE"/>
		<reference ref_id="CVE-2024-53175" ref_url="https://www.suse.com/security/cve/CVE-2024-53175/" source="CVE"/>
		<reference ref_id="CVE-2024-53176" ref_url="https://www.suse.com/security/cve/CVE-2024-53176/" source="CVE"/>
		<reference ref_id="CVE-2024-53177" ref_url="https://www.suse.com/security/cve/CVE-2024-53177/" source="CVE"/>
		<reference ref_id="CVE-2024-53178" ref_url="https://www.suse.com/security/cve/CVE-2024-53178/" source="CVE"/>
		<reference ref_id="CVE-2024-53179" ref_url="https://www.suse.com/security/cve/CVE-2024-53179/" source="CVE"/>
		<reference ref_id="CVE-2024-53180" ref_url="https://www.suse.com/security/cve/CVE-2024-53180/" source="CVE"/>
		<reference ref_id="CVE-2024-53182" ref_url="https://www.suse.com/security/cve/CVE-2024-53182/" source="CVE"/>
		<reference ref_id="CVE-2024-53185" ref_url="https://www.suse.com/security/cve/CVE-2024-53185/" source="CVE"/>
		<reference ref_id="CVE-2024-53187" ref_url="https://www.suse.com/security/cve/CVE-2024-53187/" source="CVE"/>
		<reference ref_id="CVE-2024-53188" ref_url="https://www.suse.com/security/cve/CVE-2024-53188/" source="CVE"/>
		<reference ref_id="CVE-2024-53189" ref_url="https://www.suse.com/security/cve/CVE-2024-53189/" source="CVE"/>
		<reference ref_id="CVE-2024-53190" ref_url="https://www.suse.com/security/cve/CVE-2024-53190/" source="CVE"/>
		<reference ref_id="CVE-2024-53191" ref_url="https://www.suse.com/security/cve/CVE-2024-53191/" source="CVE"/>
		<reference ref_id="CVE-2024-53192" ref_url="https://www.suse.com/security/cve/CVE-2024-53192/" source="CVE"/>
		<reference ref_id="CVE-2024-53193" ref_url="https://www.suse.com/security/cve/CVE-2024-53193/" source="CVE"/>
		<reference ref_id="CVE-2024-53194" ref_url="https://www.suse.com/security/cve/CVE-2024-53194/" source="CVE"/>
		<reference ref_id="CVE-2024-53195" ref_url="https://www.suse.com/security/cve/CVE-2024-53195/" source="CVE"/>
		<reference ref_id="CVE-2024-53196" ref_url="https://www.suse.com/security/cve/CVE-2024-53196/" source="CVE"/>
		<reference ref_id="CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197/" source="CVE"/>
		<reference ref_id="CVE-2024-53198" ref_url="https://www.suse.com/security/cve/CVE-2024-53198/" source="CVE"/>
		<reference ref_id="CVE-2024-53199" ref_url="https://www.suse.com/security/cve/CVE-2024-53199/" source="CVE"/>
		<reference ref_id="CVE-2024-53200" ref_url="https://www.suse.com/security/cve/CVE-2024-53200/" source="CVE"/>
		<reference ref_id="CVE-2024-53201" ref_url="https://www.suse.com/security/cve/CVE-2024-53201/" source="CVE"/>
		<reference ref_id="CVE-2024-53202" ref_url="https://www.suse.com/security/cve/CVE-2024-53202/" source="CVE"/>
		<reference ref_id="CVE-2024-53203" ref_url="https://www.suse.com/security/cve/CVE-2024-53203/" source="CVE"/>
		<reference ref_id="CVE-2024-53204" ref_url="https://www.suse.com/security/cve/CVE-2024-53204/" source="CVE"/>
		<reference ref_id="CVE-2024-53205" ref_url="https://www.suse.com/security/cve/CVE-2024-53205/" source="CVE"/>
		<reference ref_id="CVE-2024-53206" ref_url="https://www.suse.com/security/cve/CVE-2024-53206/" source="CVE"/>
		<reference ref_id="CVE-2024-53207" ref_url="https://www.suse.com/security/cve/CVE-2024-53207/" source="CVE"/>
		<reference ref_id="CVE-2024-53208" ref_url="https://www.suse.com/security/cve/CVE-2024-53208/" source="CVE"/>
		<reference ref_id="CVE-2024-53209" ref_url="https://www.suse.com/security/cve/CVE-2024-53209/" source="CVE"/>
		<reference ref_id="CVE-2024-53210" ref_url="https://www.suse.com/security/cve/CVE-2024-53210/" source="CVE"/>
		<reference ref_id="CVE-2024-53211" ref_url="https://www.suse.com/security/cve/CVE-2024-53211/" source="CVE"/>
		<reference ref_id="CVE-2024-53212" ref_url="https://www.suse.com/security/cve/CVE-2024-53212/" source="CVE"/>
		<reference ref_id="CVE-2024-53213" ref_url="https://www.suse.com/security/cve/CVE-2024-53213/" source="CVE"/>
		<reference ref_id="CVE-2024-53214" ref_url="https://www.suse.com/security/cve/CVE-2024-53214/" source="CVE"/>
		<reference ref_id="CVE-2024-53215" ref_url="https://www.suse.com/security/cve/CVE-2024-53215/" source="CVE"/>
		<reference ref_id="CVE-2024-53216" ref_url="https://www.suse.com/security/cve/CVE-2024-53216/" source="CVE"/>
		<reference ref_id="CVE-2024-53217" ref_url="https://www.suse.com/security/cve/CVE-2024-53217/" source="CVE"/>
		<reference ref_id="CVE-2024-53219" ref_url="https://www.suse.com/security/cve/CVE-2024-53219/" source="CVE"/>
		<reference ref_id="CVE-2024-53222" ref_url="https://www.suse.com/security/cve/CVE-2024-53222/" source="CVE"/>
		<reference ref_id="CVE-2024-53223" ref_url="https://www.suse.com/security/cve/CVE-2024-53223/" source="CVE"/>
		<reference ref_id="CVE-2024-53224" ref_url="https://www.suse.com/security/cve/CVE-2024-53224/" source="CVE"/>
		<reference ref_id="CVE-2024-53225" ref_url="https://www.suse.com/security/cve/CVE-2024-53225/" source="CVE"/>
		<reference ref_id="CVE-2024-53226" ref_url="https://www.suse.com/security/cve/CVE-2024-53226/" source="CVE"/>
		<reference ref_id="CVE-2024-53227" ref_url="https://www.suse.com/security/cve/CVE-2024-53227/" source="CVE"/>
		<reference ref_id="CVE-2024-53228" ref_url="https://www.suse.com/security/cve/CVE-2024-53228/" source="CVE"/>
		<reference ref_id="CVE-2024-53229" ref_url="https://www.suse.com/security/cve/CVE-2024-53229/" source="CVE"/>
		<reference ref_id="CVE-2024-53230" ref_url="https://www.suse.com/security/cve/CVE-2024-53230/" source="CVE"/>
		<reference ref_id="CVE-2024-53231" ref_url="https://www.suse.com/security/cve/CVE-2024-53231/" source="CVE"/>
		<reference ref_id="CVE-2024-53232" ref_url="https://www.suse.com/security/cve/CVE-2024-53232/" source="CVE"/>
		<reference ref_id="CVE-2024-53233" ref_url="https://www.suse.com/security/cve/CVE-2024-53233/" source="CVE"/>
		<reference ref_id="CVE-2024-53234" ref_url="https://www.suse.com/security/cve/CVE-2024-53234/" source="CVE"/>
		<reference ref_id="CVE-2024-53235" ref_url="https://www.suse.com/security/cve/CVE-2024-53235/" source="CVE"/>
		<reference ref_id="CVE-2024-53236" ref_url="https://www.suse.com/security/cve/CVE-2024-53236/" source="CVE"/>
		<reference ref_id="CVE-2024-53237" ref_url="https://www.suse.com/security/cve/CVE-2024-53237/" source="CVE"/>
		<reference ref_id="CVE-2024-53238" ref_url="https://www.suse.com/security/cve/CVE-2024-53238/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-53240" ref_url="https://www.suse.com/security/cve/CVE-2024-53240/" source="CVE"/>
		<reference ref_id="CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241/" source="CVE"/>
		<reference ref_id="CVE-2024-53680" ref_url="https://www.suse.com/security/cve/CVE-2024-53680/" source="CVE"/>
		<reference ref_id="CVE-2024-53681" ref_url="https://www.suse.com/security/cve/CVE-2024-53681/" source="CVE"/>
		<reference ref_id="CVE-2024-53682" ref_url="https://www.suse.com/security/cve/CVE-2024-53682/" source="CVE"/>
		<reference ref_id="CVE-2024-53685" ref_url="https://www.suse.com/security/cve/CVE-2024-53685/" source="CVE"/>
		<reference ref_id="CVE-2024-54191" ref_url="https://www.suse.com/security/cve/CVE-2024-54191/" source="CVE"/>
		<reference ref_id="CVE-2024-54193" ref_url="https://www.suse.com/security/cve/CVE-2024-54193/" source="CVE"/>
		<reference ref_id="CVE-2024-54455" ref_url="https://www.suse.com/security/cve/CVE-2024-54455/" source="CVE"/>
		<reference ref_id="CVE-2024-54456" ref_url="https://www.suse.com/security/cve/CVE-2024-54456/" source="CVE"/>
		<reference ref_id="CVE-2024-54458" ref_url="https://www.suse.com/security/cve/CVE-2024-54458/" source="CVE"/>
		<reference ref_id="CVE-2024-54460" ref_url="https://www.suse.com/security/cve/CVE-2024-54460/" source="CVE"/>
		<reference ref_id="CVE-2024-54680" ref_url="https://www.suse.com/security/cve/CVE-2024-54680/" source="CVE"/>
		<reference ref_id="CVE-2024-54683" ref_url="https://www.suse.com/security/cve/CVE-2024-54683/" source="CVE"/>
		<reference ref_id="CVE-2024-55639" ref_url="https://www.suse.com/security/cve/CVE-2024-55639/" source="CVE"/>
		<reference ref_id="CVE-2024-55641" ref_url="https://www.suse.com/security/cve/CVE-2024-55641/" source="CVE"/>
		<reference ref_id="CVE-2024-55642" ref_url="https://www.suse.com/security/cve/CVE-2024-55642/" source="CVE"/>
		<reference ref_id="CVE-2024-55881" ref_url="https://www.suse.com/security/cve/CVE-2024-55881/" source="CVE"/>
		<reference ref_id="CVE-2024-55916" ref_url="https://www.suse.com/security/cve/CVE-2024-55916/" source="CVE"/>
		<reference ref_id="CVE-2024-56368" ref_url="https://www.suse.com/security/cve/CVE-2024-56368/" source="CVE"/>
		<reference ref_id="CVE-2024-56369" ref_url="https://www.suse.com/security/cve/CVE-2024-56369/" source="CVE"/>
		<reference ref_id="CVE-2024-56372" ref_url="https://www.suse.com/security/cve/CVE-2024-56372/" source="CVE"/>
		<reference ref_id="CVE-2024-56531" ref_url="https://www.suse.com/security/cve/CVE-2024-56531/" source="CVE"/>
		<reference ref_id="CVE-2024-56532" ref_url="https://www.suse.com/security/cve/CVE-2024-56532/" source="CVE"/>
		<reference ref_id="CVE-2024-56533" ref_url="https://www.suse.com/security/cve/CVE-2024-56533/" source="CVE"/>
		<reference ref_id="CVE-2024-56534" ref_url="https://www.suse.com/security/cve/CVE-2024-56534/" source="CVE"/>
		<reference ref_id="CVE-2024-56535" ref_url="https://www.suse.com/security/cve/CVE-2024-56535/" source="CVE"/>
		<reference ref_id="CVE-2024-56536" ref_url="https://www.suse.com/security/cve/CVE-2024-56536/" source="CVE"/>
		<reference ref_id="CVE-2024-56537" ref_url="https://www.suse.com/security/cve/CVE-2024-56537/" source="CVE"/>
		<reference ref_id="CVE-2024-56538" ref_url="https://www.suse.com/security/cve/CVE-2024-56538/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56540" ref_url="https://www.suse.com/security/cve/CVE-2024-56540/" source="CVE"/>
		<reference ref_id="CVE-2024-56541" ref_url="https://www.suse.com/security/cve/CVE-2024-56541/" source="CVE"/>
		<reference ref_id="CVE-2024-56542" ref_url="https://www.suse.com/security/cve/CVE-2024-56542/" source="CVE"/>
		<reference ref_id="CVE-2024-56543" ref_url="https://www.suse.com/security/cve/CVE-2024-56543/" source="CVE"/>
		<reference ref_id="CVE-2024-56544" ref_url="https://www.suse.com/security/cve/CVE-2024-56544/" source="CVE"/>
		<reference ref_id="CVE-2024-56545" ref_url="https://www.suse.com/security/cve/CVE-2024-56545/" source="CVE"/>
		<reference ref_id="CVE-2024-56546" ref_url="https://www.suse.com/security/cve/CVE-2024-56546/" source="CVE"/>
		<reference ref_id="CVE-2024-56549" ref_url="https://www.suse.com/security/cve/CVE-2024-56549/" source="CVE"/>
		<reference ref_id="CVE-2024-56550" ref_url="https://www.suse.com/security/cve/CVE-2024-56550/" source="CVE"/>
		<reference ref_id="CVE-2024-56551" ref_url="https://www.suse.com/security/cve/CVE-2024-56551/" source="CVE"/>
		<reference ref_id="CVE-2024-56552" ref_url="https://www.suse.com/security/cve/CVE-2024-56552/" source="CVE"/>
		<reference ref_id="CVE-2024-56557" ref_url="https://www.suse.com/security/cve/CVE-2024-56557/" source="CVE"/>
		<reference ref_id="CVE-2024-56558" ref_url="https://www.suse.com/security/cve/CVE-2024-56558/" source="CVE"/>
		<reference ref_id="CVE-2024-56560" ref_url="https://www.suse.com/security/cve/CVE-2024-56560/" source="CVE"/>
		<reference ref_id="CVE-2024-56561" ref_url="https://www.suse.com/security/cve/CVE-2024-56561/" source="CVE"/>
		<reference ref_id="CVE-2024-56562" ref_url="https://www.suse.com/security/cve/CVE-2024-56562/" source="CVE"/>
		<reference ref_id="CVE-2024-56563" ref_url="https://www.suse.com/security/cve/CVE-2024-56563/" source="CVE"/>
		<reference ref_id="CVE-2024-56566" ref_url="https://www.suse.com/security/cve/CVE-2024-56566/" source="CVE"/>
		<reference ref_id="CVE-2024-56567" ref_url="https://www.suse.com/security/cve/CVE-2024-56567/" source="CVE"/>
		<reference ref_id="CVE-2024-56568" ref_url="https://www.suse.com/security/cve/CVE-2024-56568/" source="CVE"/>
		<reference ref_id="CVE-2024-56569" ref_url="https://www.suse.com/security/cve/CVE-2024-56569/" source="CVE"/>
		<reference ref_id="CVE-2024-56570" ref_url="https://www.suse.com/security/cve/CVE-2024-56570/" source="CVE"/>
		<reference ref_id="CVE-2024-56571" ref_url="https://www.suse.com/security/cve/CVE-2024-56571/" source="CVE"/>
		<reference ref_id="CVE-2024-56572" ref_url="https://www.suse.com/security/cve/CVE-2024-56572/" source="CVE"/>
		<reference ref_id="CVE-2024-56573" ref_url="https://www.suse.com/security/cve/CVE-2024-56573/" source="CVE"/>
		<reference ref_id="CVE-2024-56574" ref_url="https://www.suse.com/security/cve/CVE-2024-56574/" source="CVE"/>
		<reference ref_id="CVE-2024-56575" ref_url="https://www.suse.com/security/cve/CVE-2024-56575/" source="CVE"/>
		<reference ref_id="CVE-2024-56576" ref_url="https://www.suse.com/security/cve/CVE-2024-56576/" source="CVE"/>
		<reference ref_id="CVE-2024-56577" ref_url="https://www.suse.com/security/cve/CVE-2024-56577/" source="CVE"/>
		<reference ref_id="CVE-2024-56578" ref_url="https://www.suse.com/security/cve/CVE-2024-56578/" source="CVE"/>
		<reference ref_id="CVE-2024-56579" ref_url="https://www.suse.com/security/cve/CVE-2024-56579/" source="CVE"/>
		<reference ref_id="CVE-2024-56580" ref_url="https://www.suse.com/security/cve/CVE-2024-56580/" source="CVE"/>
		<reference ref_id="CVE-2024-56582" ref_url="https://www.suse.com/security/cve/CVE-2024-56582/" source="CVE"/>
		<reference ref_id="CVE-2024-56583" ref_url="https://www.suse.com/security/cve/CVE-2024-56583/" source="CVE"/>
		<reference ref_id="CVE-2024-56584" ref_url="https://www.suse.com/security/cve/CVE-2024-56584/" source="CVE"/>
		<reference ref_id="CVE-2024-56587" ref_url="https://www.suse.com/security/cve/CVE-2024-56587/" source="CVE"/>
		<reference ref_id="CVE-2024-56588" ref_url="https://www.suse.com/security/cve/CVE-2024-56588/" source="CVE"/>
		<reference ref_id="CVE-2024-56589" ref_url="https://www.suse.com/security/cve/CVE-2024-56589/" source="CVE"/>
		<reference ref_id="CVE-2024-56590" ref_url="https://www.suse.com/security/cve/CVE-2024-56590/" source="CVE"/>
		<reference ref_id="CVE-2024-56591" ref_url="https://www.suse.com/security/cve/CVE-2024-56591/" source="CVE"/>
		<reference ref_id="CVE-2024-56592" ref_url="https://www.suse.com/security/cve/CVE-2024-56592/" source="CVE"/>
		<reference ref_id="CVE-2024-56593" ref_url="https://www.suse.com/security/cve/CVE-2024-56593/" source="CVE"/>
		<reference ref_id="CVE-2024-56594" ref_url="https://www.suse.com/security/cve/CVE-2024-56594/" source="CVE"/>
		<reference ref_id="CVE-2024-56599" ref_url="https://www.suse.com/security/cve/CVE-2024-56599/" source="CVE"/>
		<reference ref_id="CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600/" source="CVE"/>
		<reference ref_id="CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601/" source="CVE"/>
		<reference ref_id="CVE-2024-56602" ref_url="https://www.suse.com/security/cve/CVE-2024-56602/" source="CVE"/>
		<reference ref_id="CVE-2024-56603" ref_url="https://www.suse.com/security/cve/CVE-2024-56603/" source="CVE"/>
		<reference ref_id="CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-56606" ref_url="https://www.suse.com/security/cve/CVE-2024-56606/" source="CVE"/>
		<reference ref_id="CVE-2024-56607" ref_url="https://www.suse.com/security/cve/CVE-2024-56607/" source="CVE"/>
		<reference ref_id="CVE-2024-56608" ref_url="https://www.suse.com/security/cve/CVE-2024-56608/" source="CVE"/>
		<reference ref_id="CVE-2024-56609" ref_url="https://www.suse.com/security/cve/CVE-2024-56609/" source="CVE"/>
		<reference ref_id="CVE-2024-56610" ref_url="https://www.suse.com/security/cve/CVE-2024-56610/" source="CVE"/>
		<reference ref_id="CVE-2024-56611" ref_url="https://www.suse.com/security/cve/CVE-2024-56611/" source="CVE"/>
		<reference ref_id="CVE-2024-56612" ref_url="https://www.suse.com/security/cve/CVE-2024-56612/" source="CVE"/>
		<reference ref_id="CVE-2024-56613" ref_url="https://www.suse.com/security/cve/CVE-2024-56613/" source="CVE"/>
		<reference ref_id="CVE-2024-56614" ref_url="https://www.suse.com/security/cve/CVE-2024-56614/" source="CVE"/>
		<reference ref_id="CVE-2024-56615" ref_url="https://www.suse.com/security/cve/CVE-2024-56615/" source="CVE"/>
		<reference ref_id="CVE-2024-56616" ref_url="https://www.suse.com/security/cve/CVE-2024-56616/" source="CVE"/>
		<reference ref_id="CVE-2024-56617" ref_url="https://www.suse.com/security/cve/CVE-2024-56617/" source="CVE"/>
		<reference ref_id="CVE-2024-56618" ref_url="https://www.suse.com/security/cve/CVE-2024-56618/" source="CVE"/>
		<reference ref_id="CVE-2024-56620" ref_url="https://www.suse.com/security/cve/CVE-2024-56620/" source="CVE"/>
		<reference ref_id="CVE-2024-56621" ref_url="https://www.suse.com/security/cve/CVE-2024-56621/" source="CVE"/>
		<reference ref_id="CVE-2024-56622" ref_url="https://www.suse.com/security/cve/CVE-2024-56622/" source="CVE"/>
		<reference ref_id="CVE-2024-56623" ref_url="https://www.suse.com/security/cve/CVE-2024-56623/" source="CVE"/>
		<reference ref_id="CVE-2024-56624" ref_url="https://www.suse.com/security/cve/CVE-2024-56624/" source="CVE"/>
		<reference ref_id="CVE-2024-56625" ref_url="https://www.suse.com/security/cve/CVE-2024-56625/" source="CVE"/>
		<reference ref_id="CVE-2024-56629" ref_url="https://www.suse.com/security/cve/CVE-2024-56629/" source="CVE"/>
		<reference ref_id="CVE-2024-56630" ref_url="https://www.suse.com/security/cve/CVE-2024-56630/" source="CVE"/>
		<reference ref_id="CVE-2024-56631" ref_url="https://www.suse.com/security/cve/CVE-2024-56631/" source="CVE"/>
		<reference ref_id="CVE-2024-56632" ref_url="https://www.suse.com/security/cve/CVE-2024-56632/" source="CVE"/>
		<reference ref_id="CVE-2024-56633" ref_url="https://www.suse.com/security/cve/CVE-2024-56633/" source="CVE"/>
		<reference ref_id="CVE-2024-56634" ref_url="https://www.suse.com/security/cve/CVE-2024-56634/" source="CVE"/>
		<reference ref_id="CVE-2024-56635" ref_url="https://www.suse.com/security/cve/CVE-2024-56635/" source="CVE"/>
		<reference ref_id="CVE-2024-56636" ref_url="https://www.suse.com/security/cve/CVE-2024-56636/" source="CVE"/>
		<reference ref_id="CVE-2024-56637" ref_url="https://www.suse.com/security/cve/CVE-2024-56637/" source="CVE"/>
		<reference ref_id="CVE-2024-56638" ref_url="https://www.suse.com/security/cve/CVE-2024-56638/" source="CVE"/>
		<reference ref_id="CVE-2024-56639" ref_url="https://www.suse.com/security/cve/CVE-2024-56639/" source="CVE"/>
		<reference ref_id="CVE-2024-56640" ref_url="https://www.suse.com/security/cve/CVE-2024-56640/" source="CVE"/>
		<reference ref_id="CVE-2024-56641" ref_url="https://www.suse.com/security/cve/CVE-2024-56641/" source="CVE"/>
		<reference ref_id="CVE-2024-56642" ref_url="https://www.suse.com/security/cve/CVE-2024-56642/" source="CVE"/>
		<reference ref_id="CVE-2024-56643" ref_url="https://www.suse.com/security/cve/CVE-2024-56643/" source="CVE"/>
		<reference ref_id="CVE-2024-56644" ref_url="https://www.suse.com/security/cve/CVE-2024-56644/" source="CVE"/>
		<reference ref_id="CVE-2024-56645" ref_url="https://www.suse.com/security/cve/CVE-2024-56645/" source="CVE"/>
		<reference ref_id="CVE-2024-56646" ref_url="https://www.suse.com/security/cve/CVE-2024-56646/" source="CVE"/>
		<reference ref_id="CVE-2024-56647" ref_url="https://www.suse.com/security/cve/CVE-2024-56647/" source="CVE"/>
		<reference ref_id="CVE-2024-56648" ref_url="https://www.suse.com/security/cve/CVE-2024-56648/" source="CVE"/>
		<reference ref_id="CVE-2024-56649" ref_url="https://www.suse.com/security/cve/CVE-2024-56649/" source="CVE"/>
		<reference ref_id="CVE-2024-56650" ref_url="https://www.suse.com/security/cve/CVE-2024-56650/" source="CVE"/>
		<reference ref_id="CVE-2024-56651" ref_url="https://www.suse.com/security/cve/CVE-2024-56651/" source="CVE"/>
		<reference ref_id="CVE-2024-56652" ref_url="https://www.suse.com/security/cve/CVE-2024-56652/" source="CVE"/>
		<reference ref_id="CVE-2024-56653" ref_url="https://www.suse.com/security/cve/CVE-2024-56653/" source="CVE"/>
		<reference ref_id="CVE-2024-56654" ref_url="https://www.suse.com/security/cve/CVE-2024-56654/" source="CVE"/>
		<reference ref_id="CVE-2024-56655" ref_url="https://www.suse.com/security/cve/CVE-2024-56655/" source="CVE"/>
		<reference ref_id="CVE-2024-56656" ref_url="https://www.suse.com/security/cve/CVE-2024-56656/" source="CVE"/>
		<reference ref_id="CVE-2024-56657" ref_url="https://www.suse.com/security/cve/CVE-2024-56657/" source="CVE"/>
		<reference ref_id="CVE-2024-56658" ref_url="https://www.suse.com/security/cve/CVE-2024-56658/" source="CVE"/>
		<reference ref_id="CVE-2024-56659" ref_url="https://www.suse.com/security/cve/CVE-2024-56659/" source="CVE"/>
		<reference ref_id="CVE-2024-56660" ref_url="https://www.suse.com/security/cve/CVE-2024-56660/" source="CVE"/>
		<reference ref_id="CVE-2024-56661" ref_url="https://www.suse.com/security/cve/CVE-2024-56661/" source="CVE"/>
		<reference ref_id="CVE-2024-56662" ref_url="https://www.suse.com/security/cve/CVE-2024-56662/" source="CVE"/>
		<reference ref_id="CVE-2024-56663" ref_url="https://www.suse.com/security/cve/CVE-2024-56663/" source="CVE"/>
		<reference ref_id="CVE-2024-56664" ref_url="https://www.suse.com/security/cve/CVE-2024-56664/" source="CVE"/>
		<reference ref_id="CVE-2024-56665" ref_url="https://www.suse.com/security/cve/CVE-2024-56665/" source="CVE"/>
		<reference ref_id="CVE-2024-56666" ref_url="https://www.suse.com/security/cve/CVE-2024-56666/" source="CVE"/>
		<reference ref_id="CVE-2024-56667" ref_url="https://www.suse.com/security/cve/CVE-2024-56667/" source="CVE"/>
		<reference ref_id="CVE-2024-56668" ref_url="https://www.suse.com/security/cve/CVE-2024-56668/" source="CVE"/>
		<reference ref_id="CVE-2024-56669" ref_url="https://www.suse.com/security/cve/CVE-2024-56669/" source="CVE"/>
		<reference ref_id="CVE-2024-56670" ref_url="https://www.suse.com/security/cve/CVE-2024-56670/" source="CVE"/>
		<reference ref_id="CVE-2024-56671" ref_url="https://www.suse.com/security/cve/CVE-2024-56671/" source="CVE"/>
		<reference ref_id="CVE-2024-56672" ref_url="https://www.suse.com/security/cve/CVE-2024-56672/" source="CVE"/>
		<reference ref_id="CVE-2024-56674" ref_url="https://www.suse.com/security/cve/CVE-2024-56674/" source="CVE"/>
		<reference ref_id="CVE-2024-56675" ref_url="https://www.suse.com/security/cve/CVE-2024-56675/" source="CVE"/>
		<reference ref_id="CVE-2024-56676" ref_url="https://www.suse.com/security/cve/CVE-2024-56676/" source="CVE"/>
		<reference ref_id="CVE-2024-56677" ref_url="https://www.suse.com/security/cve/CVE-2024-56677/" source="CVE"/>
		<reference ref_id="CVE-2024-56678" ref_url="https://www.suse.com/security/cve/CVE-2024-56678/" source="CVE"/>
		<reference ref_id="CVE-2024-56679" ref_url="https://www.suse.com/security/cve/CVE-2024-56679/" source="CVE"/>
		<reference ref_id="CVE-2024-56680" ref_url="https://www.suse.com/security/cve/CVE-2024-56680/" source="CVE"/>
		<reference ref_id="CVE-2024-56681" ref_url="https://www.suse.com/security/cve/CVE-2024-56681/" source="CVE"/>
		<reference ref_id="CVE-2024-56682" ref_url="https://www.suse.com/security/cve/CVE-2024-56682/" source="CVE"/>
		<reference ref_id="CVE-2024-56683" ref_url="https://www.suse.com/security/cve/CVE-2024-56683/" source="CVE"/>
		<reference ref_id="CVE-2024-56684" ref_url="https://www.suse.com/security/cve/CVE-2024-56684/" source="CVE"/>
		<reference ref_id="CVE-2024-56685" ref_url="https://www.suse.com/security/cve/CVE-2024-56685/" source="CVE"/>
		<reference ref_id="CVE-2024-56687" ref_url="https://www.suse.com/security/cve/CVE-2024-56687/" source="CVE"/>
		<reference ref_id="CVE-2024-56688" ref_url="https://www.suse.com/security/cve/CVE-2024-56688/" source="CVE"/>
		<reference ref_id="CVE-2024-56689" ref_url="https://www.suse.com/security/cve/CVE-2024-56689/" source="CVE"/>
		<reference ref_id="CVE-2024-56690" ref_url="https://www.suse.com/security/cve/CVE-2024-56690/" source="CVE"/>
		<reference ref_id="CVE-2024-56691" ref_url="https://www.suse.com/security/cve/CVE-2024-56691/" source="CVE"/>
		<reference ref_id="CVE-2024-56693" ref_url="https://www.suse.com/security/cve/CVE-2024-56693/" source="CVE"/>
		<reference ref_id="CVE-2024-56694" ref_url="https://www.suse.com/security/cve/CVE-2024-56694/" source="CVE"/>
		<reference ref_id="CVE-2024-56695" ref_url="https://www.suse.com/security/cve/CVE-2024-56695/" source="CVE"/>
		<reference ref_id="CVE-2024-56696" ref_url="https://www.suse.com/security/cve/CVE-2024-56696/" source="CVE"/>
		<reference ref_id="CVE-2024-56697" ref_url="https://www.suse.com/security/cve/CVE-2024-56697/" source="CVE"/>
		<reference ref_id="CVE-2024-56698" ref_url="https://www.suse.com/security/cve/CVE-2024-56698/" source="CVE"/>
		<reference ref_id="CVE-2024-56699" ref_url="https://www.suse.com/security/cve/CVE-2024-56699/" source="CVE"/>
		<reference ref_id="CVE-2024-56700" ref_url="https://www.suse.com/security/cve/CVE-2024-56700/" source="CVE"/>
		<reference ref_id="CVE-2024-56701" ref_url="https://www.suse.com/security/cve/CVE-2024-56701/" source="CVE"/>
		<reference ref_id="CVE-2024-56702" ref_url="https://www.suse.com/security/cve/CVE-2024-56702/" source="CVE"/>
		<reference ref_id="CVE-2024-56703" ref_url="https://www.suse.com/security/cve/CVE-2024-56703/" source="CVE"/>
		<reference ref_id="CVE-2024-56704" ref_url="https://www.suse.com/security/cve/CVE-2024-56704/" source="CVE"/>
		<reference ref_id="CVE-2024-56705" ref_url="https://www.suse.com/security/cve/CVE-2024-56705/" source="CVE"/>
		<reference ref_id="CVE-2024-56706" ref_url="https://www.suse.com/security/cve/CVE-2024-56706/" source="CVE"/>
		<reference ref_id="CVE-2024-56707" ref_url="https://www.suse.com/security/cve/CVE-2024-56707/" source="CVE"/>
		<reference ref_id="CVE-2024-56708" ref_url="https://www.suse.com/security/cve/CVE-2024-56708/" source="CVE"/>
		<reference ref_id="CVE-2024-56709" ref_url="https://www.suse.com/security/cve/CVE-2024-56709/" source="CVE"/>
		<reference ref_id="CVE-2024-56711" ref_url="https://www.suse.com/security/cve/CVE-2024-56711/" source="CVE"/>
		<reference ref_id="CVE-2024-56712" ref_url="https://www.suse.com/security/cve/CVE-2024-56712/" source="CVE"/>
		<reference ref_id="CVE-2024-56713" ref_url="https://www.suse.com/security/cve/CVE-2024-56713/" source="CVE"/>
		<reference ref_id="CVE-2024-56714" ref_url="https://www.suse.com/security/cve/CVE-2024-56714/" source="CVE"/>
		<reference ref_id="CVE-2024-56715" ref_url="https://www.suse.com/security/cve/CVE-2024-56715/" source="CVE"/>
		<reference ref_id="CVE-2024-56716" ref_url="https://www.suse.com/security/cve/CVE-2024-56716/" source="CVE"/>
		<reference ref_id="CVE-2024-56717" ref_url="https://www.suse.com/security/cve/CVE-2024-56717/" source="CVE"/>
		<reference ref_id="CVE-2024-56718" ref_url="https://www.suse.com/security/cve/CVE-2024-56718/" source="CVE"/>
		<reference ref_id="CVE-2024-56719" ref_url="https://www.suse.com/security/cve/CVE-2024-56719/" source="CVE"/>
		<reference ref_id="CVE-2024-56720" ref_url="https://www.suse.com/security/cve/CVE-2024-56720/" source="CVE"/>
		<reference ref_id="CVE-2024-56721" ref_url="https://www.suse.com/security/cve/CVE-2024-56721/" source="CVE"/>
		<reference ref_id="CVE-2024-56722" ref_url="https://www.suse.com/security/cve/CVE-2024-56722/" source="CVE"/>
		<reference ref_id="CVE-2024-56723" ref_url="https://www.suse.com/security/cve/CVE-2024-56723/" source="CVE"/>
		<reference ref_id="CVE-2024-56724" ref_url="https://www.suse.com/security/cve/CVE-2024-56724/" source="CVE"/>
		<reference ref_id="CVE-2024-56725" ref_url="https://www.suse.com/security/cve/CVE-2024-56725/" source="CVE"/>
		<reference ref_id="CVE-2024-56726" ref_url="https://www.suse.com/security/cve/CVE-2024-56726/" source="CVE"/>
		<reference ref_id="CVE-2024-56727" ref_url="https://www.suse.com/security/cve/CVE-2024-56727/" source="CVE"/>
		<reference ref_id="CVE-2024-56728" ref_url="https://www.suse.com/security/cve/CVE-2024-56728/" source="CVE"/>
		<reference ref_id="CVE-2024-56729" ref_url="https://www.suse.com/security/cve/CVE-2024-56729/" source="CVE"/>
		<reference ref_id="CVE-2024-56730" ref_url="https://www.suse.com/security/cve/CVE-2024-56730/" source="CVE"/>
		<reference ref_id="CVE-2024-56739" ref_url="https://www.suse.com/security/cve/CVE-2024-56739/" source="CVE"/>
		<reference ref_id="CVE-2024-56740" ref_url="https://www.suse.com/security/cve/CVE-2024-56740/" source="CVE"/>
		<reference ref_id="CVE-2024-56741" ref_url="https://www.suse.com/security/cve/CVE-2024-56741/" source="CVE"/>
		<reference ref_id="CVE-2024-56742" ref_url="https://www.suse.com/security/cve/CVE-2024-56742/" source="CVE"/>
		<reference ref_id="CVE-2024-56743" ref_url="https://www.suse.com/security/cve/CVE-2024-56743/" source="CVE"/>
		<reference ref_id="CVE-2024-56745" ref_url="https://www.suse.com/security/cve/CVE-2024-56745/" source="CVE"/>
		<reference ref_id="CVE-2024-56746" ref_url="https://www.suse.com/security/cve/CVE-2024-56746/" source="CVE"/>
		<reference ref_id="CVE-2024-56747" ref_url="https://www.suse.com/security/cve/CVE-2024-56747/" source="CVE"/>
		<reference ref_id="CVE-2024-56748" ref_url="https://www.suse.com/security/cve/CVE-2024-56748/" source="CVE"/>
		<reference ref_id="CVE-2024-56749" ref_url="https://www.suse.com/security/cve/CVE-2024-56749/" source="CVE"/>
		<reference ref_id="CVE-2024-56750" ref_url="https://www.suse.com/security/cve/CVE-2024-56750/" source="CVE"/>
		<reference ref_id="CVE-2024-56751" ref_url="https://www.suse.com/security/cve/CVE-2024-56751/" source="CVE"/>
		<reference ref_id="CVE-2024-56752" ref_url="https://www.suse.com/security/cve/CVE-2024-56752/" source="CVE"/>
		<reference ref_id="CVE-2024-56753" ref_url="https://www.suse.com/security/cve/CVE-2024-56753/" source="CVE"/>
		<reference ref_id="CVE-2024-56754" ref_url="https://www.suse.com/security/cve/CVE-2024-56754/" source="CVE"/>
		<reference ref_id="CVE-2024-56755" ref_url="https://www.suse.com/security/cve/CVE-2024-56755/" source="CVE"/>
		<reference ref_id="CVE-2024-56756" ref_url="https://www.suse.com/security/cve/CVE-2024-56756/" source="CVE"/>
		<reference ref_id="CVE-2024-56757" ref_url="https://www.suse.com/security/cve/CVE-2024-56757/" source="CVE"/>
		<reference ref_id="CVE-2024-56758" ref_url="https://www.suse.com/security/cve/CVE-2024-56758/" source="CVE"/>
		<reference ref_id="CVE-2024-56759" ref_url="https://www.suse.com/security/cve/CVE-2024-56759/" source="CVE"/>
		<reference ref_id="CVE-2024-56760" ref_url="https://www.suse.com/security/cve/CVE-2024-56760/" source="CVE"/>
		<reference ref_id="CVE-2024-56761" ref_url="https://www.suse.com/security/cve/CVE-2024-56761/" source="CVE"/>
		<reference ref_id="CVE-2024-56763" ref_url="https://www.suse.com/security/cve/CVE-2024-56763/" source="CVE"/>
		<reference ref_id="CVE-2024-56764" ref_url="https://www.suse.com/security/cve/CVE-2024-56764/" source="CVE"/>
		<reference ref_id="CVE-2024-56765" ref_url="https://www.suse.com/security/cve/CVE-2024-56765/" source="CVE"/>
		<reference ref_id="CVE-2024-56766" ref_url="https://www.suse.com/security/cve/CVE-2024-56766/" source="CVE"/>
		<reference ref_id="CVE-2024-56767" ref_url="https://www.suse.com/security/cve/CVE-2024-56767/" source="CVE"/>
		<reference ref_id="CVE-2024-56769" ref_url="https://www.suse.com/security/cve/CVE-2024-56769/" source="CVE"/>
		<reference ref_id="CVE-2024-56770" ref_url="https://www.suse.com/security/cve/CVE-2024-56770/" source="CVE"/>
		<reference ref_id="CVE-2024-56771" ref_url="https://www.suse.com/security/cve/CVE-2024-56771/" source="CVE"/>
		<reference ref_id="CVE-2024-56772" ref_url="https://www.suse.com/security/cve/CVE-2024-56772/" source="CVE"/>
		<reference ref_id="CVE-2024-56773" ref_url="https://www.suse.com/security/cve/CVE-2024-56773/" source="CVE"/>
		<reference ref_id="CVE-2024-56774" ref_url="https://www.suse.com/security/cve/CVE-2024-56774/" source="CVE"/>
		<reference ref_id="CVE-2024-56775" ref_url="https://www.suse.com/security/cve/CVE-2024-56775/" source="CVE"/>
		<reference ref_id="CVE-2024-56776" ref_url="https://www.suse.com/security/cve/CVE-2024-56776/" source="CVE"/>
		<reference ref_id="CVE-2024-56777" ref_url="https://www.suse.com/security/cve/CVE-2024-56777/" source="CVE"/>
		<reference ref_id="CVE-2024-56778" ref_url="https://www.suse.com/security/cve/CVE-2024-56778/" source="CVE"/>
		<reference ref_id="CVE-2024-56779" ref_url="https://www.suse.com/security/cve/CVE-2024-56779/" source="CVE"/>
		<reference ref_id="CVE-2024-56780" ref_url="https://www.suse.com/security/cve/CVE-2024-56780/" source="CVE"/>
		<reference ref_id="CVE-2024-56782" ref_url="https://www.suse.com/security/cve/CVE-2024-56782/" source="CVE"/>
		<reference ref_id="CVE-2024-56783" ref_url="https://www.suse.com/security/cve/CVE-2024-56783/" source="CVE"/>
		<reference ref_id="CVE-2024-56784" ref_url="https://www.suse.com/security/cve/CVE-2024-56784/" source="CVE"/>
		<reference ref_id="CVE-2024-56786" ref_url="https://www.suse.com/security/cve/CVE-2024-56786/" source="CVE"/>
		<reference ref_id="CVE-2024-56787" ref_url="https://www.suse.com/security/cve/CVE-2024-56787/" source="CVE"/>
		<reference ref_id="CVE-2024-56788" ref_url="https://www.suse.com/security/cve/CVE-2024-56788/" source="CVE"/>
		<reference ref_id="CVE-2024-57791" ref_url="https://www.suse.com/security/cve/CVE-2024-57791/" source="CVE"/>
		<reference ref_id="CVE-2024-57792" ref_url="https://www.suse.com/security/cve/CVE-2024-57792/" source="CVE"/>
		<reference ref_id="CVE-2024-57793" ref_url="https://www.suse.com/security/cve/CVE-2024-57793/" source="CVE"/>
		<reference ref_id="CVE-2024-57795" ref_url="https://www.suse.com/security/cve/CVE-2024-57795/" source="CVE"/>
		<reference ref_id="CVE-2024-57798" ref_url="https://www.suse.com/security/cve/CVE-2024-57798/" source="CVE"/>
		<reference ref_id="CVE-2024-57799" ref_url="https://www.suse.com/security/cve/CVE-2024-57799/" source="CVE"/>
		<reference ref_id="CVE-2024-57800" ref_url="https://www.suse.com/security/cve/CVE-2024-57800/" source="CVE"/>
		<reference ref_id="CVE-2024-57801" ref_url="https://www.suse.com/security/cve/CVE-2024-57801/" source="CVE"/>
		<reference ref_id="CVE-2024-57802" ref_url="https://www.suse.com/security/cve/CVE-2024-57802/" source="CVE"/>
		<reference ref_id="CVE-2024-57804" ref_url="https://www.suse.com/security/cve/CVE-2024-57804/" source="CVE"/>
		<reference ref_id="CVE-2024-57805" ref_url="https://www.suse.com/security/cve/CVE-2024-57805/" source="CVE"/>
		<reference ref_id="CVE-2024-57806" ref_url="https://www.suse.com/security/cve/CVE-2024-57806/" source="CVE"/>
		<reference ref_id="CVE-2024-57807" ref_url="https://www.suse.com/security/cve/CVE-2024-57807/" source="CVE"/>
		<reference ref_id="CVE-2024-57809" ref_url="https://www.suse.com/security/cve/CVE-2024-57809/" source="CVE"/>
		<reference ref_id="CVE-2024-57834" ref_url="https://www.suse.com/security/cve/CVE-2024-57834/" source="CVE"/>
		<reference ref_id="CVE-2024-57838" ref_url="https://www.suse.com/security/cve/CVE-2024-57838/" source="CVE"/>
		<reference ref_id="CVE-2024-57839" ref_url="https://www.suse.com/security/cve/CVE-2024-57839/" source="CVE"/>
		<reference ref_id="CVE-2024-57841" ref_url="https://www.suse.com/security/cve/CVE-2024-57841/" source="CVE"/>
		<reference ref_id="CVE-2024-57844" ref_url="https://www.suse.com/security/cve/CVE-2024-57844/" source="CVE"/>
		<reference ref_id="CVE-2024-57849" ref_url="https://www.suse.com/security/cve/CVE-2024-57849/" source="CVE"/>
		<reference ref_id="CVE-2024-57852" ref_url="https://www.suse.com/security/cve/CVE-2024-57852/" source="CVE"/>
		<reference ref_id="CVE-2024-57857" ref_url="https://www.suse.com/security/cve/CVE-2024-57857/" source="CVE"/>
		<reference ref_id="CVE-2024-57874" ref_url="https://www.suse.com/security/cve/CVE-2024-57874/" source="CVE"/>
		<reference ref_id="CVE-2024-57875" ref_url="https://www.suse.com/security/cve/CVE-2024-57875/" source="CVE"/>
		<reference ref_id="CVE-2024-57876" ref_url="https://www.suse.com/security/cve/CVE-2024-57876/" source="CVE"/>
		<reference ref_id="CVE-2024-57877" ref_url="https://www.suse.com/security/cve/CVE-2024-57877/" source="CVE"/>
		<reference ref_id="CVE-2024-57878" ref_url="https://www.suse.com/security/cve/CVE-2024-57878/" source="CVE"/>
		<reference ref_id="CVE-2024-57879" ref_url="https://www.suse.com/security/cve/CVE-2024-57879/" source="CVE"/>
		<reference ref_id="CVE-2024-57880" ref_url="https://www.suse.com/security/cve/CVE-2024-57880/" source="CVE"/>
		<reference ref_id="CVE-2024-57881" ref_url="https://www.suse.com/security/cve/CVE-2024-57881/" source="CVE"/>
		<reference ref_id="CVE-2024-57882" ref_url="https://www.suse.com/security/cve/CVE-2024-57882/" source="CVE"/>
		<reference ref_id="CVE-2024-57883" ref_url="https://www.suse.com/security/cve/CVE-2024-57883/" source="CVE"/>
		<reference ref_id="CVE-2024-57884" ref_url="https://www.suse.com/security/cve/CVE-2024-57884/" source="CVE"/>
		<reference ref_id="CVE-2024-57887" ref_url="https://www.suse.com/security/cve/CVE-2024-57887/" source="CVE"/>
		<reference ref_id="CVE-2024-57888" ref_url="https://www.suse.com/security/cve/CVE-2024-57888/" source="CVE"/>
		<reference ref_id="CVE-2024-57889" ref_url="https://www.suse.com/security/cve/CVE-2024-57889/" source="CVE"/>
		<reference ref_id="CVE-2024-57890" ref_url="https://www.suse.com/security/cve/CVE-2024-57890/" source="CVE"/>
		<reference ref_id="CVE-2024-57892" ref_url="https://www.suse.com/security/cve/CVE-2024-57892/" source="CVE"/>
		<reference ref_id="CVE-2024-57893" ref_url="https://www.suse.com/security/cve/CVE-2024-57893/" source="CVE"/>
		<reference ref_id="CVE-2024-57896" ref_url="https://www.suse.com/security/cve/CVE-2024-57896/" source="CVE"/>
		<reference ref_id="CVE-2024-57897" ref_url="https://www.suse.com/security/cve/CVE-2024-57897/" source="CVE"/>
		<reference ref_id="CVE-2024-57898" ref_url="https://www.suse.com/security/cve/CVE-2024-57898/" source="CVE"/>
		<reference ref_id="CVE-2024-57899" ref_url="https://www.suse.com/security/cve/CVE-2024-57899/" source="CVE"/>
		<reference ref_id="CVE-2024-57900" ref_url="https://www.suse.com/security/cve/CVE-2024-57900/" source="CVE"/>
		<reference ref_id="CVE-2024-57901" ref_url="https://www.suse.com/security/cve/CVE-2024-57901/" source="CVE"/>
		<reference ref_id="CVE-2024-57902" ref_url="https://www.suse.com/security/cve/CVE-2024-57902/" source="CVE"/>
		<reference ref_id="CVE-2024-57903" ref_url="https://www.suse.com/security/cve/CVE-2024-57903/" source="CVE"/>
		<reference ref_id="CVE-2024-57904" ref_url="https://www.suse.com/security/cve/CVE-2024-57904/" source="CVE"/>
		<reference ref_id="CVE-2024-57905" ref_url="https://www.suse.com/security/cve/CVE-2024-57905/" source="CVE"/>
		<reference ref_id="CVE-2024-57906" ref_url="https://www.suse.com/security/cve/CVE-2024-57906/" source="CVE"/>
		<reference ref_id="CVE-2024-57907" ref_url="https://www.suse.com/security/cve/CVE-2024-57907/" source="CVE"/>
		<reference ref_id="CVE-2024-57908" ref_url="https://www.suse.com/security/cve/CVE-2024-57908/" source="CVE"/>
		<reference ref_id="CVE-2024-57909" ref_url="https://www.suse.com/security/cve/CVE-2024-57909/" source="CVE"/>
		<reference ref_id="CVE-2024-57910" ref_url="https://www.suse.com/security/cve/CVE-2024-57910/" source="CVE"/>
		<reference ref_id="CVE-2024-57911" ref_url="https://www.suse.com/security/cve/CVE-2024-57911/" source="CVE"/>
		<reference ref_id="CVE-2024-57912" ref_url="https://www.suse.com/security/cve/CVE-2024-57912/" source="CVE"/>
		<reference ref_id="CVE-2024-57913" ref_url="https://www.suse.com/security/cve/CVE-2024-57913/" source="CVE"/>
		<reference ref_id="CVE-2024-57914" ref_url="https://www.suse.com/security/cve/CVE-2024-57914/" source="CVE"/>
		<reference ref_id="CVE-2024-57915" ref_url="https://www.suse.com/security/cve/CVE-2024-57915/" source="CVE"/>
		<reference ref_id="CVE-2024-57916" ref_url="https://www.suse.com/security/cve/CVE-2024-57916/" source="CVE"/>
		<reference ref_id="CVE-2024-57917" ref_url="https://www.suse.com/security/cve/CVE-2024-57917/" source="CVE"/>
		<reference ref_id="CVE-2024-57918" ref_url="https://www.suse.com/security/cve/CVE-2024-57918/" source="CVE"/>
		<reference ref_id="CVE-2024-57919" ref_url="https://www.suse.com/security/cve/CVE-2024-57919/" source="CVE"/>
		<reference ref_id="CVE-2024-57920" ref_url="https://www.suse.com/security/cve/CVE-2024-57920/" source="CVE"/>
		<reference ref_id="CVE-2024-57921" ref_url="https://www.suse.com/security/cve/CVE-2024-57921/" source="CVE"/>
		<reference ref_id="CVE-2024-57922" ref_url="https://www.suse.com/security/cve/CVE-2024-57922/" source="CVE"/>
		<reference ref_id="CVE-2024-57923" ref_url="https://www.suse.com/security/cve/CVE-2024-57923/" source="CVE"/>
		<reference ref_id="CVE-2024-57924" ref_url="https://www.suse.com/security/cve/CVE-2024-57924/" source="CVE"/>
		<reference ref_id="CVE-2024-57926" ref_url="https://www.suse.com/security/cve/CVE-2024-57926/" source="CVE"/>
		<reference ref_id="CVE-2024-57927" ref_url="https://www.suse.com/security/cve/CVE-2024-57927/" source="CVE"/>
		<reference ref_id="CVE-2024-57928" ref_url="https://www.suse.com/security/cve/CVE-2024-57928/" source="CVE"/>
		<reference ref_id="CVE-2024-57929" ref_url="https://www.suse.com/security/cve/CVE-2024-57929/" source="CVE"/>
		<reference ref_id="CVE-2024-57930" ref_url="https://www.suse.com/security/cve/CVE-2024-57930/" source="CVE"/>
		<reference ref_id="CVE-2024-57931" ref_url="https://www.suse.com/security/cve/CVE-2024-57931/" source="CVE"/>
		<reference ref_id="CVE-2024-57932" ref_url="https://www.suse.com/security/cve/CVE-2024-57932/" source="CVE"/>
		<reference ref_id="CVE-2024-57933" ref_url="https://www.suse.com/security/cve/CVE-2024-57933/" source="CVE"/>
		<reference ref_id="CVE-2024-57934" ref_url="https://www.suse.com/security/cve/CVE-2024-57934/" source="CVE"/>
		<reference ref_id="CVE-2024-57935" ref_url="https://www.suse.com/security/cve/CVE-2024-57935/" source="CVE"/>
		<reference ref_id="CVE-2024-57936" ref_url="https://www.suse.com/security/cve/CVE-2024-57936/" source="CVE"/>
		<reference ref_id="CVE-2024-57938" ref_url="https://www.suse.com/security/cve/CVE-2024-57938/" source="CVE"/>
		<reference ref_id="CVE-2024-57940" ref_url="https://www.suse.com/security/cve/CVE-2024-57940/" source="CVE"/>
		<reference ref_id="CVE-2024-57941" ref_url="https://www.suse.com/security/cve/CVE-2024-57941/" source="CVE"/>
		<reference ref_id="CVE-2024-57942" ref_url="https://www.suse.com/security/cve/CVE-2024-57942/" source="CVE"/>
		<reference ref_id="CVE-2024-57943" ref_url="https://www.suse.com/security/cve/CVE-2024-57943/" source="CVE"/>
		<reference ref_id="CVE-2024-57944" ref_url="https://www.suse.com/security/cve/CVE-2024-57944/" source="CVE"/>
		<reference ref_id="CVE-2024-57946" ref_url="https://www.suse.com/security/cve/CVE-2024-57946/" source="CVE"/>
		<reference ref_id="CVE-2024-57948" ref_url="https://www.suse.com/security/cve/CVE-2024-57948/" source="CVE"/>
		<reference ref_id="CVE-2024-57949" ref_url="https://www.suse.com/security/cve/CVE-2024-57949/" source="CVE"/>
		<reference ref_id="CVE-2024-57950" ref_url="https://www.suse.com/security/cve/CVE-2024-57950/" source="CVE"/>
		<reference ref_id="CVE-2024-57953" ref_url="https://www.suse.com/security/cve/CVE-2024-57953/" source="CVE"/>
		<reference ref_id="CVE-2024-57973" ref_url="https://www.suse.com/security/cve/CVE-2024-57973/" source="CVE"/>
		<reference ref_id="CVE-2024-57974" ref_url="https://www.suse.com/security/cve/CVE-2024-57974/" source="CVE"/>
		<reference ref_id="CVE-2024-57975" ref_url="https://www.suse.com/security/cve/CVE-2024-57975/" source="CVE"/>
		<reference ref_id="CVE-2024-57976" ref_url="https://www.suse.com/security/cve/CVE-2024-57976/" source="CVE"/>
		<reference ref_id="CVE-2024-57978" ref_url="https://www.suse.com/security/cve/CVE-2024-57978/" source="CVE"/>
		<reference ref_id="CVE-2024-57979" ref_url="https://www.suse.com/security/cve/CVE-2024-57979/" source="CVE"/>
		<reference ref_id="CVE-2024-57980" ref_url="https://www.suse.com/security/cve/CVE-2024-57980/" source="CVE"/>
		<reference ref_id="CVE-2024-57981" ref_url="https://www.suse.com/security/cve/CVE-2024-57981/" source="CVE"/>
		<reference ref_id="CVE-2024-57982" ref_url="https://www.suse.com/security/cve/CVE-2024-57982/" source="CVE"/>
		<reference ref_id="CVE-2024-57984" ref_url="https://www.suse.com/security/cve/CVE-2024-57984/" source="CVE"/>
		<reference ref_id="CVE-2024-57985" ref_url="https://www.suse.com/security/cve/CVE-2024-57985/" source="CVE"/>
		<reference ref_id="CVE-2024-57986" ref_url="https://www.suse.com/security/cve/CVE-2024-57986/" source="CVE"/>
		<reference ref_id="CVE-2024-57987" ref_url="https://www.suse.com/security/cve/CVE-2024-57987/" source="CVE"/>
		<reference ref_id="CVE-2024-57988" ref_url="https://www.suse.com/security/cve/CVE-2024-57988/" source="CVE"/>
		<reference ref_id="CVE-2024-57989" ref_url="https://www.suse.com/security/cve/CVE-2024-57989/" source="CVE"/>
		<reference ref_id="CVE-2024-57990" ref_url="https://www.suse.com/security/cve/CVE-2024-57990/" source="CVE"/>
		<reference ref_id="CVE-2024-57991" ref_url="https://www.suse.com/security/cve/CVE-2024-57991/" source="CVE"/>
		<reference ref_id="CVE-2024-57993" ref_url="https://www.suse.com/security/cve/CVE-2024-57993/" source="CVE"/>
		<reference ref_id="CVE-2024-57994" ref_url="https://www.suse.com/security/cve/CVE-2024-57994/" source="CVE"/>
		<reference ref_id="CVE-2024-57995" ref_url="https://www.suse.com/security/cve/CVE-2024-57995/" source="CVE"/>
		<reference ref_id="CVE-2024-57996" ref_url="https://www.suse.com/security/cve/CVE-2024-57996/" source="CVE"/>
		<reference ref_id="CVE-2024-57997" ref_url="https://www.suse.com/security/cve/CVE-2024-57997/" source="CVE"/>
		<reference ref_id="CVE-2024-57998" ref_url="https://www.suse.com/security/cve/CVE-2024-57998/" source="CVE"/>
		<reference ref_id="CVE-2024-57999" ref_url="https://www.suse.com/security/cve/CVE-2024-57999/" source="CVE"/>
		<reference ref_id="CVE-2024-58001" ref_url="https://www.suse.com/security/cve/CVE-2024-58001/" source="CVE"/>
		<reference ref_id="CVE-2024-58002" ref_url="https://www.suse.com/security/cve/CVE-2024-58002/" source="CVE"/>
		<reference ref_id="CVE-2024-58003" ref_url="https://www.suse.com/security/cve/CVE-2024-58003/" source="CVE"/>
		<reference ref_id="CVE-2024-58004" ref_url="https://www.suse.com/security/cve/CVE-2024-58004/" source="CVE"/>
		<reference ref_id="CVE-2024-58005" ref_url="https://www.suse.com/security/cve/CVE-2024-58005/" source="CVE"/>
		<reference ref_id="CVE-2024-58006" ref_url="https://www.suse.com/security/cve/CVE-2024-58006/" source="CVE"/>
		<reference ref_id="CVE-2024-58007" ref_url="https://www.suse.com/security/cve/CVE-2024-58007/" source="CVE"/>
		<reference ref_id="CVE-2024-58008" ref_url="https://www.suse.com/security/cve/CVE-2024-58008/" source="CVE"/>
		<reference ref_id="CVE-2024-58009" ref_url="https://www.suse.com/security/cve/CVE-2024-58009/" source="CVE"/>
		<reference ref_id="CVE-2024-58011" ref_url="https://www.suse.com/security/cve/CVE-2024-58011/" source="CVE"/>
		<reference ref_id="CVE-2024-58012" ref_url="https://www.suse.com/security/cve/CVE-2024-58012/" source="CVE"/>
		<reference ref_id="CVE-2024-58013" ref_url="https://www.suse.com/security/cve/CVE-2024-58013/" source="CVE"/>
		<reference ref_id="CVE-2024-58014" ref_url="https://www.suse.com/security/cve/CVE-2024-58014/" source="CVE"/>
		<reference ref_id="CVE-2024-58015" ref_url="https://www.suse.com/security/cve/CVE-2024-58015/" source="CVE"/>
		<reference ref_id="CVE-2024-58017" ref_url="https://www.suse.com/security/cve/CVE-2024-58017/" source="CVE"/>
		<reference ref_id="CVE-2024-58018" ref_url="https://www.suse.com/security/cve/CVE-2024-58018/" source="CVE"/>
		<reference ref_id="CVE-2024-58019" ref_url="https://www.suse.com/security/cve/CVE-2024-58019/" source="CVE"/>
		<reference ref_id="CVE-2024-58020" ref_url="https://www.suse.com/security/cve/CVE-2024-58020/" source="CVE"/>
		<reference ref_id="CVE-2024-58021" ref_url="https://www.suse.com/security/cve/CVE-2024-58021/" source="CVE"/>
		<reference ref_id="CVE-2024-58034" ref_url="https://www.suse.com/security/cve/CVE-2024-58034/" source="CVE"/>
		<reference ref_id="CVE-2024-58042" ref_url="https://www.suse.com/security/cve/CVE-2024-58042/" source="CVE"/>
		<reference ref_id="CVE-2024-58051" ref_url="https://www.suse.com/security/cve/CVE-2024-58051/" source="CVE"/>
		<reference ref_id="CVE-2024-58052" ref_url="https://www.suse.com/security/cve/CVE-2024-58052/" source="CVE"/>
		<reference ref_id="CVE-2024-58053" ref_url="https://www.suse.com/security/cve/CVE-2024-58053/" source="CVE"/>
		<reference ref_id="CVE-2024-58054" ref_url="https://www.suse.com/security/cve/CVE-2024-58054/" source="CVE"/>
		<reference ref_id="CVE-2024-58055" ref_url="https://www.suse.com/security/cve/CVE-2024-58055/" source="CVE"/>
		<reference ref_id="CVE-2024-58056" ref_url="https://www.suse.com/security/cve/CVE-2024-58056/" source="CVE"/>
		<reference ref_id="CVE-2024-58057" ref_url="https://www.suse.com/security/cve/CVE-2024-58057/" source="CVE"/>
		<reference ref_id="CVE-2024-58059" ref_url="https://www.suse.com/security/cve/CVE-2024-58059/" source="CVE"/>
		<reference ref_id="CVE-2024-58060" ref_url="https://www.suse.com/security/cve/CVE-2024-58060/" source="CVE"/>
		<reference ref_id="CVE-2024-58061" ref_url="https://www.suse.com/security/cve/CVE-2024-58061/" source="CVE"/>
		<reference ref_id="CVE-2024-58062" ref_url="https://www.suse.com/security/cve/CVE-2024-58062/" source="CVE"/>
		<reference ref_id="CVE-2024-58063" ref_url="https://www.suse.com/security/cve/CVE-2024-58063/" source="CVE"/>
		<reference ref_id="CVE-2024-58064" ref_url="https://www.suse.com/security/cve/CVE-2024-58064/" source="CVE"/>
		<reference ref_id="CVE-2024-58068" ref_url="https://www.suse.com/security/cve/CVE-2024-58068/" source="CVE"/>
		<reference ref_id="CVE-2024-58069" ref_url="https://www.suse.com/security/cve/CVE-2024-58069/" source="CVE"/>
		<reference ref_id="CVE-2024-58070" ref_url="https://www.suse.com/security/cve/CVE-2024-58070/" source="CVE"/>
		<reference ref_id="CVE-2024-58071" ref_url="https://www.suse.com/security/cve/CVE-2024-58071/" source="CVE"/>
		<reference ref_id="CVE-2024-58072" ref_url="https://www.suse.com/security/cve/CVE-2024-58072/" source="CVE"/>
		<reference ref_id="CVE-2024-58074" ref_url="https://www.suse.com/security/cve/CVE-2024-58074/" source="CVE"/>
		<reference ref_id="CVE-2024-58075" ref_url="https://www.suse.com/security/cve/CVE-2024-58075/" source="CVE"/>
		<reference ref_id="CVE-2024-58076" ref_url="https://www.suse.com/security/cve/CVE-2024-58076/" source="CVE"/>
		<reference ref_id="CVE-2024-58077" ref_url="https://www.suse.com/security/cve/CVE-2024-58077/" source="CVE"/>
		<reference ref_id="CVE-2024-58078" ref_url="https://www.suse.com/security/cve/CVE-2024-58078/" source="CVE"/>
		<reference ref_id="CVE-2024-58079" ref_url="https://www.suse.com/security/cve/CVE-2024-58079/" source="CVE"/>
		<reference ref_id="CVE-2024-58080" ref_url="https://www.suse.com/security/cve/CVE-2024-58080/" source="CVE"/>
		<reference ref_id="CVE-2024-58081" ref_url="https://www.suse.com/security/cve/CVE-2024-58081/" source="CVE"/>
		<reference ref_id="CVE-2024-58082" ref_url="https://www.suse.com/security/cve/CVE-2024-58082/" source="CVE"/>
		<reference ref_id="CVE-2024-58083" ref_url="https://www.suse.com/security/cve/CVE-2024-58083/" source="CVE"/>
		<reference ref_id="CVE-2024-58084" ref_url="https://www.suse.com/security/cve/CVE-2024-58084/" source="CVE"/>
		<reference ref_id="CVE-2024-58086" ref_url="https://www.suse.com/security/cve/CVE-2024-58086/" source="CVE"/>
		<reference ref_id="CVE-2024-58088" ref_url="https://www.suse.com/security/cve/CVE-2024-58088/" source="CVE"/>
		<reference ref_id="CVE-2024-58089" ref_url="https://www.suse.com/security/cve/CVE-2024-58089/" source="CVE"/>
		<reference ref_id="CVE-2024-58091" ref_url="https://www.suse.com/security/cve/CVE-2024-58091/" source="CVE"/>
		<reference ref_id="CVE-2024-58092" ref_url="https://www.suse.com/security/cve/CVE-2024-58092/" source="CVE"/>
		<reference ref_id="CVE-2024-58093" ref_url="https://www.suse.com/security/cve/CVE-2024-58093/" source="CVE"/>
		<reference ref_id="CVE-2024-58096" ref_url="https://www.suse.com/security/cve/CVE-2024-58096/" source="CVE"/>
		<reference ref_id="CVE-2024-58097" ref_url="https://www.suse.com/security/cve/CVE-2024-58097/" source="CVE"/>
		<reference ref_id="CVE-2024-58098" ref_url="https://www.suse.com/security/cve/CVE-2024-58098/" source="CVE"/>
		<reference ref_id="CVE-2024-58100" ref_url="https://www.suse.com/security/cve/CVE-2024-58100/" source="CVE"/>
		<reference ref_id="CVE-2024-58237" ref_url="https://www.suse.com/security/cve/CVE-2024-58237/" source="CVE"/>
		<reference ref_id="CVE-2025-21629" ref_url="https://www.suse.com/security/cve/CVE-2025-21629/" source="CVE"/>
		<reference ref_id="CVE-2025-21631" ref_url="https://www.suse.com/security/cve/CVE-2025-21631/" source="CVE"/>
		<reference ref_id="CVE-2025-21632" ref_url="https://www.suse.com/security/cve/CVE-2025-21632/" source="CVE"/>
		<reference ref_id="CVE-2025-21633" ref_url="https://www.suse.com/security/cve/CVE-2025-21633/" source="CVE"/>
		<reference ref_id="CVE-2025-21634" ref_url="https://www.suse.com/security/cve/CVE-2025-21634/" source="CVE"/>
		<reference ref_id="CVE-2025-21635" ref_url="https://www.suse.com/security/cve/CVE-2025-21635/" source="CVE"/>
		<reference ref_id="CVE-2025-21636" ref_url="https://www.suse.com/security/cve/CVE-2025-21636/" source="CVE"/>
		<reference ref_id="CVE-2025-21637" ref_url="https://www.suse.com/security/cve/CVE-2025-21637/" source="CVE"/>
		<reference ref_id="CVE-2025-21638" ref_url="https://www.suse.com/security/cve/CVE-2025-21638/" source="CVE"/>
		<reference ref_id="CVE-2025-21639" ref_url="https://www.suse.com/security/cve/CVE-2025-21639/" source="CVE"/>
		<reference ref_id="CVE-2025-21640" ref_url="https://www.suse.com/security/cve/CVE-2025-21640/" source="CVE"/>
		<reference ref_id="CVE-2025-21641" ref_url="https://www.suse.com/security/cve/CVE-2025-21641/" source="CVE"/>
		<reference ref_id="CVE-2025-21642" ref_url="https://www.suse.com/security/cve/CVE-2025-21642/" source="CVE"/>
		<reference ref_id="CVE-2025-21643" ref_url="https://www.suse.com/security/cve/CVE-2025-21643/" source="CVE"/>
		<reference ref_id="CVE-2025-21644" ref_url="https://www.suse.com/security/cve/CVE-2025-21644/" source="CVE"/>
		<reference ref_id="CVE-2025-21645" ref_url="https://www.suse.com/security/cve/CVE-2025-21645/" source="CVE"/>
		<reference ref_id="CVE-2025-21647" ref_url="https://www.suse.com/security/cve/CVE-2025-21647/" source="CVE"/>
		<reference ref_id="CVE-2025-21648" ref_url="https://www.suse.com/security/cve/CVE-2025-21648/" source="CVE"/>
		<reference ref_id="CVE-2025-21649" ref_url="https://www.suse.com/security/cve/CVE-2025-21649/" source="CVE"/>
		<reference ref_id="CVE-2025-21650" ref_url="https://www.suse.com/security/cve/CVE-2025-21650/" source="CVE"/>
		<reference ref_id="CVE-2025-21651" ref_url="https://www.suse.com/security/cve/CVE-2025-21651/" source="CVE"/>
		<reference ref_id="CVE-2025-21652" ref_url="https://www.suse.com/security/cve/CVE-2025-21652/" source="CVE"/>
		<reference ref_id="CVE-2025-21653" ref_url="https://www.suse.com/security/cve/CVE-2025-21653/" source="CVE"/>
		<reference ref_id="CVE-2025-21654" ref_url="https://www.suse.com/security/cve/CVE-2025-21654/" source="CVE"/>
		<reference ref_id="CVE-2025-21655" ref_url="https://www.suse.com/security/cve/CVE-2025-21655/" source="CVE"/>
		<reference ref_id="CVE-2025-21656" ref_url="https://www.suse.com/security/cve/CVE-2025-21656/" source="CVE"/>
		<reference ref_id="CVE-2025-21658" ref_url="https://www.suse.com/security/cve/CVE-2025-21658/" source="CVE"/>
		<reference ref_id="CVE-2025-21659" ref_url="https://www.suse.com/security/cve/CVE-2025-21659/" source="CVE"/>
		<reference ref_id="CVE-2025-21661" ref_url="https://www.suse.com/security/cve/CVE-2025-21661/" source="CVE"/>
		<reference ref_id="CVE-2025-21662" ref_url="https://www.suse.com/security/cve/CVE-2025-21662/" source="CVE"/>
		<reference ref_id="CVE-2025-21663" ref_url="https://www.suse.com/security/cve/CVE-2025-21663/" source="CVE"/>
		<reference ref_id="CVE-2025-21664" ref_url="https://www.suse.com/security/cve/CVE-2025-21664/" source="CVE"/>
		<reference ref_id="CVE-2025-21666" ref_url="https://www.suse.com/security/cve/CVE-2025-21666/" source="CVE"/>
		<reference ref_id="CVE-2025-21667" ref_url="https://www.suse.com/security/cve/CVE-2025-21667/" source="CVE"/>
		<reference ref_id="CVE-2025-21668" ref_url="https://www.suse.com/security/cve/CVE-2025-21668/" source="CVE"/>
		<reference ref_id="CVE-2025-21669" ref_url="https://www.suse.com/security/cve/CVE-2025-21669/" source="CVE"/>
		<reference ref_id="CVE-2025-21670" ref_url="https://www.suse.com/security/cve/CVE-2025-21670/" source="CVE"/>
		<reference ref_id="CVE-2025-21671" ref_url="https://www.suse.com/security/cve/CVE-2025-21671/" source="CVE"/>
		<reference ref_id="CVE-2025-21673" ref_url="https://www.suse.com/security/cve/CVE-2025-21673/" source="CVE"/>
		<reference ref_id="CVE-2025-21674" ref_url="https://www.suse.com/security/cve/CVE-2025-21674/" source="CVE"/>
		<reference ref_id="CVE-2025-21675" ref_url="https://www.suse.com/security/cve/CVE-2025-21675/" source="CVE"/>
		<reference ref_id="CVE-2025-21676" ref_url="https://www.suse.com/security/cve/CVE-2025-21676/" source="CVE"/>
		<reference ref_id="CVE-2025-21677" ref_url="https://www.suse.com/security/cve/CVE-2025-21677/" source="CVE"/>
		<reference ref_id="CVE-2025-21678" ref_url="https://www.suse.com/security/cve/CVE-2025-21678/" source="CVE"/>
		<reference ref_id="CVE-2025-21680" ref_url="https://www.suse.com/security/cve/CVE-2025-21680/" source="CVE"/>
		<reference ref_id="CVE-2025-21681" ref_url="https://www.suse.com/security/cve/CVE-2025-21681/" source="CVE"/>
		<reference ref_id="CVE-2025-21682" ref_url="https://www.suse.com/security/cve/CVE-2025-21682/" source="CVE"/>
		<reference ref_id="CVE-2025-21683" ref_url="https://www.suse.com/security/cve/CVE-2025-21683/" source="CVE"/>
		<reference ref_id="CVE-2025-21684" ref_url="https://www.suse.com/security/cve/CVE-2025-21684/" source="CVE"/>
		<reference ref_id="CVE-2025-21685" ref_url="https://www.suse.com/security/cve/CVE-2025-21685/" source="CVE"/>
		<reference ref_id="CVE-2025-21686" ref_url="https://www.suse.com/security/cve/CVE-2025-21686/" source="CVE"/>
		<reference ref_id="CVE-2025-21687" ref_url="https://www.suse.com/security/cve/CVE-2025-21687/" source="CVE"/>
		<reference ref_id="CVE-2025-21688" ref_url="https://www.suse.com/security/cve/CVE-2025-21688/" source="CVE"/>
		<reference ref_id="CVE-2025-21689" ref_url="https://www.suse.com/security/cve/CVE-2025-21689/" source="CVE"/>
		<reference ref_id="CVE-2025-21690" ref_url="https://www.suse.com/security/cve/CVE-2025-21690/" source="CVE"/>
		<reference ref_id="CVE-2025-21691" ref_url="https://www.suse.com/security/cve/CVE-2025-21691/" source="CVE"/>
		<reference ref_id="CVE-2025-21692" ref_url="https://www.suse.com/security/cve/CVE-2025-21692/" source="CVE"/>
		<reference ref_id="CVE-2025-21693" ref_url="https://www.suse.com/security/cve/CVE-2025-21693/" source="CVE"/>
		<reference ref_id="CVE-2025-21695" ref_url="https://www.suse.com/security/cve/CVE-2025-21695/" source="CVE"/>
		<reference ref_id="CVE-2025-21696" ref_url="https://www.suse.com/security/cve/CVE-2025-21696/" source="CVE"/>
		<reference ref_id="CVE-2025-21697" ref_url="https://www.suse.com/security/cve/CVE-2025-21697/" source="CVE"/>
		<reference ref_id="CVE-2025-21699" ref_url="https://www.suse.com/security/cve/CVE-2025-21699/" source="CVE"/>
		<reference ref_id="CVE-2025-21700" ref_url="https://www.suse.com/security/cve/CVE-2025-21700/" source="CVE"/>
		<reference ref_id="CVE-2025-21701" ref_url="https://www.suse.com/security/cve/CVE-2025-21701/" source="CVE"/>
		<reference ref_id="CVE-2025-21702" ref_url="https://www.suse.com/security/cve/CVE-2025-21702/" source="CVE"/>
		<reference ref_id="CVE-2025-21703" ref_url="https://www.suse.com/security/cve/CVE-2025-21703/" source="CVE"/>
		<reference ref_id="CVE-2025-21704" ref_url="https://www.suse.com/security/cve/CVE-2025-21704/" source="CVE"/>
		<reference ref_id="CVE-2025-21705" ref_url="https://www.suse.com/security/cve/CVE-2025-21705/" source="CVE"/>
		<reference ref_id="CVE-2025-21706" ref_url="https://www.suse.com/security/cve/CVE-2025-21706/" source="CVE"/>
		<reference ref_id="CVE-2025-21707" ref_url="https://www.suse.com/security/cve/CVE-2025-21707/" source="CVE"/>
		<reference ref_id="CVE-2025-21708" ref_url="https://www.suse.com/security/cve/CVE-2025-21708/" source="CVE"/>
		<reference ref_id="CVE-2025-21709" ref_url="https://www.suse.com/security/cve/CVE-2025-21709/" source="CVE"/>
		<reference ref_id="CVE-2025-21710" ref_url="https://www.suse.com/security/cve/CVE-2025-21710/" source="CVE"/>
		<reference ref_id="CVE-2025-21711" ref_url="https://www.suse.com/security/cve/CVE-2025-21711/" source="CVE"/>
		<reference ref_id="CVE-2025-21712" ref_url="https://www.suse.com/security/cve/CVE-2025-21712/" source="CVE"/>
		<reference ref_id="CVE-2025-21713" ref_url="https://www.suse.com/security/cve/CVE-2025-21713/" source="CVE"/>
		<reference ref_id="CVE-2025-21714" ref_url="https://www.suse.com/security/cve/CVE-2025-21714/" source="CVE"/>
		<reference ref_id="CVE-2025-21715" ref_url="https://www.suse.com/security/cve/CVE-2025-21715/" source="CVE"/>
		<reference ref_id="CVE-2025-21716" ref_url="https://www.suse.com/security/cve/CVE-2025-21716/" source="CVE"/>
		<reference ref_id="CVE-2025-21717" ref_url="https://www.suse.com/security/cve/CVE-2025-21717/" source="CVE"/>
		<reference ref_id="CVE-2025-21718" ref_url="https://www.suse.com/security/cve/CVE-2025-21718/" source="CVE"/>
		<reference ref_id="CVE-2025-21719" ref_url="https://www.suse.com/security/cve/CVE-2025-21719/" source="CVE"/>
		<reference ref_id="CVE-2025-21720" ref_url="https://www.suse.com/security/cve/CVE-2025-21720/" source="CVE"/>
		<reference ref_id="CVE-2025-21723" ref_url="https://www.suse.com/security/cve/CVE-2025-21723/" source="CVE"/>
		<reference ref_id="CVE-2025-21724" ref_url="https://www.suse.com/security/cve/CVE-2025-21724/" source="CVE"/>
		<reference ref_id="CVE-2025-21725" ref_url="https://www.suse.com/security/cve/CVE-2025-21725/" source="CVE"/>
		<reference ref_id="CVE-2025-21726" ref_url="https://www.suse.com/security/cve/CVE-2025-21726/" source="CVE"/>
		<reference ref_id="CVE-2025-21727" ref_url="https://www.suse.com/security/cve/CVE-2025-21727/" source="CVE"/>
		<reference ref_id="CVE-2025-21728" ref_url="https://www.suse.com/security/cve/CVE-2025-21728/" source="CVE"/>
		<reference ref_id="CVE-2025-21729" ref_url="https://www.suse.com/security/cve/CVE-2025-21729/" source="CVE"/>
		<reference ref_id="CVE-2025-21730" ref_url="https://www.suse.com/security/cve/CVE-2025-21730/" source="CVE"/>
		<reference ref_id="CVE-2025-21731" ref_url="https://www.suse.com/security/cve/CVE-2025-21731/" source="CVE"/>
		<reference ref_id="CVE-2025-21732" ref_url="https://www.suse.com/security/cve/CVE-2025-21732/" source="CVE"/>
		<reference ref_id="CVE-2025-21733" ref_url="https://www.suse.com/security/cve/CVE-2025-21733/" source="CVE"/>
		<reference ref_id="CVE-2025-21734" ref_url="https://www.suse.com/security/cve/CVE-2025-21734/" source="CVE"/>
		<reference ref_id="CVE-2025-21735" ref_url="https://www.suse.com/security/cve/CVE-2025-21735/" source="CVE"/>
		<reference ref_id="CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738/" source="CVE"/>
		<reference ref_id="CVE-2025-21739" ref_url="https://www.suse.com/security/cve/CVE-2025-21739/" source="CVE"/>
		<reference ref_id="CVE-2025-21741" ref_url="https://www.suse.com/security/cve/CVE-2025-21741/" source="CVE"/>
		<reference ref_id="CVE-2025-21742" ref_url="https://www.suse.com/security/cve/CVE-2025-21742/" source="CVE"/>
		<reference ref_id="CVE-2025-21743" ref_url="https://www.suse.com/security/cve/CVE-2025-21743/" source="CVE"/>
		<reference ref_id="CVE-2025-21744" ref_url="https://www.suse.com/security/cve/CVE-2025-21744/" source="CVE"/>
		<reference ref_id="CVE-2025-21745" ref_url="https://www.suse.com/security/cve/CVE-2025-21745/" source="CVE"/>
		<reference ref_id="CVE-2025-21746" ref_url="https://www.suse.com/security/cve/CVE-2025-21746/" source="CVE"/>
		<reference ref_id="CVE-2025-21749" ref_url="https://www.suse.com/security/cve/CVE-2025-21749/" source="CVE"/>
		<reference ref_id="CVE-2025-21750" ref_url="https://www.suse.com/security/cve/CVE-2025-21750/" source="CVE"/>
		<reference ref_id="CVE-2025-21751" ref_url="https://www.suse.com/security/cve/CVE-2025-21751/" source="CVE"/>
		<reference ref_id="CVE-2025-21753" ref_url="https://www.suse.com/security/cve/CVE-2025-21753/" source="CVE"/>
		<reference ref_id="CVE-2025-21754" ref_url="https://www.suse.com/security/cve/CVE-2025-21754/" source="CVE"/>
		<reference ref_id="CVE-2025-21755" ref_url="https://www.suse.com/security/cve/CVE-2025-21755/" source="CVE"/>
		<reference ref_id="CVE-2025-21756" ref_url="https://www.suse.com/security/cve/CVE-2025-21756/" source="CVE"/>
		<reference ref_id="CVE-2025-21758" ref_url="https://www.suse.com/security/cve/CVE-2025-21758/" source="CVE"/>
		<reference ref_id="CVE-2025-21759" ref_url="https://www.suse.com/security/cve/CVE-2025-21759/" source="CVE"/>
		<reference ref_id="CVE-2025-21760" ref_url="https://www.suse.com/security/cve/CVE-2025-21760/" source="CVE"/>
		<reference ref_id="CVE-2025-21761" ref_url="https://www.suse.com/security/cve/CVE-2025-21761/" source="CVE"/>
		<reference ref_id="CVE-2025-21762" ref_url="https://www.suse.com/security/cve/CVE-2025-21762/" source="CVE"/>
		<reference ref_id="CVE-2025-21763" ref_url="https://www.suse.com/security/cve/CVE-2025-21763/" source="CVE"/>
		<reference ref_id="CVE-2025-21764" ref_url="https://www.suse.com/security/cve/CVE-2025-21764/" source="CVE"/>
		<reference ref_id="CVE-2025-21765" ref_url="https://www.suse.com/security/cve/CVE-2025-21765/" source="CVE"/>
		<reference ref_id="CVE-2025-21766" ref_url="https://www.suse.com/security/cve/CVE-2025-21766/" source="CVE"/>
		<reference ref_id="CVE-2025-21767" ref_url="https://www.suse.com/security/cve/CVE-2025-21767/" source="CVE"/>
		<reference ref_id="CVE-2025-21768" ref_url="https://www.suse.com/security/cve/CVE-2025-21768/" source="CVE"/>
		<reference ref_id="CVE-2025-21770" ref_url="https://www.suse.com/security/cve/CVE-2025-21770/" source="CVE"/>
		<reference ref_id="CVE-2025-21771" ref_url="https://www.suse.com/security/cve/CVE-2025-21771/" source="CVE"/>
		<reference ref_id="CVE-2025-21772" ref_url="https://www.suse.com/security/cve/CVE-2025-21772/" source="CVE"/>
		<reference ref_id="CVE-2025-21773" ref_url="https://www.suse.com/security/cve/CVE-2025-21773/" source="CVE"/>
		<reference ref_id="CVE-2025-21774" ref_url="https://www.suse.com/security/cve/CVE-2025-21774/" source="CVE"/>
		<reference ref_id="CVE-2025-21775" ref_url="https://www.suse.com/security/cve/CVE-2025-21775/" source="CVE"/>
		<reference ref_id="CVE-2025-21776" ref_url="https://www.suse.com/security/cve/CVE-2025-21776/" source="CVE"/>
		<reference ref_id="CVE-2025-21777" ref_url="https://www.suse.com/security/cve/CVE-2025-21777/" source="CVE"/>
		<reference ref_id="CVE-2025-21778" ref_url="https://www.suse.com/security/cve/CVE-2025-21778/" source="CVE"/>
		<reference ref_id="CVE-2025-21779" ref_url="https://www.suse.com/security/cve/CVE-2025-21779/" source="CVE"/>
		<reference ref_id="CVE-2025-21780" ref_url="https://www.suse.com/security/cve/CVE-2025-21780/" source="CVE"/>
		<reference ref_id="CVE-2025-21781" ref_url="https://www.suse.com/security/cve/CVE-2025-21781/" source="CVE"/>
		<reference ref_id="CVE-2025-21783" ref_url="https://www.suse.com/security/cve/CVE-2025-21783/" source="CVE"/>
		<reference ref_id="CVE-2025-21784" ref_url="https://www.suse.com/security/cve/CVE-2025-21784/" source="CVE"/>
		<reference ref_id="CVE-2025-21785" ref_url="https://www.suse.com/security/cve/CVE-2025-21785/" source="CVE"/>
		<reference ref_id="CVE-2025-21786" ref_url="https://www.suse.com/security/cve/CVE-2025-21786/" source="CVE"/>
		<reference ref_id="CVE-2025-21787" ref_url="https://www.suse.com/security/cve/CVE-2025-21787/" source="CVE"/>
		<reference ref_id="CVE-2025-21788" ref_url="https://www.suse.com/security/cve/CVE-2025-21788/" source="CVE"/>
		<reference ref_id="CVE-2025-21790" ref_url="https://www.suse.com/security/cve/CVE-2025-21790/" source="CVE"/>
		<reference ref_id="CVE-2025-21791" ref_url="https://www.suse.com/security/cve/CVE-2025-21791/" source="CVE"/>
		<reference ref_id="CVE-2025-21792" ref_url="https://www.suse.com/security/cve/CVE-2025-21792/" source="CVE"/>
		<reference ref_id="CVE-2025-21793" ref_url="https://www.suse.com/security/cve/CVE-2025-21793/" source="CVE"/>
		<reference ref_id="CVE-2025-21794" ref_url="https://www.suse.com/security/cve/CVE-2025-21794/" source="CVE"/>
		<reference ref_id="CVE-2025-21795" ref_url="https://www.suse.com/security/cve/CVE-2025-21795/" source="CVE"/>
		<reference ref_id="CVE-2025-21796" ref_url="https://www.suse.com/security/cve/CVE-2025-21796/" source="CVE"/>
		<reference ref_id="CVE-2025-21798" ref_url="https://www.suse.com/security/cve/CVE-2025-21798/" source="CVE"/>
		<reference ref_id="CVE-2025-21799" ref_url="https://www.suse.com/security/cve/CVE-2025-21799/" source="CVE"/>
		<reference ref_id="CVE-2025-21800" ref_url="https://www.suse.com/security/cve/CVE-2025-21800/" source="CVE"/>
		<reference ref_id="CVE-2025-21801" ref_url="https://www.suse.com/security/cve/CVE-2025-21801/" source="CVE"/>
		<reference ref_id="CVE-2025-21802" ref_url="https://www.suse.com/security/cve/CVE-2025-21802/" source="CVE"/>
		<reference ref_id="CVE-2025-21803" ref_url="https://www.suse.com/security/cve/CVE-2025-21803/" source="CVE"/>
		<reference ref_id="CVE-2025-21804" ref_url="https://www.suse.com/security/cve/CVE-2025-21804/" source="CVE"/>
		<reference ref_id="CVE-2025-21805" ref_url="https://www.suse.com/security/cve/CVE-2025-21805/" source="CVE"/>
		<reference ref_id="CVE-2025-21806" ref_url="https://www.suse.com/security/cve/CVE-2025-21806/" source="CVE"/>
		<reference ref_id="CVE-2025-21807" ref_url="https://www.suse.com/security/cve/CVE-2025-21807/" source="CVE"/>
		<reference ref_id="CVE-2025-21808" ref_url="https://www.suse.com/security/cve/CVE-2025-21808/" source="CVE"/>
		<reference ref_id="CVE-2025-21809" ref_url="https://www.suse.com/security/cve/CVE-2025-21809/" source="CVE"/>
		<reference ref_id="CVE-2025-21810" ref_url="https://www.suse.com/security/cve/CVE-2025-21810/" source="CVE"/>
		<reference ref_id="CVE-2025-21812" ref_url="https://www.suse.com/security/cve/CVE-2025-21812/" source="CVE"/>
		<reference ref_id="CVE-2025-21814" ref_url="https://www.suse.com/security/cve/CVE-2025-21814/" source="CVE"/>
		<reference ref_id="CVE-2025-21815" ref_url="https://www.suse.com/security/cve/CVE-2025-21815/" source="CVE"/>
		<reference ref_id="CVE-2025-21817" ref_url="https://www.suse.com/security/cve/CVE-2025-21817/" source="CVE"/>
		<reference ref_id="CVE-2025-21819" ref_url="https://www.suse.com/security/cve/CVE-2025-21819/" source="CVE"/>
		<reference ref_id="CVE-2025-21820" ref_url="https://www.suse.com/security/cve/CVE-2025-21820/" source="CVE"/>
		<reference ref_id="CVE-2025-21821" ref_url="https://www.suse.com/security/cve/CVE-2025-21821/" source="CVE"/>
		<reference ref_id="CVE-2025-21823" ref_url="https://www.suse.com/security/cve/CVE-2025-21823/" source="CVE"/>
		<reference ref_id="CVE-2025-21824" ref_url="https://www.suse.com/security/cve/CVE-2025-21824/" source="CVE"/>
		<reference ref_id="CVE-2025-21825" ref_url="https://www.suse.com/security/cve/CVE-2025-21825/" source="CVE"/>
		<reference ref_id="CVE-2025-21826" ref_url="https://www.suse.com/security/cve/CVE-2025-21826/" source="CVE"/>
		<reference ref_id="CVE-2025-21827" ref_url="https://www.suse.com/security/cve/CVE-2025-21827/" source="CVE"/>
		<reference ref_id="CVE-2025-21828" ref_url="https://www.suse.com/security/cve/CVE-2025-21828/" source="CVE"/>
		<reference ref_id="CVE-2025-21829" ref_url="https://www.suse.com/security/cve/CVE-2025-21829/" source="CVE"/>
		<reference ref_id="CVE-2025-21830" ref_url="https://www.suse.com/security/cve/CVE-2025-21830/" source="CVE"/>
		<reference ref_id="CVE-2025-21831" ref_url="https://www.suse.com/security/cve/CVE-2025-21831/" source="CVE"/>
		<reference ref_id="CVE-2025-21832" ref_url="https://www.suse.com/security/cve/CVE-2025-21832/" source="CVE"/>
		<reference ref_id="CVE-2025-21833" ref_url="https://www.suse.com/security/cve/CVE-2025-21833/" source="CVE"/>
		<reference ref_id="CVE-2025-21834" ref_url="https://www.suse.com/security/cve/CVE-2025-21834/" source="CVE"/>
		<reference ref_id="CVE-2025-21835" ref_url="https://www.suse.com/security/cve/CVE-2025-21835/" source="CVE"/>
		<reference ref_id="CVE-2025-21836" ref_url="https://www.suse.com/security/cve/CVE-2025-21836/" source="CVE"/>
		<reference ref_id="CVE-2025-21837" ref_url="https://www.suse.com/security/cve/CVE-2025-21837/" source="CVE"/>
		<reference ref_id="CVE-2025-21838" ref_url="https://www.suse.com/security/cve/CVE-2025-21838/" source="CVE"/>
		<reference ref_id="CVE-2025-21839" ref_url="https://www.suse.com/security/cve/CVE-2025-21839/" source="CVE"/>
		<reference ref_id="CVE-2025-21841" ref_url="https://www.suse.com/security/cve/CVE-2025-21841/" source="CVE"/>
		<reference ref_id="CVE-2025-21842" ref_url="https://www.suse.com/security/cve/CVE-2025-21842/" source="CVE"/>
		<reference ref_id="CVE-2025-21844" ref_url="https://www.suse.com/security/cve/CVE-2025-21844/" source="CVE"/>
		<reference ref_id="CVE-2025-21845" ref_url="https://www.suse.com/security/cve/CVE-2025-21845/" source="CVE"/>
		<reference ref_id="CVE-2025-21846" ref_url="https://www.suse.com/security/cve/CVE-2025-21846/" source="CVE"/>
		<reference ref_id="CVE-2025-21847" ref_url="https://www.suse.com/security/cve/CVE-2025-21847/" source="CVE"/>
		<reference ref_id="CVE-2025-21848" ref_url="https://www.suse.com/security/cve/CVE-2025-21848/" source="CVE"/>
		<reference ref_id="CVE-2025-21849" ref_url="https://www.suse.com/security/cve/CVE-2025-21849/" source="CVE"/>
		<reference ref_id="CVE-2025-21850" ref_url="https://www.suse.com/security/cve/CVE-2025-21850/" source="CVE"/>
		<reference ref_id="CVE-2025-21851" ref_url="https://www.suse.com/security/cve/CVE-2025-21851/" source="CVE"/>
		<reference ref_id="CVE-2025-21852" ref_url="https://www.suse.com/security/cve/CVE-2025-21852/" source="CVE"/>
		<reference ref_id="CVE-2025-21853" ref_url="https://www.suse.com/security/cve/CVE-2025-21853/" source="CVE"/>
		<reference ref_id="CVE-2025-21854" ref_url="https://www.suse.com/security/cve/CVE-2025-21854/" source="CVE"/>
		<reference ref_id="CVE-2025-21855" ref_url="https://www.suse.com/security/cve/CVE-2025-21855/" source="CVE"/>
		<reference ref_id="CVE-2025-21856" ref_url="https://www.suse.com/security/cve/CVE-2025-21856/" source="CVE"/>
		<reference ref_id="CVE-2025-21857" ref_url="https://www.suse.com/security/cve/CVE-2025-21857/" source="CVE"/>
		<reference ref_id="CVE-2025-21858" ref_url="https://www.suse.com/security/cve/CVE-2025-21858/" source="CVE"/>
		<reference ref_id="CVE-2025-21859" ref_url="https://www.suse.com/security/cve/CVE-2025-21859/" source="CVE"/>
		<reference ref_id="CVE-2025-21861" ref_url="https://www.suse.com/security/cve/CVE-2025-21861/" source="CVE"/>
		<reference ref_id="CVE-2025-21862" ref_url="https://www.suse.com/security/cve/CVE-2025-21862/" source="CVE"/>
		<reference ref_id="CVE-2025-21863" ref_url="https://www.suse.com/security/cve/CVE-2025-21863/" source="CVE"/>
		<reference ref_id="CVE-2025-21864" ref_url="https://www.suse.com/security/cve/CVE-2025-21864/" source="CVE"/>
		<reference ref_id="CVE-2025-21865" ref_url="https://www.suse.com/security/cve/CVE-2025-21865/" source="CVE"/>
		<reference ref_id="CVE-2025-21866" ref_url="https://www.suse.com/security/cve/CVE-2025-21866/" source="CVE"/>
		<reference ref_id="CVE-2025-21867" ref_url="https://www.suse.com/security/cve/CVE-2025-21867/" source="CVE"/>
		<reference ref_id="CVE-2025-21868" ref_url="https://www.suse.com/security/cve/CVE-2025-21868/" source="CVE"/>
		<reference ref_id="CVE-2025-21869" ref_url="https://www.suse.com/security/cve/CVE-2025-21869/" source="CVE"/>
		<reference ref_id="CVE-2025-21870" ref_url="https://www.suse.com/security/cve/CVE-2025-21870/" source="CVE"/>
		<reference ref_id="CVE-2025-21871" ref_url="https://www.suse.com/security/cve/CVE-2025-21871/" source="CVE"/>
		<reference ref_id="CVE-2025-21872" ref_url="https://www.suse.com/security/cve/CVE-2025-21872/" source="CVE"/>
		<reference ref_id="CVE-2025-21873" ref_url="https://www.suse.com/security/cve/CVE-2025-21873/" source="CVE"/>
		<reference ref_id="CVE-2025-21874" ref_url="https://www.suse.com/security/cve/CVE-2025-21874/" source="CVE"/>
		<reference ref_id="CVE-2025-21875" ref_url="https://www.suse.com/security/cve/CVE-2025-21875/" source="CVE"/>
		<reference ref_id="CVE-2025-21876" ref_url="https://www.suse.com/security/cve/CVE-2025-21876/" source="CVE"/>
		<reference ref_id="CVE-2025-21877" ref_url="https://www.suse.com/security/cve/CVE-2025-21877/" source="CVE"/>
		<reference ref_id="CVE-2025-21878" ref_url="https://www.suse.com/security/cve/CVE-2025-21878/" source="CVE"/>
		<reference ref_id="CVE-2025-21880" ref_url="https://www.suse.com/security/cve/CVE-2025-21880/" source="CVE"/>
		<reference ref_id="CVE-2025-21881" ref_url="https://www.suse.com/security/cve/CVE-2025-21881/" source="CVE"/>
		<reference ref_id="CVE-2025-21882" ref_url="https://www.suse.com/security/cve/CVE-2025-21882/" source="CVE"/>
		<reference ref_id="CVE-2025-21883" ref_url="https://www.suse.com/security/cve/CVE-2025-21883/" source="CVE"/>
		<reference ref_id="CVE-2025-21884" ref_url="https://www.suse.com/security/cve/CVE-2025-21884/" source="CVE"/>
		<reference ref_id="CVE-2025-21885" ref_url="https://www.suse.com/security/cve/CVE-2025-21885/" source="CVE"/>
		<reference ref_id="CVE-2025-21886" ref_url="https://www.suse.com/security/cve/CVE-2025-21886/" source="CVE"/>
		<reference ref_id="CVE-2025-21887" ref_url="https://www.suse.com/security/cve/CVE-2025-21887/" source="CVE"/>
		<reference ref_id="CVE-2025-21888" ref_url="https://www.suse.com/security/cve/CVE-2025-21888/" source="CVE"/>
		<reference ref_id="CVE-2025-21889" ref_url="https://www.suse.com/security/cve/CVE-2025-21889/" source="CVE"/>
		<reference ref_id="CVE-2025-21890" ref_url="https://www.suse.com/security/cve/CVE-2025-21890/" source="CVE"/>
		<reference ref_id="CVE-2025-21891" ref_url="https://www.suse.com/security/cve/CVE-2025-21891/" source="CVE"/>
		<reference ref_id="CVE-2025-21892" ref_url="https://www.suse.com/security/cve/CVE-2025-21892/" source="CVE"/>
		<reference ref_id="CVE-2025-21893" ref_url="https://www.suse.com/security/cve/CVE-2025-21893/" source="CVE"/>
		<reference ref_id="CVE-2025-21894" ref_url="https://www.suse.com/security/cve/CVE-2025-21894/" source="CVE"/>
		<reference ref_id="CVE-2025-21895" ref_url="https://www.suse.com/security/cve/CVE-2025-21895/" source="CVE"/>
		<reference ref_id="CVE-2025-21898" ref_url="https://www.suse.com/security/cve/CVE-2025-21898/" source="CVE"/>
		<reference ref_id="CVE-2025-21899" ref_url="https://www.suse.com/security/cve/CVE-2025-21899/" source="CVE"/>
		<reference ref_id="CVE-2025-21900" ref_url="https://www.suse.com/security/cve/CVE-2025-21900/" source="CVE"/>
		<reference ref_id="CVE-2025-21901" ref_url="https://www.suse.com/security/cve/CVE-2025-21901/" source="CVE"/>
		<reference ref_id="CVE-2025-21902" ref_url="https://www.suse.com/security/cve/CVE-2025-21902/" source="CVE"/>
		<reference ref_id="CVE-2025-21903" ref_url="https://www.suse.com/security/cve/CVE-2025-21903/" source="CVE"/>
		<reference ref_id="CVE-2025-21904" ref_url="https://www.suse.com/security/cve/CVE-2025-21904/" source="CVE"/>
		<reference ref_id="CVE-2025-21905" ref_url="https://www.suse.com/security/cve/CVE-2025-21905/" source="CVE"/>
		<reference ref_id="CVE-2025-21906" ref_url="https://www.suse.com/security/cve/CVE-2025-21906/" source="CVE"/>
		<reference ref_id="CVE-2025-21907" ref_url="https://www.suse.com/security/cve/CVE-2025-21907/" source="CVE"/>
		<reference ref_id="CVE-2025-21908" ref_url="https://www.suse.com/security/cve/CVE-2025-21908/" source="CVE"/>
		<reference ref_id="CVE-2025-21909" ref_url="https://www.suse.com/security/cve/CVE-2025-21909/" source="CVE"/>
		<reference ref_id="CVE-2025-21910" ref_url="https://www.suse.com/security/cve/CVE-2025-21910/" source="CVE"/>
		<reference ref_id="CVE-2025-21911" ref_url="https://www.suse.com/security/cve/CVE-2025-21911/" source="CVE"/>
		<reference ref_id="CVE-2025-21912" ref_url="https://www.suse.com/security/cve/CVE-2025-21912/" source="CVE"/>
		<reference ref_id="CVE-2025-21913" ref_url="https://www.suse.com/security/cve/CVE-2025-21913/" source="CVE"/>
		<reference ref_id="CVE-2025-21914" ref_url="https://www.suse.com/security/cve/CVE-2025-21914/" source="CVE"/>
		<reference ref_id="CVE-2025-21915" ref_url="https://www.suse.com/security/cve/CVE-2025-21915/" source="CVE"/>
		<reference ref_id="CVE-2025-21916" ref_url="https://www.suse.com/security/cve/CVE-2025-21916/" source="CVE"/>
		<reference ref_id="CVE-2025-21917" ref_url="https://www.suse.com/security/cve/CVE-2025-21917/" source="CVE"/>
		<reference ref_id="CVE-2025-21918" ref_url="https://www.suse.com/security/cve/CVE-2025-21918/" source="CVE"/>
		<reference ref_id="CVE-2025-21919" ref_url="https://www.suse.com/security/cve/CVE-2025-21919/" source="CVE"/>
		<reference ref_id="CVE-2025-21920" ref_url="https://www.suse.com/security/cve/CVE-2025-21920/" source="CVE"/>
		<reference ref_id="CVE-2025-21921" ref_url="https://www.suse.com/security/cve/CVE-2025-21921/" source="CVE"/>
		<reference ref_id="CVE-2025-21922" ref_url="https://www.suse.com/security/cve/CVE-2025-21922/" source="CVE"/>
		<reference ref_id="CVE-2025-21923" ref_url="https://www.suse.com/security/cve/CVE-2025-21923/" source="CVE"/>
		<reference ref_id="CVE-2025-21924" ref_url="https://www.suse.com/security/cve/CVE-2025-21924/" source="CVE"/>
		<reference ref_id="CVE-2025-21925" ref_url="https://www.suse.com/security/cve/CVE-2025-21925/" source="CVE"/>
		<reference ref_id="CVE-2025-21926" ref_url="https://www.suse.com/security/cve/CVE-2025-21926/" source="CVE"/>
		<reference ref_id="CVE-2025-21927" ref_url="https://www.suse.com/security/cve/CVE-2025-21927/" source="CVE"/>
		<reference ref_id="CVE-2025-21928" ref_url="https://www.suse.com/security/cve/CVE-2025-21928/" source="CVE"/>
		<reference ref_id="CVE-2025-21929" ref_url="https://www.suse.com/security/cve/CVE-2025-21929/" source="CVE"/>
		<reference ref_id="CVE-2025-21930" ref_url="https://www.suse.com/security/cve/CVE-2025-21930/" source="CVE"/>
		<reference ref_id="CVE-2025-21931" ref_url="https://www.suse.com/security/cve/CVE-2025-21931/" source="CVE"/>
		<reference ref_id="CVE-2025-21932" ref_url="https://www.suse.com/security/cve/CVE-2025-21932/" source="CVE"/>
		<reference ref_id="CVE-2025-21934" ref_url="https://www.suse.com/security/cve/CVE-2025-21934/" source="CVE"/>
		<reference ref_id="CVE-2025-21935" ref_url="https://www.suse.com/security/cve/CVE-2025-21935/" source="CVE"/>
		<reference ref_id="CVE-2025-21936" ref_url="https://www.suse.com/security/cve/CVE-2025-21936/" source="CVE"/>
		<reference ref_id="CVE-2025-21937" ref_url="https://www.suse.com/security/cve/CVE-2025-21937/" source="CVE"/>
		<reference ref_id="CVE-2025-21938" ref_url="https://www.suse.com/security/cve/CVE-2025-21938/" source="CVE"/>
		<reference ref_id="CVE-2025-21939" ref_url="https://www.suse.com/security/cve/CVE-2025-21939/" source="CVE"/>
		<reference ref_id="CVE-2025-21940" ref_url="https://www.suse.com/security/cve/CVE-2025-21940/" source="CVE"/>
		<reference ref_id="CVE-2025-21941" ref_url="https://www.suse.com/security/cve/CVE-2025-21941/" source="CVE"/>
		<reference ref_id="CVE-2025-21942" ref_url="https://www.suse.com/security/cve/CVE-2025-21942/" source="CVE"/>
		<reference ref_id="CVE-2025-21943" ref_url="https://www.suse.com/security/cve/CVE-2025-21943/" source="CVE"/>
		<reference ref_id="CVE-2025-21948" ref_url="https://www.suse.com/security/cve/CVE-2025-21948/" source="CVE"/>
		<reference ref_id="CVE-2025-21950" ref_url="https://www.suse.com/security/cve/CVE-2025-21950/" source="CVE"/>
		<reference ref_id="CVE-2025-21951" ref_url="https://www.suse.com/security/cve/CVE-2025-21951/" source="CVE"/>
		<reference ref_id="CVE-2025-21953" ref_url="https://www.suse.com/security/cve/CVE-2025-21953/" source="CVE"/>
		<reference ref_id="CVE-2025-21954" ref_url="https://www.suse.com/security/cve/CVE-2025-21954/" source="CVE"/>
		<reference ref_id="CVE-2025-21956" ref_url="https://www.suse.com/security/cve/CVE-2025-21956/" source="CVE"/>
		<reference ref_id="CVE-2025-21958" ref_url="https://www.suse.com/security/cve/CVE-2025-21958/" source="CVE"/>
		<reference ref_id="CVE-2025-21959" ref_url="https://www.suse.com/security/cve/CVE-2025-21959/" source="CVE"/>
		<reference ref_id="CVE-2025-21960" ref_url="https://www.suse.com/security/cve/CVE-2025-21960/" source="CVE"/>
		<reference ref_id="CVE-2025-21961" ref_url="https://www.suse.com/security/cve/CVE-2025-21961/" source="CVE"/>
		<reference ref_id="CVE-2025-21962" ref_url="https://www.suse.com/security/cve/CVE-2025-21962/" source="CVE"/>
		<reference ref_id="CVE-2025-21963" ref_url="https://www.suse.com/security/cve/CVE-2025-21963/" source="CVE"/>
		<reference ref_id="CVE-2025-21964" ref_url="https://www.suse.com/security/cve/CVE-2025-21964/" source="CVE"/>
		<reference ref_id="CVE-2025-21966" ref_url="https://www.suse.com/security/cve/CVE-2025-21966/" source="CVE"/>
		<reference ref_id="CVE-2025-21968" ref_url="https://www.suse.com/security/cve/CVE-2025-21968/" source="CVE"/>
		<reference ref_id="CVE-2025-21969" ref_url="https://www.suse.com/security/cve/CVE-2025-21969/" source="CVE"/>
		<reference ref_id="CVE-2025-21970" ref_url="https://www.suse.com/security/cve/CVE-2025-21970/" source="CVE"/>
		<reference ref_id="CVE-2025-21971" ref_url="https://www.suse.com/security/cve/CVE-2025-21971/" source="CVE"/>
		<reference ref_id="CVE-2025-21972" ref_url="https://www.suse.com/security/cve/CVE-2025-21972/" source="CVE"/>
		<reference ref_id="CVE-2025-21973" ref_url="https://www.suse.com/security/cve/CVE-2025-21973/" source="CVE"/>
		<reference ref_id="CVE-2025-21974" ref_url="https://www.suse.com/security/cve/CVE-2025-21974/" source="CVE"/>
		<reference ref_id="CVE-2025-21975" ref_url="https://www.suse.com/security/cve/CVE-2025-21975/" source="CVE"/>
		<reference ref_id="CVE-2025-21976" ref_url="https://www.suse.com/security/cve/CVE-2025-21976/" source="CVE"/>
		<reference ref_id="CVE-2025-21977" ref_url="https://www.suse.com/security/cve/CVE-2025-21977/" source="CVE"/>
		<reference ref_id="CVE-2025-21978" ref_url="https://www.suse.com/security/cve/CVE-2025-21978/" source="CVE"/>
		<reference ref_id="CVE-2025-21979" ref_url="https://www.suse.com/security/cve/CVE-2025-21979/" source="CVE"/>
		<reference ref_id="CVE-2025-21980" ref_url="https://www.suse.com/security/cve/CVE-2025-21980/" source="CVE"/>
		<reference ref_id="CVE-2025-21981" ref_url="https://www.suse.com/security/cve/CVE-2025-21981/" source="CVE"/>
		<reference ref_id="CVE-2025-21982" ref_url="https://www.suse.com/security/cve/CVE-2025-21982/" source="CVE"/>
		<reference ref_id="CVE-2025-21983" ref_url="https://www.suse.com/security/cve/CVE-2025-21983/" source="CVE"/>
		<reference ref_id="CVE-2025-21984" ref_url="https://www.suse.com/security/cve/CVE-2025-21984/" source="CVE"/>
		<reference ref_id="CVE-2025-21985" ref_url="https://www.suse.com/security/cve/CVE-2025-21985/" source="CVE"/>
		<reference ref_id="CVE-2025-21986" ref_url="https://www.suse.com/security/cve/CVE-2025-21986/" source="CVE"/>
		<reference ref_id="CVE-2025-21987" ref_url="https://www.suse.com/security/cve/CVE-2025-21987/" source="CVE"/>
		<reference ref_id="CVE-2025-21988" ref_url="https://www.suse.com/security/cve/CVE-2025-21988/" source="CVE"/>
		<reference ref_id="CVE-2025-21989" ref_url="https://www.suse.com/security/cve/CVE-2025-21989/" source="CVE"/>
		<reference ref_id="CVE-2025-21990" ref_url="https://www.suse.com/security/cve/CVE-2025-21990/" source="CVE"/>
		<reference ref_id="CVE-2025-21991" ref_url="https://www.suse.com/security/cve/CVE-2025-21991/" source="CVE"/>
		<reference ref_id="CVE-2025-21992" ref_url="https://www.suse.com/security/cve/CVE-2025-21992/" source="CVE"/>
		<reference ref_id="CVE-2025-21993" ref_url="https://www.suse.com/security/cve/CVE-2025-21993/" source="CVE"/>
		<reference ref_id="CVE-2025-21995" ref_url="https://www.suse.com/security/cve/CVE-2025-21995/" source="CVE"/>
		<reference ref_id="CVE-2025-21996" ref_url="https://www.suse.com/security/cve/CVE-2025-21996/" source="CVE"/>
		<reference ref_id="CVE-2025-21997" ref_url="https://www.suse.com/security/cve/CVE-2025-21997/" source="CVE"/>
		<reference ref_id="CVE-2025-21998" ref_url="https://www.suse.com/security/cve/CVE-2025-21998/" source="CVE"/>
		<reference ref_id="CVE-2025-21999" ref_url="https://www.suse.com/security/cve/CVE-2025-21999/" source="CVE"/>
		<reference ref_id="CVE-2025-22000" ref_url="https://www.suse.com/security/cve/CVE-2025-22000/" source="CVE"/>
		<reference ref_id="CVE-2025-22001" ref_url="https://www.suse.com/security/cve/CVE-2025-22001/" source="CVE"/>
		<reference ref_id="CVE-2025-22002" ref_url="https://www.suse.com/security/cve/CVE-2025-22002/" source="CVE"/>
		<reference ref_id="CVE-2025-22003" ref_url="https://www.suse.com/security/cve/CVE-2025-22003/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<reference ref_id="CVE-2025-22005" ref_url="https://www.suse.com/security/cve/CVE-2025-22005/" source="CVE"/>
		<reference ref_id="CVE-2025-22007" ref_url="https://www.suse.com/security/cve/CVE-2025-22007/" source="CVE"/>
		<reference ref_id="CVE-2025-22008" ref_url="https://www.suse.com/security/cve/CVE-2025-22008/" source="CVE"/>
		<reference ref_id="CVE-2025-22009" ref_url="https://www.suse.com/security/cve/CVE-2025-22009/" source="CVE"/>
		<reference ref_id="CVE-2025-22010" ref_url="https://www.suse.com/security/cve/CVE-2025-22010/" source="CVE"/>
		<reference ref_id="CVE-2025-22013" ref_url="https://www.suse.com/security/cve/CVE-2025-22013/" source="CVE"/>
		<reference ref_id="CVE-2025-22014" ref_url="https://www.suse.com/security/cve/CVE-2025-22014/" source="CVE"/>
		<reference ref_id="CVE-2025-22015" ref_url="https://www.suse.com/security/cve/CVE-2025-22015/" source="CVE"/>
		<reference ref_id="CVE-2025-22016" ref_url="https://www.suse.com/security/cve/CVE-2025-22016/" source="CVE"/>
		<reference ref_id="CVE-2025-22017" ref_url="https://www.suse.com/security/cve/CVE-2025-22017/" source="CVE"/>
		<reference ref_id="CVE-2025-22018" ref_url="https://www.suse.com/security/cve/CVE-2025-22018/" source="CVE"/>
		<reference ref_id="CVE-2025-22020" ref_url="https://www.suse.com/security/cve/CVE-2025-22020/" source="CVE"/>
		<reference ref_id="CVE-2025-22021" ref_url="https://www.suse.com/security/cve/CVE-2025-22021/" source="CVE"/>
		<reference ref_id="CVE-2025-22022" ref_url="https://www.suse.com/security/cve/CVE-2025-22022/" source="CVE"/>
		<reference ref_id="CVE-2025-22023" ref_url="https://www.suse.com/security/cve/CVE-2025-22023/" source="CVE"/>
		<reference ref_id="CVE-2025-22024" ref_url="https://www.suse.com/security/cve/CVE-2025-22024/" source="CVE"/>
		<reference ref_id="CVE-2025-22025" ref_url="https://www.suse.com/security/cve/CVE-2025-22025/" source="CVE"/>
		<reference ref_id="CVE-2025-22027" ref_url="https://www.suse.com/security/cve/CVE-2025-22027/" source="CVE"/>
		<reference ref_id="CVE-2025-22028" ref_url="https://www.suse.com/security/cve/CVE-2025-22028/" source="CVE"/>
		<reference ref_id="CVE-2025-22029" ref_url="https://www.suse.com/security/cve/CVE-2025-22029/" source="CVE"/>
		<reference ref_id="CVE-2025-22030" ref_url="https://www.suse.com/security/cve/CVE-2025-22030/" source="CVE"/>
		<reference ref_id="CVE-2025-22032" ref_url="https://www.suse.com/security/cve/CVE-2025-22032/" source="CVE"/>
		<reference ref_id="CVE-2025-22033" ref_url="https://www.suse.com/security/cve/CVE-2025-22033/" source="CVE"/>
		<reference ref_id="CVE-2025-22035" ref_url="https://www.suse.com/security/cve/CVE-2025-22035/" source="CVE"/>
		<reference ref_id="CVE-2025-22036" ref_url="https://www.suse.com/security/cve/CVE-2025-22036/" source="CVE"/>
		<reference ref_id="CVE-2025-22044" ref_url="https://www.suse.com/security/cve/CVE-2025-22044/" source="CVE"/>
		<reference ref_id="CVE-2025-22045" ref_url="https://www.suse.com/security/cve/CVE-2025-22045/" source="CVE"/>
		<reference ref_id="CVE-2025-22046" ref_url="https://www.suse.com/security/cve/CVE-2025-22046/" source="CVE"/>
		<reference ref_id="CVE-2025-22047" ref_url="https://www.suse.com/security/cve/CVE-2025-22047/" source="CVE"/>
		<reference ref_id="CVE-2025-22050" ref_url="https://www.suse.com/security/cve/CVE-2025-22050/" source="CVE"/>
		<reference ref_id="CVE-2025-22053" ref_url="https://www.suse.com/security/cve/CVE-2025-22053/" source="CVE"/>
		<reference ref_id="CVE-2025-22055" ref_url="https://www.suse.com/security/cve/CVE-2025-22055/" source="CVE"/>
		<reference ref_id="CVE-2025-22056" ref_url="https://www.suse.com/security/cve/CVE-2025-22056/" source="CVE"/>
		<reference ref_id="CVE-2025-22057" ref_url="https://www.suse.com/security/cve/CVE-2025-22057/" source="CVE"/>
		<reference ref_id="CVE-2025-22058" ref_url="https://www.suse.com/security/cve/CVE-2025-22058/" source="CVE"/>
		<reference ref_id="CVE-2025-22059" ref_url="https://www.suse.com/security/cve/CVE-2025-22059/" source="CVE"/>
		<reference ref_id="CVE-2025-22060" ref_url="https://www.suse.com/security/cve/CVE-2025-22060/" source="CVE"/>
		<reference ref_id="CVE-2025-22062" ref_url="https://www.suse.com/security/cve/CVE-2025-22062/" source="CVE"/>
		<reference ref_id="CVE-2025-22063" ref_url="https://www.suse.com/security/cve/CVE-2025-22063/" source="CVE"/>
		<reference ref_id="CVE-2025-22064" ref_url="https://www.suse.com/security/cve/CVE-2025-22064/" source="CVE"/>
		<reference ref_id="CVE-2025-22065" ref_url="https://www.suse.com/security/cve/CVE-2025-22065/" source="CVE"/>
		<reference ref_id="CVE-2025-22066" ref_url="https://www.suse.com/security/cve/CVE-2025-22066/" source="CVE"/>
		<reference ref_id="CVE-2025-22068" ref_url="https://www.suse.com/security/cve/CVE-2025-22068/" source="CVE"/>
		<reference ref_id="CVE-2025-22070" ref_url="https://www.suse.com/security/cve/CVE-2025-22070/" source="CVE"/>
		<reference ref_id="CVE-2025-22075" ref_url="https://www.suse.com/security/cve/CVE-2025-22075/" source="CVE"/>
		<reference ref_id="CVE-2025-22076" ref_url="https://www.suse.com/security/cve/CVE-2025-22076/" source="CVE"/>
		<reference ref_id="CVE-2025-22078" ref_url="https://www.suse.com/security/cve/CVE-2025-22078/" source="CVE"/>
		<reference ref_id="CVE-2025-22080" ref_url="https://www.suse.com/security/cve/CVE-2025-22080/" source="CVE"/>
		<reference ref_id="CVE-2025-22082" ref_url="https://www.suse.com/security/cve/CVE-2025-22082/" source="CVE"/>
		<reference ref_id="CVE-2025-22083" ref_url="https://www.suse.com/security/cve/CVE-2025-22083/" source="CVE"/>
		<reference ref_id="CVE-2025-22084" ref_url="https://www.suse.com/security/cve/CVE-2025-22084/" source="CVE"/>
		<reference ref_id="CVE-2025-22085" ref_url="https://www.suse.com/security/cve/CVE-2025-22085/" source="CVE"/>
		<reference ref_id="CVE-2025-22086" ref_url="https://www.suse.com/security/cve/CVE-2025-22086/" source="CVE"/>
		<reference ref_id="CVE-2025-22087" ref_url="https://www.suse.com/security/cve/CVE-2025-22087/" source="CVE"/>
		<reference ref_id="CVE-2025-22088" ref_url="https://www.suse.com/security/cve/CVE-2025-22088/" source="CVE"/>
		<reference ref_id="CVE-2025-22089" ref_url="https://www.suse.com/security/cve/CVE-2025-22089/" source="CVE"/>
		<reference ref_id="CVE-2025-22090" ref_url="https://www.suse.com/security/cve/CVE-2025-22090/" source="CVE"/>
		<reference ref_id="CVE-2025-22091" ref_url="https://www.suse.com/security/cve/CVE-2025-22091/" source="CVE"/>
		<reference ref_id="CVE-2025-22093" ref_url="https://www.suse.com/security/cve/CVE-2025-22093/" source="CVE"/>
		<reference ref_id="CVE-2025-22094" ref_url="https://www.suse.com/security/cve/CVE-2025-22094/" source="CVE"/>
		<reference ref_id="CVE-2025-22095" ref_url="https://www.suse.com/security/cve/CVE-2025-22095/" source="CVE"/>
		<reference ref_id="CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097/" source="CVE"/>
		<reference ref_id="CVE-2025-22101" ref_url="https://www.suse.com/security/cve/CVE-2025-22101/" source="CVE"/>
		<reference ref_id="CVE-2025-22102" ref_url="https://www.suse.com/security/cve/CVE-2025-22102/" source="CVE"/>
		<reference ref_id="CVE-2025-22103" ref_url="https://www.suse.com/security/cve/CVE-2025-22103/" source="CVE"/>
		<reference ref_id="CVE-2025-22104" ref_url="https://www.suse.com/security/cve/CVE-2025-22104/" source="CVE"/>
		<reference ref_id="CVE-2025-22105" ref_url="https://www.suse.com/security/cve/CVE-2025-22105/" source="CVE"/>
		<reference ref_id="CVE-2025-22106" ref_url="https://www.suse.com/security/cve/CVE-2025-22106/" source="CVE"/>
		<reference ref_id="CVE-2025-22107" ref_url="https://www.suse.com/security/cve/CVE-2025-22107/" source="CVE"/>
		<reference ref_id="CVE-2025-22108" ref_url="https://www.suse.com/security/cve/CVE-2025-22108/" source="CVE"/>
		<reference ref_id="CVE-2025-22109" ref_url="https://www.suse.com/security/cve/CVE-2025-22109/" source="CVE"/>
		<reference ref_id="CVE-2025-22111" ref_url="https://www.suse.com/security/cve/CVE-2025-22111/" source="CVE"/>
		<reference ref_id="CVE-2025-22112" ref_url="https://www.suse.com/security/cve/CVE-2025-22112/" source="CVE"/>
		<reference ref_id="CVE-2025-22113" ref_url="https://www.suse.com/security/cve/CVE-2025-22113/" source="CVE"/>
		<reference ref_id="CVE-2025-22115" ref_url="https://www.suse.com/security/cve/CVE-2025-22115/" source="CVE"/>
		<reference ref_id="CVE-2025-22116" ref_url="https://www.suse.com/security/cve/CVE-2025-22116/" source="CVE"/>
		<reference ref_id="CVE-2025-22117" ref_url="https://www.suse.com/security/cve/CVE-2025-22117/" source="CVE"/>
		<reference ref_id="CVE-2025-22118" ref_url="https://www.suse.com/security/cve/CVE-2025-22118/" source="CVE"/>
		<reference ref_id="CVE-2025-22119" ref_url="https://www.suse.com/security/cve/CVE-2025-22119/" source="CVE"/>
		<reference ref_id="CVE-2025-22120" ref_url="https://www.suse.com/security/cve/CVE-2025-22120/" source="CVE"/>
		<reference ref_id="CVE-2025-22121" ref_url="https://www.suse.com/security/cve/CVE-2025-22121/" source="CVE"/>
		<reference ref_id="CVE-2025-22122" ref_url="https://www.suse.com/security/cve/CVE-2025-22122/" source="CVE"/>
		<reference ref_id="CVE-2025-22124" ref_url="https://www.suse.com/security/cve/CVE-2025-22124/" source="CVE"/>
		<reference ref_id="CVE-2025-22125" ref_url="https://www.suse.com/security/cve/CVE-2025-22125/" source="CVE"/>
		<reference ref_id="CVE-2025-22126" ref_url="https://www.suse.com/security/cve/CVE-2025-22126/" source="CVE"/>
		<reference ref_id="CVE-2025-22128" ref_url="https://www.suse.com/security/cve/CVE-2025-22128/" source="CVE"/>
		<reference ref_id="CVE-2025-23129" ref_url="https://www.suse.com/security/cve/CVE-2025-23129/" source="CVE"/>
		<reference ref_id="CVE-2025-23131" ref_url="https://www.suse.com/security/cve/CVE-2025-23131/" source="CVE"/>
		<reference ref_id="CVE-2025-23133" ref_url="https://www.suse.com/security/cve/CVE-2025-23133/" source="CVE"/>
		<reference ref_id="CVE-2025-23134" ref_url="https://www.suse.com/security/cve/CVE-2025-23134/" source="CVE"/>
		<reference ref_id="CVE-2025-23136" ref_url="https://www.suse.com/security/cve/CVE-2025-23136/" source="CVE"/>
		<reference ref_id="CVE-2025-23137" ref_url="https://www.suse.com/security/cve/CVE-2025-23137/" source="CVE"/>
		<reference ref_id="CVE-2025-23138" ref_url="https://www.suse.com/security/cve/CVE-2025-23138/" source="CVE"/>
		<reference ref_id="CVE-2025-23140" ref_url="https://www.suse.com/security/cve/CVE-2025-23140/" source="CVE"/>
		<reference ref_id="CVE-2025-23142" ref_url="https://www.suse.com/security/cve/CVE-2025-23142/" source="CVE"/>
		<reference ref_id="CVE-2025-23144" ref_url="https://www.suse.com/security/cve/CVE-2025-23144/" source="CVE"/>
		<reference ref_id="CVE-2025-23145" ref_url="https://www.suse.com/security/cve/CVE-2025-23145/" source="CVE"/>
		<reference ref_id="CVE-2025-23146" ref_url="https://www.suse.com/security/cve/CVE-2025-23146/" source="CVE"/>
		<reference ref_id="CVE-2025-23147" ref_url="https://www.suse.com/security/cve/CVE-2025-23147/" source="CVE"/>
		<reference ref_id="CVE-2025-23148" ref_url="https://www.suse.com/security/cve/CVE-2025-23148/" source="CVE"/>
		<reference ref_id="CVE-2025-23149" ref_url="https://www.suse.com/security/cve/CVE-2025-23149/" source="CVE"/>
		<reference ref_id="CVE-2025-23150" ref_url="https://www.suse.com/security/cve/CVE-2025-23150/" source="CVE"/>
		<reference ref_id="CVE-2025-23151" ref_url="https://www.suse.com/security/cve/CVE-2025-23151/" source="CVE"/>
		<reference ref_id="CVE-2025-23154" ref_url="https://www.suse.com/security/cve/CVE-2025-23154/" source="CVE"/>
		<reference ref_id="CVE-2025-23155" ref_url="https://www.suse.com/security/cve/CVE-2025-23155/" source="CVE"/>
		<reference ref_id="CVE-2025-23156" ref_url="https://www.suse.com/security/cve/CVE-2025-23156/" source="CVE"/>
		<reference ref_id="CVE-2025-23157" ref_url="https://www.suse.com/security/cve/CVE-2025-23157/" source="CVE"/>
		<reference ref_id="CVE-2025-23158" ref_url="https://www.suse.com/security/cve/CVE-2025-23158/" source="CVE"/>
		<reference ref_id="CVE-2025-23159" ref_url="https://www.suse.com/security/cve/CVE-2025-23159/" source="CVE"/>
		<reference ref_id="CVE-2025-23160" ref_url="https://www.suse.com/security/cve/CVE-2025-23160/" source="CVE"/>
		<reference ref_id="CVE-2025-23161" ref_url="https://www.suse.com/security/cve/CVE-2025-23161/" source="CVE"/>
		<reference ref_id="CVE-2025-23162" ref_url="https://www.suse.com/security/cve/CVE-2025-23162/" source="CVE"/>
		<reference ref_id="CVE-2025-23163" ref_url="https://www.suse.com/security/cve/CVE-2025-23163/" source="CVE"/>
		<reference ref_id="CVE-2025-37738" ref_url="https://www.suse.com/security/cve/CVE-2025-37738/" source="CVE"/>
		<reference ref_id="CVE-2025-37743" ref_url="https://www.suse.com/security/cve/CVE-2025-37743/" source="CVE"/>
		<reference ref_id="CVE-2025-37745" ref_url="https://www.suse.com/security/cve/CVE-2025-37745/" source="CVE"/>
		<reference ref_id="CVE-2025-37746" ref_url="https://www.suse.com/security/cve/CVE-2025-37746/" source="CVE"/>
		<reference ref_id="CVE-2025-37747" ref_url="https://www.suse.com/security/cve/CVE-2025-37747/" source="CVE"/>
		<reference ref_id="CVE-2025-37748" ref_url="https://www.suse.com/security/cve/CVE-2025-37748/" source="CVE"/>
		<reference ref_id="CVE-2025-37749" ref_url="https://www.suse.com/security/cve/CVE-2025-37749/" source="CVE"/>
		<reference ref_id="CVE-2025-37750" ref_url="https://www.suse.com/security/cve/CVE-2025-37750/" source="CVE"/>
		<reference ref_id="CVE-2025-37752" ref_url="https://www.suse.com/security/cve/CVE-2025-37752/" source="CVE"/>
		<reference ref_id="CVE-2025-37754" ref_url="https://www.suse.com/security/cve/CVE-2025-37754/" source="CVE"/>
		<reference ref_id="CVE-2025-37755" ref_url="https://www.suse.com/security/cve/CVE-2025-37755/" source="CVE"/>
		<reference ref_id="CVE-2025-37756" ref_url="https://www.suse.com/security/cve/CVE-2025-37756/" source="CVE"/>
		<reference ref_id="CVE-2025-37757" ref_url="https://www.suse.com/security/cve/CVE-2025-37757/" source="CVE"/>
		<reference ref_id="CVE-2025-37758" ref_url="https://www.suse.com/security/cve/CVE-2025-37758/" source="CVE"/>
		<reference ref_id="CVE-2025-37759" ref_url="https://www.suse.com/security/cve/CVE-2025-37759/" source="CVE"/>
		<reference ref_id="CVE-2025-37760" ref_url="https://www.suse.com/security/cve/CVE-2025-37760/" source="CVE"/>
		<reference ref_id="CVE-2025-37761" ref_url="https://www.suse.com/security/cve/CVE-2025-37761/" source="CVE"/>
		<reference ref_id="CVE-2025-37763" ref_url="https://www.suse.com/security/cve/CVE-2025-37763/" source="CVE"/>
		<reference ref_id="CVE-2025-37764" ref_url="https://www.suse.com/security/cve/CVE-2025-37764/" source="CVE"/>
		<reference ref_id="CVE-2025-37765" ref_url="https://www.suse.com/security/cve/CVE-2025-37765/" source="CVE"/>
		<reference ref_id="CVE-2025-37766" ref_url="https://www.suse.com/security/cve/CVE-2025-37766/" source="CVE"/>
		<reference ref_id="CVE-2025-37767" ref_url="https://www.suse.com/security/cve/CVE-2025-37767/" source="CVE"/>
		<reference ref_id="CVE-2025-37768" ref_url="https://www.suse.com/security/cve/CVE-2025-37768/" source="CVE"/>
		<reference ref_id="CVE-2025-37769" ref_url="https://www.suse.com/security/cve/CVE-2025-37769/" source="CVE"/>
		<reference ref_id="CVE-2025-37770" ref_url="https://www.suse.com/security/cve/CVE-2025-37770/" source="CVE"/>
		<reference ref_id="CVE-2025-37771" ref_url="https://www.suse.com/security/cve/CVE-2025-37771/" source="CVE"/>
		<reference ref_id="CVE-2025-37772" ref_url="https://www.suse.com/security/cve/CVE-2025-37772/" source="CVE"/>
		<reference ref_id="CVE-2025-37773" ref_url="https://www.suse.com/security/cve/CVE-2025-37773/" source="CVE"/>
		<reference ref_id="CVE-2025-37774" ref_url="https://www.suse.com/security/cve/CVE-2025-37774/" source="CVE"/>
		<reference ref_id="CVE-2025-37779" ref_url="https://www.suse.com/security/cve/CVE-2025-37779/" source="CVE"/>
		<reference ref_id="CVE-2025-37780" ref_url="https://www.suse.com/security/cve/CVE-2025-37780/" source="CVE"/>
		<reference ref_id="CVE-2025-37781" ref_url="https://www.suse.com/security/cve/CVE-2025-37781/" source="CVE"/>
		<reference ref_id="CVE-2025-37785" ref_url="https://www.suse.com/security/cve/CVE-2025-37785/" source="CVE"/>
		<reference ref_id="CVE-2025-37786" ref_url="https://www.suse.com/security/cve/CVE-2025-37786/" source="CVE"/>
		<reference ref_id="CVE-2025-37787" ref_url="https://www.suse.com/security/cve/CVE-2025-37787/" source="CVE"/>
		<reference ref_id="CVE-2025-37788" ref_url="https://www.suse.com/security/cve/CVE-2025-37788/" source="CVE"/>
		<reference ref_id="CVE-2025-37789" ref_url="https://www.suse.com/security/cve/CVE-2025-37789/" source="CVE"/>
		<reference ref_id="CVE-2025-37790" ref_url="https://www.suse.com/security/cve/CVE-2025-37790/" source="CVE"/>
		<reference ref_id="CVE-2025-37791" ref_url="https://www.suse.com/security/cve/CVE-2025-37791/" source="CVE"/>
		<reference ref_id="CVE-2025-37792" ref_url="https://www.suse.com/security/cve/CVE-2025-37792/" source="CVE"/>
		<reference ref_id="CVE-2025-37793" ref_url="https://www.suse.com/security/cve/CVE-2025-37793/" source="CVE"/>
		<reference ref_id="CVE-2025-37794" ref_url="https://www.suse.com/security/cve/CVE-2025-37794/" source="CVE"/>
		<reference ref_id="CVE-2025-37796" ref_url="https://www.suse.com/security/cve/CVE-2025-37796/" source="CVE"/>
		<reference ref_id="CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-37799" ref_url="https://www.suse.com/security/cve/CVE-2025-37799/" source="CVE"/>
		<reference ref_id="CVE-2025-37800" ref_url="https://www.suse.com/security/cve/CVE-2025-37800/" source="CVE"/>
		<reference ref_id="CVE-2025-37801" ref_url="https://www.suse.com/security/cve/CVE-2025-37801/" source="CVE"/>
		<reference ref_id="CVE-2025-37803" ref_url="https://www.suse.com/security/cve/CVE-2025-37803/" source="CVE"/>
		<reference ref_id="CVE-2025-37804" ref_url="https://www.suse.com/security/cve/CVE-2025-37804/" source="CVE"/>
		<reference ref_id="CVE-2025-37805" ref_url="https://www.suse.com/security/cve/CVE-2025-37805/" source="CVE"/>
		<reference ref_id="CVE-2025-37808" ref_url="https://www.suse.com/security/cve/CVE-2025-37808/" source="CVE"/>
		<reference ref_id="CVE-2025-37809" ref_url="https://www.suse.com/security/cve/CVE-2025-37809/" source="CVE"/>
		<reference ref_id="CVE-2025-37810" ref_url="https://www.suse.com/security/cve/CVE-2025-37810/" source="CVE"/>
		<reference ref_id="CVE-2025-37811" ref_url="https://www.suse.com/security/cve/CVE-2025-37811/" source="CVE"/>
		<reference ref_id="CVE-2025-37812" ref_url="https://www.suse.com/security/cve/CVE-2025-37812/" source="CVE"/>
		<reference ref_id="CVE-2025-37813" ref_url="https://www.suse.com/security/cve/CVE-2025-37813/" source="CVE"/>
		<reference ref_id="CVE-2025-37814" ref_url="https://www.suse.com/security/cve/CVE-2025-37814/" source="CVE"/>
		<reference ref_id="CVE-2025-37815" ref_url="https://www.suse.com/security/cve/CVE-2025-37815/" source="CVE"/>
		<reference ref_id="CVE-2025-37816" ref_url="https://www.suse.com/security/cve/CVE-2025-37816/" source="CVE"/>
		<reference ref_id="CVE-2025-37819" ref_url="https://www.suse.com/security/cve/CVE-2025-37819/" source="CVE"/>
		<reference ref_id="CVE-2025-37820" ref_url="https://www.suse.com/security/cve/CVE-2025-37820/" source="CVE"/>
		<reference ref_id="CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823/" source="CVE"/>
		<reference ref_id="CVE-2025-37824" ref_url="https://www.suse.com/security/cve/CVE-2025-37824/" source="CVE"/>
		<reference ref_id="CVE-2025-37825" ref_url="https://www.suse.com/security/cve/CVE-2025-37825/" source="CVE"/>
		<reference ref_id="CVE-2025-37826" ref_url="https://www.suse.com/security/cve/CVE-2025-37826/" source="CVE"/>
		<reference ref_id="CVE-2025-37827" ref_url="https://www.suse.com/security/cve/CVE-2025-37827/" source="CVE"/>
		<reference ref_id="CVE-2025-37828" ref_url="https://www.suse.com/security/cve/CVE-2025-37828/" source="CVE"/>
		<reference ref_id="CVE-2025-37829" ref_url="https://www.suse.com/security/cve/CVE-2025-37829/" source="CVE"/>
		<reference ref_id="CVE-2025-37830" ref_url="https://www.suse.com/security/cve/CVE-2025-37830/" source="CVE"/>
		<reference ref_id="CVE-2025-37831" ref_url="https://www.suse.com/security/cve/CVE-2025-37831/" source="CVE"/>
		<reference ref_id="CVE-2025-37833" ref_url="https://www.suse.com/security/cve/CVE-2025-37833/" source="CVE"/>
		<reference ref_id="CVE-2025-37836" ref_url="https://www.suse.com/security/cve/CVE-2025-37836/" source="CVE"/>
		<reference ref_id="CVE-2025-37837" ref_url="https://www.suse.com/security/cve/CVE-2025-37837/" source="CVE"/>
		<reference ref_id="CVE-2025-37838" ref_url="https://www.suse.com/security/cve/CVE-2025-37838/" source="CVE"/>
		<reference ref_id="CVE-2025-37839" ref_url="https://www.suse.com/security/cve/CVE-2025-37839/" source="CVE"/>
		<reference ref_id="CVE-2025-37840" ref_url="https://www.suse.com/security/cve/CVE-2025-37840/" source="CVE"/>
		<reference ref_id="CVE-2025-37842" ref_url="https://www.suse.com/security/cve/CVE-2025-37842/" source="CVE"/>
		<reference ref_id="CVE-2025-37843" ref_url="https://www.suse.com/security/cve/CVE-2025-37843/" source="CVE"/>
		<reference ref_id="CVE-2025-37844" ref_url="https://www.suse.com/security/cve/CVE-2025-37844/" source="CVE"/>
		<reference ref_id="CVE-2025-37846" ref_url="https://www.suse.com/security/cve/CVE-2025-37846/" source="CVE"/>
		<reference ref_id="CVE-2025-37847" ref_url="https://www.suse.com/security/cve/CVE-2025-37847/" source="CVE"/>
		<reference ref_id="CVE-2025-37848" ref_url="https://www.suse.com/security/cve/CVE-2025-37848/" source="CVE"/>
		<reference ref_id="CVE-2025-37850" ref_url="https://www.suse.com/security/cve/CVE-2025-37850/" source="CVE"/>
		<reference ref_id="CVE-2025-37851" ref_url="https://www.suse.com/security/cve/CVE-2025-37851/" source="CVE"/>
		<reference ref_id="CVE-2025-37852" ref_url="https://www.suse.com/security/cve/CVE-2025-37852/" source="CVE"/>
		<reference ref_id="CVE-2025-37853" ref_url="https://www.suse.com/security/cve/CVE-2025-37853/" source="CVE"/>
		<reference ref_id="CVE-2025-37854" ref_url="https://www.suse.com/security/cve/CVE-2025-37854/" source="CVE"/>
		<reference ref_id="CVE-2025-37859" ref_url="https://www.suse.com/security/cve/CVE-2025-37859/" source="CVE"/>
		<reference ref_id="CVE-2025-37860" ref_url="https://www.suse.com/security/cve/CVE-2025-37860/" source="CVE"/>
		<reference ref_id="CVE-2025-37862" ref_url="https://www.suse.com/security/cve/CVE-2025-37862/" source="CVE"/>
		<reference ref_id="CVE-2025-37863" ref_url="https://www.suse.com/security/cve/CVE-2025-37863/" source="CVE"/>
		<reference ref_id="CVE-2025-37865" ref_url="https://www.suse.com/security/cve/CVE-2025-37865/" source="CVE"/>
		<reference ref_id="CVE-2025-37867" ref_url="https://www.suse.com/security/cve/CVE-2025-37867/" source="CVE"/>
		<reference ref_id="CVE-2025-37868" ref_url="https://www.suse.com/security/cve/CVE-2025-37868/" source="CVE"/>
		<reference ref_id="CVE-2025-37869" ref_url="https://www.suse.com/security/cve/CVE-2025-37869/" source="CVE"/>
		<reference ref_id="CVE-2025-37870" ref_url="https://www.suse.com/security/cve/CVE-2025-37870/" source="CVE"/>
		<reference ref_id="CVE-2025-37871" ref_url="https://www.suse.com/security/cve/CVE-2025-37871/" source="CVE"/>
		<reference ref_id="CVE-2025-37872" ref_url="https://www.suse.com/security/cve/CVE-2025-37872/" source="CVE"/>
		<reference ref_id="CVE-2025-37873" ref_url="https://www.suse.com/security/cve/CVE-2025-37873/" source="CVE"/>
		<reference ref_id="CVE-2025-37874" ref_url="https://www.suse.com/security/cve/CVE-2025-37874/" source="CVE"/>
		<reference ref_id="CVE-2025-37875" ref_url="https://www.suse.com/security/cve/CVE-2025-37875/" source="CVE"/>
		<reference ref_id="CVE-2025-37877" ref_url="https://www.suse.com/security/cve/CVE-2025-37877/" source="CVE"/>
		<reference ref_id="CVE-2025-37878" ref_url="https://www.suse.com/security/cve/CVE-2025-37878/" source="CVE"/>
		<reference ref_id="CVE-2025-37879" ref_url="https://www.suse.com/security/cve/CVE-2025-37879/" source="CVE"/>
		<reference ref_id="CVE-2025-37881" ref_url="https://www.suse.com/security/cve/CVE-2025-37881/" source="CVE"/>
		<reference ref_id="CVE-2025-37882" ref_url="https://www.suse.com/security/cve/CVE-2025-37882/" source="CVE"/>
		<reference ref_id="CVE-2025-37884" ref_url="https://www.suse.com/security/cve/CVE-2025-37884/" source="CVE"/>
		<reference ref_id="CVE-2025-37885" ref_url="https://www.suse.com/security/cve/CVE-2025-37885/" source="CVE"/>
		<reference ref_id="CVE-2025-37886" ref_url="https://www.suse.com/security/cve/CVE-2025-37886/" source="CVE"/>
		<reference ref_id="CVE-2025-37887" ref_url="https://www.suse.com/security/cve/CVE-2025-37887/" source="CVE"/>
		<reference ref_id="CVE-2025-37888" ref_url="https://www.suse.com/security/cve/CVE-2025-37888/" source="CVE"/>
		<reference ref_id="CVE-2025-37889" ref_url="https://www.suse.com/security/cve/CVE-2025-37889/" source="CVE"/>
		<reference ref_id="CVE-2025-37890" ref_url="https://www.suse.com/security/cve/CVE-2025-37890/" source="CVE"/>
		<reference ref_id="CVE-2025-37891" ref_url="https://www.suse.com/security/cve/CVE-2025-37891/" source="CVE"/>
		<reference ref_id="CVE-2025-37892" ref_url="https://www.suse.com/security/cve/CVE-2025-37892/" source="CVE"/>
		<reference ref_id="CVE-2025-37894" ref_url="https://www.suse.com/security/cve/CVE-2025-37894/" source="CVE"/>
		<reference ref_id="CVE-2025-37895" ref_url="https://www.suse.com/security/cve/CVE-2025-37895/" source="CVE"/>
		<reference ref_id="CVE-2025-37897" ref_url="https://www.suse.com/security/cve/CVE-2025-37897/" source="CVE"/>
		<reference ref_id="CVE-2025-37898" ref_url="https://www.suse.com/security/cve/CVE-2025-37898/" source="CVE"/>
		<reference ref_id="CVE-2025-37900" ref_url="https://www.suse.com/security/cve/CVE-2025-37900/" source="CVE"/>
		<reference ref_id="CVE-2025-37901" ref_url="https://www.suse.com/security/cve/CVE-2025-37901/" source="CVE"/>
		<reference ref_id="CVE-2025-37903" ref_url="https://www.suse.com/security/cve/CVE-2025-37903/" source="CVE"/>
		<reference ref_id="CVE-2025-37905" ref_url="https://www.suse.com/security/cve/CVE-2025-37905/" source="CVE"/>
		<reference ref_id="CVE-2025-37907" ref_url="https://www.suse.com/security/cve/CVE-2025-37907/" source="CVE"/>
		<reference ref_id="CVE-2025-37908" ref_url="https://www.suse.com/security/cve/CVE-2025-37908/" source="CVE"/>
		<reference ref_id="CVE-2025-37909" ref_url="https://www.suse.com/security/cve/CVE-2025-37909/" source="CVE"/>
		<reference ref_id="CVE-2025-37910" ref_url="https://www.suse.com/security/cve/CVE-2025-37910/" source="CVE"/>
		<reference ref_id="CVE-2025-37911" ref_url="https://www.suse.com/security/cve/CVE-2025-37911/" source="CVE"/>
		<reference ref_id="CVE-2025-37912" ref_url="https://www.suse.com/security/cve/CVE-2025-37912/" source="CVE"/>
		<reference ref_id="CVE-2025-37913" ref_url="https://www.suse.com/security/cve/CVE-2025-37913/" source="CVE"/>
		<reference ref_id="CVE-2025-37914" ref_url="https://www.suse.com/security/cve/CVE-2025-37914/" source="CVE"/>
		<reference ref_id="CVE-2025-37915" ref_url="https://www.suse.com/security/cve/CVE-2025-37915/" source="CVE"/>
		<reference ref_id="CVE-2025-37917" ref_url="https://www.suse.com/security/cve/CVE-2025-37917/" source="CVE"/>
		<reference ref_id="CVE-2025-37918" ref_url="https://www.suse.com/security/cve/CVE-2025-37918/" source="CVE"/>
		<reference ref_id="CVE-2025-37919" ref_url="https://www.suse.com/security/cve/CVE-2025-37919/" source="CVE"/>
		<reference ref_id="CVE-2025-37920" ref_url="https://www.suse.com/security/cve/CVE-2025-37920/" source="CVE"/>
		<reference ref_id="CVE-2025-37921" ref_url="https://www.suse.com/security/cve/CVE-2025-37921/" source="CVE"/>
		<reference ref_id="CVE-2025-37922" ref_url="https://www.suse.com/security/cve/CVE-2025-37922/" source="CVE"/>
		<reference ref_id="CVE-2025-37923" ref_url="https://www.suse.com/security/cve/CVE-2025-37923/" source="CVE"/>
		<reference ref_id="CVE-2025-37927" ref_url="https://www.suse.com/security/cve/CVE-2025-37927/" source="CVE"/>
		<reference ref_id="CVE-2025-37928" ref_url="https://www.suse.com/security/cve/CVE-2025-37928/" source="CVE"/>
		<reference ref_id="CVE-2025-37929" ref_url="https://www.suse.com/security/cve/CVE-2025-37929/" source="CVE"/>
		<reference ref_id="CVE-2025-37930" ref_url="https://www.suse.com/security/cve/CVE-2025-37930/" source="CVE"/>
		<reference ref_id="CVE-2025-37931" ref_url="https://www.suse.com/security/cve/CVE-2025-37931/" source="CVE"/>
		<reference ref_id="CVE-2025-37932" ref_url="https://www.suse.com/security/cve/CVE-2025-37932/" source="CVE"/>
		<reference ref_id="CVE-2025-37933" ref_url="https://www.suse.com/security/cve/CVE-2025-37933/" source="CVE"/>
		<reference ref_id="CVE-2025-37934" ref_url="https://www.suse.com/security/cve/CVE-2025-37934/" source="CVE"/>
		<reference ref_id="CVE-2025-37935" ref_url="https://www.suse.com/security/cve/CVE-2025-37935/" source="CVE"/>
		<reference ref_id="CVE-2025-37936" ref_url="https://www.suse.com/security/cve/CVE-2025-37936/" source="CVE"/>
		<reference ref_id="CVE-2025-37937" ref_url="https://www.suse.com/security/cve/CVE-2025-37937/" source="CVE"/>
		<reference ref_id="CVE-2025-37938" ref_url="https://www.suse.com/security/cve/CVE-2025-37938/" source="CVE"/>
		<reference ref_id="CVE-2025-37941" ref_url="https://www.suse.com/security/cve/CVE-2025-37941/" source="CVE"/>
		<reference ref_id="CVE-2025-37942" ref_url="https://www.suse.com/security/cve/CVE-2025-37942/" source="CVE"/>
		<reference ref_id="CVE-2025-37943" ref_url="https://www.suse.com/security/cve/CVE-2025-37943/" source="CVE"/>
		<reference ref_id="CVE-2025-37944" ref_url="https://www.suse.com/security/cve/CVE-2025-37944/" source="CVE"/>
		<reference ref_id="CVE-2025-37945" ref_url="https://www.suse.com/security/cve/CVE-2025-37945/" source="CVE"/>
		<reference ref_id="CVE-2025-37946" ref_url="https://www.suse.com/security/cve/CVE-2025-37946/" source="CVE"/>
		<reference ref_id="CVE-2025-37948" ref_url="https://www.suse.com/security/cve/CVE-2025-37948/" source="CVE"/>
		<reference ref_id="CVE-2025-37949" ref_url="https://www.suse.com/security/cve/CVE-2025-37949/" source="CVE"/>
		<reference ref_id="CVE-2025-37951" ref_url="https://www.suse.com/security/cve/CVE-2025-37951/" source="CVE"/>
		<reference ref_id="CVE-2025-37953" ref_url="https://www.suse.com/security/cve/CVE-2025-37953/" source="CVE"/>
		<reference ref_id="CVE-2025-37954" ref_url="https://www.suse.com/security/cve/CVE-2025-37954/" source="CVE"/>
		<reference ref_id="CVE-2025-37955" ref_url="https://www.suse.com/security/cve/CVE-2025-37955/" source="CVE"/>
		<reference ref_id="CVE-2025-37957" ref_url="https://www.suse.com/security/cve/CVE-2025-37957/" source="CVE"/>
		<reference ref_id="CVE-2025-37958" ref_url="https://www.suse.com/security/cve/CVE-2025-37958/" source="CVE"/>
		<reference ref_id="CVE-2025-37959" ref_url="https://www.suse.com/security/cve/CVE-2025-37959/" source="CVE"/>
		<reference ref_id="CVE-2025-37960" ref_url="https://www.suse.com/security/cve/CVE-2025-37960/" source="CVE"/>
		<reference ref_id="CVE-2025-37961" ref_url="https://www.suse.com/security/cve/CVE-2025-37961/" source="CVE"/>
		<reference ref_id="CVE-2025-37963" ref_url="https://www.suse.com/security/cve/CVE-2025-37963/" source="CVE"/>
		<reference ref_id="CVE-2025-37965" ref_url="https://www.suse.com/security/cve/CVE-2025-37965/" source="CVE"/>
		<reference ref_id="CVE-2025-37967" ref_url="https://www.suse.com/security/cve/CVE-2025-37967/" source="CVE"/>
		<reference ref_id="CVE-2025-37968" ref_url="https://www.suse.com/security/cve/CVE-2025-37968/" source="CVE"/>
		<reference ref_id="CVE-2025-37969" ref_url="https://www.suse.com/security/cve/CVE-2025-37969/" source="CVE"/>
		<reference ref_id="CVE-2025-37970" ref_url="https://www.suse.com/security/cve/CVE-2025-37970/" source="CVE"/>
		<reference ref_id="CVE-2025-37971" ref_url="https://www.suse.com/security/cve/CVE-2025-37971/" source="CVE"/>
		<reference ref_id="CVE-2025-37972" ref_url="https://www.suse.com/security/cve/CVE-2025-37972/" source="CVE"/>
		<reference ref_id="CVE-2025-37973" ref_url="https://www.suse.com/security/cve/CVE-2025-37973/" source="CVE"/>
		<reference ref_id="CVE-2025-37974" ref_url="https://www.suse.com/security/cve/CVE-2025-37974/" source="CVE"/>
		<reference ref_id="CVE-2025-37978" ref_url="https://www.suse.com/security/cve/CVE-2025-37978/" source="CVE"/>
		<reference ref_id="CVE-2025-37979" ref_url="https://www.suse.com/security/cve/CVE-2025-37979/" source="CVE"/>
		<reference ref_id="CVE-2025-37980" ref_url="https://www.suse.com/security/cve/CVE-2025-37980/" source="CVE"/>
		<reference ref_id="CVE-2025-37981" ref_url="https://www.suse.com/security/cve/CVE-2025-37981/" source="CVE"/>
		<reference ref_id="CVE-2025-37982" ref_url="https://www.suse.com/security/cve/CVE-2025-37982/" source="CVE"/>
		<reference ref_id="CVE-2025-37983" ref_url="https://www.suse.com/security/cve/CVE-2025-37983/" source="CVE"/>
		<reference ref_id="CVE-2025-37984" ref_url="https://www.suse.com/security/cve/CVE-2025-37984/" source="CVE"/>
		<reference ref_id="CVE-2025-37985" ref_url="https://www.suse.com/security/cve/CVE-2025-37985/" source="CVE"/>
		<reference ref_id="CVE-2025-37986" ref_url="https://www.suse.com/security/cve/CVE-2025-37986/" source="CVE"/>
		<reference ref_id="CVE-2025-37987" ref_url="https://www.suse.com/security/cve/CVE-2025-37987/" source="CVE"/>
		<reference ref_id="CVE-2025-37988" ref_url="https://www.suse.com/security/cve/CVE-2025-37988/" source="CVE"/>
		<reference ref_id="CVE-2025-37989" ref_url="https://www.suse.com/security/cve/CVE-2025-37989/" source="CVE"/>
		<reference ref_id="CVE-2025-37990" ref_url="https://www.suse.com/security/cve/CVE-2025-37990/" source="CVE"/>
		<reference ref_id="CVE-2025-37992" ref_url="https://www.suse.com/security/cve/CVE-2025-37992/" source="CVE"/>
		<reference ref_id="CVE-2025-37993" ref_url="https://www.suse.com/security/cve/CVE-2025-37993/" source="CVE"/>
		<reference ref_id="CVE-2025-37994" ref_url="https://www.suse.com/security/cve/CVE-2025-37994/" source="CVE"/>
		<reference ref_id="CVE-2025-37995" ref_url="https://www.suse.com/security/cve/CVE-2025-37995/" source="CVE"/>
		<reference ref_id="CVE-2025-37996" ref_url="https://www.suse.com/security/cve/CVE-2025-37996/" source="CVE"/>
		<reference ref_id="CVE-2025-37997" ref_url="https://www.suse.com/security/cve/CVE-2025-37997/" source="CVE"/>
		<reference ref_id="CVE-2025-37998" ref_url="https://www.suse.com/security/cve/CVE-2025-37998/" source="CVE"/>
		<reference ref_id="CVE-2025-37999" ref_url="https://www.suse.com/security/cve/CVE-2025-37999/" source="CVE"/>
		<reference ref_id="CVE-2025-38000" ref_url="https://www.suse.com/security/cve/CVE-2025-38000/" source="CVE"/>
		<reference ref_id="CVE-2025-38001" ref_url="https://www.suse.com/security/cve/CVE-2025-38001/" source="CVE"/>
		<reference ref_id="CVE-2025-38003" ref_url="https://www.suse.com/security/cve/CVE-2025-38003/" source="CVE"/>
		<reference ref_id="CVE-2025-38004" ref_url="https://www.suse.com/security/cve/CVE-2025-38004/" source="CVE"/>
		<reference ref_id="CVE-2025-38005" ref_url="https://www.suse.com/security/cve/CVE-2025-38005/" source="CVE"/>
		<reference ref_id="CVE-2025-38007" ref_url="https://www.suse.com/security/cve/CVE-2025-38007/" source="CVE"/>
		<reference ref_id="CVE-2025-38009" ref_url="https://www.suse.com/security/cve/CVE-2025-38009/" source="CVE"/>
		<reference ref_id="CVE-2025-38010" ref_url="https://www.suse.com/security/cve/CVE-2025-38010/" source="CVE"/>
		<reference ref_id="CVE-2025-38011" ref_url="https://www.suse.com/security/cve/CVE-2025-38011/" source="CVE"/>
		<reference ref_id="CVE-2025-38013" ref_url="https://www.suse.com/security/cve/CVE-2025-38013/" source="CVE"/>
		<reference ref_id="CVE-2025-38014" ref_url="https://www.suse.com/security/cve/CVE-2025-38014/" source="CVE"/>
		<reference ref_id="CVE-2025-38015" ref_url="https://www.suse.com/security/cve/CVE-2025-38015/" source="CVE"/>
		<reference ref_id="CVE-2025-38016" ref_url="https://www.suse.com/security/cve/CVE-2025-38016/" source="CVE"/>
		<reference ref_id="CVE-2025-38018" ref_url="https://www.suse.com/security/cve/CVE-2025-38018/" source="CVE"/>
		<reference ref_id="CVE-2025-38020" ref_url="https://www.suse.com/security/cve/CVE-2025-38020/" source="CVE"/>
		<reference ref_id="CVE-2025-38022" ref_url="https://www.suse.com/security/cve/CVE-2025-38022/" source="CVE"/>
		<reference ref_id="CVE-2025-38023" ref_url="https://www.suse.com/security/cve/CVE-2025-38023/" source="CVE"/>
		<reference ref_id="CVE-2025-38024" ref_url="https://www.suse.com/security/cve/CVE-2025-38024/" source="CVE"/>
		<reference ref_id="CVE-2025-38027" ref_url="https://www.suse.com/security/cve/CVE-2025-38027/" source="CVE"/>
		<reference ref_id="CVE-2025-38031" ref_url="https://www.suse.com/security/cve/CVE-2025-38031/" source="CVE"/>
		<reference ref_id="CVE-2025-38035" ref_url="https://www.suse.com/security/cve/CVE-2025-38035/" source="CVE"/>
		<reference ref_id="CVE-2025-38040" ref_url="https://www.suse.com/security/cve/CVE-2025-38040/" source="CVE"/>
		<reference ref_id="CVE-2025-38043" ref_url="https://www.suse.com/security/cve/CVE-2025-38043/" source="CVE"/>
		<reference ref_id="CVE-2025-38044" ref_url="https://www.suse.com/security/cve/CVE-2025-38044/" source="CVE"/>
		<reference ref_id="CVE-2025-38045" ref_url="https://www.suse.com/security/cve/CVE-2025-38045/" source="CVE"/>
		<reference ref_id="CVE-2025-38047" ref_url="https://www.suse.com/security/cve/CVE-2025-38047/" source="CVE"/>
		<reference ref_id="CVE-2025-38050" ref_url="https://www.suse.com/security/cve/CVE-2025-38050/" source="CVE"/>
		<reference ref_id="CVE-2025-38051" ref_url="https://www.suse.com/security/cve/CVE-2025-38051/" source="CVE"/>
		<reference ref_id="CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052/" source="CVE"/>
		<reference ref_id="CVE-2025-38053" ref_url="https://www.suse.com/security/cve/CVE-2025-38053/" source="CVE"/>
		<reference ref_id="CVE-2025-38054" ref_url="https://www.suse.com/security/cve/CVE-2025-38054/" source="CVE"/>
		<reference ref_id="CVE-2025-38055" ref_url="https://www.suse.com/security/cve/CVE-2025-38055/" source="CVE"/>
		<reference ref_id="CVE-2025-38056" ref_url="https://www.suse.com/security/cve/CVE-2025-38056/" source="CVE"/>
		<reference ref_id="CVE-2025-38057" ref_url="https://www.suse.com/security/cve/CVE-2025-38057/" source="CVE"/>
		<reference ref_id="CVE-2025-38059" ref_url="https://www.suse.com/security/cve/CVE-2025-38059/" source="CVE"/>
		<reference ref_id="CVE-2025-38060" ref_url="https://www.suse.com/security/cve/CVE-2025-38060/" source="CVE"/>
		<reference ref_id="CVE-2025-38061" ref_url="https://www.suse.com/security/cve/CVE-2025-38061/" source="CVE"/>
		<reference ref_id="CVE-2025-38063" ref_url="https://www.suse.com/security/cve/CVE-2025-38063/" source="CVE"/>
		<reference ref_id="CVE-2025-38064" ref_url="https://www.suse.com/security/cve/CVE-2025-38064/" source="CVE"/>
		<reference ref_id="CVE-2025-38066" ref_url="https://www.suse.com/security/cve/CVE-2025-38066/" source="CVE"/>
		<reference ref_id="CVE-2025-38068" ref_url="https://www.suse.com/security/cve/CVE-2025-38068/" source="CVE"/>
		<reference ref_id="CVE-2025-38069" ref_url="https://www.suse.com/security/cve/CVE-2025-38069/" source="CVE"/>
		<reference ref_id="CVE-2025-38072" ref_url="https://www.suse.com/security/cve/CVE-2025-38072/" source="CVE"/>
		<reference ref_id="CVE-2025-38073" ref_url="https://www.suse.com/security/cve/CVE-2025-38073/" source="CVE"/>
		<reference ref_id="CVE-2025-38074" ref_url="https://www.suse.com/security/cve/CVE-2025-38074/" source="CVE"/>
		<reference ref_id="CVE-2025-38077" ref_url="https://www.suse.com/security/cve/CVE-2025-38077/" source="CVE"/>
		<reference ref_id="CVE-2025-38078" ref_url="https://www.suse.com/security/cve/CVE-2025-38078/" source="CVE"/>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<reference ref_id="CVE-2025-38080" ref_url="https://www.suse.com/security/cve/CVE-2025-38080/" source="CVE"/>
		<reference ref_id="CVE-2025-38081" ref_url="https://www.suse.com/security/cve/CVE-2025-38081/" source="CVE"/>
		<reference ref_id="CVE-2025-38082" ref_url="https://www.suse.com/security/cve/CVE-2025-38082/" source="CVE"/>
		<reference ref_id="CVE-2025-38083" ref_url="https://www.suse.com/security/cve/CVE-2025-38083/" source="CVE"/>
		<reference ref_id="CVE-2025-38094" ref_url="https://www.suse.com/security/cve/CVE-2025-38094/" source="CVE"/>
		<reference ref_id="CVE-2025-38097" ref_url="https://www.suse.com/security/cve/CVE-2025-38097/" source="CVE"/>
		<reference ref_id="CVE-2025-38100" ref_url="https://www.suse.com/security/cve/CVE-2025-38100/" source="CVE"/>
		<reference ref_id="CVE-2025-38104" ref_url="https://www.suse.com/security/cve/CVE-2025-38104/" source="CVE"/>
		<reference ref_id="CVE-2025-38105" ref_url="https://www.suse.com/security/cve/CVE-2025-38105/" source="CVE"/>
		<reference ref_id="CVE-2025-38115" ref_url="https://www.suse.com/security/cve/CVE-2025-38115/" source="CVE"/>
		<reference ref_id="CVE-2025-38126" ref_url="https://www.suse.com/security/cve/CVE-2025-38126/" source="CVE"/>
		<reference ref_id="CVE-2025-38131" ref_url="https://www.suse.com/security/cve/CVE-2025-38131/" source="CVE"/>
		<reference ref_id="CVE-2025-38132" ref_url="https://www.suse.com/security/cve/CVE-2025-38132/" source="CVE"/>
		<reference ref_id="CVE-2025-38139" ref_url="https://www.suse.com/security/cve/CVE-2025-38139/" source="CVE"/>
		<reference ref_id="CVE-2025-38140" ref_url="https://www.suse.com/security/cve/CVE-2025-38140/" source="CVE"/>
		<reference ref_id="CVE-2025-38147" ref_url="https://www.suse.com/security/cve/CVE-2025-38147/" source="CVE"/>
		<reference ref_id="CVE-2025-38152" ref_url="https://www.suse.com/security/cve/CVE-2025-38152/" source="CVE"/>
		<reference ref_id="CVE-2025-38154" ref_url="https://www.suse.com/security/cve/CVE-2025-38154/" source="CVE"/>
		<reference ref_id="CVE-2025-38158" ref_url="https://www.suse.com/security/cve/CVE-2025-38158/" source="CVE"/>
		<reference ref_id="CVE-2025-38162" ref_url="https://www.suse.com/security/cve/CVE-2025-38162/" source="CVE"/>
		<reference ref_id="CVE-2025-38166" ref_url="https://www.suse.com/security/cve/CVE-2025-38166/" source="CVE"/>
		<reference ref_id="CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180/" source="CVE"/>
		<reference ref_id="CVE-2025-38183" ref_url="https://www.suse.com/security/cve/CVE-2025-38183/" source="CVE"/>
		<reference ref_id="CVE-2025-38187" ref_url="https://www.suse.com/security/cve/CVE-2025-38187/" source="CVE"/>
		<reference ref_id="CVE-2025-38192" ref_url="https://www.suse.com/security/cve/CVE-2025-38192/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<reference ref_id="CVE-2025-38202" ref_url="https://www.suse.com/security/cve/CVE-2025-38202/" source="CVE"/>
		<reference ref_id="CVE-2025-38206" ref_url="https://www.suse.com/security/cve/CVE-2025-38206/" source="CVE"/>
		<reference ref_id="CVE-2025-38207" ref_url="https://www.suse.com/security/cve/CVE-2025-38207/" source="CVE"/>
		<reference ref_id="CVE-2025-38210" ref_url="https://www.suse.com/security/cve/CVE-2025-38210/" source="CVE"/>
		<reference ref_id="CVE-2025-38212" ref_url="https://www.suse.com/security/cve/CVE-2025-38212/" source="CVE"/>
		<reference ref_id="CVE-2025-38236" ref_url="https://www.suse.com/security/cve/CVE-2025-38236/" source="CVE"/>
		<reference ref_id="CVE-2025-38239" ref_url="https://www.suse.com/security/cve/CVE-2025-38239/" source="CVE"/>
		<reference ref_id="CVE-2025-38240" ref_url="https://www.suse.com/security/cve/CVE-2025-38240/" source="CVE"/>
		<reference ref_id="CVE-2025-38248" ref_url="https://www.suse.com/security/cve/CVE-2025-38248/" source="CVE"/>
		<reference ref_id="CVE-2025-38250" ref_url="https://www.suse.com/security/cve/CVE-2025-38250/" source="CVE"/>
		<reference ref_id="CVE-2025-38279" ref_url="https://www.suse.com/security/cve/CVE-2025-38279/" source="CVE"/>
		<reference ref_id="CVE-2025-38283" ref_url="https://www.suse.com/security/cve/CVE-2025-38283/" source="CVE"/>
		<reference ref_id="CVE-2025-38310" ref_url="https://www.suse.com/security/cve/CVE-2025-38310/" source="CVE"/>
		<reference ref_id="CVE-2025-38323" ref_url="https://www.suse.com/security/cve/CVE-2025-38323/" source="CVE"/>
		<reference ref_id="CVE-2025-38334" ref_url="https://www.suse.com/security/cve/CVE-2025-38334/" source="CVE"/>
		<reference ref_id="CVE-2025-38396" ref_url="https://www.suse.com/security/cve/CVE-2025-38396/" source="CVE"/>
		<reference ref_id="CVE-2025-38453" ref_url="https://www.suse.com/security/cve/CVE-2025-38453/" source="CVE"/>
		<reference ref_id="CVE-2025-38471" ref_url="https://www.suse.com/security/cve/CVE-2025-38471/" source="CVE"/>
		<reference ref_id="CVE-2025-38475" ref_url="https://www.suse.com/security/cve/CVE-2025-38475/" source="CVE"/>
		<reference ref_id="CVE-2025-38479" ref_url="https://www.suse.com/security/cve/CVE-2025-38479/" source="CVE"/>
		<reference ref_id="CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498/" source="CVE"/>
		<reference ref_id="CVE-2025-38637" ref_url="https://www.suse.com/security/cve/CVE-2025-38637/" source="CVE"/>
		<reference ref_id="CVE-2025-39688" ref_url="https://www.suse.com/security/cve/CVE-2025-39688/" source="CVE"/>
		<reference ref_id="CVE-2025-39728" ref_url="https://www.suse.com/security/cve/CVE-2025-39728/" source="CVE"/>
		<reference ref_id="CVE-2025-39778" ref_url="https://www.suse.com/security/cve/CVE-2025-39778/" source="CVE"/>
		<reference ref_id="CVE-2025-39989" ref_url="https://www.suse.com/security/cve/CVE-2025-39989/" source="CVE"/>
		<reference ref_id="CVE-2025-40014" ref_url="https://www.suse.com/security/cve/CVE-2025-40014/" source="CVE"/>
		<reference ref_id="CVE-2025-40114" ref_url="https://www.suse.com/security/cve/CVE-2025-40114/" source="CVE"/>
		<reference ref_id="CVE-2025-40325" ref_url="https://www.suse.com/security/cve/CVE-2025-40325/" source="CVE"/>
		<reference ref_id="CVE-2025-40364" ref_url="https://www.suse.com/security/cve/CVE-2025-40364/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-64kb-6.12.0-160000.5.1 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3695">CVE-2016-3695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48628/">CVE-2022-48628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48772/">CVE-2022-48772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49145/">CVE-2022-49145 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49145">CVE-2022-49145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49320/">CVE-2022-49320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49320">CVE-2022-49320 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3269/">CVE-2023-3269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3773/">CVE-2023-3773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38417/">CVE-2023-38417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38417">CVE-2023-38417 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42752/">CVE-2023-42752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42756/">CVE-2023-42756 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4611/">CVE-2023-4611 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4611">CVE-2023-4611 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47210/">CVE-2023-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47210">CVE-2023-47210 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50431/">CVE-2023-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52433/">CVE-2023-52433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52433">CVE-2023-52433 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52434/">CVE-2023-52434 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52435/">CVE-2023-52435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52437/">CVE-2023-52437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52437">CVE-2023-52437 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52440/">CVE-2023-52440 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52440">CVE-2023-52440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52446/">CVE-2023-52446 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52446">CVE-2023-52446 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52453/">CVE-2023-52453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52455/">CVE-2023-52455 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52455">CVE-2023-52455 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52460/">CVE-2023-52460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52460">CVE-2023-52460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52461/">CVE-2023-52461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52461">CVE-2023-52461 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52462/">CVE-2023-52462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52468/">CVE-2023-52468 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52468">CVE-2023-52468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52471/">CVE-2023-52471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52471">CVE-2023-52471 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52472/">CVE-2023-52472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52472">CVE-2023-52472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52473/">CVE-2023-52473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52473">CVE-2023-52473 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52481/">CVE-2023-52481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52483/">CVE-2023-52483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52483">CVE-2023-52483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52485/">CVE-2023-52485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52485">CVE-2023-52485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52487/">CVE-2023-52487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52487">CVE-2023-52487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52488/">CVE-2023-52488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52490/">CVE-2023-52490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52490">CVE-2023-52490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52491/">CVE-2023-52491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52491">CVE-2023-52491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52493/">CVE-2023-52493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52494/">CVE-2023-52494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52495/">CVE-2023-52495 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52495">CVE-2023-52495 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52498/">CVE-2023-52498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52503/">CVE-2023-52503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52505/">CVE-2023-52505 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52505">CVE-2023-52505 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52512/">CVE-2023-52512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52512">CVE-2023-52512 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52518/">CVE-2023-52518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52522/">CVE-2023-52522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52522">CVE-2023-52522 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52526/">CVE-2023-52526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52526">CVE-2023-52526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52527/">CVE-2023-52527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52527">CVE-2023-52527 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52561/">CVE-2023-52561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52562/">CVE-2023-52562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52562">CVE-2023-52562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52563/">CVE-2023-52563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52565/">CVE-2023-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52565">CVE-2023-52565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52568/">CVE-2023-52568 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52568">CVE-2023-52568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52570/">CVE-2023-52570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52570">CVE-2023-52570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52571/">CVE-2023-52571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52571">CVE-2023-52571 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52572/">CVE-2023-52572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52572">CVE-2023-52572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52573/">CVE-2023-52573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52577/">CVE-2023-52577 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52577">CVE-2023-52577 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52578/">CVE-2023-52578 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52578">CVE-2023-52578 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52584/">CVE-2023-52584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52584">CVE-2023-52584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52585/">CVE-2023-52585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52585">CVE-2023-52585 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52586/">CVE-2023-52586 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52586">CVE-2023-52586 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52587/">CVE-2023-52587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52589/">CVE-2023-52589 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52593/">CVE-2023-52593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52599/">CVE-2023-52599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52600/">CVE-2023-52600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52601/">CVE-2023-52601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52602/">CVE-2023-52602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52603/">CVE-2023-52603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52604/">CVE-2023-52604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52608/">CVE-2023-52608 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52611/">CVE-2023-52611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52611">CVE-2023-52611 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52612/">CVE-2023-52612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52614/">CVE-2023-52614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52617/">CVE-2023-52617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52618/">CVE-2023-52618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52624/">CVE-2023-52624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52624">CVE-2023-52624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52625/">CVE-2023-52625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52625">CVE-2023-52625 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52626/">CVE-2023-52626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52626">CVE-2023-52626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52627/">CVE-2023-52627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52631/">CVE-2023-52631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52631">CVE-2023-52631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52632/">CVE-2023-52632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52634/">CVE-2023-52634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52634">CVE-2023-52634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52635/">CVE-2023-52635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52636/">CVE-2023-52636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52637/">CVE-2023-52637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52638/">CVE-2023-52638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52638">CVE-2023-52638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52639/">CVE-2023-52639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52640/">CVE-2023-52640 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52640">CVE-2023-52640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52641/">CVE-2023-52641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52641">CVE-2023-52641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52642/">CVE-2023-52642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52642">CVE-2023-52642 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52643/">CVE-2023-52643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52643">CVE-2023-52643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52644/">CVE-2023-52644 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52644">CVE-2023-52644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52645/">CVE-2023-52645 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52645">CVE-2023-52645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52647/">CVE-2023-52647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52647">CVE-2023-52647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52648/">CVE-2023-52648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52648">CVE-2023-52648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52649/">CVE-2023-52649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52649">CVE-2023-52649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52650/">CVE-2023-52650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52650">CVE-2023-52650 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52652/">CVE-2023-52652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52652">CVE-2023-52652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52656/">CVE-2023-52656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52656">CVE-2023-52656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52657/">CVE-2023-52657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52657">CVE-2023-52657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52659/">CVE-2023-52659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52659">CVE-2023-52659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52660/">CVE-2023-52660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52660">CVE-2023-52660 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52661/">CVE-2023-52661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52661">CVE-2023-52661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52663/">CVE-2023-52663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52663">CVE-2023-52663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52664/">CVE-2023-52664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52664">CVE-2023-52664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52668/">CVE-2023-52668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52668">CVE-2023-52668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52671/">CVE-2023-52671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52673/">CVE-2023-52673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52673">CVE-2023-52673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52674/">CVE-2023-52674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52674">CVE-2023-52674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52678/">CVE-2023-52678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52678">CVE-2023-52678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52680/">CVE-2023-52680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52680">CVE-2023-52680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52681/">CVE-2023-52681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52681">CVE-2023-52681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52685/">CVE-2023-52685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52685">CVE-2023-52685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52687/">CVE-2023-52687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52687">CVE-2023-52687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52688/">CVE-2023-52688 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52688">CVE-2023-52688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52691/">CVE-2023-52691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52691">CVE-2023-52691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52692/">CVE-2023-52692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52692">CVE-2023-52692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52693/">CVE-2023-52693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52693">CVE-2023-52693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52694/">CVE-2023-52694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52694">CVE-2023-52694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52695/">CVE-2023-52695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52695">CVE-2023-52695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52696/">CVE-2023-52696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52696">CVE-2023-52696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52697/">CVE-2023-52697 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52697">CVE-2023-52697 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52698/">CVE-2023-52698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52698">CVE-2023-52698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52699/">CVE-2023-52699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52749/">CVE-2023-52749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52749">CVE-2023-52749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52750/">CVE-2023-52750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52750">CVE-2023-52750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52751/">CVE-2023-52751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52751">CVE-2023-52751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52757/">CVE-2023-52757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52757">CVE-2023-52757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52765/">CVE-2023-52765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52765">CVE-2023-52765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52767/">CVE-2023-52767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52767">CVE-2023-52767 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52768/">CVE-2023-52768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52768">CVE-2023-52768 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52769/">CVE-2023-52769 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52769">CVE-2023-52769 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52771/">CVE-2023-52771 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52771">CVE-2023-52771 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52772/">CVE-2023-52772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52772">CVE-2023-52772 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52773/">CVE-2023-52773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52773">CVE-2023-52773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52776/">CVE-2023-52776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52776">CVE-2023-52776 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52778/">CVE-2023-52778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52778">CVE-2023-52778 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52780/">CVE-2023-52780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52780">CVE-2023-52780 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52782/">CVE-2023-52782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52782">CVE-2023-52782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52783/">CVE-2023-52783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52783">CVE-2023-52783 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52786/">CVE-2023-52786 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52786">CVE-2023-52786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52787/">CVE-2023-52787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52787">CVE-2023-52787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52792/">CVE-2023-52792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52792">CVE-2023-52792 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52794/">CVE-2023-52794 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52794">CVE-2023-52794 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52795/">CVE-2023-52795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52795">CVE-2023-52795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52801/">CVE-2023-52801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52801">CVE-2023-52801 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52807/">CVE-2023-52807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52807">CVE-2023-52807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52808/">CVE-2023-52808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52808">CVE-2023-52808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52812/">CVE-2023-52812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52812">CVE-2023-52812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52813/">CVE-2023-52813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52813">CVE-2023-52813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52815/">CVE-2023-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52815">CVE-2023-52815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52827/">CVE-2023-52827 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52827">CVE-2023-52827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52829/">CVE-2023-52829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52829">CVE-2023-52829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52836/">CVE-2023-52836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52836">CVE-2023-52836 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52842/">CVE-2023-52842 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52842">CVE-2023-52842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52843/">CVE-2023-52843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52843">CVE-2023-52843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52849/">CVE-2023-52849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52849">CVE-2023-52849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52850/">CVE-2023-52850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52850">CVE-2023-52850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52851/">CVE-2023-52851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52851">CVE-2023-52851 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52857/">CVE-2023-52857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52857">CVE-2023-52857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52859/">CVE-2023-52859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52859">CVE-2023-52859 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52860/">CVE-2023-52860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52860">CVE-2023-52860 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52861/">CVE-2023-52861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52861">CVE-2023-52861 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52862/">CVE-2023-52862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52862">CVE-2023-52862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52863/">CVE-2023-52863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52863">CVE-2023-52863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52866/">CVE-2023-52866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52866">CVE-2023-52866 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52869/">CVE-2023-52869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52869">CVE-2023-52869 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52874/">CVE-2023-52874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52874">CVE-2023-52874 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52879/">CVE-2023-52879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52879">CVE-2023-52879 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52882/">CVE-2023-52882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52883/">CVE-2023-52883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52883">CVE-2023-52883 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52887/">CVE-2023-52887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52889/">CVE-2023-52889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52915/">CVE-2023-52915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52915">CVE-2023-52915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52916/">CVE-2023-52916 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52916">CVE-2023-52916 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52918/">CVE-2023-52918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52918">CVE-2023-52918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53034/">CVE-2023-53034 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5972/">CVE-2023-5972 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5972">CVE-2023-5972 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6238/">CVE-2023-6238 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6238">CVE-2023-6238 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6679/">CVE-2023-6679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6679">CVE-2023-6679 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0193/">CVE-2024-0193 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0193">CVE-2024-0193 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0646/">CVE-2024-0646 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1312/">CVE-2024-1312 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1312">CVE-2024-1312 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-21823/">CVE-2024-21823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21823">CVE-2024-21823 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24861/">CVE-2024-24861 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24861">CVE-2024-24861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-25741/">CVE-2024-25741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25741">CVE-2024-25741 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26581/">CVE-2024-26581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26582/">CVE-2024-26582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26590/">CVE-2024-26590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26590">CVE-2024-26590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26597/">CVE-2024-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26599/">CVE-2024-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26605/">CVE-2024-26605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26605">CVE-2024-26605 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26611/">CVE-2024-26611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26611">CVE-2024-26611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26612/">CVE-2024-26612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26616/">CVE-2024-26616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26616">CVE-2024-26616 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26618/">CVE-2024-26618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26618">CVE-2024-26618 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26620/">CVE-2024-26620 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26623/">CVE-2024-26623 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26623">CVE-2024-26623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26625/">CVE-2024-26625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26627/">CVE-2024-26627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26631/">CVE-2024-26631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26632/">CVE-2024-26632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26632">CVE-2024-26632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26635/">CVE-2024-26635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26636/">CVE-2024-26636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26637/">CVE-2024-26637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26637">CVE-2024-26637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26638/">CVE-2024-26638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26638">CVE-2024-26638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26641/">CVE-2024-26641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26644/">CVE-2024-26644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26646/">CVE-2024-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26647/">CVE-2024-26647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26647">CVE-2024-26647 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26648/">CVE-2024-26648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26648">CVE-2024-26648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26649/">CVE-2024-26649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26650/">CVE-2024-26650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26650">CVE-2024-26650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26651/">CVE-2024-26651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26652/">CVE-2024-26652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26652">CVE-2024-26652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26654/">CVE-2024-26654 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26657/">CVE-2024-26657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26657">CVE-2024-26657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26661/">CVE-2024-26661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26662/">CVE-2024-26662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26662">CVE-2024-26662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26663/">CVE-2024-26663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26666/">CVE-2024-26666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26666">CVE-2024-26666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26667/">CVE-2024-26667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26670/">CVE-2024-26670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26672/">CVE-2024-26672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26672">CVE-2024-26672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26674/">CVE-2024-26674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26674">CVE-2024-26674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26676/">CVE-2024-26676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26676">CVE-2024-26676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26677/">CVE-2024-26677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26677">CVE-2024-26677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26679/">CVE-2024-26679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26680/">CVE-2024-26680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26681/">CVE-2024-26681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26682/">CVE-2024-26682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26682">CVE-2024-26682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26683/">CVE-2024-26683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26683">CVE-2024-26683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26684/">CVE-2024-26684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26685/">CVE-2024-26685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26691/">CVE-2024-26691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26691">CVE-2024-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26692/">CVE-2024-26692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26693/">CVE-2024-26693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26693">CVE-2024-26693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26694/">CVE-2024-26694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26694">CVE-2024-26694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26695/">CVE-2024-26695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26696/">CVE-2024-26696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26697/">CVE-2024-26697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26699/">CVE-2024-26699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26699">CVE-2024-26699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26700/">CVE-2024-26700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26702/">CVE-2024-26702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26709/">CVE-2024-26709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26709">CVE-2024-26709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26710/">CVE-2024-26710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26710">CVE-2024-26710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26711/">CVE-2024-26711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26711">CVE-2024-26711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26714/">CVE-2024-26714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26714">CVE-2024-26714 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26715/">CVE-2024-26715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26716/">CVE-2024-26716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26716">CVE-2024-26716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26718/">CVE-2024-26718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26721/">CVE-2024-26721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26721">CVE-2024-26721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26722/">CVE-2024-26722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26722">CVE-2024-26722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26723/">CVE-2024-26723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26723">CVE-2024-26723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26724/">CVE-2024-26724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26724">CVE-2024-26724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26725/">CVE-2024-26725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26725">CVE-2024-26725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26726/">CVE-2024-26726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26726">CVE-2024-26726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26728/">CVE-2024-26728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26728">CVE-2024-26728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26729/">CVE-2024-26729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26729">CVE-2024-26729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26731/">CVE-2024-26731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26731">CVE-2024-26731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26734/">CVE-2024-26734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26734">CVE-2024-26734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26736/">CVE-2024-26736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26738/">CVE-2024-26738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26738">CVE-2024-26738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26740/">CVE-2024-26740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26740">CVE-2024-26740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26742/">CVE-2024-26742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26746/">CVE-2024-26746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26746">CVE-2024-26746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26747/">CVE-2024-26747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26748/">CVE-2024-26748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26749/">CVE-2024-26749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26750/">CVE-2024-26750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26750">CVE-2024-26750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26751/">CVE-2024-26751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26752/">CVE-2024-26752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26752">CVE-2024-26752 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-26753/">CVE-2024-26753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26753">CVE-2024-26753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26754/">CVE-2024-26754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26755/">CVE-2024-26755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26755">CVE-2024-26755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26756/">CVE-2024-26756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26756">CVE-2024-26756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26757/">CVE-2024-26757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26757">CVE-2024-26757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26758/">CVE-2024-26758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26758">CVE-2024-26758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26759/">CVE-2024-26759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26761/">CVE-2024-26761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26761">CVE-2024-26761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26763/">CVE-2024-26763 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-26767/">CVE-2024-26767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26771/">CVE-2024-26771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26774/">CVE-2024-26774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26774">CVE-2024-26774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26775/">CVE-2024-26775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26776/">CVE-2024-26776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26777/">CVE-2024-26777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26778/">CVE-2024-26778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26780/">CVE-2024-26780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26780">CVE-2024-26780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26785/">CVE-2024-26785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26785">CVE-2024-26785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26786/">CVE-2024-26786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26786">CVE-2024-26786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26787/">CVE-2024-26787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26788/">CVE-2024-26788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26789/">CVE-2024-26789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26789">CVE-2024-26789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26790/">CVE-2024-26790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26791/">CVE-2024-26791 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26793/">CVE-2024-26793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26794/">CVE-2024-26794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26794">CVE-2024-26794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26797/">CVE-2024-26797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26797">CVE-2024-26797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26798/">CVE-2024-26798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26799/">CVE-2024-26799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26799">CVE-2024-26799 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26803/">CVE-2024-26803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26803">CVE-2024-26803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26805/">CVE-2024-26805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26807/">CVE-2024-26807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26809/">CVE-2024-26809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26812/">CVE-2024-26812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26815/">CVE-2024-26815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26815">CVE-2024-26815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26820/">CVE-2024-26820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26820">CVE-2024-26820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26822/">CVE-2024-26822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26822">CVE-2024-26822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26824/">CVE-2024-26824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26824">CVE-2024-26824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26825/">CVE-2024-26825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26825">CVE-2024-26825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26826/">CVE-2024-26826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26826">CVE-2024-26826 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26829/">CVE-2024-26829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26829">CVE-2024-26829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26832/">CVE-2024-26832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26832">CVE-2024-26832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26833/">CVE-2024-26833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26833">CVE-2024-26833 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26835/">CVE-2024-26835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26835">CVE-2024-26835 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26836/">CVE-2024-26836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26836">CVE-2024-26836 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26838/">CVE-2024-26838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26838">CVE-2024-26838 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26839/">CVE-2024-26839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26839">CVE-2024-26839 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26844/">CVE-2024-26844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26844">CVE-2024-26844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26845/">CVE-2024-26845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26845">CVE-2024-26845 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26847/">CVE-2024-26847 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26847">CVE-2024-26847 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26848/">CVE-2024-26848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26848">CVE-2024-26848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26849/">CVE-2024-26849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26849">CVE-2024-26849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26854/">CVE-2024-26854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26854">CVE-2024-26854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26856/">CVE-2024-26856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26856">CVE-2024-26856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26857/">CVE-2024-26857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26857">CVE-2024-26857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26858/">CVE-2024-26858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26858">CVE-2024-26858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26860/">CVE-2024-26860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26860">CVE-2024-26860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26861/">CVE-2024-26861 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26861">CVE-2024-26861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26863/">CVE-2024-26863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26863">CVE-2024-26863 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26865/">CVE-2024-26865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26865">CVE-2024-26865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26866/">CVE-2024-26866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26866">CVE-2024-26866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26868/">CVE-2024-26868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26868">CVE-2024-26868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26874/">CVE-2024-26874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26874">CVE-2024-26874 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26875/">CVE-2024-26875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26875">CVE-2024-26875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26876/">CVE-2024-26876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26876">CVE-2024-26876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26877/">CVE-2024-26877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26877">CVE-2024-26877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26879/">CVE-2024-26879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26879">CVE-2024-26879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26881/">CVE-2024-26881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26881">CVE-2024-26881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26882/">CVE-2024-26882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26882">CVE-2024-26882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26883/">CVE-2024-26883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26883">CVE-2024-26883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26884/">CVE-2024-26884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26884">CVE-2024-26884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26885/">CVE-2024-26885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26885">CVE-2024-26885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26886/">CVE-2024-26886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26886">CVE-2024-26886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26890/">CVE-2024-26890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26890">CVE-2024-26890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26891/">CVE-2024-26891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26891">CVE-2024-26891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26892/">CVE-2024-26892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26892">CVE-2024-26892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26893/">CVE-2024-26893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26893">CVE-2024-26893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26895/">CVE-2024-26895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26895">CVE-2024-26895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26896/">CVE-2024-26896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26896">CVE-2024-26896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26899/">CVE-2024-26899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26899">CVE-2024-26899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26900/">CVE-2024-26900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26900">CVE-2024-26900 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26909/">CVE-2024-26909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26909">CVE-2024-26909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26911/">CVE-2024-26911 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26911">CVE-2024-26911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26912/">CVE-2024-26912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26912">CVE-2024-26912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26913/">CVE-2024-26913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26913">CVE-2024-26913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26914/">CVE-2024-26914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26914">CVE-2024-26914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26915/">CVE-2024-26915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26915">CVE-2024-26915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26916/">CVE-2024-26916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26916">CVE-2024-26916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26917/">CVE-2024-26917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26917">CVE-2024-26917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26922/">CVE-2024-26922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26922">CVE-2024-26922 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26927/">CVE-2024-26927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26927">CVE-2024-26927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26932/">CVE-2024-26932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26932">CVE-2024-26932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26937/">CVE-2024-26937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26938/">CVE-2024-26938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26943/">CVE-2024-26943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26944/">CVE-2024-26944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26944">CVE-2024-26944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26945/">CVE-2024-26945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26945">CVE-2024-26945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26946/">CVE-2024-26946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26946">CVE-2024-26946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26948/">CVE-2024-26948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26948">CVE-2024-26948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26949/">CVE-2024-26949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26949">CVE-2024-26949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26950/">CVE-2024-26950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26951/">CVE-2024-26951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26955/">CVE-2024-26955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26956/">CVE-2024-26956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26957/">CVE-2024-26957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26959/">CVE-2024-26959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26959">CVE-2024-26959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26962/">CVE-2024-26962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26962">CVE-2024-26962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26963/">CVE-2024-26963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26963">CVE-2024-26963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26965/">CVE-2024-26965 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26966/">CVE-2024-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26968/">CVE-2024-26968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26968">CVE-2024-26968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26969/">CVE-2024-26969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26970/">CVE-2024-26970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26972/">CVE-2024-26972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26972">CVE-2024-26972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26975/">CVE-2024-26975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26975">CVE-2024-26975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26977/">CVE-2024-26977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26978/">CVE-2024-26978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26978">CVE-2024-26978 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26979/">CVE-2024-26979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26979">CVE-2024-26979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26981/">CVE-2024-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26983/">CVE-2024-26983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26983">CVE-2024-26983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26986/">CVE-2024-26986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26986">CVE-2024-26986 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26988/">CVE-2024-26988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26989/">CVE-2024-26989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26990/">CVE-2024-26990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26990">CVE-2024-26990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26991/">CVE-2024-26991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26991">CVE-2024-26991 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26992/">CVE-2024-26992 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26992">CVE-2024-26992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26994/">CVE-2024-26994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26995/">CVE-2024-26995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26995">CVE-2024-26995 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26996/">CVE-2024-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26997/">CVE-2024-26997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26999/">CVE-2024-26999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27000/">CVE-2024-27000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27001/">CVE-2024-27001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27001">CVE-2024-27001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27002/">CVE-2024-27002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27002">CVE-2024-27002 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27003/">CVE-2024-27003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27003">CVE-2024-27003 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27004/">CVE-2024-27004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27009/">CVE-2024-27009 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27009">CVE-2024-27009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27012/">CVE-2024-27012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27012">CVE-2024-27012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27015/">CVE-2024-27015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27022/">CVE-2024-27022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27022">CVE-2024-27022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27023/">CVE-2024-27023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27023">CVE-2024-27023 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27024/">CVE-2024-27024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27024">CVE-2024-27024 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27026/">CVE-2024-27026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27026">CVE-2024-27026 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27027/">CVE-2024-27027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27027">CVE-2024-27027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27028/">CVE-2024-27028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27028">CVE-2024-27028 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27029/">CVE-2024-27029 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27029">CVE-2024-27029 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27031/">CVE-2024-27031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27031">CVE-2024-27031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27036/">CVE-2024-27036 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27036">CVE-2024-27036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27037/">CVE-2024-27037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27037">CVE-2024-27037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27038/">CVE-2024-27038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27038">CVE-2024-27038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27039/">CVE-2024-27039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27039">CVE-2024-27039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27040/">CVE-2024-27040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27040">CVE-2024-27040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27041/">CVE-2024-27041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27041">CVE-2024-27041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27044/">CVE-2024-27044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27044">CVE-2024-27044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27045/">CVE-2024-27045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27045">CVE-2024-27045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27047/">CVE-2024-27047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27047">CVE-2024-27047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27048/">CVE-2024-27048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27048">CVE-2024-27048 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27049/">CVE-2024-27049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27049">CVE-2024-27049 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27050/">CVE-2024-27050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27050">CVE-2024-27050 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27051/">CVE-2024-27051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27051">CVE-2024-27051 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27053/">CVE-2024-27053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27053">CVE-2024-27053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27054/">CVE-2024-27054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27054">CVE-2024-27054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27057/">CVE-2024-27057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27057">CVE-2024-27057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27060/">CVE-2024-27060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27060">CVE-2024-27060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27064/">CVE-2024-27064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27064">CVE-2024-27064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27067/">CVE-2024-27067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27067">CVE-2024-27067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27068/">CVE-2024-27068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27068">CVE-2024-27068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27071/">CVE-2024-27071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27071">CVE-2024-27071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27072/">CVE-2024-27072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27072">CVE-2024-27072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27073/">CVE-2024-27073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27073">CVE-2024-27073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27074/">CVE-2024-27074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27074">CVE-2024-27074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27075/">CVE-2024-27075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27075">CVE-2024-27075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27076/">CVE-2024-27076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27076">CVE-2024-27076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27077/">CVE-2024-27077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27077">CVE-2024-27077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27078/">CVE-2024-27078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27078">CVE-2024-27078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27079/">CVE-2024-27079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27079">CVE-2024-27079 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27080/">CVE-2024-27080 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27080">CVE-2024-27080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27391/">CVE-2024-27391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27391">CVE-2024-27391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27396/">CVE-2024-27396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27400/">CVE-2024-27400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27400">CVE-2024-27400 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27401/">CVE-2024-27401 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27401">CVE-2024-27401 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27402/">CVE-2024-27402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27402">CVE-2024-27402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27404/">CVE-2024-27404 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27404">CVE-2024-27404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27405/">CVE-2024-27405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27405">CVE-2024-27405 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27408/">CVE-2024-27408 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27408">CVE-2024-27408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27411/">CVE-2024-27411 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27411">CVE-2024-27411 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27412/">CVE-2024-27412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27412">CVE-2024-27412 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27414/">CVE-2024-27414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27414">CVE-2024-27414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27416/">CVE-2024-27416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27416">CVE-2024-27416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27418/">CVE-2024-27418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27418">CVE-2024-27418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27431/">CVE-2024-27431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27431">CVE-2024-27431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27432/">CVE-2024-27432 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27432">CVE-2024-27432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27433/">CVE-2024-27433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27433">CVE-2024-27433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27434/">CVE-2024-27434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27434">CVE-2024-27434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27436/">CVE-2024-27436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27436">CVE-2024-27436 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27437/">CVE-2024-27437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33619/">CVE-2024-33619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34777/">CVE-2024-34777 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-34777">CVE-2024-34777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35247/">CVE-2024-35247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35784/">CVE-2024-35784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35784">CVE-2024-35784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35786/">CVE-2024-35786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35786">CVE-2024-35786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35788/">CVE-2024-35788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35788">CVE-2024-35788 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35794/">CVE-2024-35794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35794">CVE-2024-35794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35795/">CVE-2024-35795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35795">CVE-2024-35795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35796/">CVE-2024-35796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35799/">CVE-2024-35799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35800/">CVE-2024-35800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35800">CVE-2024-35800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35803/">CVE-2024-35803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35803">CVE-2024-35803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35804/">CVE-2024-35804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35805/">CVE-2024-35805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35806/">CVE-2024-35806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35808/">CVE-2024-35808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35808">CVE-2024-35808 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35809/">CVE-2024-35809 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35810/">CVE-2024-35810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35810">CVE-2024-35810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35812/">CVE-2024-35812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35813/">CVE-2024-35813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35819/">CVE-2024-35819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35821/">CVE-2024-35821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35822/">CVE-2024-35822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35824/">CVE-2024-35824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35824">CVE-2024-35824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35825/">CVE-2024-35825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35827/">CVE-2024-35827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35827">CVE-2024-35827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35828/">CVE-2024-35828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35828">CVE-2024-35828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35829/">CVE-2024-35829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35829">CVE-2024-35829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35830/">CVE-2024-35830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35830">CVE-2024-35830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35831/">CVE-2024-35831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35831">CVE-2024-35831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35833/">CVE-2024-35833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35833">CVE-2024-35833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35834/">CVE-2024-35834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35834">CVE-2024-35834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35836/">CVE-2024-35836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35836">CVE-2024-35836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35837/">CVE-2024-35837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35837">CVE-2024-35837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35838/">CVE-2024-35838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35838">CVE-2024-35838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35841/">CVE-2024-35841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35841">CVE-2024-35841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35842/">CVE-2024-35842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35842">CVE-2024-35842 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35843/">CVE-2024-35843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35843">CVE-2024-35843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35849/">CVE-2024-35849 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35850/">CVE-2024-35850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35850">CVE-2024-35850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35851/">CVE-2024-35851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35860/">CVE-2024-35860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35865/">CVE-2024-35865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35866/">CVE-2024-35866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35872/">CVE-2024-35872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35879/">CVE-2024-35879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35880/">CVE-2024-35880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35880">CVE-2024-35880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35883/">CVE-2024-35883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35883">CVE-2024-35883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35886/">CVE-2024-35886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35887/">CVE-2024-35887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35889/">CVE-2024-35889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35889">CVE-2024-35889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35891/">CVE-2024-35891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35891">CVE-2024-35891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35892/">CVE-2024-35892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35892">CVE-2024-35892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35902/">CVE-2024-35902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35903/">CVE-2024-35903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35903">CVE-2024-35903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35908/">CVE-2024-35908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35908">CVE-2024-35908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35909/">CVE-2024-35909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35909">CVE-2024-35909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35911/">CVE-2024-35911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35911">CVE-2024-35911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35913/">CVE-2024-35913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35913">CVE-2024-35913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35915/">CVE-2024-35915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35916/">CVE-2024-35916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35916">CVE-2024-35916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35917/">CVE-2024-35917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35917">CVE-2024-35917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35921/">CVE-2024-35921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35921">CVE-2024-35921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35922/">CVE-2024-35922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35926/">CVE-2024-35926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35926">CVE-2024-35926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35927/">CVE-2024-35927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35927">CVE-2024-35927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35928/">CVE-2024-35928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35928">CVE-2024-35928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35931/">CVE-2024-35931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35931">CVE-2024-35931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35932/">CVE-2024-35932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35935/">CVE-2024-35935 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35936/">CVE-2024-35936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35940/">CVE-2024-35940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35942/">CVE-2024-35942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35942">CVE-2024-35942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35943/">CVE-2024-35943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35945/">CVE-2024-35945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35946/">CVE-2024-35946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35946">CVE-2024-35946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35951/">CVE-2024-35951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35953/">CVE-2024-35953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35953">CVE-2024-35953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35954/">CVE-2024-35954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35954">CVE-2024-35954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35955/">CVE-2024-35955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35956/">CVE-2024-35956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35957/">CVE-2024-35957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35957">CVE-2024-35957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35961/">CVE-2024-35961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35970/">CVE-2024-35970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35970">CVE-2024-35970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35971/">CVE-2024-35971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35972/">CVE-2024-35972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35972">CVE-2024-35972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35973/">CVE-2024-35973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35974/">CVE-2024-35974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35974">CVE-2024-35974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35975/">CVE-2024-35975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35975">CVE-2024-35975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35976/">CVE-2024-35976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35977/">CVE-2024-35977 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35977">CVE-2024-35977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35979/">CVE-2024-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35980/">CVE-2024-35980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35981/">CVE-2024-35981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35981">CVE-2024-35981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35982/">CVE-2024-35982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35984/">CVE-2024-35984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35986/">CVE-2024-35986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35986">CVE-2024-35986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35990/">CVE-2024-35990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35991/">CVE-2024-35991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35991">CVE-2024-35991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35992/">CVE-2024-35992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35992">CVE-2024-35992 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-35995/">CVE-2024-35995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35997/">CVE-2024-35997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35998/">CVE-2024-35998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35999/">CVE-2024-35999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36002/">CVE-2024-36002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36002">CVE-2024-36002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36003/">CVE-2024-36003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36003">CVE-2024-36003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36008/">CVE-2024-36008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36009/">CVE-2024-36009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36010/">CVE-2024-36010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36010">CVE-2024-36010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36011/">CVE-2024-36011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36011">CVE-2024-36011 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36014/">CVE-2024-36014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36014">CVE-2024-36014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36015/">CVE-2024-36015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36015">CVE-2024-36015 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36018/">CVE-2024-36018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36018">CVE-2024-36018 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36019/">CVE-2024-36019 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36019">CVE-2024-36019 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36021/">CVE-2024-36021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36024/">CVE-2024-36024 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36024">CVE-2024-36024 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36026/">CVE-2024-36026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36029/">CVE-2024-36029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36030/">CVE-2024-36030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36030">CVE-2024-36030 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36032/">CVE-2024-36032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36281/">CVE-2024-36281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36281">CVE-2024-36281 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36288/">CVE-2024-36288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36288">CVE-2024-36288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36348/">CVE-2024-36348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36348">CVE-2024-36348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36349/">CVE-2024-36349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36349">CVE-2024-36349 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36476/">CVE-2024-36476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36477/">CVE-2024-36477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36478/">CVE-2024-36478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36478">CVE-2024-36478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36479/">CVE-2024-36479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36881/">CVE-2024-36881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36881">CVE-2024-36881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36882/">CVE-2024-36882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36882">CVE-2024-36882 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36885/">CVE-2024-36885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36885">CVE-2024-36885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36887/">CVE-2024-36887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36887">CVE-2024-36887 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36890/">CVE-2024-36890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36891/">CVE-2024-36891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36891">CVE-2024-36891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36893/">CVE-2024-36893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36895/">CVE-2024-36895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36895">CVE-2024-36895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36897/">CVE-2024-36897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36898/">CVE-2024-36898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36898">CVE-2024-36898 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36900/">CVE-2024-36900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36903/">CVE-2024-36903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36903">CVE-2024-36903 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36906/">CVE-2024-36906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36907/">CVE-2024-36907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36907">CVE-2024-36907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36909/">CVE-2024-36909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36910/">CVE-2024-36910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36911/">CVE-2024-36911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36912/">CVE-2024-36912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36913/">CVE-2024-36913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36914/">CVE-2024-36914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36915/">CVE-2024-36915 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36915">CVE-2024-36915 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36916/">CVE-2024-36916 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36918/">CVE-2024-36918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36921/">CVE-2024-36921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36922/">CVE-2024-36922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36923/">CVE-2024-36923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36923">CVE-2024-36923 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36930/">CVE-2024-36930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36930">CVE-2024-36930 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36931/">CVE-2024-36931 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36934/">CVE-2024-36934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36935/">CVE-2024-36935 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36935">CVE-2024-36935 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36936/">CVE-2024-36936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36936">CVE-2024-36936 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36937/">CVE-2024-36937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36938/">CVE-2024-36938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36946/">CVE-2024-36946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36949/">CVE-2024-36949 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36951/">CVE-2024-36951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36951">CVE-2024-36951 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36962/">CVE-2024-36962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36965/">CVE-2024-36965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36967/">CVE-2024-36967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36968/">CVE-2024-36968 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36968">CVE-2024-36968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36969/">CVE-2024-36969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36970/">CVE-2024-36970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36970">CVE-2024-36970 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36972/">CVE-2024-36972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36972">CVE-2024-36972 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36973/">CVE-2024-36973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36973">CVE-2024-36973 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36975/">CVE-2024-36975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36977/">CVE-2024-36977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36977">CVE-2024-36977 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36979/">CVE-2024-36979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37021/">CVE-2024-37021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-37078/">CVE-2024-37078 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-37354/">CVE-2024-37354 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38381/">CVE-2024-38381 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38384/">CVE-2024-38384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38384">CVE-2024-38384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38385/">CVE-2024-38385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38385">CVE-2024-38385 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38388/">CVE-2024-38388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38390/">CVE-2024-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38391/">CVE-2024-38391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38391">CVE-2024-38391 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38539/">CVE-2024-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38539">CVE-2024-38539 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38543/">CVE-2024-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38543">CVE-2024-38543 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38546/">CVE-2024-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38547/">CVE-2024-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38549/">CVE-2024-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38550/">CVE-2024-38550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38551/">CVE-2024-38551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38551">CVE-2024-38551 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38552/">CVE-2024-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38553/">CVE-2024-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38554/">CVE-2024-38554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38557/">CVE-2024-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38562/">CVE-2024-38562 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38562">CVE-2024-38562 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38563/">CVE-2024-38563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38563">CVE-2024-38563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38565/">CVE-2024-38565 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38566/">CVE-2024-38566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38566">CVE-2024-38566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38567/">CVE-2024-38567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38568/">CVE-2024-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38569/">CVE-2024-38569 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38569">CVE-2024-38569 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38571/">CVE-2024-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38572/">CVE-2024-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38572">CVE-2024-38572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38575/">CVE-2024-38575 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38576/">CVE-2024-38576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38576">CVE-2024-38576 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38577/">CVE-2024-38577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38582/">CVE-2024-38582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38583/">CVE-2024-38583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38587/">CVE-2024-38587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38588/">CVE-2024-38588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38590/">CVE-2024-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38591/">CVE-2024-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38592/">CVE-2024-38592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38592">CVE-2024-38592 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38594/">CVE-2024-38594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38594">CVE-2024-38594 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38595/">CVE-2024-38595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38595">CVE-2024-38595 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38597/">CVE-2024-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38600/">CVE-2024-38600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38602/">CVE-2024-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38603/">CVE-2024-38603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38604/">CVE-2024-38604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38604">CVE-2024-38604 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38605/">CVE-2024-38605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38609/">CVE-2024-38609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38609">CVE-2024-38609 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38610/">CVE-2024-38610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38610">CVE-2024-38610 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38611/">CVE-2024-38611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38611">CVE-2024-38611 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38616/">CVE-2024-38616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38617/">CVE-2024-38617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38617">CVE-2024-38617 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38618/">CVE-2024-38618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38621/">CVE-2024-38621 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38622/">CVE-2024-38622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38622">CVE-2024-38622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38628/">CVE-2024-38628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38629/">CVE-2024-38629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38629">CVE-2024-38629 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38630/">CVE-2024-38630 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38632/">CVE-2024-38632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38633/">CVE-2024-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38634/">CVE-2024-38634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38635/">CVE-2024-38635 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38636/">CVE-2024-38636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38636">CVE-2024-38636 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38659/">CVE-2024-38659 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38661/">CVE-2024-38661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38662/">CVE-2024-38662 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38663/">CVE-2024-38663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38663">CVE-2024-38663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38664/">CVE-2024-38664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38664">CVE-2024-38664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38780/">CVE-2024-38780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-39277/">CVE-2024-39277 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39277">CVE-2024-39277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39282/">CVE-2024-39282 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39282">CVE-2024-39282 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39291/">CVE-2024-39291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39291">CVE-2024-39291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39296/">CVE-2024-39296 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39296">CVE-2024-39296 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39301/">CVE-2024-39301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39362/">CVE-2024-39362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39362">CVE-2024-39362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39371/">CVE-2024-39371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39466/">CVE-2024-39466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39466">CVE-2024-39466 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39468/">CVE-2024-39468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39469/">CVE-2024-39469 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39473/">CVE-2024-39473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39473">CVE-2024-39473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39474/">CVE-2024-39474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39474">CVE-2024-39474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39475/">CVE-2024-39475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39479/">CVE-2024-39479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39479">CVE-2024-39479 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39481/">CVE-2024-39481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39481">CVE-2024-39481 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39482/">CVE-2024-39482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39483/">CVE-2024-39483 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39483">CVE-2024-39483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39484/">CVE-2024-39484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39484">CVE-2024-39484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39486/">CVE-2024-39486 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39486">CVE-2024-39486 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39488/">CVE-2024-39488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39489/">CVE-2024-39489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39490/">CVE-2024-39490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-39491/">CVE-2024-39491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39491">CVE-2024-39491 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39493/">CVE-2024-39493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39496/">CVE-2024-39496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39496">CVE-2024-39496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39497/">CVE-2024-39497 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39498/">CVE-2024-39498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39498">CVE-2024-39498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39504/">CVE-2024-39504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39504">CVE-2024-39504 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39505/">CVE-2024-39505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39507/">CVE-2024-39507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39508/">CVE-2024-39508 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39509/">CVE-2024-39509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39510/">CVE-2024-39510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39510">CVE-2024-39510 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40899/">CVE-2024-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40899">CVE-2024-40899 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40900/">CVE-2024-40900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40903/">CVE-2024-40903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40908/">CVE-2024-40908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40913/">CVE-2024-40913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40913">CVE-2024-40913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40916/">CVE-2024-40916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40919/">CVE-2024-40919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40920/">CVE-2024-40920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40920">CVE-2024-40920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40921/">CVE-2024-40921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40921">CVE-2024-40921 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40922/">CVE-2024-40922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40922">CVE-2024-40922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40923/">CVE-2024-40923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40925/">CVE-2024-40925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40925">CVE-2024-40925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40926/">CVE-2024-40926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40926">CVE-2024-40926 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40928/">CVE-2024-40928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40928">CVE-2024-40928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40930/">CVE-2024-40930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40930">CVE-2024-40930 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40932/">CVE-2024-40932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40934/">CVE-2024-40934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40935/">CVE-2024-40935 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40936/">CVE-2024-40936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40936">CVE-2024-40936 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40938/">CVE-2024-40938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40938">CVE-2024-40938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40939/">CVE-2024-40939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40939">CVE-2024-40939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40940/">CVE-2024-40940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40942/">CVE-2024-40942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40943/">CVE-2024-40943 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40944/">CVE-2024-40944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40944">CVE-2024-40944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40945/">CVE-2024-40945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40947/">CVE-2024-40947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40947">CVE-2024-40947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40948/">CVE-2024-40948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40948">CVE-2024-40948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40953/">CVE-2024-40953 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40957/">CVE-2024-40957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40962/">CVE-2024-40962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40962">CVE-2024-40962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40964/">CVE-2024-40964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40964">CVE-2024-40964 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40965/">CVE-2024-40965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40965">CVE-2024-40965 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40966/">CVE-2024-40966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40967/">CVE-2024-40967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40970/">CVE-2024-40970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40973/">CVE-2024-40973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40975/">CVE-2024-40975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40975">CVE-2024-40975 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40976/">CVE-2024-40976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40979/">CVE-2024-40979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40979">CVE-2024-40979 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40981/">CVE-2024-40981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40982/">CVE-2024-40982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40987/">CVE-2024-40987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40990/">CVE-2024-40990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40992/">CVE-2024-40992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40992">CVE-2024-40992 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40999/">CVE-2024-40999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40999">CVE-2024-40999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41000/">CVE-2024-41000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41001/">CVE-2024-41001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41001">CVE-2024-41001 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41002/">CVE-2024-41002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41004/">CVE-2024-41004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41006/">CVE-2024-41006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41010/">CVE-2024-41010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41010">CVE-2024-41010 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41015/">CVE-2024-41015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41017/">CVE-2024-41017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41020/">CVE-2024-41020 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41022/">CVE-2024-41022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41024/">CVE-2024-41024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41024">CVE-2024-41024 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41025/">CVE-2024-41025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41025">CVE-2024-41025 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41028/">CVE-2024-41028 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41028">CVE-2024-41028 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41031/">CVE-2024-41031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41031">CVE-2024-41031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41032/">CVE-2024-41032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41032">CVE-2024-41032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41036/">CVE-2024-41036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41037/">CVE-2024-41037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41037">CVE-2024-41037 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41045/">CVE-2024-41045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41045">CVE-2024-41045 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41047/">CVE-2024-41047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41047">CVE-2024-41047 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41048/">CVE-2024-41048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41049/">CVE-2024-41049 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41050/">CVE-2024-41050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41050">CVE-2024-41050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41051/">CVE-2024-41051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41051">CVE-2024-41051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41057/">CVE-2024-41057 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41058/">CVE-2024-41058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41061/">CVE-2024-41061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41061">CVE-2024-41061 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41063/">CVE-2024-41063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41068/">CVE-2024-41068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41070/">CVE-2024-41070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41072/">CVE-2024-41072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41074/">CVE-2024-41074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41074">CVE-2024-41074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41075/">CVE-2024-41075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41075">CVE-2024-41075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41078/">CVE-2024-41078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41079/">CVE-2024-41079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41080/">CVE-2024-41080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41080">CVE-2024-41080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41081/">CVE-2024-41081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41082/">CVE-2024-41082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41082">CVE-2024-41082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41084/">CVE-2024-41084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41084">CVE-2024-41084 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41088/">CVE-2024-41088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41089/">CVE-2024-41089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41094/">CVE-2024-41094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41094">CVE-2024-41094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41095/">CVE-2024-41095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41096/">CVE-2024-41096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41098/">CVE-2024-41098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41149/">CVE-2024-41149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41149">CVE-2024-41149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41932/">CVE-2024-41932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41932">CVE-2024-41932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42064/">CVE-2024-42064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42064">CVE-2024-42064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42069/">CVE-2024-42069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42073/">CVE-2024-42073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42073">CVE-2024-42073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42074/">CVE-2024-42074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42076/">CVE-2024-42076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42080/">CVE-2024-42080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42085/">CVE-2024-42085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42086/">CVE-2024-42086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42087/">CVE-2024-42087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42089/">CVE-2024-42089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42092/">CVE-2024-42092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42095/">CVE-2024-42095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42097/">CVE-2024-42097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42101/">CVE-2024-42101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42102/">CVE-2024-42102 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42105/">CVE-2024-42105 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42106/">CVE-2024-42106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42107/">CVE-2024-42107 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42107">CVE-2024-42107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42109/">CVE-2024-42109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42109">CVE-2024-42109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42113/">CVE-2024-42113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42113">CVE-2024-42113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42115/">CVE-2024-42115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42117/">CVE-2024-42117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42117">CVE-2024-42117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42119/">CVE-2024-42119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42120/">CVE-2024-42120 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42121/">CVE-2024-42121 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42122/">CVE-2024-42122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42122">CVE-2024-42122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42125/">CVE-2024-42125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42125">CVE-2024-42125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42127/">CVE-2024-42127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42130/">CVE-2024-42130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42132/">CVE-2024-42132 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42132">CVE-2024-42132 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42133/">CVE-2024-42133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42136/">CVE-2024-42136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42136">CVE-2024-42136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42137/">CVE-2024-42137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42138/">CVE-2024-42138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42138">CVE-2024-42138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42139/">CVE-2024-42139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42139">CVE-2024-42139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42141/">CVE-2024-42141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42141">CVE-2024-42141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42142/">CVE-2024-42142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42143/">CVE-2024-42143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42144/">CVE-2024-42144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42144">CVE-2024-42144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42147/">CVE-2024-42147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42147">CVE-2024-42147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42153/">CVE-2024-42153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42153">CVE-2024-42153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42155/">CVE-2024-42155 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42155">CVE-2024-42155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42156/">CVE-2024-42156 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42156">CVE-2024-42156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42157/">CVE-2024-42157 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42158/">CVE-2024-42158 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42158">CVE-2024-42158 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42159/">CVE-2024-42159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42159">CVE-2024-42159 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42161/">CVE-2024-42161 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42162/">CVE-2024-42162 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42162">CVE-2024-42162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42223/">CVE-2024-42223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42224/">CVE-2024-42224 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42227/">CVE-2024-42227 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42227">CVE-2024-42227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42236/">CVE-2024-42236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42239/">CVE-2024-42239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42239">CVE-2024-42239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42241/">CVE-2024-42241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42241">CVE-2024-42241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42243/">CVE-2024-42243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42243">CVE-2024-42243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42245/">CVE-2024-42245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42245">CVE-2024-42245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42247/">CVE-2024-42247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42250/">CVE-2024-42250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42250">CVE-2024-42250 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42252/">CVE-2024-42252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42252">CVE-2024-42252 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42259/">CVE-2024-42259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42268/">CVE-2024-42268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42269/">CVE-2024-42269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42269">CVE-2024-42269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42270/">CVE-2024-42270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42270">CVE-2024-42270 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42274/">CVE-2024-42274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42276/">CVE-2024-42276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42277/">CVE-2024-42277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42278/">CVE-2024-42278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42279/">CVE-2024-42279 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42279">CVE-2024-42279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42280/">CVE-2024-42280 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42281/">CVE-2024-42281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42285/">CVE-2024-42285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42286/">CVE-2024-42286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42287/">CVE-2024-42287 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42288/">CVE-2024-42288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42289/">CVE-2024-42289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42290/">CVE-2024-42290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42290">CVE-2024-42290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42294/">CVE-2024-42294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42295/">CVE-2024-42295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42298/">CVE-2024-42298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42298">CVE-2024-42298 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42303/">CVE-2024-42303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42303">CVE-2024-42303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42306/">CVE-2024-42306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42308/">CVE-2024-42308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42309/">CVE-2024-42309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42310/">CVE-2024-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42311/">CVE-2024-42311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42313/">CVE-2024-42313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42314/">CVE-2024-42314 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42314">CVE-2024-42314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42316/">CVE-2024-42316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42318/">CVE-2024-42318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42319/">CVE-2024-42319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42319">CVE-2024-42319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42320/">CVE-2024-42320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43098/">CVE-2024-43098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43816/">CVE-2024-43816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43816">CVE-2024-43816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43817/">CVE-2024-43817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43818/">CVE-2024-43818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43819/">CVE-2024-43819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43819">CVE-2024-43819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43824/">CVE-2024-43824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43824">CVE-2024-43824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43825/">CVE-2024-43825 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43825">CVE-2024-43825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43826/">CVE-2024-43826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43826">CVE-2024-43826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43829/">CVE-2024-43829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43831/">CVE-2024-43831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43832/">CVE-2024-43832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43832">CVE-2024-43832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43833/">CVE-2024-43833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43833">CVE-2024-43833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43835/">CVE-2024-43835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43835">CVE-2024-43835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43837/">CVE-2024-43837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43839/">CVE-2024-43839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43840/">CVE-2024-43840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43840">CVE-2024-43840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43841/">CVE-2024-43841 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43845/">CVE-2024-43845 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43845">CVE-2024-43845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43847/">CVE-2024-43847 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43847">CVE-2024-43847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43849/">CVE-2024-43849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43850/">CVE-2024-43850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43850">CVE-2024-43850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43851/">CVE-2024-43851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43851">CVE-2024-43851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43855/">CVE-2024-43855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43856/">CVE-2024-43856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43858/">CVE-2024-43858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43860/">CVE-2024-43860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43863/">CVE-2024-43863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43864/">CVE-2024-43864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43864">CVE-2024-43864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43866/">CVE-2024-43866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43867/">CVE-2024-43867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43870/">CVE-2024-43870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43870">CVE-2024-43870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43872/">CVE-2024-43872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43872">CVE-2024-43872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43874/">CVE-2024-43874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43874">CVE-2024-43874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43875/">CVE-2024-43875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43875">CVE-2024-43875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43876/">CVE-2024-43876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43876">CVE-2024-43876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43877/">CVE-2024-43877 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43877">CVE-2024-43877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43879/">CVE-2024-43879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43881/">CVE-2024-43881 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43881">CVE-2024-43881 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-43885/">CVE-2024-43885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43885">CVE-2024-43885 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43890/">CVE-2024-43890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43893/">CVE-2024-43893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43894/">CVE-2024-43894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43895/">CVE-2024-43895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43897/">CVE-2024-43897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43899/">CVE-2024-43899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43899">CVE-2024-43899 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43900/">CVE-2024-43900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43902/">CVE-2024-43902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43903/">CVE-2024-43903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43904/">CVE-2024-43904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43904">CVE-2024-43904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43905/">CVE-2024-43905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43906/">CVE-2024-43906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43906">CVE-2024-43906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43907/">CVE-2024-43907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43908/">CVE-2024-43908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43909/">CVE-2024-43909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43911/">CVE-2024-43911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43911">CVE-2024-43911 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43912/">CVE-2024-43912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44939/">CVE-2024-44939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44944/">CVE-2024-44944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44948/">CVE-2024-44948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44950/">CVE-2024-44950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44950">CVE-2024-44950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44951/">CVE-2024-44951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44951">CVE-2024-44951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44954/">CVE-2024-44954 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44960/">CVE-2024-44960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44960">CVE-2024-44960 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44961/">CVE-2024-44961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44961">CVE-2024-44961 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44962/">CVE-2024-44962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44962">CVE-2024-44962 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44965/">CVE-2024-44965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44965">CVE-2024-44965 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44967/">CVE-2024-44967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44967">CVE-2024-44967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44969/">CVE-2024-44969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44971/">CVE-2024-44971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44977/">CVE-2024-44977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44977">CVE-2024-44977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44982/">CVE-2024-44982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-44984/">CVE-2024-44984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44984">CVE-2024-44984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44985/">CVE-2024-44985 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44985">CVE-2024-44985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44986/">CVE-2024-44986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44988/">CVE-2024-44988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44991/">CVE-2024-44991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44991">CVE-2024-44991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44997/">CVE-2024-44997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44997">CVE-2024-44997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44998/">CVE-2024-44998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44999/">CVE-2024-44999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45001/">CVE-2024-45001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45001">CVE-2024-45001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45002/">CVE-2024-45002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45002">CVE-2024-45002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45005/">CVE-2024-45005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45005">CVE-2024-45005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45006/">CVE-2024-45006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45007/">CVE-2024-45007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45008/">CVE-2024-45008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45008">CVE-2024-45008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45011/">CVE-2024-45011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45012/">CVE-2024-45012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45012">CVE-2024-45012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45015/">CVE-2024-45015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45015">CVE-2024-45015 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45017/">CVE-2024-45017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45017">CVE-2024-45017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45019/">CVE-2024-45019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45019">CVE-2024-45019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45020/">CVE-2024-45020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45020">CVE-2024-45020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45022/">CVE-2024-45022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45022">CVE-2024-45022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45023/">CVE-2024-45023 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45023">CVE-2024-45023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45025/">CVE-2024-45025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45025">CVE-2024-45025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45028/">CVE-2024-45028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45029/">CVE-2024-45029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45029">CVE-2024-45029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45030/">CVE-2024-45030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45030">CVE-2024-45030 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45828/">CVE-2024-45828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46672/">CVE-2024-46672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46672">CVE-2024-46672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46676/">CVE-2024-46676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46677/">CVE-2024-46677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46678/">CVE-2024-46678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46685/">CVE-2024-46685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46686/">CVE-2024-46686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46687/">CVE-2024-46687 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46687">CVE-2024-46687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46691/">CVE-2024-46691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46691">CVE-2024-46691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46692/">CVE-2024-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46692">CVE-2024-46692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46693/">CVE-2024-46693 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46693">CVE-2024-46693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46694/">CVE-2024-46694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46695/">CVE-2024-46695 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46702/">CVE-2024-46702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46706/">CVE-2024-46706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46706">CVE-2024-46706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46707/">CVE-2024-46707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46709/">CVE-2024-46709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46709">CVE-2024-46709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46710/">CVE-2024-46710 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46710">CVE-2024-46710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46714/">CVE-2024-46714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46715/">CVE-2024-46715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46717/">CVE-2024-46717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46719/">CVE-2024-46719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46720/">CVE-2024-46720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46721/">CVE-2024-46721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46726/">CVE-2024-46726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46728/">CVE-2024-46728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46729/">CVE-2024-46729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46729">CVE-2024-46729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46730/">CVE-2024-46730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46730">CVE-2024-46730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46731/">CVE-2024-46731 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46732/">CVE-2024-46732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46734/">CVE-2024-46734 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46734">CVE-2024-46734 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46735/">CVE-2024-46735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46735">CVE-2024-46735 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46737/">CVE-2024-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46738/">CVE-2024-46738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46739/">CVE-2024-46739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46741/">CVE-2024-46741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46741">CVE-2024-46741 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46746/">CVE-2024-46746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46749/">CVE-2024-46749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46749">CVE-2024-46749 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46751/">CVE-2024-46751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46751">CVE-2024-46751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46752/">CVE-2024-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46753/">CVE-2024-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46753">CVE-2024-46753 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46755/">CVE-2024-46755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46757/">CVE-2024-46757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46757">CVE-2024-46757 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46760/">CVE-2024-46760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46760">CVE-2024-46760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46766/">CVE-2024-46766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46766">CVE-2024-46766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46767/">CVE-2024-46767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46767">CVE-2024-46767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46770/">CVE-2024-46770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46771/">CVE-2024-46771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46772/">CVE-2024-46772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46772">CVE-2024-46772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46773/">CVE-2024-46773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46775/">CVE-2024-46775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46775">CVE-2024-46775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46776/">CVE-2024-46776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46776">CVE-2024-46776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46777/">CVE-2024-46777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46778/">CVE-2024-46778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46778">CVE-2024-46778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46780/">CVE-2024-46780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46781/">CVE-2024-46781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46791/">CVE-2024-46791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46794/">CVE-2024-46794 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46797/">CVE-2024-46797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46797">CVE-2024-46797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46798/">CVE-2024-46798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46802/">CVE-2024-46802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46803/">CVE-2024-46803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46803">CVE-2024-46803 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46804/">CVE-2024-46804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46806/">CVE-2024-46806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46809/">CVE-2024-46809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46810/">CVE-2024-46810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46811/">CVE-2024-46811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46812/">CVE-2024-46812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46821/">CVE-2024-46821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46825/">CVE-2024-46825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46825">CVE-2024-46825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46827/">CVE-2024-46827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46827">CVE-2024-46827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46830/">CVE-2024-46830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46831/">CVE-2024-46831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46831">CVE-2024-46831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46834/">CVE-2024-46834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46834">CVE-2024-46834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46836/">CVE-2024-46836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46836">CVE-2024-46836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46840/">CVE-2024-46840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46841/">CVE-2024-46841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46841">CVE-2024-46841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46842/">CVE-2024-46842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46842">CVE-2024-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46843/">CVE-2024-46843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46843">CVE-2024-46843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46846/">CVE-2024-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46846">CVE-2024-46846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46848/">CVE-2024-46848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46851/">CVE-2024-46851 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46851">CVE-2024-46851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46852/">CVE-2024-46852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46852">CVE-2024-46852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46855/">CVE-2024-46855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46857/">CVE-2024-46857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46859/">CVE-2024-46859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46860/">CVE-2024-46860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46860">CVE-2024-46860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46861/">CVE-2024-46861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46861">CVE-2024-46861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46870/">CVE-2024-46870 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46870">CVE-2024-46870 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46896/">CVE-2024-46896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47141/">CVE-2024-47141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47143/">CVE-2024-47143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47408/">CVE-2024-47408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47658/">CVE-2024-47658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47658">CVE-2024-47658 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47661/">CVE-2024-47661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47661">CVE-2024-47661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47662/">CVE-2024-47662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47662">CVE-2024-47662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47663/">CVE-2024-47663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47664/">CVE-2024-47664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47664">CVE-2024-47664 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47665/">CVE-2024-47665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47667/">CVE-2024-47667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47669/">CVE-2024-47669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47669">CVE-2024-47669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47670/">CVE-2024-47670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47670">CVE-2024-47670 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47672/">CVE-2024-47672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47672">CVE-2024-47672 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47673/">CVE-2024-47673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47673">CVE-2024-47673 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47675/">CVE-2024-47675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47675">CVE-2024-47675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47681/">CVE-2024-47681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47681">CVE-2024-47681 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47686/">CVE-2024-47686 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47686">CVE-2024-47686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47687/">CVE-2024-47687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47687">CVE-2024-47687 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47688/">CVE-2024-47688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47688">CVE-2024-47688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47702/">CVE-2024-47702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47702">CVE-2024-47702 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47703/">CVE-2024-47703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47703">CVE-2024-47703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47714/">CVE-2024-47714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47714">CVE-2024-47714 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47715/">CVE-2024-47715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47715">CVE-2024-47715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47719/">CVE-2024-47719 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47719">CVE-2024-47719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47731/">CVE-2024-47731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47731">CVE-2024-47731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47732/">CVE-2024-47732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47732">CVE-2024-47732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47741/">CVE-2024-47741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47741">CVE-2024-47741 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47743/">CVE-2024-47743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47743">CVE-2024-47743 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47744/">CVE-2024-47744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47744">CVE-2024-47744 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47750/">CVE-2024-47750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47750">CVE-2024-47750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47751/">CVE-2024-47751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47751">CVE-2024-47751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47752/">CVE-2024-47752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47752">CVE-2024-47752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47753/">CVE-2024-47753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47753">CVE-2024-47753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47754/">CVE-2024-47754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47754">CVE-2024-47754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47794/">CVE-2024-47794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47794">CVE-2024-47794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47809/">CVE-2024-47809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48873/">CVE-2024-48873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48876/">CVE-2024-48876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48876">CVE-2024-48876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48881/">CVE-2024-48881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49568/">CVE-2024-49568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49569/">CVE-2024-49569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49569">CVE-2024-49569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49570/">CVE-2024-49570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49570">CVE-2024-49570 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49571/">CVE-2024-49571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49573/">CVE-2024-49573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49573">CVE-2024-49573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49853/">CVE-2024-49853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49853">CVE-2024-49853 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49862/">CVE-2024-49862 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49862">CVE-2024-49862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49864/">CVE-2024-49864 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49874/">CVE-2024-49874 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49878/">CVE-2024-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49888/">CVE-2024-49888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49888">CVE-2024-49888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49898/">CVE-2024-49898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49898">CVE-2024-49898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49928/">CVE-2024-49928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49928">CVE-2024-49928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49931/">CVE-2024-49931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49937/">CVE-2024-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49953/">CVE-2024-49953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49961/">CVE-2024-49961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49972/">CVE-2024-49972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49972">CVE-2024-49972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49986/">CVE-2024-49986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49987/">CVE-2024-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50004/">CVE-2024-50004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50004">CVE-2024-50004 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50012/">CVE-2024-50012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50015/">CVE-2024-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50020/">CVE-2024-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50020">CVE-2024-50020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50021/">CVE-2024-50021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50021">CVE-2024-50021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50022/">CVE-2024-50022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50023/">CVE-2024-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50027/">CVE-2024-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50027">CVE-2024-50027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50040/">CVE-2024-50040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50042/">CVE-2024-50042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50042">CVE-2024-50042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50051/">CVE-2024-50051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50060/">CVE-2024-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50064/">CVE-2024-50064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50069/">CVE-2024-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50075/">CVE-2024-50075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50076/">CVE-2024-50076 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50080/">CVE-2024-50080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50084/">CVE-2024-50084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50087/">CVE-2024-50087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50088/">CVE-2024-50088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50130/">CVE-2024-50130 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50139/">CVE-2024-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50228/">CVE-2024-50228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50250/">CVE-2024-50250 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51729/">CVE-2024-51729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-51729">CVE-2024-51729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52319/">CVE-2024-52319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52319">CVE-2024-52319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52332/">CVE-2024-52332 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-52559/">CVE-2024-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52559">CVE-2024-52559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53103/">CVE-2024-53103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-53142/">CVE-2024-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53142">CVE-2024-53142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53143/">CVE-2024-53143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53143">CVE-2024-53143 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53147/">CVE-2024-53147 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53147">CVE-2024-53147 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53148/">CVE-2024-53148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53148">CVE-2024-53148 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53149/">CVE-2024-53149 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53149">CVE-2024-53149 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53151/">CVE-2024-53151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53151">CVE-2024-53151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53152/">CVE-2024-53152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53152">CVE-2024-53152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53153/">CVE-2024-53153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53153">CVE-2024-53153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53154/">CVE-2024-53154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53154">CVE-2024-53154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53155/">CVE-2024-53155 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53155">CVE-2024-53155 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53157/">CVE-2024-53157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53157">CVE-2024-53157 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53158/">CVE-2024-53158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53158">CVE-2024-53158 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53160/">CVE-2024-53160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53160">CVE-2024-53160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53161/">CVE-2024-53161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53161">CVE-2024-53161 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53162/">CVE-2024-53162 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53162">CVE-2024-53162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53163/">CVE-2024-53163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53163">CVE-2024-53163 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53166/">CVE-2024-53166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53166">CVE-2024-53166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53167/">CVE-2024-53167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53167">CVE-2024-53167 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53168/">CVE-2024-53168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53168">CVE-2024-53168 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53169/">CVE-2024-53169 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53169">CVE-2024-53169 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53170/">CVE-2024-53170 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53170">CVE-2024-53170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53172/">CVE-2024-53172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53172">CVE-2024-53172 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53174/">CVE-2024-53174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53174">CVE-2024-53174 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53175/">CVE-2024-53175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53175">CVE-2024-53175 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53176/">CVE-2024-53176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53176">CVE-2024-53176 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53177/">CVE-2024-53177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53177">CVE-2024-53177 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53178/">CVE-2024-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53178">CVE-2024-53178 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53179/">CVE-2024-53179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53179">CVE-2024-53179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53180/">CVE-2024-53180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53180">CVE-2024-53180 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53182/">CVE-2024-53182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53182">CVE-2024-53182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53185/">CVE-2024-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53185">CVE-2024-53185 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53187/">CVE-2024-53187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53187">CVE-2024-53187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53188/">CVE-2024-53188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53188">CVE-2024-53188 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53189/">CVE-2024-53189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53189">CVE-2024-53189 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53190/">CVE-2024-53190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53190">CVE-2024-53190 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53191/">CVE-2024-53191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53191">CVE-2024-53191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53192/">CVE-2024-53192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53192">CVE-2024-53192 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53193/">CVE-2024-53193 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53193">CVE-2024-53193 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53194/">CVE-2024-53194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53194">CVE-2024-53194 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53195/">CVE-2024-53195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53195">CVE-2024-53195 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53196/">CVE-2024-53196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53198/">CVE-2024-53198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53198">CVE-2024-53198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53199/">CVE-2024-53199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53199">CVE-2024-53199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53200/">CVE-2024-53200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53200">CVE-2024-53200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53201/">CVE-2024-53201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53201">CVE-2024-53201 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53202/">CVE-2024-53202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53202">CVE-2024-53202 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53203/">CVE-2024-53203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53203">CVE-2024-53203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53204/">CVE-2024-53204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53204">CVE-2024-53204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53205/">CVE-2024-53205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53205">CVE-2024-53205 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53206/">CVE-2024-53206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53206">CVE-2024-53206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53207/">CVE-2024-53207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53207">CVE-2024-53207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53208/">CVE-2024-53208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53208">CVE-2024-53208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53209/">CVE-2024-53209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53209">CVE-2024-53209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53210/">CVE-2024-53210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53210">CVE-2024-53210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53211/">CVE-2024-53211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53211">CVE-2024-53211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53212/">CVE-2024-53212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53212">CVE-2024-53212 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53213/">CVE-2024-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53213">CVE-2024-53213 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53214/">CVE-2024-53214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53214">CVE-2024-53214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53215/">CVE-2024-53215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53215">CVE-2024-53215 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53216/">CVE-2024-53216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53216">CVE-2024-53216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53217/">CVE-2024-53217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53217">CVE-2024-53217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53219/">CVE-2024-53219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53219">CVE-2024-53219 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53222/">CVE-2024-53222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53222">CVE-2024-53222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53223/">CVE-2024-53223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53223">CVE-2024-53223 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53224/">CVE-2024-53224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53224">CVE-2024-53224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53225/">CVE-2024-53225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53225">CVE-2024-53225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53226/">CVE-2024-53226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53226">CVE-2024-53226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53227/">CVE-2024-53227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53227">CVE-2024-53227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53228/">CVE-2024-53228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53228">CVE-2024-53228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53229/">CVE-2024-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53229">CVE-2024-53229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53230/">CVE-2024-53230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53230">CVE-2024-53230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53231/">CVE-2024-53231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53231">CVE-2024-53231 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53232/">CVE-2024-53232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53232">CVE-2024-53232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53233/">CVE-2024-53233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53233">CVE-2024-53233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53234/">CVE-2024-53234 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53234">CVE-2024-53234 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53235/">CVE-2024-53235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53235">CVE-2024-53235 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53236/">CVE-2024-53236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53236">CVE-2024-53236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53237/">CVE-2024-53237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53237">CVE-2024-53237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53238/">CVE-2024-53238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53238">CVE-2024-53238 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53240/">CVE-2024-53240 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53680/">CVE-2024-53680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53681/">CVE-2024-53681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53681">CVE-2024-53681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53682/">CVE-2024-53682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53682">CVE-2024-53682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53685/">CVE-2024-53685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54191/">CVE-2024-54191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54191">CVE-2024-54191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54193/">CVE-2024-54193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54193">CVE-2024-54193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54455/">CVE-2024-54455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54455">CVE-2024-54455 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54456/">CVE-2024-54456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54458/">CVE-2024-54458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54458">CVE-2024-54458 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54460/">CVE-2024-54460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54680/">CVE-2024-54680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54683/">CVE-2024-54683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55639/">CVE-2024-55639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55641/">CVE-2024-55641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55641">CVE-2024-55641 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55642/">CVE-2024-55642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55642">CVE-2024-55642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55881/">CVE-2024-55881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55916/">CVE-2024-55916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56368/">CVE-2024-56368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56368">CVE-2024-56368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56369/">CVE-2024-56369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56372/">CVE-2024-56372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56531/">CVE-2024-56531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56531">CVE-2024-56531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56532/">CVE-2024-56532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56532">CVE-2024-56532 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56533/">CVE-2024-56533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56533">CVE-2024-56533 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56534/">CVE-2024-56534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56534">CVE-2024-56534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56535/">CVE-2024-56535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56535">CVE-2024-56535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56536/">CVE-2024-56536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56536">CVE-2024-56536 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56537/">CVE-2024-56537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56537">CVE-2024-56537 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56538/">CVE-2024-56538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56538">CVE-2024-56538 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56540/">CVE-2024-56540 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56540">CVE-2024-56540 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56541/">CVE-2024-56541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56541">CVE-2024-56541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56542/">CVE-2024-56542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56542">CVE-2024-56542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56543/">CVE-2024-56543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56543">CVE-2024-56543 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56544/">CVE-2024-56544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56544">CVE-2024-56544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56545/">CVE-2024-56545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56545">CVE-2024-56545 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56546/">CVE-2024-56546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56546">CVE-2024-56546 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56549/">CVE-2024-56549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56549">CVE-2024-56549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56550/">CVE-2024-56550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56550">CVE-2024-56550 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56551/">CVE-2024-56551 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56551">CVE-2024-56551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56552/">CVE-2024-56552 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56552">CVE-2024-56552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56557/">CVE-2024-56557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56557">CVE-2024-56557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56558/">CVE-2024-56558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56560/">CVE-2024-56560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56560">CVE-2024-56560 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56561/">CVE-2024-56561 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56561">CVE-2024-56561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56562/">CVE-2024-56562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56563/">CVE-2024-56563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56563">CVE-2024-56563 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56566/">CVE-2024-56566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56566">CVE-2024-56566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56567/">CVE-2024-56567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56567">CVE-2024-56567 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56568/">CVE-2024-56568 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56569/">CVE-2024-56569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56569">CVE-2024-56569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56570/">CVE-2024-56570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56571/">CVE-2024-56571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56571">CVE-2024-56571 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56572/">CVE-2024-56572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56572">CVE-2024-56572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56573/">CVE-2024-56573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56573">CVE-2024-56573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56574/">CVE-2024-56574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56574">CVE-2024-56574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56575/">CVE-2024-56575 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56575">CVE-2024-56575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56576/">CVE-2024-56576 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56576">CVE-2024-56576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56577/">CVE-2024-56577 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56577">CVE-2024-56577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56578/">CVE-2024-56578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56578">CVE-2024-56578 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56579/">CVE-2024-56579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56579">CVE-2024-56579 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56580/">CVE-2024-56580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56580">CVE-2024-56580 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56582/">CVE-2024-56582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56582">CVE-2024-56582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56583/">CVE-2024-56583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56584/">CVE-2024-56584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56587/">CVE-2024-56587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56588/">CVE-2024-56588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56588">CVE-2024-56588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56589/">CVE-2024-56589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56590/">CVE-2024-56590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56591/">CVE-2024-56591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56591">CVE-2024-56591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56592/">CVE-2024-56592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56593/">CVE-2024-56593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56594/">CVE-2024-56594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56599/">CVE-2024-56599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56599">CVE-2024-56599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56602/">CVE-2024-56602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56603/">CVE-2024-56603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56606/">CVE-2024-56606 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56607/">CVE-2024-56607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56607">CVE-2024-56607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56608/">CVE-2024-56608 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56608">CVE-2024-56608 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56609/">CVE-2024-56609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56609">CVE-2024-56609 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56610/">CVE-2024-56610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56611/">CVE-2024-56611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56612/">CVE-2024-56612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56612">CVE-2024-56612 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56613/">CVE-2024-56613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56614/">CVE-2024-56614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56615/">CVE-2024-56615 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56616/">CVE-2024-56616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56617/">CVE-2024-56617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56618/">CVE-2024-56618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56618">CVE-2024-56618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56620/">CVE-2024-56620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56620">CVE-2024-56620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56621/">CVE-2024-56621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56621">CVE-2024-56621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56622/">CVE-2024-56622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56623/">CVE-2024-56623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56624/">CVE-2024-56624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56624">CVE-2024-56624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56625/">CVE-2024-56625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56629/">CVE-2024-56629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56630/">CVE-2024-56630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56631/">CVE-2024-56631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56632/">CVE-2024-56632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56632">CVE-2024-56632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56633/">CVE-2024-56633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56634/">CVE-2024-56634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56635/">CVE-2024-56635 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56636/">CVE-2024-56636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56637/">CVE-2024-56637 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56638/">CVE-2024-56638 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56639/">CVE-2024-56639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56639">CVE-2024-56639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56640/">CVE-2024-56640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56641/">CVE-2024-56641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56642/">CVE-2024-56642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56643/">CVE-2024-56643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56644/">CVE-2024-56644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56645/">CVE-2024-56645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56646/">CVE-2024-56646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56646">CVE-2024-56646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56647/">CVE-2024-56647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56647">CVE-2024-56647 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56648/">CVE-2024-56648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56649/">CVE-2024-56649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56650/">CVE-2024-56650 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56651/">CVE-2024-56651 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56652/">CVE-2024-56652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56652">CVE-2024-56652 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56653/">CVE-2024-56653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56654/">CVE-2024-56654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56655/">CVE-2024-56655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56656/">CVE-2024-56656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56656">CVE-2024-56656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56657/">CVE-2024-56657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56658/">CVE-2024-56658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56659/">CVE-2024-56659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56660/">CVE-2024-56660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56661/">CVE-2024-56661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56662/">CVE-2024-56662 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56663/">CVE-2024-56663 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56664/">CVE-2024-56664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56665/">CVE-2024-56665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56666/">CVE-2024-56666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56666">CVE-2024-56666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56667/">CVE-2024-56667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56668/">CVE-2024-56668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56668">CVE-2024-56668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56669/">CVE-2024-56669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56669">CVE-2024-56669 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56670/">CVE-2024-56670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56671/">CVE-2024-56671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56671">CVE-2024-56671 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56672/">CVE-2024-56672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56674/">CVE-2024-56674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56674">CVE-2024-56674 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56675/">CVE-2024-56675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56676/">CVE-2024-56676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56676">CVE-2024-56676 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56677/">CVE-2024-56677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56677">CVE-2024-56677 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56678/">CVE-2024-56678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56678">CVE-2024-56678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56679/">CVE-2024-56679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56679">CVE-2024-56679 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56680/">CVE-2024-56680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56680">CVE-2024-56680 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56681/">CVE-2024-56681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56681">CVE-2024-56681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56682/">CVE-2024-56682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56682">CVE-2024-56682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56683/">CVE-2024-56683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56683">CVE-2024-56683 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56684/">CVE-2024-56684 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56684">CVE-2024-56684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56685/">CVE-2024-56685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56685">CVE-2024-56685 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56687/">CVE-2024-56687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56687">CVE-2024-56687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56688/">CVE-2024-56688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56688">CVE-2024-56688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56689/">CVE-2024-56689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56689">CVE-2024-56689 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56690/">CVE-2024-56690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56690">CVE-2024-56690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56691/">CVE-2024-56691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56691">CVE-2024-56691 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56693/">CVE-2024-56693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56693">CVE-2024-56693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56694/">CVE-2024-56694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56694">CVE-2024-56694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56695/">CVE-2024-56695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56695">CVE-2024-56695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56696/">CVE-2024-56696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56696">CVE-2024-56696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56697/">CVE-2024-56697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56697">CVE-2024-56697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56698/">CVE-2024-56698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56698">CVE-2024-56698 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56699/">CVE-2024-56699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56699">CVE-2024-56699 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56700/">CVE-2024-56700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56700">CVE-2024-56700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56701/">CVE-2024-56701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56701">CVE-2024-56701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56702/">CVE-2024-56702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56702">CVE-2024-56702 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56703/">CVE-2024-56703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56703">CVE-2024-56703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56704/">CVE-2024-56704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56704">CVE-2024-56704 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56705/">CVE-2024-56705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56705">CVE-2024-56705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56706/">CVE-2024-56706 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56706">CVE-2024-56706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56707/">CVE-2024-56707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56707">CVE-2024-56707 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56708/">CVE-2024-56708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56708">CVE-2024-56708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56709/">CVE-2024-56709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56711/">CVE-2024-56711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56711">CVE-2024-56711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56712/">CVE-2024-56712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56712">CVE-2024-56712 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56713/">CVE-2024-56713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56713">CVE-2024-56713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56714/">CVE-2024-56714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56714">CVE-2024-56714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56715/">CVE-2024-56715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56716/">CVE-2024-56716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56717/">CVE-2024-56717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56718/">CVE-2024-56718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56719/">CVE-2024-56719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56720/">CVE-2024-56720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56720">CVE-2024-56720 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56721/">CVE-2024-56721 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56721">CVE-2024-56721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56722/">CVE-2024-56722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56722">CVE-2024-56722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56723/">CVE-2024-56723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56723">CVE-2024-56723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56724/">CVE-2024-56724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56724">CVE-2024-56724 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56725/">CVE-2024-56725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56725">CVE-2024-56725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56726/">CVE-2024-56726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56726">CVE-2024-56726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56727/">CVE-2024-56727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56727">CVE-2024-56727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56728/">CVE-2024-56728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56728">CVE-2024-56728 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56729/">CVE-2024-56729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56729">CVE-2024-56729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56730/">CVE-2024-56730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56730">CVE-2024-56730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56739/">CVE-2024-56739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56739">CVE-2024-56739 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56740/">CVE-2024-56740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56740">CVE-2024-56740 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56741/">CVE-2024-56741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56741">CVE-2024-56741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56742/">CVE-2024-56742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56742">CVE-2024-56742 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56743/">CVE-2024-56743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56743">CVE-2024-56743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56745/">CVE-2024-56745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56745">CVE-2024-56745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56746/">CVE-2024-56746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56746">CVE-2024-56746 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56747/">CVE-2024-56747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56747">CVE-2024-56747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56748/">CVE-2024-56748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56748">CVE-2024-56748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56749/">CVE-2024-56749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56749">CVE-2024-56749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56750/">CVE-2024-56750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56750">CVE-2024-56750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56751/">CVE-2024-56751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56751">CVE-2024-56751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56752/">CVE-2024-56752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56752">CVE-2024-56752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56753/">CVE-2024-56753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56753">CVE-2024-56753 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56754/">CVE-2024-56754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56754">CVE-2024-56754 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56755/">CVE-2024-56755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56755">CVE-2024-56755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56756/">CVE-2024-56756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56756">CVE-2024-56756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56757/">CVE-2024-56757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56757">CVE-2024-56757 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56758/">CVE-2024-56758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56758">CVE-2024-56758 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56759/">CVE-2024-56759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56759">CVE-2024-56759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56760/">CVE-2024-56760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56761/">CVE-2024-56761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56761">CVE-2024-56761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56763/">CVE-2024-56763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56764/">CVE-2024-56764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56764">CVE-2024-56764 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56765/">CVE-2024-56765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56766/">CVE-2024-56766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56767/">CVE-2024-56767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56769/">CVE-2024-56769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56770/">CVE-2024-56770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56771/">CVE-2024-56771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56771">CVE-2024-56771 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56772/">CVE-2024-56772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56772">CVE-2024-56772 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56773/">CVE-2024-56773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56773">CVE-2024-56773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56774/">CVE-2024-56774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56774">CVE-2024-56774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56775/">CVE-2024-56775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56775">CVE-2024-56775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56776/">CVE-2024-56776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56776">CVE-2024-56776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56777/">CVE-2024-56777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56777">CVE-2024-56777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56778/">CVE-2024-56778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56778">CVE-2024-56778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56779/">CVE-2024-56779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56780/">CVE-2024-56780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56780">CVE-2024-56780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56782/">CVE-2024-56782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56782">CVE-2024-56782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56783/">CVE-2024-56783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56784/">CVE-2024-56784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56784">CVE-2024-56784 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56786/">CVE-2024-56786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56787/">CVE-2024-56787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56788/">CVE-2024-56788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56788">CVE-2024-56788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57791/">CVE-2024-57791 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57792/">CVE-2024-57792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-57793/">CVE-2024-57793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57793">CVE-2024-57793 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57795/">CVE-2024-57795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57795">CVE-2024-57795 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57798/">CVE-2024-57798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57799/">CVE-2024-57799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57799">CVE-2024-57799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57800/">CVE-2024-57800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57800">CVE-2024-57800 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57801/">CVE-2024-57801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57801">CVE-2024-57801 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57802/">CVE-2024-57802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57804/">CVE-2024-57804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57804">CVE-2024-57804 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57805/">CVE-2024-57805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57805">CVE-2024-57805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57806/">CVE-2024-57806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57806">CVE-2024-57806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57807/">CVE-2024-57807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57809/">CVE-2024-57809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57809">CVE-2024-57809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57834/">CVE-2024-57834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57834">CVE-2024-57834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57838/">CVE-2024-57838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57838">CVE-2024-57838 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57839/">CVE-2024-57839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57839">CVE-2024-57839 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57841/">CVE-2024-57841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57844/">CVE-2024-57844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57844">CVE-2024-57844 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57849/">CVE-2024-57849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57852/">CVE-2024-57852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57852">CVE-2024-57852 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57857/">CVE-2024-57857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57857">CVE-2024-57857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57874/">CVE-2024-57874 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57875/">CVE-2024-57875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57875">CVE-2024-57875 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57876/">CVE-2024-57876 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57877/">CVE-2024-57877 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57877">CVE-2024-57877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57878/">CVE-2024-57878 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57878">CVE-2024-57878 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57879/">CVE-2024-57879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57880/">CVE-2024-57880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57880">CVE-2024-57880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57881/">CVE-2024-57881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57881">CVE-2024-57881 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57882/">CVE-2024-57882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57882">CVE-2024-57882 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57883/">CVE-2024-57883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57883">CVE-2024-57883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57884/">CVE-2024-57884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57887/">CVE-2024-57887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57887">CVE-2024-57887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57888/">CVE-2024-57888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57888">CVE-2024-57888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57889/">CVE-2024-57889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57890/">CVE-2024-57890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57892/">CVE-2024-57892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57892">CVE-2024-57892 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57893/">CVE-2024-57893 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57896/">CVE-2024-57896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57897/">CVE-2024-57897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57898/">CVE-2024-57898 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57898">CVE-2024-57898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57899/">CVE-2024-57899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57899">CVE-2024-57899 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57900/">CVE-2024-57900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57901/">CVE-2024-57901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57902/">CVE-2024-57902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57903/">CVE-2024-57903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57904/">CVE-2024-57904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57904">CVE-2024-57904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57905/">CVE-2024-57905 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57905">CVE-2024-57905 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57906/">CVE-2024-57906 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57906">CVE-2024-57906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57907/">CVE-2024-57907 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57907">CVE-2024-57907 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57908/">CVE-2024-57908 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57908">CVE-2024-57908 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57909/">CVE-2024-57909 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57909">CVE-2024-57909 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57910/">CVE-2024-57910 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57910">CVE-2024-57910 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-57911/">CVE-2024-57911 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57911">CVE-2024-57911 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57912/">CVE-2024-57912 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57912">CVE-2024-57912 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57913/">CVE-2024-57913 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57913">CVE-2024-57913 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57914/">CVE-2024-57914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57914">CVE-2024-57914 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57915/">CVE-2024-57915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57915">CVE-2024-57915 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57916/">CVE-2024-57916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57916">CVE-2024-57916 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57917/">CVE-2024-57917 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57917">CVE-2024-57917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57918/">CVE-2024-57918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57918">CVE-2024-57918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57919/">CVE-2024-57919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57919">CVE-2024-57919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57920/">CVE-2024-57920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57920">CVE-2024-57920 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57921/">CVE-2024-57921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57921">CVE-2024-57921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57922/">CVE-2024-57922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57922">CVE-2024-57922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57923/">CVE-2024-57923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57923">CVE-2024-57923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57924/">CVE-2024-57924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57924">CVE-2024-57924 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57926/">CVE-2024-57926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57926">CVE-2024-57926 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57927/">CVE-2024-57927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57927">CVE-2024-57927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57928/">CVE-2024-57928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57928">CVE-2024-57928 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57929/">CVE-2024-57929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57930/">CVE-2024-57930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57930">CVE-2024-57930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57931/">CVE-2024-57931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57932/">CVE-2024-57932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57932">CVE-2024-57932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57933/">CVE-2024-57933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57933">CVE-2024-57933 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57934/">CVE-2024-57934 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57934">CVE-2024-57934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57935/">CVE-2024-57935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57935">CVE-2024-57935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57936/">CVE-2024-57936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57936">CVE-2024-57936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57938/">CVE-2024-57938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57940/">CVE-2024-57940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57941/">CVE-2024-57941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57941">CVE-2024-57941 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57942/">CVE-2024-57942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57942">CVE-2024-57942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57943/">CVE-2024-57943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57943">CVE-2024-57943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57944/">CVE-2024-57944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57944">CVE-2024-57944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57946/">CVE-2024-57946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57948/">CVE-2024-57948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57948">CVE-2024-57948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57949/">CVE-2024-57949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57949">CVE-2024-57949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57950/">CVE-2024-57950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57950">CVE-2024-57950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57953/">CVE-2024-57953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57953">CVE-2024-57953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57973/">CVE-2024-57973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57973">CVE-2024-57973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57974/">CVE-2024-57974 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57974">CVE-2024-57974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57975/">CVE-2024-57975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57975">CVE-2024-57975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57976/">CVE-2024-57976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57976">CVE-2024-57976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57978/">CVE-2024-57978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57978">CVE-2024-57978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57979/">CVE-2024-57979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57979">CVE-2024-57979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57980/">CVE-2024-57980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57980">CVE-2024-57980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57981/">CVE-2024-57981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57981">CVE-2024-57981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57982/">CVE-2024-57982 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57982">CVE-2024-57982 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-57984/">CVE-2024-57984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57984">CVE-2024-57984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57985/">CVE-2024-57985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57985">CVE-2024-57985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57986/">CVE-2024-57986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57986">CVE-2024-57986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57987/">CVE-2024-57987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57987">CVE-2024-57987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57988/">CVE-2024-57988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57988">CVE-2024-57988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57989/">CVE-2024-57989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57989">CVE-2024-57989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57990/">CVE-2024-57990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57990">CVE-2024-57990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57991/">CVE-2024-57991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57991">CVE-2024-57991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57993/">CVE-2024-57993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57993">CVE-2024-57993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57994/">CVE-2024-57994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57994">CVE-2024-57994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57995/">CVE-2024-57995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57995">CVE-2024-57995 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57996/">CVE-2024-57996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57996">CVE-2024-57996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57997/">CVE-2024-57997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57997">CVE-2024-57997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57998/">CVE-2024-57998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57998">CVE-2024-57998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57999/">CVE-2024-57999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57999">CVE-2024-57999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58001/">CVE-2024-58001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58001">CVE-2024-58001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58002/">CVE-2024-58002 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58002">CVE-2024-58002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58003/">CVE-2024-58003 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58003">CVE-2024-58003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58004/">CVE-2024-58004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58004">CVE-2024-58004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58005/">CVE-2024-58005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58005">CVE-2024-58005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58006/">CVE-2024-58006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58006">CVE-2024-58006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58007/">CVE-2024-58007 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58007">CVE-2024-58007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58008/">CVE-2024-58008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58008">CVE-2024-58008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58009/">CVE-2024-58009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58009">CVE-2024-58009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58011/">CVE-2024-58011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58011">CVE-2024-58011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58012/">CVE-2024-58012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58012">CVE-2024-58012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58013/">CVE-2024-58013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58013">CVE-2024-58013 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58014/">CVE-2024-58014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58014">CVE-2024-58014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58015/">CVE-2024-58015 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58015">CVE-2024-58015 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58017/">CVE-2024-58017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58017">CVE-2024-58017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58018/">CVE-2024-58018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58018">CVE-2024-58018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58019/">CVE-2024-58019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58019">CVE-2024-58019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58020/">CVE-2024-58020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58020">CVE-2024-58020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58021/">CVE-2024-58021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58021">CVE-2024-58021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58034/">CVE-2024-58034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58034">CVE-2024-58034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58042/">CVE-2024-58042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58042">CVE-2024-58042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58051/">CVE-2024-58051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58051">CVE-2024-58051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58052/">CVE-2024-58052 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58052">CVE-2024-58052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58053/">CVE-2024-58053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58053">CVE-2024-58053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58054/">CVE-2024-58054 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58054">CVE-2024-58054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58055/">CVE-2024-58055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58055">CVE-2024-58055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58056/">CVE-2024-58056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58056">CVE-2024-58056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58057/">CVE-2024-58057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58057">CVE-2024-58057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58059/">CVE-2024-58059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58059">CVE-2024-58059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58060/">CVE-2024-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58060">CVE-2024-58060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58061/">CVE-2024-58061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58061">CVE-2024-58061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58062/">CVE-2024-58062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58062">CVE-2024-58062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58063/">CVE-2024-58063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58063">CVE-2024-58063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58064/">CVE-2024-58064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58064">CVE-2024-58064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58068/">CVE-2024-58068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58068">CVE-2024-58068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58069/">CVE-2024-58069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58069">CVE-2024-58069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58070/">CVE-2024-58070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58070">CVE-2024-58070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58071/">CVE-2024-58071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58071">CVE-2024-58071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58072/">CVE-2024-58072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58072">CVE-2024-58072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58074/">CVE-2024-58074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58074">CVE-2024-58074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58075/">CVE-2024-58075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58075">CVE-2024-58075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58076/">CVE-2024-58076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58076">CVE-2024-58076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58077/">CVE-2024-58077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58077">CVE-2024-58077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58078/">CVE-2024-58078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58078">CVE-2024-58078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58079/">CVE-2024-58079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58079">CVE-2024-58079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58080/">CVE-2024-58080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58080">CVE-2024-58080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58081/">CVE-2024-58081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58081">CVE-2024-58081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58082/">CVE-2024-58082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58082">CVE-2024-58082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58083/">CVE-2024-58083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58083">CVE-2024-58083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58084/">CVE-2024-58084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58084">CVE-2024-58084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58086/">CVE-2024-58086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58086">CVE-2024-58086 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58088/">CVE-2024-58088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58089/">CVE-2024-58089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58089">CVE-2024-58089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58091/">CVE-2024-58091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58091">CVE-2024-58091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58092/">CVE-2024-58092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58092">CVE-2024-58092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58093/">CVE-2024-58093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58093">CVE-2024-58093 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58096/">CVE-2024-58096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58096">CVE-2024-58096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58097/">CVE-2024-58097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58097">CVE-2024-58097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58098/">CVE-2024-58098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58098">CVE-2024-58098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58100/">CVE-2024-58100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58100">CVE-2024-58100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58237/">CVE-2024-58237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58237">CVE-2024-58237 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21629/">CVE-2025-21629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21629">CVE-2025-21629 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21631/">CVE-2025-21631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21632/">CVE-2025-21632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21632">CVE-2025-21632 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21633/">CVE-2025-21633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21633">CVE-2025-21633 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21634/">CVE-2025-21634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21634">CVE-2025-21634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21635/">CVE-2025-21635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21635">CVE-2025-21635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21636/">CVE-2025-21636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21636">CVE-2025-21636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21637/">CVE-2025-21637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21637">CVE-2025-21637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21638/">CVE-2025-21638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21638">CVE-2025-21638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21639/">CVE-2025-21639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21639">CVE-2025-21639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21640/">CVE-2025-21640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21640">CVE-2025-21640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21641/">CVE-2025-21641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21641">CVE-2025-21641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21642/">CVE-2025-21642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21642">CVE-2025-21642 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21643/">CVE-2025-21643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21643">CVE-2025-21643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21644/">CVE-2025-21644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21644">CVE-2025-21644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21645/">CVE-2025-21645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21645">CVE-2025-21645 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21647/">CVE-2025-21647 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21648/">CVE-2025-21648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21649/">CVE-2025-21649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21649">CVE-2025-21649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21650/">CVE-2025-21650 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21650">CVE-2025-21650 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21651/">CVE-2025-21651 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21651">CVE-2025-21651 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21652/">CVE-2025-21652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21652">CVE-2025-21652 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21653/">CVE-2025-21653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21653">CVE-2025-21653 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21654/">CVE-2025-21654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21654">CVE-2025-21654 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21655/">CVE-2025-21655 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21655">CVE-2025-21655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21656/">CVE-2025-21656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21656">CVE-2025-21656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21658/">CVE-2025-21658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21659/">CVE-2025-21659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21659">CVE-2025-21659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21661/">CVE-2025-21661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21661">CVE-2025-21661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21662/">CVE-2025-21662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21662">CVE-2025-21662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21663/">CVE-2025-21663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21664/">CVE-2025-21664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21664">CVE-2025-21664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21666/">CVE-2025-21666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21666">CVE-2025-21666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21667/">CVE-2025-21667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21667">CVE-2025-21667 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21668/">CVE-2025-21668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21668">CVE-2025-21668 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21669/">CVE-2025-21669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21669">CVE-2025-21669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21670/">CVE-2025-21670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21670">CVE-2025-21670 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21671/">CVE-2025-21671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21671">CVE-2025-21671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21673/">CVE-2025-21673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21673">CVE-2025-21673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21674/">CVE-2025-21674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21674">CVE-2025-21674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21675/">CVE-2025-21675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21675">CVE-2025-21675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21676/">CVE-2025-21676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21676">CVE-2025-21676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21677/">CVE-2025-21677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21677">CVE-2025-21677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21678/">CVE-2025-21678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21678">CVE-2025-21678 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21680/">CVE-2025-21680 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21680">CVE-2025-21680 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-21681/">CVE-2025-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21681">CVE-2025-21681 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21682/">CVE-2025-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21682">CVE-2025-21682 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21683/">CVE-2025-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21683">CVE-2025-21683 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21684/">CVE-2025-21684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21684">CVE-2025-21684 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21685/">CVE-2025-21685 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21685">CVE-2025-21685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21686/">CVE-2025-21686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21686">CVE-2025-21686 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21687/">CVE-2025-21687 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21687">CVE-2025-21687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21688/">CVE-2025-21688 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21688">CVE-2025-21688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21689/">CVE-2025-21689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21689">CVE-2025-21689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21690/">CVE-2025-21690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21690">CVE-2025-21690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21691/">CVE-2025-21691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21691">CVE-2025-21691 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21692/">CVE-2025-21692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21692">CVE-2025-21692 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21693/">CVE-2025-21693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21693">CVE-2025-21693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21695/">CVE-2025-21695 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21695">CVE-2025-21695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21696/">CVE-2025-21696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21696">CVE-2025-21696 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-21697/">CVE-2025-21697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21697">CVE-2025-21697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21699/">CVE-2025-21699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21699">CVE-2025-21699 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21700/">CVE-2025-21700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21700">CVE-2025-21700 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21701/">CVE-2025-21701 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21701">CVE-2025-21701 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21702/">CVE-2025-21702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21702">CVE-2025-21702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21703/">CVE-2025-21703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21703">CVE-2025-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21704/">CVE-2025-21704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21704">CVE-2025-21704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21705/">CVE-2025-21705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21705">CVE-2025-21705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21706/">CVE-2025-21706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21706">CVE-2025-21706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21707/">CVE-2025-21707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21707">CVE-2025-21707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21708/">CVE-2025-21708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21708">CVE-2025-21708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21709/">CVE-2025-21709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21709">CVE-2025-21709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21710/">CVE-2025-21710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21710">CVE-2025-21710 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21711/">CVE-2025-21711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21711">CVE-2025-21711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21712/">CVE-2025-21712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21712">CVE-2025-21712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21713/">CVE-2025-21713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21713">CVE-2025-21713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21714/">CVE-2025-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21714">CVE-2025-21714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21715/">CVE-2025-21715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21715">CVE-2025-21715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21716/">CVE-2025-21716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21716">CVE-2025-21716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21717/">CVE-2025-21717 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21717">CVE-2025-21717 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21718/">CVE-2025-21718 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21718">CVE-2025-21718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21719/">CVE-2025-21719 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21719">CVE-2025-21719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21720/">CVE-2025-21720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21720">CVE-2025-21720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21723/">CVE-2025-21723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21723">CVE-2025-21723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21724/">CVE-2025-21724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21724">CVE-2025-21724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21725/">CVE-2025-21725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21725">CVE-2025-21725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21726/">CVE-2025-21726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21726">CVE-2025-21726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21727/">CVE-2025-21727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21727">CVE-2025-21727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21728/">CVE-2025-21728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21728">CVE-2025-21728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21729/">CVE-2025-21729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21729">CVE-2025-21729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21730/">CVE-2025-21730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21730">CVE-2025-21730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21731/">CVE-2025-21731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21731">CVE-2025-21731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21732/">CVE-2025-21732 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21732">CVE-2025-21732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21733/">CVE-2025-21733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21733">CVE-2025-21733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21734/">CVE-2025-21734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21734">CVE-2025-21734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21735/">CVE-2025-21735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21735">CVE-2025-21735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21739/">CVE-2025-21739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21739">CVE-2025-21739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21741/">CVE-2025-21741 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21741">CVE-2025-21741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21742/">CVE-2025-21742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21742">CVE-2025-21742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21743/">CVE-2025-21743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21743">CVE-2025-21743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21744/">CVE-2025-21744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21744">CVE-2025-21744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21745/">CVE-2025-21745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21745">CVE-2025-21745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21746/">CVE-2025-21746 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21746">CVE-2025-21746 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21749/">CVE-2025-21749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21749">CVE-2025-21749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21750/">CVE-2025-21750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21750">CVE-2025-21750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21751/">CVE-2025-21751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21751">CVE-2025-21751 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21753/">CVE-2025-21753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21753">CVE-2025-21753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21754/">CVE-2025-21754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21754">CVE-2025-21754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21755/">CVE-2025-21755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21755">CVE-2025-21755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21756/">CVE-2025-21756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21758/">CVE-2025-21758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21758">CVE-2025-21758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21759/">CVE-2025-21759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21760/">CVE-2025-21760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21761/">CVE-2025-21761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21761">CVE-2025-21761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21762/">CVE-2025-21762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21762">CVE-2025-21762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21763/">CVE-2025-21763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21763">CVE-2025-21763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21764/">CVE-2025-21764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21765/">CVE-2025-21765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21766/">CVE-2025-21766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21767/">CVE-2025-21767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21767">CVE-2025-21767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21768/">CVE-2025-21768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21768">CVE-2025-21768 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21770/">CVE-2025-21770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21770">CVE-2025-21770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21771/">CVE-2025-21771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21771">CVE-2025-21771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21772/">CVE-2025-21772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21773/">CVE-2025-21773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21773">CVE-2025-21773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21774/">CVE-2025-21774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21774">CVE-2025-21774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21775/">CVE-2025-21775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21775">CVE-2025-21775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21776/">CVE-2025-21776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21776">CVE-2025-21776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21777/">CVE-2025-21777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21777">CVE-2025-21777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21778/">CVE-2025-21778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21778">CVE-2025-21778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21779/">CVE-2025-21779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21779">CVE-2025-21779 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21780/">CVE-2025-21780 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21781/">CVE-2025-21781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21781">CVE-2025-21781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21783/">CVE-2025-21783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21783">CVE-2025-21783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21784/">CVE-2025-21784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21784">CVE-2025-21784 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21785/">CVE-2025-21785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21786/">CVE-2025-21786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21786">CVE-2025-21786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21787/">CVE-2025-21787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21788/">CVE-2025-21788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21788">CVE-2025-21788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21790/">CVE-2025-21790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21791/">CVE-2025-21791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21792/">CVE-2025-21792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21792">CVE-2025-21792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21793/">CVE-2025-21793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21793">CVE-2025-21793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21794/">CVE-2025-21794 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21794">CVE-2025-21794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21795/">CVE-2025-21795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21796/">CVE-2025-21796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21798/">CVE-2025-21798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21798">CVE-2025-21798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21799/">CVE-2025-21799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21799">CVE-2025-21799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21800/">CVE-2025-21800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21800">CVE-2025-21800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21801/">CVE-2025-21801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21801">CVE-2025-21801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21802/">CVE-2025-21802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21802">CVE-2025-21802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21803/">CVE-2025-21803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21803">CVE-2025-21803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21804/">CVE-2025-21804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21804">CVE-2025-21804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21805/">CVE-2025-21805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21805">CVE-2025-21805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21806/">CVE-2025-21806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21806">CVE-2025-21806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21807/">CVE-2025-21807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21807">CVE-2025-21807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21808/">CVE-2025-21808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21808">CVE-2025-21808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21809/">CVE-2025-21809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21809">CVE-2025-21809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21810/">CVE-2025-21810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21810">CVE-2025-21810 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21812/">CVE-2025-21812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21812">CVE-2025-21812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21814/">CVE-2025-21814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21814">CVE-2025-21814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21815/">CVE-2025-21815 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21815">CVE-2025-21815 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21817/">CVE-2025-21817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21817">CVE-2025-21817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21819/">CVE-2025-21819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21819">CVE-2025-21819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21820/">CVE-2025-21820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21820">CVE-2025-21820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21821/">CVE-2025-21821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21821">CVE-2025-21821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21823/">CVE-2025-21823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21823">CVE-2025-21823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21824/">CVE-2025-21824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21824">CVE-2025-21824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21825/">CVE-2025-21825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21825">CVE-2025-21825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21826/">CVE-2025-21826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21826">CVE-2025-21826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21827/">CVE-2025-21827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21827">CVE-2025-21827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21828/">CVE-2025-21828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21828">CVE-2025-21828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21829/">CVE-2025-21829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21829">CVE-2025-21829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21830/">CVE-2025-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21830">CVE-2025-21830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21831/">CVE-2025-21831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21831">CVE-2025-21831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21832/">CVE-2025-21832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21832">CVE-2025-21832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21833/">CVE-2025-21833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21833">CVE-2025-21833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21834/">CVE-2025-21834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21834">CVE-2025-21834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21835/">CVE-2025-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21835">CVE-2025-21835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21836/">CVE-2025-21836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21836">CVE-2025-21836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21837/">CVE-2025-21837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21837">CVE-2025-21837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21838/">CVE-2025-21838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21838">CVE-2025-21838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21839/">CVE-2025-21839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21839">CVE-2025-21839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21841/">CVE-2025-21841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21841">CVE-2025-21841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21842/">CVE-2025-21842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21842">CVE-2025-21842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21844/">CVE-2025-21844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21845/">CVE-2025-21845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21845">CVE-2025-21845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21846/">CVE-2025-21846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21847/">CVE-2025-21847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21848/">CVE-2025-21848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21849/">CVE-2025-21849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21849">CVE-2025-21849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21850/">CVE-2025-21850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21850">CVE-2025-21850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21851/">CVE-2025-21851 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21851">CVE-2025-21851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21852/">CVE-2025-21852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21852">CVE-2025-21852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21853/">CVE-2025-21853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21854/">CVE-2025-21854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21854">CVE-2025-21854 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21855/">CVE-2025-21855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21856/">CVE-2025-21856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21856">CVE-2025-21856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21857/">CVE-2025-21857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21857">CVE-2025-21857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21858/">CVE-2025-21858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21858">CVE-2025-21858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21859/">CVE-2025-21859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21859">CVE-2025-21859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21861/">CVE-2025-21861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21861">CVE-2025-21861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21862/">CVE-2025-21862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21862">CVE-2025-21862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21863/">CVE-2025-21863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21864/">CVE-2025-21864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21865/">CVE-2025-21865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21865">CVE-2025-21865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21866/">CVE-2025-21866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21866">CVE-2025-21866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21867/">CVE-2025-21867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21867">CVE-2025-21867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21868/">CVE-2025-21868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21868">CVE-2025-21868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21869/">CVE-2025-21869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21869">CVE-2025-21869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21870/">CVE-2025-21870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21870">CVE-2025-21870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21871/">CVE-2025-21871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21871">CVE-2025-21871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21872/">CVE-2025-21872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21872">CVE-2025-21872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21873/">CVE-2025-21873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21873">CVE-2025-21873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21874/">CVE-2025-21874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21874">CVE-2025-21874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21875/">CVE-2025-21875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21875">CVE-2025-21875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21876/">CVE-2025-21876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21876">CVE-2025-21876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21877/">CVE-2025-21877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21877">CVE-2025-21877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21878/">CVE-2025-21878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21878">CVE-2025-21878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21880/">CVE-2025-21880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21880">CVE-2025-21880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21881/">CVE-2025-21881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21881">CVE-2025-21881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21882/">CVE-2025-21882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21882">CVE-2025-21882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21883/">CVE-2025-21883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21883">CVE-2025-21883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21884/">CVE-2025-21884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21884">CVE-2025-21884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21885/">CVE-2025-21885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21885">CVE-2025-21885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21886/">CVE-2025-21886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21886">CVE-2025-21886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21887/">CVE-2025-21887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21887">CVE-2025-21887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21888/">CVE-2025-21888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21888">CVE-2025-21888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21889/">CVE-2025-21889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21889">CVE-2025-21889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21890/">CVE-2025-21890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21890">CVE-2025-21890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21891/">CVE-2025-21891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21891">CVE-2025-21891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21892/">CVE-2025-21892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21892">CVE-2025-21892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21893/">CVE-2025-21893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21893">CVE-2025-21893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21894/">CVE-2025-21894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21894">CVE-2025-21894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21895/">CVE-2025-21895 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21895">CVE-2025-21895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21898/">CVE-2025-21898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21898">CVE-2025-21898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21899/">CVE-2025-21899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21899">CVE-2025-21899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21900/">CVE-2025-21900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21900">CVE-2025-21900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21901/">CVE-2025-21901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21901">CVE-2025-21901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21902/">CVE-2025-21902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21902">CVE-2025-21902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21903/">CVE-2025-21903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21903">CVE-2025-21903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21904/">CVE-2025-21904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21904">CVE-2025-21904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21905/">CVE-2025-21905 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21905">CVE-2025-21905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21906/">CVE-2025-21906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21906">CVE-2025-21906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21907/">CVE-2025-21907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21907">CVE-2025-21907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21908/">CVE-2025-21908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21908">CVE-2025-21908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21909/">CVE-2025-21909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21909">CVE-2025-21909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21910/">CVE-2025-21910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21910">CVE-2025-21910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21911/">CVE-2025-21911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21911">CVE-2025-21911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21912/">CVE-2025-21912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21912">CVE-2025-21912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21913/">CVE-2025-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21913">CVE-2025-21913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21914/">CVE-2025-21914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21914">CVE-2025-21914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21915/">CVE-2025-21915 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21915">CVE-2025-21915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21916/">CVE-2025-21916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21916">CVE-2025-21916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21917/">CVE-2025-21917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21917">CVE-2025-21917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21918/">CVE-2025-21918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21918">CVE-2025-21918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21919/">CVE-2025-21919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21919">CVE-2025-21919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21920/">CVE-2025-21920 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21920">CVE-2025-21920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21921/">CVE-2025-21921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21921">CVE-2025-21921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21922/">CVE-2025-21922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21922">CVE-2025-21922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21923/">CVE-2025-21923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21923">CVE-2025-21923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21924/">CVE-2025-21924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21924">CVE-2025-21924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21925/">CVE-2025-21925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21925">CVE-2025-21925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21926/">CVE-2025-21926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21926">CVE-2025-21926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21927/">CVE-2025-21927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21927">CVE-2025-21927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21928/">CVE-2025-21928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21928">CVE-2025-21928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21929/">CVE-2025-21929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21929">CVE-2025-21929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21930/">CVE-2025-21930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21930">CVE-2025-21930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21931/">CVE-2025-21931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21931">CVE-2025-21931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21932/">CVE-2025-21932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21932">CVE-2025-21932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21934/">CVE-2025-21934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21934">CVE-2025-21934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21935/">CVE-2025-21935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21935">CVE-2025-21935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21936/">CVE-2025-21936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21936">CVE-2025-21936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21937/">CVE-2025-21937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21937">CVE-2025-21937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21938/">CVE-2025-21938 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21938">CVE-2025-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21939/">CVE-2025-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21939">CVE-2025-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21940/">CVE-2025-21940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21940">CVE-2025-21940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21941/">CVE-2025-21941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21941">CVE-2025-21941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21942/">CVE-2025-21942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21942">CVE-2025-21942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21943/">CVE-2025-21943 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21943">CVE-2025-21943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21948/">CVE-2025-21948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21948">CVE-2025-21948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21950/">CVE-2025-21950 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21950">CVE-2025-21950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21951/">CVE-2025-21951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21951">CVE-2025-21951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21953/">CVE-2025-21953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21953">CVE-2025-21953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21954/">CVE-2025-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21954">CVE-2025-21954 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21956/">CVE-2025-21956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21956">CVE-2025-21956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21958/">CVE-2025-21958 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21958">CVE-2025-21958 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21959/">CVE-2025-21959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21959">CVE-2025-21959 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21960/">CVE-2025-21960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21960">CVE-2025-21960 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21961/">CVE-2025-21961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21961">CVE-2025-21961 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21962/">CVE-2025-21962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21963/">CVE-2025-21963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21964/">CVE-2025-21964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21966/">CVE-2025-21966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21968/">CVE-2025-21968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21968">CVE-2025-21968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21969/">CVE-2025-21969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21970/">CVE-2025-21970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21970">CVE-2025-21970 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21971/">CVE-2025-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21972/">CVE-2025-21972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21972">CVE-2025-21972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21973/">CVE-2025-21973 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21973">CVE-2025-21973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21974/">CVE-2025-21974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21974">CVE-2025-21974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21975/">CVE-2025-21975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21975">CVE-2025-21975 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-21976/">CVE-2025-21976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21976">CVE-2025-21976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21977/">CVE-2025-21977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21977">CVE-2025-21977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21978/">CVE-2025-21978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21978">CVE-2025-21978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21979/">CVE-2025-21979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21980/">CVE-2025-21980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21980">CVE-2025-21980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21981/">CVE-2025-21981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21981">CVE-2025-21981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21982/">CVE-2025-21982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21982">CVE-2025-21982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21983/">CVE-2025-21983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21983">CVE-2025-21983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21984/">CVE-2025-21984 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21984">CVE-2025-21984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21985/">CVE-2025-21985 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21985">CVE-2025-21985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21986/">CVE-2025-21986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21986">CVE-2025-21986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21987/">CVE-2025-21987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21987">CVE-2025-21987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21988/">CVE-2025-21988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21988">CVE-2025-21988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21989/">CVE-2025-21989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21989">CVE-2025-21989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21990/">CVE-2025-21990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21990">CVE-2025-21990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21991/">CVE-2025-21991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21992/">CVE-2025-21992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21992">CVE-2025-21992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21993/">CVE-2025-21993 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21995/">CVE-2025-21995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21995">CVE-2025-21995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21996/">CVE-2025-21996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21996">CVE-2025-21996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21997/">CVE-2025-21997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21998/">CVE-2025-21998 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21998">CVE-2025-21998 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21999/">CVE-2025-21999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22000/">CVE-2025-22000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22000">CVE-2025-22000 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22001/">CVE-2025-22001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22001">CVE-2025-22001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22002/">CVE-2025-22002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22002">CVE-2025-22002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22003/">CVE-2025-22003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22003">CVE-2025-22003 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22005/">CVE-2025-22005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22005">CVE-2025-22005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22007/">CVE-2025-22007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22007">CVE-2025-22007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22008/">CVE-2025-22008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22008">CVE-2025-22008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22009/">CVE-2025-22009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22009">CVE-2025-22009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22010/">CVE-2025-22010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22010">CVE-2025-22010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22013/">CVE-2025-22013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22013">CVE-2025-22013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22014/">CVE-2025-22014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22014">CVE-2025-22014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22015/">CVE-2025-22015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22015">CVE-2025-22015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22016/">CVE-2025-22016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22016">CVE-2025-22016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22017/">CVE-2025-22017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22017">CVE-2025-22017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22018/">CVE-2025-22018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22018">CVE-2025-22018 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22020/">CVE-2025-22020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22021/">CVE-2025-22021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22021">CVE-2025-22021 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22022/">CVE-2025-22022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22022">CVE-2025-22022 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22023/">CVE-2025-22023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22023">CVE-2025-22023 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22024/">CVE-2025-22024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22024">CVE-2025-22024 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22025/">CVE-2025-22025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22025">CVE-2025-22025 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22027/">CVE-2025-22027 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22027">CVE-2025-22027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22028/">CVE-2025-22028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22028">CVE-2025-22028 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22029/">CVE-2025-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22029">CVE-2025-22029 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22030/">CVE-2025-22030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22030">CVE-2025-22030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22032/">CVE-2025-22032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22032">CVE-2025-22032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22033/">CVE-2025-22033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22033">CVE-2025-22033 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-22035/">CVE-2025-22035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22035">CVE-2025-22035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22036/">CVE-2025-22036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22036">CVE-2025-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22044/">CVE-2025-22044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22044">CVE-2025-22044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22045/">CVE-2025-22045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22046/">CVE-2025-22046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22046">CVE-2025-22046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22047/">CVE-2025-22047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22047">CVE-2025-22047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22050/">CVE-2025-22050 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22050">CVE-2025-22050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22053/">CVE-2025-22053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22053">CVE-2025-22053 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22055/">CVE-2025-22055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22056/">CVE-2025-22056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22057/">CVE-2025-22057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22057">CVE-2025-22057 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22058/">CVE-2025-22058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22059/">CVE-2025-22059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22059">CVE-2025-22059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22060/">CVE-2025-22060 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22062/">CVE-2025-22062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22062">CVE-2025-22062 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22063/">CVE-2025-22063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22063">CVE-2025-22063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22064/">CVE-2025-22064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22064">CVE-2025-22064 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22065/">CVE-2025-22065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22065">CVE-2025-22065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22066/">CVE-2025-22066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22066">CVE-2025-22066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22068/">CVE-2025-22068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22068">CVE-2025-22068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22070/">CVE-2025-22070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22070">CVE-2025-22070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22075/">CVE-2025-22075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22075">CVE-2025-22075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22076/">CVE-2025-22076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22076">CVE-2025-22076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22078/">CVE-2025-22078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22078">CVE-2025-22078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22080/">CVE-2025-22080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22080">CVE-2025-22080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22082/">CVE-2025-22082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22082">CVE-2025-22082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22083/">CVE-2025-22083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22083">CVE-2025-22083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22084/">CVE-2025-22084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22084">CVE-2025-22084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22085/">CVE-2025-22085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22085">CVE-2025-22085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22086/">CVE-2025-22086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22087/">CVE-2025-22087 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22087">CVE-2025-22087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22088/">CVE-2025-22088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22088">CVE-2025-22088 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22089/">CVE-2025-22089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22090/">CVE-2025-22090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22090">CVE-2025-22090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22091/">CVE-2025-22091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22091">CVE-2025-22091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22093/">CVE-2025-22093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22093">CVE-2025-22093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22094/">CVE-2025-22094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22094">CVE-2025-22094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22095/">CVE-2025-22095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22095">CVE-2025-22095 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22101/">CVE-2025-22101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22101">CVE-2025-22101 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22102/">CVE-2025-22102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22102">CVE-2025-22102 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22103/">CVE-2025-22103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22103">CVE-2025-22103 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22104/">CVE-2025-22104 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22104">CVE-2025-22104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22105/">CVE-2025-22105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22105">CVE-2025-22105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22106/">CVE-2025-22106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22106">CVE-2025-22106 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22107/">CVE-2025-22107 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22107">CVE-2025-22107 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22108/">CVE-2025-22108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22108">CVE-2025-22108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22109/">CVE-2025-22109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22109">CVE-2025-22109 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22111/">CVE-2025-22111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22111">CVE-2025-22111 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22112/">CVE-2025-22112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22112">CVE-2025-22112 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22113/">CVE-2025-22113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22113">CVE-2025-22113 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22115/">CVE-2025-22115 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22115">CVE-2025-22115 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22116/">CVE-2025-22116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22116">CVE-2025-22116 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22117/">CVE-2025-22117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22117">CVE-2025-22117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-22118/">CVE-2025-22118 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22118">CVE-2025-22118 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22119/">CVE-2025-22119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22119">CVE-2025-22119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22120/">CVE-2025-22120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22120">CVE-2025-22120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22121/">CVE-2025-22121 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22121">CVE-2025-22121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22122/">CVE-2025-22122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22122">CVE-2025-22122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22124/">CVE-2025-22124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22124">CVE-2025-22124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22125/">CVE-2025-22125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22125">CVE-2025-22125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22126/">CVE-2025-22126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22126">CVE-2025-22126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22128/">CVE-2025-22128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22128">CVE-2025-22128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23129/">CVE-2025-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23129">CVE-2025-23129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23131/">CVE-2025-23131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23131">CVE-2025-23131 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23133/">CVE-2025-23133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23133">CVE-2025-23133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23134/">CVE-2025-23134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23134">CVE-2025-23134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23136/">CVE-2025-23136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23136">CVE-2025-23136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23137/">CVE-2025-23137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23137">CVE-2025-23137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23138/">CVE-2025-23138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23140/">CVE-2025-23140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23140">CVE-2025-23140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23142/">CVE-2025-23142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23142">CVE-2025-23142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23144/">CVE-2025-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23144">CVE-2025-23144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23145/">CVE-2025-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23145">CVE-2025-23145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23146/">CVE-2025-23146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23146">CVE-2025-23146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23147/">CVE-2025-23147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23147">CVE-2025-23147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23148/">CVE-2025-23148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23148">CVE-2025-23148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23149/">CVE-2025-23149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23149">CVE-2025-23149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23150/">CVE-2025-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23150">CVE-2025-23150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23151/">CVE-2025-23151 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23151">CVE-2025-23151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23154/">CVE-2025-23154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23154">CVE-2025-23154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23155/">CVE-2025-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23155">CVE-2025-23155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23156/">CVE-2025-23156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23156">CVE-2025-23156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23157/">CVE-2025-23157 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23157">CVE-2025-23157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23158/">CVE-2025-23158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23158">CVE-2025-23158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23159/">CVE-2025-23159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23159">CVE-2025-23159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23160/">CVE-2025-23160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23160">CVE-2025-23160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23161/">CVE-2025-23161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23161">CVE-2025-23161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23162/">CVE-2025-23162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23162">CVE-2025-23162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23163/">CVE-2025-23163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23163">CVE-2025-23163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37738/">CVE-2025-37738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37738">CVE-2025-37738 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37743/">CVE-2025-37743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37743">CVE-2025-37743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37745/">CVE-2025-37745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37745">CVE-2025-37745 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37746/">CVE-2025-37746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37746">CVE-2025-37746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37747/">CVE-2025-37747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37747">CVE-2025-37747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37748/">CVE-2025-37748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37748">CVE-2025-37748 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37749/">CVE-2025-37749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37749">CVE-2025-37749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37750/">CVE-2025-37750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37750">CVE-2025-37750 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37752/">CVE-2025-37752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37752">CVE-2025-37752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37754/">CVE-2025-37754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37754">CVE-2025-37754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37755/">CVE-2025-37755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37755">CVE-2025-37755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37756/">CVE-2025-37756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37756">CVE-2025-37756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37757/">CVE-2025-37757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37757">CVE-2025-37757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37758/">CVE-2025-37758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37758">CVE-2025-37758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37759/">CVE-2025-37759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37759">CVE-2025-37759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37760/">CVE-2025-37760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37760">CVE-2025-37760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37761/">CVE-2025-37761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37761">CVE-2025-37761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37763/">CVE-2025-37763 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37763">CVE-2025-37763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37764/">CVE-2025-37764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37764">CVE-2025-37764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37765/">CVE-2025-37765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37765">CVE-2025-37765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37766/">CVE-2025-37766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37766">CVE-2025-37766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37767/">CVE-2025-37767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37767">CVE-2025-37767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37768/">CVE-2025-37768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37768">CVE-2025-37768 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37769/">CVE-2025-37769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37769">CVE-2025-37769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37770/">CVE-2025-37770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37770">CVE-2025-37770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37771/">CVE-2025-37771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37771">CVE-2025-37771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37772/">CVE-2025-37772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37772">CVE-2025-37772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37773/">CVE-2025-37773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37773">CVE-2025-37773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37774/">CVE-2025-37774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37774">CVE-2025-37774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37779/">CVE-2025-37779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37779">CVE-2025-37779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37780/">CVE-2025-37780 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37780">CVE-2025-37780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37781/">CVE-2025-37781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37781">CVE-2025-37781 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37785/">CVE-2025-37785 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37786/">CVE-2025-37786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37786">CVE-2025-37786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37787/">CVE-2025-37787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37787">CVE-2025-37787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37788/">CVE-2025-37788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37788">CVE-2025-37788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37789/">CVE-2025-37789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37789">CVE-2025-37789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37790/">CVE-2025-37790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37790">CVE-2025-37790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37791/">CVE-2025-37791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37791">CVE-2025-37791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37792/">CVE-2025-37792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37792">CVE-2025-37792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37793/">CVE-2025-37793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37793">CVE-2025-37793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37794/">CVE-2025-37794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37794">CVE-2025-37794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37796/">CVE-2025-37796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37796">CVE-2025-37796 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37799/">CVE-2025-37799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37800/">CVE-2025-37800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37800">CVE-2025-37800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37801/">CVE-2025-37801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37801">CVE-2025-37801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37803/">CVE-2025-37803 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37804/">CVE-2025-37804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-37804">CVE-2025-37804 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-37805/">CVE-2025-37805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37805">CVE-2025-37805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37808/">CVE-2025-37808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37808">CVE-2025-37808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37809/">CVE-2025-37809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37809">CVE-2025-37809 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37810/">CVE-2025-37810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37811/">CVE-2025-37811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37811">CVE-2025-37811 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37812/">CVE-2025-37812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37812">CVE-2025-37812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37813/">CVE-2025-37813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37813">CVE-2025-37813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37814/">CVE-2025-37814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37814">CVE-2025-37814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37815/">CVE-2025-37815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37815">CVE-2025-37815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37816/">CVE-2025-37816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37816">CVE-2025-37816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37819/">CVE-2025-37819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37820/">CVE-2025-37820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37820">CVE-2025-37820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37824/">CVE-2025-37824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37824">CVE-2025-37824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37825/">CVE-2025-37825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37825">CVE-2025-37825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37826/">CVE-2025-37826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37826">CVE-2025-37826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37827/">CVE-2025-37827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37827">CVE-2025-37827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37828/">CVE-2025-37828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37828">CVE-2025-37828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37829/">CVE-2025-37829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37829">CVE-2025-37829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37830/">CVE-2025-37830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37830">CVE-2025-37830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37831/">CVE-2025-37831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37831">CVE-2025-37831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37833/">CVE-2025-37833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37833">CVE-2025-37833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37836/">CVE-2025-37836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37836">CVE-2025-37836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37837/">CVE-2025-37837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37837">CVE-2025-37837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37838/">CVE-2025-37838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-37838">CVE-2025-37838 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37839/">CVE-2025-37839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37839">CVE-2025-37839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37840/">CVE-2025-37840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37840">CVE-2025-37840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37842/">CVE-2025-37842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37842">CVE-2025-37842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37843/">CVE-2025-37843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37843">CVE-2025-37843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37844/">CVE-2025-37844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37844">CVE-2025-37844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37846/">CVE-2025-37846 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37846">CVE-2025-37846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37847/">CVE-2025-37847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37847">CVE-2025-37847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37848/">CVE-2025-37848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37848">CVE-2025-37848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37850/">CVE-2025-37850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37850">CVE-2025-37850 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37851/">CVE-2025-37851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37851">CVE-2025-37851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37852/">CVE-2025-37852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37852">CVE-2025-37852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37853/">CVE-2025-37853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37853">CVE-2025-37853 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37854/">CVE-2025-37854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37854">CVE-2025-37854 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37859/">CVE-2025-37859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37859">CVE-2025-37859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37860/">CVE-2025-37860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37860">CVE-2025-37860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37862/">CVE-2025-37862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37862">CVE-2025-37862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37863/">CVE-2025-37863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37863">CVE-2025-37863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37865/">CVE-2025-37865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37865">CVE-2025-37865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37867/">CVE-2025-37867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37867">CVE-2025-37867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37868/">CVE-2025-37868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37868">CVE-2025-37868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37869/">CVE-2025-37869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37869">CVE-2025-37869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37870/">CVE-2025-37870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37870">CVE-2025-37870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37871/">CVE-2025-37871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37871">CVE-2025-37871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37872/">CVE-2025-37872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37872">CVE-2025-37872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37873/">CVE-2025-37873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37873">CVE-2025-37873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37874/">CVE-2025-37874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37874">CVE-2025-37874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37875/">CVE-2025-37875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37875">CVE-2025-37875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37877/">CVE-2025-37877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37877">CVE-2025-37877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37878/">CVE-2025-37878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37878">CVE-2025-37878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37879/">CVE-2025-37879 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37879">CVE-2025-37879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37881/">CVE-2025-37881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37881">CVE-2025-37881 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-37882/">CVE-2025-37882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37882">CVE-2025-37882 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37884/">CVE-2025-37884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37884">CVE-2025-37884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37885/">CVE-2025-37885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37886/">CVE-2025-37886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37886">CVE-2025-37886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37887/">CVE-2025-37887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37887">CVE-2025-37887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37888/">CVE-2025-37888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37888">CVE-2025-37888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37889/">CVE-2025-37889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37889">CVE-2025-37889 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37890/">CVE-2025-37890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-37891/">CVE-2025-37891 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37891">CVE-2025-37891 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37892/">CVE-2025-37892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37892">CVE-2025-37892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37894/">CVE-2025-37894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37894">CVE-2025-37894 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37895/">CVE-2025-37895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37895">CVE-2025-37895 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37897/">CVE-2025-37897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37897">CVE-2025-37897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37898/">CVE-2025-37898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37898">CVE-2025-37898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37900/">CVE-2025-37900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37900">CVE-2025-37900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37901/">CVE-2025-37901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37901">CVE-2025-37901 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37903/">CVE-2025-37903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37903">CVE-2025-37903 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37905/">CVE-2025-37905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37905">CVE-2025-37905 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37907/">CVE-2025-37907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37907">CVE-2025-37907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37908/">CVE-2025-37908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37908">CVE-2025-37908 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37909/">CVE-2025-37909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37909">CVE-2025-37909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37910/">CVE-2025-37910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37910">CVE-2025-37910 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37911/">CVE-2025-37911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37911">CVE-2025-37911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37912/">CVE-2025-37912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37912">CVE-2025-37912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37913/">CVE-2025-37913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37913">CVE-2025-37913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37914/">CVE-2025-37914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37915/">CVE-2025-37915 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37915">CVE-2025-37915 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37917/">CVE-2025-37917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37917">CVE-2025-37917 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37918/">CVE-2025-37918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37918">CVE-2025-37918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37919/">CVE-2025-37919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37919">CVE-2025-37919 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37920/">CVE-2025-37920 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37920">CVE-2025-37920 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37921/">CVE-2025-37921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37921">CVE-2025-37921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37922/">CVE-2025-37922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37922">CVE-2025-37922 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37923/">CVE-2025-37923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37923">CVE-2025-37923 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37927/">CVE-2025-37927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37927">CVE-2025-37927 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37928/">CVE-2025-37928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37928">CVE-2025-37928 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37929/">CVE-2025-37929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37929">CVE-2025-37929 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37930/">CVE-2025-37930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37930">CVE-2025-37930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37931/">CVE-2025-37931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37931">CVE-2025-37931 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37932/">CVE-2025-37932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37933/">CVE-2025-37933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37933">CVE-2025-37933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37934/">CVE-2025-37934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37934">CVE-2025-37934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37935/">CVE-2025-37935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37935">CVE-2025-37935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37936/">CVE-2025-37936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37936">CVE-2025-37936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37937/">CVE-2025-37937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37937">CVE-2025-37937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37938/">CVE-2025-37938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37938">CVE-2025-37938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37941/">CVE-2025-37941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37941">CVE-2025-37941 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37942/">CVE-2025-37942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37942">CVE-2025-37942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37943/">CVE-2025-37943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37943">CVE-2025-37943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37944/">CVE-2025-37944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37944">CVE-2025-37944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37945/">CVE-2025-37945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37945">CVE-2025-37945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37946/">CVE-2025-37946 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37946">CVE-2025-37946 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37948/">CVE-2025-37948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37949/">CVE-2025-37949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37949">CVE-2025-37949 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37951/">CVE-2025-37951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37951">CVE-2025-37951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37953/">CVE-2025-37953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37954/">CVE-2025-37954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37954">CVE-2025-37954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37955/">CVE-2025-37955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37955">CVE-2025-37955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37957/">CVE-2025-37957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37957">CVE-2025-37957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37958/">CVE-2025-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37958">CVE-2025-37958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37959/">CVE-2025-37959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37959">CVE-2025-37959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37960/">CVE-2025-37960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37960">CVE-2025-37960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37961/">CVE-2025-37961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37961">CVE-2025-37961 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37963/">CVE-2025-37963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37965/">CVE-2025-37965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37965">CVE-2025-37965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37967/">CVE-2025-37967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37967">CVE-2025-37967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37968/">CVE-2025-37968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37968">CVE-2025-37968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37969/">CVE-2025-37969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37969">CVE-2025-37969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37970/">CVE-2025-37970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37970">CVE-2025-37970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37971/">CVE-2025-37971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37971">CVE-2025-37971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37972/">CVE-2025-37972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37972">CVE-2025-37972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37973/">CVE-2025-37973 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37973">CVE-2025-37973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37974/">CVE-2025-37974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37974">CVE-2025-37974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37978/">CVE-2025-37978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37978">CVE-2025-37978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37979/">CVE-2025-37979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37979">CVE-2025-37979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37980/">CVE-2025-37980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37980">CVE-2025-37980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37981/">CVE-2025-37981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37981">CVE-2025-37981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37982/">CVE-2025-37982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37982">CVE-2025-37982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37983/">CVE-2025-37983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37983">CVE-2025-37983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37984/">CVE-2025-37984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37984">CVE-2025-37984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37985/">CVE-2025-37985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37985">CVE-2025-37985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37986/">CVE-2025-37986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37986">CVE-2025-37986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37987/">CVE-2025-37987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37987">CVE-2025-37987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37988/">CVE-2025-37988 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37988">CVE-2025-37988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37989/">CVE-2025-37989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37989">CVE-2025-37989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37990/">CVE-2025-37990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37990">CVE-2025-37990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37992/">CVE-2025-37992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37992">CVE-2025-37992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37993/">CVE-2025-37993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37993">CVE-2025-37993 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37994/">CVE-2025-37994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37995/">CVE-2025-37995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37995">CVE-2025-37995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37996/">CVE-2025-37996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37996">CVE-2025-37996 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37997/">CVE-2025-37997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37998/">CVE-2025-37998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37998">CVE-2025-37998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37999/">CVE-2025-37999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37999">CVE-2025-37999 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38000/">CVE-2025-38000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38001/">CVE-2025-38001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38003/">CVE-2025-38003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38004/">CVE-2025-38004 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38005/">CVE-2025-38005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38005">CVE-2025-38005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38007/">CVE-2025-38007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38007">CVE-2025-38007 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38009/">CVE-2025-38009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38009">CVE-2025-38009 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38010/">CVE-2025-38010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38010">CVE-2025-38010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38011/">CVE-2025-38011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38011">CVE-2025-38011 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38013/">CVE-2025-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38014/">CVE-2025-38014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38015/">CVE-2025-38015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38015">CVE-2025-38015 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38016/">CVE-2025-38016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38016">CVE-2025-38016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38018/">CVE-2025-38018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38018">CVE-2025-38018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38020/">CVE-2025-38020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38020">CVE-2025-38020 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38022/">CVE-2025-38022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38022">CVE-2025-38022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38023/">CVE-2025-38023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38023">CVE-2025-38023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38024/">CVE-2025-38024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38027/">CVE-2025-38027 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38027">CVE-2025-38027 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38031/">CVE-2025-38031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38035/">CVE-2025-38035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38040/">CVE-2025-38040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38040">CVE-2025-38040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38043/">CVE-2025-38043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38044/">CVE-2025-38044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38045/">CVE-2025-38045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38045">CVE-2025-38045 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38047/">CVE-2025-38047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38047">CVE-2025-38047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38050/">CVE-2025-38050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38050">CVE-2025-38050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38051/">CVE-2025-38051 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38053/">CVE-2025-38053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38053">CVE-2025-38053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38054/">CVE-2025-38054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38054">CVE-2025-38054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38055/">CVE-2025-38055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38055">CVE-2025-38055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38056/">CVE-2025-38056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38056">CVE-2025-38056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38057/">CVE-2025-38057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38057">CVE-2025-38057 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38059/">CVE-2025-38059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38059">CVE-2025-38059 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38060/">CVE-2025-38060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38060">CVE-2025-38060 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38061/">CVE-2025-38061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38063/">CVE-2025-38063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38063">CVE-2025-38063 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38064/">CVE-2025-38064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38064">CVE-2025-38064 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38066/">CVE-2025-38066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38068/">CVE-2025-38068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38069/">CVE-2025-38069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38069">CVE-2025-38069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38072/">CVE-2025-38072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38073/">CVE-2025-38073 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38073">CVE-2025-38073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38074/">CVE-2025-38074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38074">CVE-2025-38074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38077/">CVE-2025-38077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38078/">CVE-2025-38078 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38080/">CVE-2025-38080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38080">CVE-2025-38080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38081/">CVE-2025-38081 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38081">CVE-2025-38081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38082/">CVE-2025-38082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38082">CVE-2025-38082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38083/">CVE-2025-38083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38094/">CVE-2025-38094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38094">CVE-2025-38094 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38097/">CVE-2025-38097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38097">CVE-2025-38097 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38100/">CVE-2025-38100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38100">CVE-2025-38100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38104/">CVE-2025-38104 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38104">CVE-2025-38104 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38105/">CVE-2025-38105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38105">CVE-2025-38105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38115/">CVE-2025-38115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38115">CVE-2025-38115 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38126/">CVE-2025-38126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38126">CVE-2025-38126 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38131/">CVE-2025-38131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38131">CVE-2025-38131 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38132/">CVE-2025-38132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38132">CVE-2025-38132 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38139/">CVE-2025-38139 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38139">CVE-2025-38139 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38140/">CVE-2025-38140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38140">CVE-2025-38140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38147/">CVE-2025-38147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38147">CVE-2025-38147 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38152/">CVE-2025-38152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38152">CVE-2025-38152 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38154/">CVE-2025-38154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38158/">CVE-2025-38158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38158">CVE-2025-38158 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38162/">CVE-2025-38162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38162">CVE-2025-38162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38166/">CVE-2025-38166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38166">CVE-2025-38166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38183/">CVE-2025-38183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38183">CVE-2025-38183 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38187/">CVE-2025-38187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38187">CVE-2025-38187 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38192/">CVE-2025-38192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38192">CVE-2025-38192 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38202/">CVE-2025-38202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38202">CVE-2025-38202 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38206/">CVE-2025-38206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38206">CVE-2025-38206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38207/">CVE-2025-38207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38207">CVE-2025-38207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38210/">CVE-2025-38210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38210">CVE-2025-38210 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38212/">CVE-2025-38212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38236/">CVE-2025-38236 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38236">CVE-2025-38236 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38239/">CVE-2025-38239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38239">CVE-2025-38239 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38240/">CVE-2025-38240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38240">CVE-2025-38240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38248/">CVE-2025-38248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38248">CVE-2025-38248 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38250/">CVE-2025-38250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38250">CVE-2025-38250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38279/">CVE-2025-38279 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38279">CVE-2025-38279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38283/">CVE-2025-38283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38283">CVE-2025-38283 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38310/">CVE-2025-38310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38310">CVE-2025-38310 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38323/">CVE-2025-38323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38334/">CVE-2025-38334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38334">CVE-2025-38334 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38396/">CVE-2025-38396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38453/">CVE-2025-38453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38453">CVE-2025-38453 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" cvss4="8.4/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38471/">CVE-2025-38471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38471">CVE-2025-38471 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38475/">CVE-2025-38475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38475">CVE-2025-38475 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38479/">CVE-2025-38479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38479">CVE-2025-38479 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38637/">CVE-2025-38637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38637">CVE-2025-38637 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39688/">CVE-2025-39688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39688">CVE-2025-39688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39728/">CVE-2025-39728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39728">CVE-2025-39728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39778/">CVE-2025-39778 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39778">CVE-2025-39778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39989/">CVE-2025-39989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39989">CVE-2025-39989 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40014/">CVE-2025-40014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40014">CVE-2025-40014 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40114/">CVE-2025-40114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40114">CVE-2025-40114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40325/">CVE-2025-40325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40325">CVE-2025-40325 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40364/">CVE-2025-40364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40364">CVE-2025-40364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027365" comment="kernel-64kb-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027367" comment="kernel-64kb-extra-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027368" comment="kernel-default-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027370" comment="kernel-default-extra-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027371" comment="kernel-default-livepatch-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027372" comment="kernel-default-vdso-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027374" comment="kernel-docs-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027375" comment="kernel-docs-html-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027376" comment="kernel-kvmsmall-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027378" comment="kernel-kvmsmall-vdso-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027379" comment="kernel-macros-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027380" comment="kernel-obs-qa-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027381" comment="kernel-source-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027382" comment="kernel-source-vanilla-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027383" comment="kernel-syms-6.12.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027384" comment="kernel-zfcpdump-6.12.0-160000.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93911" version="1" class="patch">
	<metadata>
		<title>kernel-azure-6.12.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432/" source="CVE"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-48628" ref_url="https://www.suse.com/security/cve/CVE-2022-48628/" source="CVE"/>
		<reference ref_id="CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669/" source="CVE"/>
		<reference ref_id="CVE-2022-48772" ref_url="https://www.suse.com/security/cve/CVE-2022-48772/" source="CVE"/>
		<reference ref_id="CVE-2022-49145" ref_url="https://www.suse.com/security/cve/CVE-2022-49145/" source="CVE"/>
		<reference ref_id="CVE-2022-49320" ref_url="https://www.suse.com/security/cve/CVE-2022-49320/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3269" ref_url="https://www.suse.com/security/cve/CVE-2023-3269/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3773" ref_url="https://www.suse.com/security/cve/CVE-2023-3773/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-38417" ref_url="https://www.suse.com/security/cve/CVE-2023-38417/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-42752" ref_url="https://www.suse.com/security/cve/CVE-2023-42752/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-42756" ref_url="https://www.suse.com/security/cve/CVE-2023-42756/" source="CVE"/>
		<reference ref_id="CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-4611" ref_url="https://www.suse.com/security/cve/CVE-2023-4611/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-47210" ref_url="https://www.suse.com/security/cve/CVE-2023-47210/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-50431" ref_url="https://www.suse.com/security/cve/CVE-2023-50431/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52433" ref_url="https://www.suse.com/security/cve/CVE-2023-52433/" source="CVE"/>
		<reference ref_id="CVE-2023-52434" ref_url="https://www.suse.com/security/cve/CVE-2023-52434/" source="CVE"/>
		<reference ref_id="CVE-2023-52435" ref_url="https://www.suse.com/security/cve/CVE-2023-52435/" source="CVE"/>
		<reference ref_id="CVE-2023-52437" ref_url="https://www.suse.com/security/cve/CVE-2023-52437/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52440" ref_url="https://www.suse.com/security/cve/CVE-2023-52440/" source="CVE"/>
		<reference ref_id="CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52446" ref_url="https://www.suse.com/security/cve/CVE-2023-52446/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452/" source="CVE"/>
		<reference ref_id="CVE-2023-52453" ref_url="https://www.suse.com/security/cve/CVE-2023-52453/" source="CVE"/>
		<reference ref_id="CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454/" source="CVE"/>
		<reference ref_id="CVE-2023-52455" ref_url="https://www.suse.com/security/cve/CVE-2023-52455/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458/" source="CVE"/>
		<reference ref_id="CVE-2023-52460" ref_url="https://www.suse.com/security/cve/CVE-2023-52460/" source="CVE"/>
		<reference ref_id="CVE-2023-52461" ref_url="https://www.suse.com/security/cve/CVE-2023-52461/" source="CVE"/>
		<reference ref_id="CVE-2023-52462" ref_url="https://www.suse.com/security/cve/CVE-2023-52462/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467/" source="CVE"/>
		<reference ref_id="CVE-2023-52468" ref_url="https://www.suse.com/security/cve/CVE-2023-52468/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52471" ref_url="https://www.suse.com/security/cve/CVE-2023-52471/" source="CVE"/>
		<reference ref_id="CVE-2023-52472" ref_url="https://www.suse.com/security/cve/CVE-2023-52472/" source="CVE"/>
		<reference ref_id="CVE-2023-52473" ref_url="https://www.suse.com/security/cve/CVE-2023-52473/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-52481" ref_url="https://www.suse.com/security/cve/CVE-2023-52481/" source="CVE"/>
		<reference ref_id="CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482/" source="CVE"/>
		<reference ref_id="CVE-2023-52483" ref_url="https://www.suse.com/security/cve/CVE-2023-52483/" source="CVE"/>
		<reference ref_id="CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484/" source="CVE"/>
		<reference ref_id="CVE-2023-52485" ref_url="https://www.suse.com/security/cve/CVE-2023-52485/" source="CVE"/>
		<reference ref_id="CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486/" source="CVE"/>
		<reference ref_id="CVE-2023-52487" ref_url="https://www.suse.com/security/cve/CVE-2023-52487/" source="CVE"/>
		<reference ref_id="CVE-2023-52488" ref_url="https://www.suse.com/security/cve/CVE-2023-52488/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52490" ref_url="https://www.suse.com/security/cve/CVE-2023-52490/" source="CVE"/>
		<reference ref_id="CVE-2023-52491" ref_url="https://www.suse.com/security/cve/CVE-2023-52491/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2023-52493" ref_url="https://www.suse.com/security/cve/CVE-2023-52493/" source="CVE"/>
		<reference ref_id="CVE-2023-52494" ref_url="https://www.suse.com/security/cve/CVE-2023-52494/" source="CVE"/>
		<reference ref_id="CVE-2023-52495" ref_url="https://www.suse.com/security/cve/CVE-2023-52495/" source="CVE"/>
		<reference ref_id="CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497/" source="CVE"/>
		<reference ref_id="CVE-2023-52498" ref_url="https://www.suse.com/security/cve/CVE-2023-52498/" source="CVE"/>
		<reference ref_id="CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500/" source="CVE"/>
		<reference ref_id="CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501/" source="CVE"/>
		<reference ref_id="CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502/" source="CVE"/>
		<reference ref_id="CVE-2023-52503" ref_url="https://www.suse.com/security/cve/CVE-2023-52503/" source="CVE"/>
		<reference ref_id="CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504/" source="CVE"/>
		<reference ref_id="CVE-2023-52505" ref_url="https://www.suse.com/security/cve/CVE-2023-52505/" source="CVE"/>
		<reference ref_id="CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507/" source="CVE"/>
		<reference ref_id="CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508/" source="CVE"/>
		<reference ref_id="CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509/" source="CVE"/>
		<reference ref_id="CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510/" source="CVE"/>
		<reference ref_id="CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511/" source="CVE"/>
		<reference ref_id="CVE-2023-52512" ref_url="https://www.suse.com/security/cve/CVE-2023-52512/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515/" source="CVE"/>
		<reference ref_id="CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517/" source="CVE"/>
		<reference ref_id="CVE-2023-52518" ref_url="https://www.suse.com/security/cve/CVE-2023-52518/" source="CVE"/>
		<reference ref_id="CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52522" ref_url="https://www.suse.com/security/cve/CVE-2023-52522/" source="CVE"/>
		<reference ref_id="CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523/" source="CVE"/>
		<reference ref_id="CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524/" source="CVE"/>
		<reference ref_id="CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525/" source="CVE"/>
		<reference ref_id="CVE-2023-52526" ref_url="https://www.suse.com/security/cve/CVE-2023-52526/" source="CVE"/>
		<reference ref_id="CVE-2023-52527" ref_url="https://www.suse.com/security/cve/CVE-2023-52527/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531/" source="CVE"/>
		<reference ref_id="CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532/" source="CVE"/>
		<reference ref_id="CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559/" source="CVE"/>
		<reference ref_id="CVE-2023-52561" ref_url="https://www.suse.com/security/cve/CVE-2023-52561/" source="CVE"/>
		<reference ref_id="CVE-2023-52562" ref_url="https://www.suse.com/security/cve/CVE-2023-52562/" source="CVE"/>
		<reference ref_id="CVE-2023-52563" ref_url="https://www.suse.com/security/cve/CVE-2023-52563/" source="CVE"/>
		<reference ref_id="CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564/" source="CVE"/>
		<reference ref_id="CVE-2023-52565" ref_url="https://www.suse.com/security/cve/CVE-2023-52565/" source="CVE"/>
		<reference ref_id="CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566/" source="CVE"/>
		<reference ref_id="CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567/" source="CVE"/>
		<reference ref_id="CVE-2023-52568" ref_url="https://www.suse.com/security/cve/CVE-2023-52568/" source="CVE"/>
		<reference ref_id="CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569/" source="CVE"/>
		<reference ref_id="CVE-2023-52570" ref_url="https://www.suse.com/security/cve/CVE-2023-52570/" source="CVE"/>
		<reference ref_id="CVE-2023-52571" ref_url="https://www.suse.com/security/cve/CVE-2023-52571/" source="CVE"/>
		<reference ref_id="CVE-2023-52572" ref_url="https://www.suse.com/security/cve/CVE-2023-52572/" source="CVE"/>
		<reference ref_id="CVE-2023-52573" ref_url="https://www.suse.com/security/cve/CVE-2023-52573/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575/" source="CVE"/>
		<reference ref_id="CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576/" source="CVE"/>
		<reference ref_id="CVE-2023-52577" ref_url="https://www.suse.com/security/cve/CVE-2023-52577/" source="CVE"/>
		<reference ref_id="CVE-2023-52578" ref_url="https://www.suse.com/security/cve/CVE-2023-52578/" source="CVE"/>
		<reference ref_id="CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580/" source="CVE"/>
		<reference ref_id="CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581/" source="CVE"/>
		<reference ref_id="CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582/" source="CVE"/>
		<reference ref_id="CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583/" source="CVE"/>
		<reference ref_id="CVE-2023-52584" ref_url="https://www.suse.com/security/cve/CVE-2023-52584/" source="CVE"/>
		<reference ref_id="CVE-2023-52585" ref_url="https://www.suse.com/security/cve/CVE-2023-52585/" source="CVE"/>
		<reference ref_id="CVE-2023-52586" ref_url="https://www.suse.com/security/cve/CVE-2023-52586/" source="CVE"/>
		<reference ref_id="CVE-2023-52587" ref_url="https://www.suse.com/security/cve/CVE-2023-52587/" source="CVE"/>
		<reference ref_id="CVE-2023-52589" ref_url="https://www.suse.com/security/cve/CVE-2023-52589/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52593" ref_url="https://www.suse.com/security/cve/CVE-2023-52593/" source="CVE"/>
		<reference ref_id="CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594/" source="CVE"/>
		<reference ref_id="CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598/" source="CVE"/>
		<reference ref_id="CVE-2023-52599" ref_url="https://www.suse.com/security/cve/CVE-2023-52599/" source="CVE"/>
		<reference ref_id="CVE-2023-52600" ref_url="https://www.suse.com/security/cve/CVE-2023-52600/" source="CVE"/>
		<reference ref_id="CVE-2023-52601" ref_url="https://www.suse.com/security/cve/CVE-2023-52601/" source="CVE"/>
		<reference ref_id="CVE-2023-52602" ref_url="https://www.suse.com/security/cve/CVE-2023-52602/" source="CVE"/>
		<reference ref_id="CVE-2023-52603" ref_url="https://www.suse.com/security/cve/CVE-2023-52603/" source="CVE"/>
		<reference ref_id="CVE-2023-52604" ref_url="https://www.suse.com/security/cve/CVE-2023-52604/" source="CVE"/>
		<reference ref_id="CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52608" ref_url="https://www.suse.com/security/cve/CVE-2023-52608/" source="CVE"/>
		<reference ref_id="CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610/" source="CVE"/>
		<reference ref_id="CVE-2023-52611" ref_url="https://www.suse.com/security/cve/CVE-2023-52611/" source="CVE"/>
		<reference ref_id="CVE-2023-52612" ref_url="https://www.suse.com/security/cve/CVE-2023-52612/" source="CVE"/>
		<reference ref_id="CVE-2023-52614" ref_url="https://www.suse.com/security/cve/CVE-2023-52614/" source="CVE"/>
		<reference ref_id="CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615/" source="CVE"/>
		<reference ref_id="CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616/" source="CVE"/>
		<reference ref_id="CVE-2023-52617" ref_url="https://www.suse.com/security/cve/CVE-2023-52617/" source="CVE"/>
		<reference ref_id="CVE-2023-52618" ref_url="https://www.suse.com/security/cve/CVE-2023-52618/" source="CVE"/>
		<reference ref_id="CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619/" source="CVE"/>
		<reference ref_id="CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621/" source="CVE"/>
		<reference ref_id="CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622/" source="CVE"/>
		<reference ref_id="CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623/" source="CVE"/>
		<reference ref_id="CVE-2023-52624" ref_url="https://www.suse.com/security/cve/CVE-2023-52624/" source="CVE"/>
		<reference ref_id="CVE-2023-52625" ref_url="https://www.suse.com/security/cve/CVE-2023-52625/" source="CVE"/>
		<reference ref_id="CVE-2023-52626" ref_url="https://www.suse.com/security/cve/CVE-2023-52626/" source="CVE"/>
		<reference ref_id="CVE-2023-52627" ref_url="https://www.suse.com/security/cve/CVE-2023-52627/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-52631" ref_url="https://www.suse.com/security/cve/CVE-2023-52631/" source="CVE"/>
		<reference ref_id="CVE-2023-52632" ref_url="https://www.suse.com/security/cve/CVE-2023-52632/" source="CVE"/>
		<reference ref_id="CVE-2023-52634" ref_url="https://www.suse.com/security/cve/CVE-2023-52634/" source="CVE"/>
		<reference ref_id="CVE-2023-52635" ref_url="https://www.suse.com/security/cve/CVE-2023-52635/" source="CVE"/>
		<reference ref_id="CVE-2023-52636" ref_url="https://www.suse.com/security/cve/CVE-2023-52636/" source="CVE"/>
		<reference ref_id="CVE-2023-52637" ref_url="https://www.suse.com/security/cve/CVE-2023-52637/" source="CVE"/>
		<reference ref_id="CVE-2023-52638" ref_url="https://www.suse.com/security/cve/CVE-2023-52638/" source="CVE"/>
		<reference ref_id="CVE-2023-52639" ref_url="https://www.suse.com/security/cve/CVE-2023-52639/" source="CVE"/>
		<reference ref_id="CVE-2023-52640" ref_url="https://www.suse.com/security/cve/CVE-2023-52640/" source="CVE"/>
		<reference ref_id="CVE-2023-52641" ref_url="https://www.suse.com/security/cve/CVE-2023-52641/" source="CVE"/>
		<reference ref_id="CVE-2023-52642" ref_url="https://www.suse.com/security/cve/CVE-2023-52642/" source="CVE"/>
		<reference ref_id="CVE-2023-52643" ref_url="https://www.suse.com/security/cve/CVE-2023-52643/" source="CVE"/>
		<reference ref_id="CVE-2023-52644" ref_url="https://www.suse.com/security/cve/CVE-2023-52644/" source="CVE"/>
		<reference ref_id="CVE-2023-52645" ref_url="https://www.suse.com/security/cve/CVE-2023-52645/" source="CVE"/>
		<reference ref_id="CVE-2023-52647" ref_url="https://www.suse.com/security/cve/CVE-2023-52647/" source="CVE"/>
		<reference ref_id="CVE-2023-52648" ref_url="https://www.suse.com/security/cve/CVE-2023-52648/" source="CVE"/>
		<reference ref_id="CVE-2023-52649" ref_url="https://www.suse.com/security/cve/CVE-2023-52649/" source="CVE"/>
		<reference ref_id="CVE-2023-52650" ref_url="https://www.suse.com/security/cve/CVE-2023-52650/" source="CVE"/>
		<reference ref_id="CVE-2023-52652" ref_url="https://www.suse.com/security/cve/CVE-2023-52652/" source="CVE"/>
		<reference ref_id="CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52656" ref_url="https://www.suse.com/security/cve/CVE-2023-52656/" source="CVE"/>
		<reference ref_id="CVE-2023-52657" ref_url="https://www.suse.com/security/cve/CVE-2023-52657/" source="CVE"/>
		<reference ref_id="CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658/" source="CVE"/>
		<reference ref_id="CVE-2023-52659" ref_url="https://www.suse.com/security/cve/CVE-2023-52659/" source="CVE"/>
		<reference ref_id="CVE-2023-52660" ref_url="https://www.suse.com/security/cve/CVE-2023-52660/" source="CVE"/>
		<reference ref_id="CVE-2023-52661" ref_url="https://www.suse.com/security/cve/CVE-2023-52661/" source="CVE"/>
		<reference ref_id="CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662/" source="CVE"/>
		<reference ref_id="CVE-2023-52663" ref_url="https://www.suse.com/security/cve/CVE-2023-52663/" source="CVE"/>
		<reference ref_id="CVE-2023-52664" ref_url="https://www.suse.com/security/cve/CVE-2023-52664/" source="CVE"/>
		<reference ref_id="CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667/" source="CVE"/>
		<reference ref_id="CVE-2023-52668" ref_url="https://www.suse.com/security/cve/CVE-2023-52668/" source="CVE"/>
		<reference ref_id="CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669/" source="CVE"/>
		<reference ref_id="CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670/" source="CVE"/>
		<reference ref_id="CVE-2023-52671" ref_url="https://www.suse.com/security/cve/CVE-2023-52671/" source="CVE"/>
		<reference ref_id="CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672/" source="CVE"/>
		<reference ref_id="CVE-2023-52673" ref_url="https://www.suse.com/security/cve/CVE-2023-52673/" source="CVE"/>
		<reference ref_id="CVE-2023-52674" ref_url="https://www.suse.com/security/cve/CVE-2023-52674/" source="CVE"/>
		<reference ref_id="CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-52678" ref_url="https://www.suse.com/security/cve/CVE-2023-52678/" source="CVE"/>
		<reference ref_id="CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679/" source="CVE"/>
		<reference ref_id="CVE-2023-52680" ref_url="https://www.suse.com/security/cve/CVE-2023-52680/" source="CVE"/>
		<reference ref_id="CVE-2023-52681" ref_url="https://www.suse.com/security/cve/CVE-2023-52681/" source="CVE"/>
		<reference ref_id="CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683/" source="CVE"/>
		<reference ref_id="CVE-2023-52685" ref_url="https://www.suse.com/security/cve/CVE-2023-52685/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52687" ref_url="https://www.suse.com/security/cve/CVE-2023-52687/" source="CVE"/>
		<reference ref_id="CVE-2023-52688" ref_url="https://www.suse.com/security/cve/CVE-2023-52688/" source="CVE"/>
		<reference ref_id="CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690/" source="CVE"/>
		<reference ref_id="CVE-2023-52691" ref_url="https://www.suse.com/security/cve/CVE-2023-52691/" source="CVE"/>
		<reference ref_id="CVE-2023-52692" ref_url="https://www.suse.com/security/cve/CVE-2023-52692/" source="CVE"/>
		<reference ref_id="CVE-2023-52693" ref_url="https://www.suse.com/security/cve/CVE-2023-52693/" source="CVE"/>
		<reference ref_id="CVE-2023-52694" ref_url="https://www.suse.com/security/cve/CVE-2023-52694/" source="CVE"/>
		<reference ref_id="CVE-2023-52695" ref_url="https://www.suse.com/security/cve/CVE-2023-52695/" source="CVE"/>
		<reference ref_id="CVE-2023-52696" ref_url="https://www.suse.com/security/cve/CVE-2023-52696/" source="CVE"/>
		<reference ref_id="CVE-2023-52697" ref_url="https://www.suse.com/security/cve/CVE-2023-52697/" source="CVE"/>
		<reference ref_id="CVE-2023-52698" ref_url="https://www.suse.com/security/cve/CVE-2023-52698/" source="CVE"/>
		<reference ref_id="CVE-2023-52699" ref_url="https://www.suse.com/security/cve/CVE-2023-52699/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52749" ref_url="https://www.suse.com/security/cve/CVE-2023-52749/" source="CVE"/>
		<reference ref_id="CVE-2023-52750" ref_url="https://www.suse.com/security/cve/CVE-2023-52750/" source="CVE"/>
		<reference ref_id="CVE-2023-52751" ref_url="https://www.suse.com/security/cve/CVE-2023-52751/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753/" source="CVE"/>
		<reference ref_id="CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754/" source="CVE"/>
		<reference ref_id="CVE-2023-52757" ref_url="https://www.suse.com/security/cve/CVE-2023-52757/" source="CVE"/>
		<reference ref_id="CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52765" ref_url="https://www.suse.com/security/cve/CVE-2023-52765/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52767" ref_url="https://www.suse.com/security/cve/CVE-2023-52767/" source="CVE"/>
		<reference ref_id="CVE-2023-52768" ref_url="https://www.suse.com/security/cve/CVE-2023-52768/" source="CVE"/>
		<reference ref_id="CVE-2023-52769" ref_url="https://www.suse.com/security/cve/CVE-2023-52769/" source="CVE"/>
		<reference ref_id="CVE-2023-52771" ref_url="https://www.suse.com/security/cve/CVE-2023-52771/" source="CVE"/>
		<reference ref_id="CVE-2023-52772" ref_url="https://www.suse.com/security/cve/CVE-2023-52772/" source="CVE"/>
		<reference ref_id="CVE-2023-52773" ref_url="https://www.suse.com/security/cve/CVE-2023-52773/" source="CVE"/>
		<reference ref_id="CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774/" source="CVE"/>
		<reference ref_id="CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775/" source="CVE"/>
		<reference ref_id="CVE-2023-52776" ref_url="https://www.suse.com/security/cve/CVE-2023-52776/" source="CVE"/>
		<reference ref_id="CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777/" source="CVE"/>
		<reference ref_id="CVE-2023-52778" ref_url="https://www.suse.com/security/cve/CVE-2023-52778/" source="CVE"/>
		<reference ref_id="CVE-2023-52780" ref_url="https://www.suse.com/security/cve/CVE-2023-52780/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52782" ref_url="https://www.suse.com/security/cve/CVE-2023-52782/" source="CVE"/>
		<reference ref_id="CVE-2023-52783" ref_url="https://www.suse.com/security/cve/CVE-2023-52783/" source="CVE"/>
		<reference ref_id="CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784/" source="CVE"/>
		<reference ref_id="CVE-2023-52786" ref_url="https://www.suse.com/security/cve/CVE-2023-52786/" source="CVE"/>
		<reference ref_id="CVE-2023-52787" ref_url="https://www.suse.com/security/cve/CVE-2023-52787/" source="CVE"/>
		<reference ref_id="CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788/" source="CVE"/>
		<reference ref_id="CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52792" ref_url="https://www.suse.com/security/cve/CVE-2023-52792/" source="CVE"/>
		<reference ref_id="CVE-2023-52794" ref_url="https://www.suse.com/security/cve/CVE-2023-52794/" source="CVE"/>
		<reference ref_id="CVE-2023-52795" ref_url="https://www.suse.com/security/cve/CVE-2023-52795/" source="CVE"/>
		<reference ref_id="CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52801" ref_url="https://www.suse.com/security/cve/CVE-2023-52801/" source="CVE"/>
		<reference ref_id="CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803/" source="CVE"/>
		<reference ref_id="CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804/" source="CVE"/>
		<reference ref_id="CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805/" source="CVE"/>
		<reference ref_id="CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806/" source="CVE"/>
		<reference ref_id="CVE-2023-52807" ref_url="https://www.suse.com/security/cve/CVE-2023-52807/" source="CVE"/>
		<reference ref_id="CVE-2023-52808" ref_url="https://www.suse.com/security/cve/CVE-2023-52808/" source="CVE"/>
		<reference ref_id="CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809/" source="CVE"/>
		<reference ref_id="CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52812" ref_url="https://www.suse.com/security/cve/CVE-2023-52812/" source="CVE"/>
		<reference ref_id="CVE-2023-52813" ref_url="https://www.suse.com/security/cve/CVE-2023-52813/" source="CVE"/>
		<reference ref_id="CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814/" source="CVE"/>
		<reference ref_id="CVE-2023-52815" ref_url="https://www.suse.com/security/cve/CVE-2023-52815/" source="CVE"/>
		<reference ref_id="CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818/" source="CVE"/>
		<reference ref_id="CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819/" source="CVE"/>
		<reference ref_id="CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821/" source="CVE"/>
		<reference ref_id="CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825/" source="CVE"/>
		<reference ref_id="CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826/" source="CVE"/>
		<reference ref_id="CVE-2023-52827" ref_url="https://www.suse.com/security/cve/CVE-2023-52827/" source="CVE"/>
		<reference ref_id="CVE-2023-52829" ref_url="https://www.suse.com/security/cve/CVE-2023-52829/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835/" source="CVE"/>
		<reference ref_id="CVE-2023-52836" ref_url="https://www.suse.com/security/cve/CVE-2023-52836/" source="CVE"/>
		<reference ref_id="CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837/" source="CVE"/>
		<reference ref_id="CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841/" source="CVE"/>
		<reference ref_id="CVE-2023-52842" ref_url="https://www.suse.com/security/cve/CVE-2023-52842/" source="CVE"/>
		<reference ref_id="CVE-2023-52843" ref_url="https://www.suse.com/security/cve/CVE-2023-52843/" source="CVE"/>
		<reference ref_id="CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844/" source="CVE"/>
		<reference ref_id="CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845/" source="CVE"/>
		<reference ref_id="CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52849" ref_url="https://www.suse.com/security/cve/CVE-2023-52849/" source="CVE"/>
		<reference ref_id="CVE-2023-52850" ref_url="https://www.suse.com/security/cve/CVE-2023-52850/" source="CVE"/>
		<reference ref_id="CVE-2023-52851" ref_url="https://www.suse.com/security/cve/CVE-2023-52851/" source="CVE"/>
		<reference ref_id="CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853/" source="CVE"/>
		<reference ref_id="CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854/" source="CVE"/>
		<reference ref_id="CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855/" source="CVE"/>
		<reference ref_id="CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856/" source="CVE"/>
		<reference ref_id="CVE-2023-52857" ref_url="https://www.suse.com/security/cve/CVE-2023-52857/" source="CVE"/>
		<reference ref_id="CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858/" source="CVE"/>
		<reference ref_id="CVE-2023-52859" ref_url="https://www.suse.com/security/cve/CVE-2023-52859/" source="CVE"/>
		<reference ref_id="CVE-2023-52860" ref_url="https://www.suse.com/security/cve/CVE-2023-52860/" source="CVE"/>
		<reference ref_id="CVE-2023-52861" ref_url="https://www.suse.com/security/cve/CVE-2023-52861/" source="CVE"/>
		<reference ref_id="CVE-2023-52862" ref_url="https://www.suse.com/security/cve/CVE-2023-52862/" source="CVE"/>
		<reference ref_id="CVE-2023-52863" ref_url="https://www.suse.com/security/cve/CVE-2023-52863/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865/" source="CVE"/>
		<reference ref_id="CVE-2023-52866" ref_url="https://www.suse.com/security/cve/CVE-2023-52866/" source="CVE"/>
		<reference ref_id="CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867/" source="CVE"/>
		<reference ref_id="CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868/" source="CVE"/>
		<reference ref_id="CVE-2023-52869" ref_url="https://www.suse.com/security/cve/CVE-2023-52869/" source="CVE"/>
		<reference ref_id="CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870/" source="CVE"/>
		<reference ref_id="CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871/" source="CVE"/>
		<reference ref_id="CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872/" source="CVE"/>
		<reference ref_id="CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873/" source="CVE"/>
		<reference ref_id="CVE-2023-52874" ref_url="https://www.suse.com/security/cve/CVE-2023-52874/" source="CVE"/>
		<reference ref_id="CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875/" source="CVE"/>
		<reference ref_id="CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52879" ref_url="https://www.suse.com/security/cve/CVE-2023-52879/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52882" ref_url="https://www.suse.com/security/cve/CVE-2023-52882/" source="CVE"/>
		<reference ref_id="CVE-2023-52883" ref_url="https://www.suse.com/security/cve/CVE-2023-52883/" source="CVE"/>
		<reference ref_id="CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884/" source="CVE"/>
		<reference ref_id="CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885/" source="CVE"/>
		<reference ref_id="CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886/" source="CVE"/>
		<reference ref_id="CVE-2023-52887" ref_url="https://www.suse.com/security/cve/CVE-2023-52887/" source="CVE"/>
		<reference ref_id="CVE-2023-52889" ref_url="https://www.suse.com/security/cve/CVE-2023-52889/" source="CVE"/>
		<reference ref_id="CVE-2023-52915" ref_url="https://www.suse.com/security/cve/CVE-2023-52915/" source="CVE"/>
		<reference ref_id="CVE-2023-52916" ref_url="https://www.suse.com/security/cve/CVE-2023-52916/" source="CVE"/>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2023-52918" ref_url="https://www.suse.com/security/cve/CVE-2023-52918/" source="CVE"/>
		<reference ref_id="CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919/" source="CVE"/>
		<reference ref_id="CVE-2023-53034" ref_url="https://www.suse.com/security/cve/CVE-2023-53034/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-5972" ref_url="https://www.suse.com/security/cve/CVE-2023-5972/" source="CVE"/>
		<reference ref_id="CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6238" ref_url="https://www.suse.com/security/cve/CVE-2023-6238/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6679" ref_url="https://www.suse.com/security/cve/CVE-2023-6679/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2024-0193" ref_url="https://www.suse.com/security/cve/CVE-2024-0193/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607/" source="CVE"/>
		<reference ref_id="CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639/" source="CVE"/>
		<reference ref_id="CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641/" source="CVE"/>
		<reference ref_id="CVE-2024-0646" ref_url="https://www.suse.com/security/cve/CVE-2024-0646/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151/" source="CVE"/>
		<reference ref_id="CVE-2024-1312" ref_url="https://www.suse.com/security/cve/CVE-2024-1312/" source="CVE"/>
		<reference ref_id="CVE-2024-21823" ref_url="https://www.suse.com/security/cve/CVE-2024-21823/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<reference ref_id="CVE-2024-24861" ref_url="https://www.suse.com/security/cve/CVE-2024-24861/" source="CVE"/>
		<reference ref_id="CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739/" source="CVE"/>
		<reference ref_id="CVE-2024-25741" ref_url="https://www.suse.com/security/cve/CVE-2024-25741/" source="CVE"/>
		<reference ref_id="CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744/" source="CVE"/>
		<reference ref_id="CVE-2024-26581" ref_url="https://www.suse.com/security/cve/CVE-2024-26581/" source="CVE"/>
		<reference ref_id="CVE-2024-26582" ref_url="https://www.suse.com/security/cve/CVE-2024-26582/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589/" source="CVE"/>
		<reference ref_id="CVE-2024-26590" ref_url="https://www.suse.com/security/cve/CVE-2024-26590/" source="CVE"/>
		<reference ref_id="CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26597" ref_url="https://www.suse.com/security/cve/CVE-2024-26597/" source="CVE"/>
		<reference ref_id="CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598/" source="CVE"/>
		<reference ref_id="CVE-2024-26599" ref_url="https://www.suse.com/security/cve/CVE-2024-26599/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26605" ref_url="https://www.suse.com/security/cve/CVE-2024-26605/" source="CVE"/>
		<reference ref_id="CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26611" ref_url="https://www.suse.com/security/cve/CVE-2024-26611/" source="CVE"/>
		<reference ref_id="CVE-2024-26612" ref_url="https://www.suse.com/security/cve/CVE-2024-26612/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615/" source="CVE"/>
		<reference ref_id="CVE-2024-26616" ref_url="https://www.suse.com/security/cve/CVE-2024-26616/" source="CVE"/>
		<reference ref_id="CVE-2024-26618" ref_url="https://www.suse.com/security/cve/CVE-2024-26618/" source="CVE"/>
		<reference ref_id="CVE-2024-26620" ref_url="https://www.suse.com/security/cve/CVE-2024-26620/" source="CVE"/>
		<reference ref_id="CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622/" source="CVE"/>
		<reference ref_id="CVE-2024-26623" ref_url="https://www.suse.com/security/cve/CVE-2024-26623/" source="CVE"/>
		<reference ref_id="CVE-2024-26625" ref_url="https://www.suse.com/security/cve/CVE-2024-26625/" source="CVE"/>
		<reference ref_id="CVE-2024-26627" ref_url="https://www.suse.com/security/cve/CVE-2024-26627/" source="CVE"/>
		<reference ref_id="CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629/" source="CVE"/>
		<reference ref_id="CVE-2024-26631" ref_url="https://www.suse.com/security/cve/CVE-2024-26631/" source="CVE"/>
		<reference ref_id="CVE-2024-26632" ref_url="https://www.suse.com/security/cve/CVE-2024-26632/" source="CVE"/>
		<reference ref_id="CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633/" source="CVE"/>
		<reference ref_id="CVE-2024-26635" ref_url="https://www.suse.com/security/cve/CVE-2024-26635/" source="CVE"/>
		<reference ref_id="CVE-2024-26636" ref_url="https://www.suse.com/security/cve/CVE-2024-26636/" source="CVE"/>
		<reference ref_id="CVE-2024-26637" ref_url="https://www.suse.com/security/cve/CVE-2024-26637/" source="CVE"/>
		<reference ref_id="CVE-2024-26638" ref_url="https://www.suse.com/security/cve/CVE-2024-26638/" source="CVE"/>
		<reference ref_id="CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640/" source="CVE"/>
		<reference ref_id="CVE-2024-26641" ref_url="https://www.suse.com/security/cve/CVE-2024-26641/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-26644" ref_url="https://www.suse.com/security/cve/CVE-2024-26644/" source="CVE"/>
		<reference ref_id="CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645/" source="CVE"/>
		<reference ref_id="CVE-2024-26646" ref_url="https://www.suse.com/security/cve/CVE-2024-26646/" source="CVE"/>
		<reference ref_id="CVE-2024-26647" ref_url="https://www.suse.com/security/cve/CVE-2024-26647/" source="CVE"/>
		<reference ref_id="CVE-2024-26648" ref_url="https://www.suse.com/security/cve/CVE-2024-26648/" source="CVE"/>
		<reference ref_id="CVE-2024-26649" ref_url="https://www.suse.com/security/cve/CVE-2024-26649/" source="CVE"/>
		<reference ref_id="CVE-2024-26650" ref_url="https://www.suse.com/security/cve/CVE-2024-26650/" source="CVE"/>
		<reference ref_id="CVE-2024-26651" ref_url="https://www.suse.com/security/cve/CVE-2024-26651/" source="CVE"/>
		<reference ref_id="CVE-2024-26652" ref_url="https://www.suse.com/security/cve/CVE-2024-26652/" source="CVE"/>
		<reference ref_id="CVE-2024-26654" ref_url="https://www.suse.com/security/cve/CVE-2024-26654/" source="CVE"/>
		<reference ref_id="CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656/" source="CVE"/>
		<reference ref_id="CVE-2024-26657" ref_url="https://www.suse.com/security/cve/CVE-2024-26657/" source="CVE"/>
		<reference ref_id="CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659/" source="CVE"/>
		<reference ref_id="CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660/" source="CVE"/>
		<reference ref_id="CVE-2024-26661" ref_url="https://www.suse.com/security/cve/CVE-2024-26661/" source="CVE"/>
		<reference ref_id="CVE-2024-26662" ref_url="https://www.suse.com/security/cve/CVE-2024-26662/" source="CVE"/>
		<reference ref_id="CVE-2024-26663" ref_url="https://www.suse.com/security/cve/CVE-2024-26663/" source="CVE"/>
		<reference ref_id="CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664/" source="CVE"/>
		<reference ref_id="CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665/" source="CVE"/>
		<reference ref_id="CVE-2024-26666" ref_url="https://www.suse.com/security/cve/CVE-2024-26666/" source="CVE"/>
		<reference ref_id="CVE-2024-26667" ref_url="https://www.suse.com/security/cve/CVE-2024-26667/" source="CVE"/>
		<reference ref_id="CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668/" source="CVE"/>
		<reference ref_id="CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669/" source="CVE"/>
		<reference ref_id="CVE-2024-26670" ref_url="https://www.suse.com/security/cve/CVE-2024-26670/" source="CVE"/>
		<reference ref_id="CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671/" source="CVE"/>
		<reference ref_id="CVE-2024-26672" ref_url="https://www.suse.com/security/cve/CVE-2024-26672/" source="CVE"/>
		<reference ref_id="CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673/" source="CVE"/>
		<reference ref_id="CVE-2024-26674" ref_url="https://www.suse.com/security/cve/CVE-2024-26674/" source="CVE"/>
		<reference ref_id="CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675/" source="CVE"/>
		<reference ref_id="CVE-2024-26676" ref_url="https://www.suse.com/security/cve/CVE-2024-26676/" source="CVE"/>
		<reference ref_id="CVE-2024-26677" ref_url="https://www.suse.com/security/cve/CVE-2024-26677/" source="CVE"/>
		<reference ref_id="CVE-2024-26679" ref_url="https://www.suse.com/security/cve/CVE-2024-26679/" source="CVE"/>
		<reference ref_id="CVE-2024-26680" ref_url="https://www.suse.com/security/cve/CVE-2024-26680/" source="CVE"/>
		<reference ref_id="CVE-2024-26681" ref_url="https://www.suse.com/security/cve/CVE-2024-26681/" source="CVE"/>
		<reference ref_id="CVE-2024-26682" ref_url="https://www.suse.com/security/cve/CVE-2024-26682/" source="CVE"/>
		<reference ref_id="CVE-2024-26683" ref_url="https://www.suse.com/security/cve/CVE-2024-26683/" source="CVE"/>
		<reference ref_id="CVE-2024-26684" ref_url="https://www.suse.com/security/cve/CVE-2024-26684/" source="CVE"/>
		<reference ref_id="CVE-2024-26685" ref_url="https://www.suse.com/security/cve/CVE-2024-26685/" source="CVE"/>
		<reference ref_id="CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687/" source="CVE"/>
		<reference ref_id="CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688/" source="CVE"/>
		<reference ref_id="CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689/" source="CVE"/>
		<reference ref_id="CVE-2024-26691" ref_url="https://www.suse.com/security/cve/CVE-2024-26691/" source="CVE"/>
		<reference ref_id="CVE-2024-26692" ref_url="https://www.suse.com/security/cve/CVE-2024-26692/" source="CVE"/>
		<reference ref_id="CVE-2024-26693" ref_url="https://www.suse.com/security/cve/CVE-2024-26693/" source="CVE"/>
		<reference ref_id="CVE-2024-26694" ref_url="https://www.suse.com/security/cve/CVE-2024-26694/" source="CVE"/>
		<reference ref_id="CVE-2024-26695" ref_url="https://www.suse.com/security/cve/CVE-2024-26695/" source="CVE"/>
		<reference ref_id="CVE-2024-26696" ref_url="https://www.suse.com/security/cve/CVE-2024-26696/" source="CVE"/>
		<reference ref_id="CVE-2024-26697" ref_url="https://www.suse.com/security/cve/CVE-2024-26697/" source="CVE"/>
		<reference ref_id="CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698/" source="CVE"/>
		<reference ref_id="CVE-2024-26699" ref_url="https://www.suse.com/security/cve/CVE-2024-26699/" source="CVE"/>
		<reference ref_id="CVE-2024-26700" ref_url="https://www.suse.com/security/cve/CVE-2024-26700/" source="CVE"/>
		<reference ref_id="CVE-2024-26702" ref_url="https://www.suse.com/security/cve/CVE-2024-26702/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26709" ref_url="https://www.suse.com/security/cve/CVE-2024-26709/" source="CVE"/>
		<reference ref_id="CVE-2024-26710" ref_url="https://www.suse.com/security/cve/CVE-2024-26710/" source="CVE"/>
		<reference ref_id="CVE-2024-26711" ref_url="https://www.suse.com/security/cve/CVE-2024-26711/" source="CVE"/>
		<reference ref_id="CVE-2024-26714" ref_url="https://www.suse.com/security/cve/CVE-2024-26714/" source="CVE"/>
		<reference ref_id="CVE-2024-26715" ref_url="https://www.suse.com/security/cve/CVE-2024-26715/" source="CVE"/>
		<reference ref_id="CVE-2024-26716" ref_url="https://www.suse.com/security/cve/CVE-2024-26716/" source="CVE"/>
		<reference ref_id="CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717/" source="CVE"/>
		<reference ref_id="CVE-2024-26718" ref_url="https://www.suse.com/security/cve/CVE-2024-26718/" source="CVE"/>
		<reference ref_id="CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720/" source="CVE"/>
		<reference ref_id="CVE-2024-26721" ref_url="https://www.suse.com/security/cve/CVE-2024-26721/" source="CVE"/>
		<reference ref_id="CVE-2024-26722" ref_url="https://www.suse.com/security/cve/CVE-2024-26722/" source="CVE"/>
		<reference ref_id="CVE-2024-26723" ref_url="https://www.suse.com/security/cve/CVE-2024-26723/" source="CVE"/>
		<reference ref_id="CVE-2024-26724" ref_url="https://www.suse.com/security/cve/CVE-2024-26724/" source="CVE"/>
		<reference ref_id="CVE-2024-26725" ref_url="https://www.suse.com/security/cve/CVE-2024-26725/" source="CVE"/>
		<reference ref_id="CVE-2024-26726" ref_url="https://www.suse.com/security/cve/CVE-2024-26726/" source="CVE"/>
		<reference ref_id="CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727/" source="CVE"/>
		<reference ref_id="CVE-2024-26728" ref_url="https://www.suse.com/security/cve/CVE-2024-26728/" source="CVE"/>
		<reference ref_id="CVE-2024-26729" ref_url="https://www.suse.com/security/cve/CVE-2024-26729/" source="CVE"/>
		<reference ref_id="CVE-2024-26731" ref_url="https://www.suse.com/security/cve/CVE-2024-26731/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26734" ref_url="https://www.suse.com/security/cve/CVE-2024-26734/" source="CVE"/>
		<reference ref_id="CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735/" source="CVE"/>
		<reference ref_id="CVE-2024-26736" ref_url="https://www.suse.com/security/cve/CVE-2024-26736/" source="CVE"/>
		<reference ref_id="CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737/" source="CVE"/>
		<reference ref_id="CVE-2024-26738" ref_url="https://www.suse.com/security/cve/CVE-2024-26738/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26740" ref_url="https://www.suse.com/security/cve/CVE-2024-26740/" source="CVE"/>
		<reference ref_id="CVE-2024-26742" ref_url="https://www.suse.com/security/cve/CVE-2024-26742/" source="CVE"/>
		<reference ref_id="CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743/" source="CVE"/>
		<reference ref_id="CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744/" source="CVE"/>
		<reference ref_id="CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745/" source="CVE"/>
		<reference ref_id="CVE-2024-26746" ref_url="https://www.suse.com/security/cve/CVE-2024-26746/" source="CVE"/>
		<reference ref_id="CVE-2024-26747" ref_url="https://www.suse.com/security/cve/CVE-2024-26747/" source="CVE"/>
		<reference ref_id="CVE-2024-26748" ref_url="https://www.suse.com/security/cve/CVE-2024-26748/" source="CVE"/>
		<reference ref_id="CVE-2024-26749" ref_url="https://www.suse.com/security/cve/CVE-2024-26749/" source="CVE"/>
		<reference ref_id="CVE-2024-26750" ref_url="https://www.suse.com/security/cve/CVE-2024-26750/" source="CVE"/>
		<reference ref_id="CVE-2024-26751" ref_url="https://www.suse.com/security/cve/CVE-2024-26751/" source="CVE"/>
		<reference ref_id="CVE-2024-26752" ref_url="https://www.suse.com/security/cve/CVE-2024-26752/" source="CVE"/>
		<reference ref_id="CVE-2024-26753" ref_url="https://www.suse.com/security/cve/CVE-2024-26753/" source="CVE"/>
		<reference ref_id="CVE-2024-26754" ref_url="https://www.suse.com/security/cve/CVE-2024-26754/" source="CVE"/>
		<reference ref_id="CVE-2024-26755" ref_url="https://www.suse.com/security/cve/CVE-2024-26755/" source="CVE"/>
		<reference ref_id="CVE-2024-26756" ref_url="https://www.suse.com/security/cve/CVE-2024-26756/" source="CVE"/>
		<reference ref_id="CVE-2024-26757" ref_url="https://www.suse.com/security/cve/CVE-2024-26757/" source="CVE"/>
		<reference ref_id="CVE-2024-26758" ref_url="https://www.suse.com/security/cve/CVE-2024-26758/" source="CVE"/>
		<reference ref_id="CVE-2024-26759" ref_url="https://www.suse.com/security/cve/CVE-2024-26759/" source="CVE"/>
		<reference ref_id="CVE-2024-26761" ref_url="https://www.suse.com/security/cve/CVE-2024-26761/" source="CVE"/>
		<reference ref_id="CVE-2024-26763" ref_url="https://www.suse.com/security/cve/CVE-2024-26763/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26767" ref_url="https://www.suse.com/security/cve/CVE-2024-26767/" source="CVE"/>
		<reference ref_id="CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769/" source="CVE"/>
		<reference ref_id="CVE-2024-26771" ref_url="https://www.suse.com/security/cve/CVE-2024-26771/" source="CVE"/>
		<reference ref_id="CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26774" ref_url="https://www.suse.com/security/cve/CVE-2024-26774/" source="CVE"/>
		<reference ref_id="CVE-2024-26775" ref_url="https://www.suse.com/security/cve/CVE-2024-26775/" source="CVE"/>
		<reference ref_id="CVE-2024-26776" ref_url="https://www.suse.com/security/cve/CVE-2024-26776/" source="CVE"/>
		<reference ref_id="CVE-2024-26777" ref_url="https://www.suse.com/security/cve/CVE-2024-26777/" source="CVE"/>
		<reference ref_id="CVE-2024-26778" ref_url="https://www.suse.com/security/cve/CVE-2024-26778/" source="CVE"/>
		<reference ref_id="CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779/" source="CVE"/>
		<reference ref_id="CVE-2024-26780" ref_url="https://www.suse.com/security/cve/CVE-2024-26780/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783/" source="CVE"/>
		<reference ref_id="CVE-2024-26785" ref_url="https://www.suse.com/security/cve/CVE-2024-26785/" source="CVE"/>
		<reference ref_id="CVE-2024-26786" ref_url="https://www.suse.com/security/cve/CVE-2024-26786/" source="CVE"/>
		<reference ref_id="CVE-2024-26787" ref_url="https://www.suse.com/security/cve/CVE-2024-26787/" source="CVE"/>
		<reference ref_id="CVE-2024-26788" ref_url="https://www.suse.com/security/cve/CVE-2024-26788/" source="CVE"/>
		<reference ref_id="CVE-2024-26789" ref_url="https://www.suse.com/security/cve/CVE-2024-26789/" source="CVE"/>
		<reference ref_id="CVE-2024-26790" ref_url="https://www.suse.com/security/cve/CVE-2024-26790/" source="CVE"/>
		<reference ref_id="CVE-2024-26791" ref_url="https://www.suse.com/security/cve/CVE-2024-26791/" source="CVE"/>
		<reference ref_id="CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792/" source="CVE"/>
		<reference ref_id="CVE-2024-26793" ref_url="https://www.suse.com/security/cve/CVE-2024-26793/" source="CVE"/>
		<reference ref_id="CVE-2024-26794" ref_url="https://www.suse.com/security/cve/CVE-2024-26794/" source="CVE"/>
		<reference ref_id="CVE-2024-26797" ref_url="https://www.suse.com/security/cve/CVE-2024-26797/" source="CVE"/>
		<reference ref_id="CVE-2024-26798" ref_url="https://www.suse.com/security/cve/CVE-2024-26798/" source="CVE"/>
		<reference ref_id="CVE-2024-26799" ref_url="https://www.suse.com/security/cve/CVE-2024-26799/" source="CVE"/>
		<reference ref_id="CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800/" source="CVE"/>
		<reference ref_id="CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801/" source="CVE"/>
		<reference ref_id="CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802/" source="CVE"/>
		<reference ref_id="CVE-2024-26803" ref_url="https://www.suse.com/security/cve/CVE-2024-26803/" source="CVE"/>
		<reference ref_id="CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804/" source="CVE"/>
		<reference ref_id="CVE-2024-26805" ref_url="https://www.suse.com/security/cve/CVE-2024-26805/" source="CVE"/>
		<reference ref_id="CVE-2024-26807" ref_url="https://www.suse.com/security/cve/CVE-2024-26807/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26809" ref_url="https://www.suse.com/security/cve/CVE-2024-26809/" source="CVE"/>
		<reference ref_id="CVE-2024-26812" ref_url="https://www.suse.com/security/cve/CVE-2024-26812/" source="CVE"/>
		<reference ref_id="CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813/" source="CVE"/>
		<reference ref_id="CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814/" source="CVE"/>
		<reference ref_id="CVE-2024-26815" ref_url="https://www.suse.com/security/cve/CVE-2024-26815/" source="CVE"/>
		<reference ref_id="CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816/" source="CVE"/>
		<reference ref_id="CVE-2024-26820" ref_url="https://www.suse.com/security/cve/CVE-2024-26820/" source="CVE"/>
		<reference ref_id="CVE-2024-26822" ref_url="https://www.suse.com/security/cve/CVE-2024-26822/" source="CVE"/>
		<reference ref_id="CVE-2024-26824" ref_url="https://www.suse.com/security/cve/CVE-2024-26824/" source="CVE"/>
		<reference ref_id="CVE-2024-26825" ref_url="https://www.suse.com/security/cve/CVE-2024-26825/" source="CVE"/>
		<reference ref_id="CVE-2024-26826" ref_url="https://www.suse.com/security/cve/CVE-2024-26826/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26829" ref_url="https://www.suse.com/security/cve/CVE-2024-26829/" source="CVE"/>
		<reference ref_id="CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830/" source="CVE"/>
		<reference ref_id="CVE-2024-26832" ref_url="https://www.suse.com/security/cve/CVE-2024-26832/" source="CVE"/>
		<reference ref_id="CVE-2024-26833" ref_url="https://www.suse.com/security/cve/CVE-2024-26833/" source="CVE"/>
		<reference ref_id="CVE-2024-26835" ref_url="https://www.suse.com/security/cve/CVE-2024-26835/" source="CVE"/>
		<reference ref_id="CVE-2024-26836" ref_url="https://www.suse.com/security/cve/CVE-2024-26836/" source="CVE"/>
		<reference ref_id="CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837/" source="CVE"/>
		<reference ref_id="CVE-2024-26838" ref_url="https://www.suse.com/security/cve/CVE-2024-26838/" source="CVE"/>
		<reference ref_id="CVE-2024-26839" ref_url="https://www.suse.com/security/cve/CVE-2024-26839/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843/" source="CVE"/>
		<reference ref_id="CVE-2024-26844" ref_url="https://www.suse.com/security/cve/CVE-2024-26844/" source="CVE"/>
		<reference ref_id="CVE-2024-26845" ref_url="https://www.suse.com/security/cve/CVE-2024-26845/" source="CVE"/>
		<reference ref_id="CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846/" source="CVE"/>
		<reference ref_id="CVE-2024-26847" ref_url="https://www.suse.com/security/cve/CVE-2024-26847/" source="CVE"/>
		<reference ref_id="CVE-2024-26848" ref_url="https://www.suse.com/security/cve/CVE-2024-26848/" source="CVE"/>
		<reference ref_id="CVE-2024-26849" ref_url="https://www.suse.com/security/cve/CVE-2024-26849/" source="CVE"/>
		<reference ref_id="CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853/" source="CVE"/>
		<reference ref_id="CVE-2024-26854" ref_url="https://www.suse.com/security/cve/CVE-2024-26854/" source="CVE"/>
		<reference ref_id="CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855/" source="CVE"/>
		<reference ref_id="CVE-2024-26856" ref_url="https://www.suse.com/security/cve/CVE-2024-26856/" source="CVE"/>
		<reference ref_id="CVE-2024-26857" ref_url="https://www.suse.com/security/cve/CVE-2024-26857/" source="CVE"/>
		<reference ref_id="CVE-2024-26858" ref_url="https://www.suse.com/security/cve/CVE-2024-26858/" source="CVE"/>
		<reference ref_id="CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859/" source="CVE"/>
		<reference ref_id="CVE-2024-26860" ref_url="https://www.suse.com/security/cve/CVE-2024-26860/" source="CVE"/>
		<reference ref_id="CVE-2024-26861" ref_url="https://www.suse.com/security/cve/CVE-2024-26861/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26863" ref_url="https://www.suse.com/security/cve/CVE-2024-26863/" source="CVE"/>
		<reference ref_id="CVE-2024-26865" ref_url="https://www.suse.com/security/cve/CVE-2024-26865/" source="CVE"/>
		<reference ref_id="CVE-2024-26866" ref_url="https://www.suse.com/security/cve/CVE-2024-26866/" source="CVE"/>
		<reference ref_id="CVE-2024-26868" ref_url="https://www.suse.com/security/cve/CVE-2024-26868/" source="CVE"/>
		<reference ref_id="CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870/" source="CVE"/>
		<reference ref_id="CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872/" source="CVE"/>
		<reference ref_id="CVE-2024-26874" ref_url="https://www.suse.com/security/cve/CVE-2024-26874/" source="CVE"/>
		<reference ref_id="CVE-2024-26875" ref_url="https://www.suse.com/security/cve/CVE-2024-26875/" source="CVE"/>
		<reference ref_id="CVE-2024-26876" ref_url="https://www.suse.com/security/cve/CVE-2024-26876/" source="CVE"/>
		<reference ref_id="CVE-2024-26877" ref_url="https://www.suse.com/security/cve/CVE-2024-26877/" source="CVE"/>
		<reference ref_id="CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878/" source="CVE"/>
		<reference ref_id="CVE-2024-26879" ref_url="https://www.suse.com/security/cve/CVE-2024-26879/" source="CVE"/>
		<reference ref_id="CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880/" source="CVE"/>
		<reference ref_id="CVE-2024-26881" ref_url="https://www.suse.com/security/cve/CVE-2024-26881/" source="CVE"/>
		<reference ref_id="CVE-2024-26882" ref_url="https://www.suse.com/security/cve/CVE-2024-26882/" source="CVE"/>
		<reference ref_id="CVE-2024-26883" ref_url="https://www.suse.com/security/cve/CVE-2024-26883/" source="CVE"/>
		<reference ref_id="CVE-2024-26884" ref_url="https://www.suse.com/security/cve/CVE-2024-26884/" source="CVE"/>
		<reference ref_id="CVE-2024-26885" ref_url="https://www.suse.com/security/cve/CVE-2024-26885/" source="CVE"/>
		<reference ref_id="CVE-2024-26886" ref_url="https://www.suse.com/security/cve/CVE-2024-26886/" source="CVE"/>
		<reference ref_id="CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889/" source="CVE"/>
		<reference ref_id="CVE-2024-26890" ref_url="https://www.suse.com/security/cve/CVE-2024-26890/" source="CVE"/>
		<reference ref_id="CVE-2024-26891" ref_url="https://www.suse.com/security/cve/CVE-2024-26891/" source="CVE"/>
		<reference ref_id="CVE-2024-26892" ref_url="https://www.suse.com/security/cve/CVE-2024-26892/" source="CVE"/>
		<reference ref_id="CVE-2024-26893" ref_url="https://www.suse.com/security/cve/CVE-2024-26893/" source="CVE"/>
		<reference ref_id="CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894/" source="CVE"/>
		<reference ref_id="CVE-2024-26895" ref_url="https://www.suse.com/security/cve/CVE-2024-26895/" source="CVE"/>
		<reference ref_id="CVE-2024-26896" ref_url="https://www.suse.com/security/cve/CVE-2024-26896/" source="CVE"/>
		<reference ref_id="CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-26899" ref_url="https://www.suse.com/security/cve/CVE-2024-26899/" source="CVE"/>
		<reference ref_id="CVE-2024-26900" ref_url="https://www.suse.com/security/cve/CVE-2024-26900/" source="CVE"/>
		<reference ref_id="CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901/" source="CVE"/>
		<reference ref_id="CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903/" source="CVE"/>
		<reference ref_id="CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906/" source="CVE"/>
		<reference ref_id="CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907/" source="CVE"/>
		<reference ref_id="CVE-2024-26909" ref_url="https://www.suse.com/security/cve/CVE-2024-26909/" source="CVE"/>
		<reference ref_id="CVE-2024-26911" ref_url="https://www.suse.com/security/cve/CVE-2024-26911/" source="CVE"/>
		<reference ref_id="CVE-2024-26912" ref_url="https://www.suse.com/security/cve/CVE-2024-26912/" source="CVE"/>
		<reference ref_id="CVE-2024-26913" ref_url="https://www.suse.com/security/cve/CVE-2024-26913/" source="CVE"/>
		<reference ref_id="CVE-2024-26914" ref_url="https://www.suse.com/security/cve/CVE-2024-26914/" source="CVE"/>
		<reference ref_id="CVE-2024-26915" ref_url="https://www.suse.com/security/cve/CVE-2024-26915/" source="CVE"/>
		<reference ref_id="CVE-2024-26916" ref_url="https://www.suse.com/security/cve/CVE-2024-26916/" source="CVE"/>
		<reference ref_id="CVE-2024-26917" ref_url="https://www.suse.com/security/cve/CVE-2024-26917/" source="CVE"/>
		<reference ref_id="CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919/" source="CVE"/>
		<reference ref_id="CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26922" ref_url="https://www.suse.com/security/cve/CVE-2024-26922/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26927" ref_url="https://www.suse.com/security/cve/CVE-2024-26927/" source="CVE"/>
		<reference ref_id="CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931/" source="CVE"/>
		<reference ref_id="CVE-2024-26932" ref_url="https://www.suse.com/security/cve/CVE-2024-26932/" source="CVE"/>
		<reference ref_id="CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933/" source="CVE"/>
		<reference ref_id="CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26937" ref_url="https://www.suse.com/security/cve/CVE-2024-26937/" source="CVE"/>
		<reference ref_id="CVE-2024-26938" ref_url="https://www.suse.com/security/cve/CVE-2024-26938/" source="CVE"/>
		<reference ref_id="CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939/" source="CVE"/>
		<reference ref_id="CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940/" source="CVE"/>
		<reference ref_id="CVE-2024-26943" ref_url="https://www.suse.com/security/cve/CVE-2024-26943/" source="CVE"/>
		<reference ref_id="CVE-2024-26944" ref_url="https://www.suse.com/security/cve/CVE-2024-26944/" source="CVE"/>
		<reference ref_id="CVE-2024-26945" ref_url="https://www.suse.com/security/cve/CVE-2024-26945/" source="CVE"/>
		<reference ref_id="CVE-2024-26946" ref_url="https://www.suse.com/security/cve/CVE-2024-26946/" source="CVE"/>
		<reference ref_id="CVE-2024-26948" ref_url="https://www.suse.com/security/cve/CVE-2024-26948/" source="CVE"/>
		<reference ref_id="CVE-2024-26949" ref_url="https://www.suse.com/security/cve/CVE-2024-26949/" source="CVE"/>
		<reference ref_id="CVE-2024-26950" ref_url="https://www.suse.com/security/cve/CVE-2024-26950/" source="CVE"/>
		<reference ref_id="CVE-2024-26951" ref_url="https://www.suse.com/security/cve/CVE-2024-26951/" source="CVE"/>
		<reference ref_id="CVE-2024-26955" ref_url="https://www.suse.com/security/cve/CVE-2024-26955/" source="CVE"/>
		<reference ref_id="CVE-2024-26956" ref_url="https://www.suse.com/security/cve/CVE-2024-26956/" source="CVE"/>
		<reference ref_id="CVE-2024-26957" ref_url="https://www.suse.com/security/cve/CVE-2024-26957/" source="CVE"/>
		<reference ref_id="CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958/" source="CVE"/>
		<reference ref_id="CVE-2024-26959" ref_url="https://www.suse.com/security/cve/CVE-2024-26959/" source="CVE"/>
		<reference ref_id="CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960/" source="CVE"/>
		<reference ref_id="CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961/" source="CVE"/>
		<reference ref_id="CVE-2024-26962" ref_url="https://www.suse.com/security/cve/CVE-2024-26962/" source="CVE"/>
		<reference ref_id="CVE-2024-26963" ref_url="https://www.suse.com/security/cve/CVE-2024-26963/" source="CVE"/>
		<reference ref_id="CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-26965" ref_url="https://www.suse.com/security/cve/CVE-2024-26965/" source="CVE"/>
		<reference ref_id="CVE-2024-26966" ref_url="https://www.suse.com/security/cve/CVE-2024-26966/" source="CVE"/>
		<reference ref_id="CVE-2024-26968" ref_url="https://www.suse.com/security/cve/CVE-2024-26968/" source="CVE"/>
		<reference ref_id="CVE-2024-26969" ref_url="https://www.suse.com/security/cve/CVE-2024-26969/" source="CVE"/>
		<reference ref_id="CVE-2024-26970" ref_url="https://www.suse.com/security/cve/CVE-2024-26970/" source="CVE"/>
		<reference ref_id="CVE-2024-26972" ref_url="https://www.suse.com/security/cve/CVE-2024-26972/" source="CVE"/>
		<reference ref_id="CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973/" source="CVE"/>
		<reference ref_id="CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974/" source="CVE"/>
		<reference ref_id="CVE-2024-26975" ref_url="https://www.suse.com/security/cve/CVE-2024-26975/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-26977" ref_url="https://www.suse.com/security/cve/CVE-2024-26977/" source="CVE"/>
		<reference ref_id="CVE-2024-26978" ref_url="https://www.suse.com/security/cve/CVE-2024-26978/" source="CVE"/>
		<reference ref_id="CVE-2024-26979" ref_url="https://www.suse.com/security/cve/CVE-2024-26979/" source="CVE"/>
		<reference ref_id="CVE-2024-26981" ref_url="https://www.suse.com/security/cve/CVE-2024-26981/" source="CVE"/>
		<reference ref_id="CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982/" source="CVE"/>
		<reference ref_id="CVE-2024-26983" ref_url="https://www.suse.com/security/cve/CVE-2024-26983/" source="CVE"/>
		<reference ref_id="CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984/" source="CVE"/>
		<reference ref_id="CVE-2024-26986" ref_url="https://www.suse.com/security/cve/CVE-2024-26986/" source="CVE"/>
		<reference ref_id="CVE-2024-26988" ref_url="https://www.suse.com/security/cve/CVE-2024-26988/" source="CVE"/>
		<reference ref_id="CVE-2024-26989" ref_url="https://www.suse.com/security/cve/CVE-2024-26989/" source="CVE"/>
		<reference ref_id="CVE-2024-26990" ref_url="https://www.suse.com/security/cve/CVE-2024-26990/" source="CVE"/>
		<reference ref_id="CVE-2024-26991" ref_url="https://www.suse.com/security/cve/CVE-2024-26991/" source="CVE"/>
		<reference ref_id="CVE-2024-26992" ref_url="https://www.suse.com/security/cve/CVE-2024-26992/" source="CVE"/>
		<reference ref_id="CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993/" source="CVE"/>
		<reference ref_id="CVE-2024-26994" ref_url="https://www.suse.com/security/cve/CVE-2024-26994/" source="CVE"/>
		<reference ref_id="CVE-2024-26995" ref_url="https://www.suse.com/security/cve/CVE-2024-26995/" source="CVE"/>
		<reference ref_id="CVE-2024-26996" ref_url="https://www.suse.com/security/cve/CVE-2024-26996/" source="CVE"/>
		<reference ref_id="CVE-2024-26997" ref_url="https://www.suse.com/security/cve/CVE-2024-26997/" source="CVE"/>
		<reference ref_id="CVE-2024-26999" ref_url="https://www.suse.com/security/cve/CVE-2024-26999/" source="CVE"/>
		<reference ref_id="CVE-2024-27000" ref_url="https://www.suse.com/security/cve/CVE-2024-27000/" source="CVE"/>
		<reference ref_id="CVE-2024-27001" ref_url="https://www.suse.com/security/cve/CVE-2024-27001/" source="CVE"/>
		<reference ref_id="CVE-2024-27002" ref_url="https://www.suse.com/security/cve/CVE-2024-27002/" source="CVE"/>
		<reference ref_id="CVE-2024-27003" ref_url="https://www.suse.com/security/cve/CVE-2024-27003/" source="CVE"/>
		<reference ref_id="CVE-2024-27004" ref_url="https://www.suse.com/security/cve/CVE-2024-27004/" source="CVE"/>
		<reference ref_id="CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008/" source="CVE"/>
		<reference ref_id="CVE-2024-27009" ref_url="https://www.suse.com/security/cve/CVE-2024-27009/" source="CVE"/>
		<reference ref_id="CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010/" source="CVE"/>
		<reference ref_id="CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011/" source="CVE"/>
		<reference ref_id="CVE-2024-27012" ref_url="https://www.suse.com/security/cve/CVE-2024-27012/" source="CVE"/>
		<reference ref_id="CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013/" source="CVE"/>
		<reference ref_id="CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014/" source="CVE"/>
		<reference ref_id="CVE-2024-27015" ref_url="https://www.suse.com/security/cve/CVE-2024-27015/" source="CVE"/>
		<reference ref_id="CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016/" source="CVE"/>
		<reference ref_id="CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019/" source="CVE"/>
		<reference ref_id="CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020/" source="CVE"/>
		<reference ref_id="CVE-2024-27022" ref_url="https://www.suse.com/security/cve/CVE-2024-27022/" source="CVE"/>
		<reference ref_id="CVE-2024-27023" ref_url="https://www.suse.com/security/cve/CVE-2024-27023/" source="CVE"/>
		<reference ref_id="CVE-2024-27024" ref_url="https://www.suse.com/security/cve/CVE-2024-27024/" source="CVE"/>
		<reference ref_id="CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025/" source="CVE"/>
		<reference ref_id="CVE-2024-27026" ref_url="https://www.suse.com/security/cve/CVE-2024-27026/" source="CVE"/>
		<reference ref_id="CVE-2024-27027" ref_url="https://www.suse.com/security/cve/CVE-2024-27027/" source="CVE"/>
		<reference ref_id="CVE-2024-27028" ref_url="https://www.suse.com/security/cve/CVE-2024-27028/" source="CVE"/>
		<reference ref_id="CVE-2024-27029" ref_url="https://www.suse.com/security/cve/CVE-2024-27029/" source="CVE"/>
		<reference ref_id="CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030/" source="CVE"/>
		<reference ref_id="CVE-2024-27031" ref_url="https://www.suse.com/security/cve/CVE-2024-27031/" source="CVE"/>
		<reference ref_id="CVE-2024-27036" ref_url="https://www.suse.com/security/cve/CVE-2024-27036/" source="CVE"/>
		<reference ref_id="CVE-2024-27037" ref_url="https://www.suse.com/security/cve/CVE-2024-27037/" source="CVE"/>
		<reference ref_id="CVE-2024-27038" ref_url="https://www.suse.com/security/cve/CVE-2024-27038/" source="CVE"/>
		<reference ref_id="CVE-2024-27039" ref_url="https://www.suse.com/security/cve/CVE-2024-27039/" source="CVE"/>
		<reference ref_id="CVE-2024-27040" ref_url="https://www.suse.com/security/cve/CVE-2024-27040/" source="CVE"/>
		<reference ref_id="CVE-2024-27041" ref_url="https://www.suse.com/security/cve/CVE-2024-27041/" source="CVE"/>
		<reference ref_id="CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27044" ref_url="https://www.suse.com/security/cve/CVE-2024-27044/" source="CVE"/>
		<reference ref_id="CVE-2024-27045" ref_url="https://www.suse.com/security/cve/CVE-2024-27045/" source="CVE"/>
		<reference ref_id="CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046/" source="CVE"/>
		<reference ref_id="CVE-2024-27047" ref_url="https://www.suse.com/security/cve/CVE-2024-27047/" source="CVE"/>
		<reference ref_id="CVE-2024-27048" ref_url="https://www.suse.com/security/cve/CVE-2024-27048/" source="CVE"/>
		<reference ref_id="CVE-2024-27049" ref_url="https://www.suse.com/security/cve/CVE-2024-27049/" source="CVE"/>
		<reference ref_id="CVE-2024-27050" ref_url="https://www.suse.com/security/cve/CVE-2024-27050/" source="CVE"/>
		<reference ref_id="CVE-2024-27051" ref_url="https://www.suse.com/security/cve/CVE-2024-27051/" source="CVE"/>
		<reference ref_id="CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052/" source="CVE"/>
		<reference ref_id="CVE-2024-27053" ref_url="https://www.suse.com/security/cve/CVE-2024-27053/" source="CVE"/>
		<reference ref_id="CVE-2024-27054" ref_url="https://www.suse.com/security/cve/CVE-2024-27054/" source="CVE"/>
		<reference ref_id="CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056/" source="CVE"/>
		<reference ref_id="CVE-2024-27057" ref_url="https://www.suse.com/security/cve/CVE-2024-27057/" source="CVE"/>
		<reference ref_id="CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059/" source="CVE"/>
		<reference ref_id="CVE-2024-27060" ref_url="https://www.suse.com/security/cve/CVE-2024-27060/" source="CVE"/>
		<reference ref_id="CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062/" source="CVE"/>
		<reference ref_id="CVE-2024-27064" ref_url="https://www.suse.com/security/cve/CVE-2024-27064/" source="CVE"/>
		<reference ref_id="CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065/" source="CVE"/>
		<reference ref_id="CVE-2024-27067" ref_url="https://www.suse.com/security/cve/CVE-2024-27067/" source="CVE"/>
		<reference ref_id="CVE-2024-27068" ref_url="https://www.suse.com/security/cve/CVE-2024-27068/" source="CVE"/>
		<reference ref_id="CVE-2024-27071" ref_url="https://www.suse.com/security/cve/CVE-2024-27071/" source="CVE"/>
		<reference ref_id="CVE-2024-27072" ref_url="https://www.suse.com/security/cve/CVE-2024-27072/" source="CVE"/>
		<reference ref_id="CVE-2024-27073" ref_url="https://www.suse.com/security/cve/CVE-2024-27073/" source="CVE"/>
		<reference ref_id="CVE-2024-27074" ref_url="https://www.suse.com/security/cve/CVE-2024-27074/" source="CVE"/>
		<reference ref_id="CVE-2024-27075" ref_url="https://www.suse.com/security/cve/CVE-2024-27075/" source="CVE"/>
		<reference ref_id="CVE-2024-27076" ref_url="https://www.suse.com/security/cve/CVE-2024-27076/" source="CVE"/>
		<reference ref_id="CVE-2024-27077" ref_url="https://www.suse.com/security/cve/CVE-2024-27077/" source="CVE"/>
		<reference ref_id="CVE-2024-27078" ref_url="https://www.suse.com/security/cve/CVE-2024-27078/" source="CVE"/>
		<reference ref_id="CVE-2024-27079" ref_url="https://www.suse.com/security/cve/CVE-2024-27079/" source="CVE"/>
		<reference ref_id="CVE-2024-27080" ref_url="https://www.suse.com/security/cve/CVE-2024-27080/" source="CVE"/>
		<reference ref_id="CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388/" source="CVE"/>
		<reference ref_id="CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389/" source="CVE"/>
		<reference ref_id="CVE-2024-27391" ref_url="https://www.suse.com/security/cve/CVE-2024-27391/" source="CVE"/>
		<reference ref_id="CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393/" source="CVE"/>
		<reference ref_id="CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395/" source="CVE"/>
		<reference ref_id="CVE-2024-27396" ref_url="https://www.suse.com/security/cve/CVE-2024-27396/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399/" source="CVE"/>
		<reference ref_id="CVE-2024-27400" ref_url="https://www.suse.com/security/cve/CVE-2024-27400/" source="CVE"/>
		<reference ref_id="CVE-2024-27401" ref_url="https://www.suse.com/security/cve/CVE-2024-27401/" source="CVE"/>
		<reference ref_id="CVE-2024-27402" ref_url="https://www.suse.com/security/cve/CVE-2024-27402/" source="CVE"/>
		<reference ref_id="CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403/" source="CVE"/>
		<reference ref_id="CVE-2024-27404" ref_url="https://www.suse.com/security/cve/CVE-2024-27404/" source="CVE"/>
		<reference ref_id="CVE-2024-27405" ref_url="https://www.suse.com/security/cve/CVE-2024-27405/" source="CVE"/>
		<reference ref_id="CVE-2024-27408" ref_url="https://www.suse.com/security/cve/CVE-2024-27408/" source="CVE"/>
		<reference ref_id="CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410/" source="CVE"/>
		<reference ref_id="CVE-2024-27411" ref_url="https://www.suse.com/security/cve/CVE-2024-27411/" source="CVE"/>
		<reference ref_id="CVE-2024-27412" ref_url="https://www.suse.com/security/cve/CVE-2024-27412/" source="CVE"/>
		<reference ref_id="CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413/" source="CVE"/>
		<reference ref_id="CVE-2024-27414" ref_url="https://www.suse.com/security/cve/CVE-2024-27414/" source="CVE"/>
		<reference ref_id="CVE-2024-27416" ref_url="https://www.suse.com/security/cve/CVE-2024-27416/" source="CVE"/>
		<reference ref_id="CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417/" source="CVE"/>
		<reference ref_id="CVE-2024-27418" ref_url="https://www.suse.com/security/cve/CVE-2024-27418/" source="CVE"/>
		<reference ref_id="CVE-2024-27431" ref_url="https://www.suse.com/security/cve/CVE-2024-27431/" source="CVE"/>
		<reference ref_id="CVE-2024-27432" ref_url="https://www.suse.com/security/cve/CVE-2024-27432/" source="CVE"/>
		<reference ref_id="CVE-2024-27433" ref_url="https://www.suse.com/security/cve/CVE-2024-27433/" source="CVE"/>
		<reference ref_id="CVE-2024-27434" ref_url="https://www.suse.com/security/cve/CVE-2024-27434/" source="CVE"/>
		<reference ref_id="CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435/" source="CVE"/>
		<reference ref_id="CVE-2024-27436" ref_url="https://www.suse.com/security/cve/CVE-2024-27436/" source="CVE"/>
		<reference ref_id="CVE-2024-27437" ref_url="https://www.suse.com/security/cve/CVE-2024-27437/" source="CVE"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076/" source="CVE"/>
		<reference ref_id="CVE-2024-33619" ref_url="https://www.suse.com/security/cve/CVE-2024-33619/" source="CVE"/>
		<reference ref_id="CVE-2024-34777" ref_url="https://www.suse.com/security/cve/CVE-2024-34777/" source="CVE"/>
		<reference ref_id="CVE-2024-35247" ref_url="https://www.suse.com/security/cve/CVE-2024-35247/" source="CVE"/>
		<reference ref_id="CVE-2024-35784" ref_url="https://www.suse.com/security/cve/CVE-2024-35784/" source="CVE"/>
		<reference ref_id="CVE-2024-35786" ref_url="https://www.suse.com/security/cve/CVE-2024-35786/" source="CVE"/>
		<reference ref_id="CVE-2024-35788" ref_url="https://www.suse.com/security/cve/CVE-2024-35788/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790/" source="CVE"/>
		<reference ref_id="CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791/" source="CVE"/>
		<reference ref_id="CVE-2024-35794" ref_url="https://www.suse.com/security/cve/CVE-2024-35794/" source="CVE"/>
		<reference ref_id="CVE-2024-35795" ref_url="https://www.suse.com/security/cve/CVE-2024-35795/" source="CVE"/>
		<reference ref_id="CVE-2024-35796" ref_url="https://www.suse.com/security/cve/CVE-2024-35796/" source="CVE"/>
		<reference ref_id="CVE-2024-35799" ref_url="https://www.suse.com/security/cve/CVE-2024-35799/" source="CVE"/>
		<reference ref_id="CVE-2024-35800" ref_url="https://www.suse.com/security/cve/CVE-2024-35800/" source="CVE"/>
		<reference ref_id="CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801/" source="CVE"/>
		<reference ref_id="CVE-2024-35803" ref_url="https://www.suse.com/security/cve/CVE-2024-35803/" source="CVE"/>
		<reference ref_id="CVE-2024-35804" ref_url="https://www.suse.com/security/cve/CVE-2024-35804/" source="CVE"/>
		<reference ref_id="CVE-2024-35805" ref_url="https://www.suse.com/security/cve/CVE-2024-35805/" source="CVE"/>
		<reference ref_id="CVE-2024-35806" ref_url="https://www.suse.com/security/cve/CVE-2024-35806/" source="CVE"/>
		<reference ref_id="CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807/" source="CVE"/>
		<reference ref_id="CVE-2024-35808" ref_url="https://www.suse.com/security/cve/CVE-2024-35808/" source="CVE"/>
		<reference ref_id="CVE-2024-35809" ref_url="https://www.suse.com/security/cve/CVE-2024-35809/" source="CVE"/>
		<reference ref_id="CVE-2024-35810" ref_url="https://www.suse.com/security/cve/CVE-2024-35810/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35812" ref_url="https://www.suse.com/security/cve/CVE-2024-35812/" source="CVE"/>
		<reference ref_id="CVE-2024-35813" ref_url="https://www.suse.com/security/cve/CVE-2024-35813/" source="CVE"/>
		<reference ref_id="CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-35819" ref_url="https://www.suse.com/security/cve/CVE-2024-35819/" source="CVE"/>
		<reference ref_id="CVE-2024-35821" ref_url="https://www.suse.com/security/cve/CVE-2024-35821/" source="CVE"/>
		<reference ref_id="CVE-2024-35822" ref_url="https://www.suse.com/security/cve/CVE-2024-35822/" source="CVE"/>
		<reference ref_id="CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823/" source="CVE"/>
		<reference ref_id="CVE-2024-35824" ref_url="https://www.suse.com/security/cve/CVE-2024-35824/" source="CVE"/>
		<reference ref_id="CVE-2024-35825" ref_url="https://www.suse.com/security/cve/CVE-2024-35825/" source="CVE"/>
		<reference ref_id="CVE-2024-35827" ref_url="https://www.suse.com/security/cve/CVE-2024-35827/" source="CVE"/>
		<reference ref_id="CVE-2024-35828" ref_url="https://www.suse.com/security/cve/CVE-2024-35828/" source="CVE"/>
		<reference ref_id="CVE-2024-35829" ref_url="https://www.suse.com/security/cve/CVE-2024-35829/" source="CVE"/>
		<reference ref_id="CVE-2024-35830" ref_url="https://www.suse.com/security/cve/CVE-2024-35830/" source="CVE"/>
		<reference ref_id="CVE-2024-35831" ref_url="https://www.suse.com/security/cve/CVE-2024-35831/" source="CVE"/>
		<reference ref_id="CVE-2024-35833" ref_url="https://www.suse.com/security/cve/CVE-2024-35833/" source="CVE"/>
		<reference ref_id="CVE-2024-35834" ref_url="https://www.suse.com/security/cve/CVE-2024-35834/" source="CVE"/>
		<reference ref_id="CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835/" source="CVE"/>
		<reference ref_id="CVE-2024-35836" ref_url="https://www.suse.com/security/cve/CVE-2024-35836/" source="CVE"/>
		<reference ref_id="CVE-2024-35837" ref_url="https://www.suse.com/security/cve/CVE-2024-35837/" source="CVE"/>
		<reference ref_id="CVE-2024-35838" ref_url="https://www.suse.com/security/cve/CVE-2024-35838/" source="CVE"/>
		<reference ref_id="CVE-2024-35841" ref_url="https://www.suse.com/security/cve/CVE-2024-35841/" source="CVE"/>
		<reference ref_id="CVE-2024-35842" ref_url="https://www.suse.com/security/cve/CVE-2024-35842/" source="CVE"/>
		<reference ref_id="CVE-2024-35843" ref_url="https://www.suse.com/security/cve/CVE-2024-35843/" source="CVE"/>
		<reference ref_id="CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845/" source="CVE"/>
		<reference ref_id="CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847/" source="CVE"/>
		<reference ref_id="CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848/" source="CVE"/>
		<reference ref_id="CVE-2024-35849" ref_url="https://www.suse.com/security/cve/CVE-2024-35849/" source="CVE"/>
		<reference ref_id="CVE-2024-35850" ref_url="https://www.suse.com/security/cve/CVE-2024-35850/" source="CVE"/>
		<reference ref_id="CVE-2024-35851" ref_url="https://www.suse.com/security/cve/CVE-2024-35851/" source="CVE"/>
		<reference ref_id="CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852/" source="CVE"/>
		<reference ref_id="CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855/" source="CVE"/>
		<reference ref_id="CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857/" source="CVE"/>
		<reference ref_id="CVE-2024-35860" ref_url="https://www.suse.com/security/cve/CVE-2024-35860/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35865" ref_url="https://www.suse.com/security/cve/CVE-2024-35865/" source="CVE"/>
		<reference ref_id="CVE-2024-35866" ref_url="https://www.suse.com/security/cve/CVE-2024-35866/" source="CVE"/>
		<reference ref_id="CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867/" source="CVE"/>
		<reference ref_id="CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870/" source="CVE"/>
		<reference ref_id="CVE-2024-35872" ref_url="https://www.suse.com/security/cve/CVE-2024-35872/" source="CVE"/>
		<reference ref_id="CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875/" source="CVE"/>
		<reference ref_id="CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35879" ref_url="https://www.suse.com/security/cve/CVE-2024-35879/" source="CVE"/>
		<reference ref_id="CVE-2024-35880" ref_url="https://www.suse.com/security/cve/CVE-2024-35880/" source="CVE"/>
		<reference ref_id="CVE-2024-35883" ref_url="https://www.suse.com/security/cve/CVE-2024-35883/" source="CVE"/>
		<reference ref_id="CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884/" source="CVE"/>
		<reference ref_id="CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885/" source="CVE"/>
		<reference ref_id="CVE-2024-35886" ref_url="https://www.suse.com/security/cve/CVE-2024-35886/" source="CVE"/>
		<reference ref_id="CVE-2024-35887" ref_url="https://www.suse.com/security/cve/CVE-2024-35887/" source="CVE"/>
		<reference ref_id="CVE-2024-35889" ref_url="https://www.suse.com/security/cve/CVE-2024-35889/" source="CVE"/>
		<reference ref_id="CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890/" source="CVE"/>
		<reference ref_id="CVE-2024-35891" ref_url="https://www.suse.com/security/cve/CVE-2024-35891/" source="CVE"/>
		<reference ref_id="CVE-2024-35892" ref_url="https://www.suse.com/security/cve/CVE-2024-35892/" source="CVE"/>
		<reference ref_id="CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896/" source="CVE"/>
		<reference ref_id="CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897/" source="CVE"/>
		<reference ref_id="CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898/" source="CVE"/>
		<reference ref_id="CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899/" source="CVE"/>
		<reference ref_id="CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900/" source="CVE"/>
		<reference ref_id="CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901/" source="CVE"/>
		<reference ref_id="CVE-2024-35902" ref_url="https://www.suse.com/security/cve/CVE-2024-35902/" source="CVE"/>
		<reference ref_id="CVE-2024-35903" ref_url="https://www.suse.com/security/cve/CVE-2024-35903/" source="CVE"/>
		<reference ref_id="CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907/" source="CVE"/>
		<reference ref_id="CVE-2024-35908" ref_url="https://www.suse.com/security/cve/CVE-2024-35908/" source="CVE"/>
		<reference ref_id="CVE-2024-35909" ref_url="https://www.suse.com/security/cve/CVE-2024-35909/" source="CVE"/>
		<reference ref_id="CVE-2024-35911" ref_url="https://www.suse.com/security/cve/CVE-2024-35911/" source="CVE"/>
		<reference ref_id="CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912/" source="CVE"/>
		<reference ref_id="CVE-2024-35913" ref_url="https://www.suse.com/security/cve/CVE-2024-35913/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-35915" ref_url="https://www.suse.com/security/cve/CVE-2024-35915/" source="CVE"/>
		<reference ref_id="CVE-2024-35916" ref_url="https://www.suse.com/security/cve/CVE-2024-35916/" source="CVE"/>
		<reference ref_id="CVE-2024-35917" ref_url="https://www.suse.com/security/cve/CVE-2024-35917/" source="CVE"/>
		<reference ref_id="CVE-2024-35921" ref_url="https://www.suse.com/security/cve/CVE-2024-35921/" source="CVE"/>
		<reference ref_id="CVE-2024-35922" ref_url="https://www.suse.com/security/cve/CVE-2024-35922/" source="CVE"/>
		<reference ref_id="CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924/" source="CVE"/>
		<reference ref_id="CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925/" source="CVE"/>
		<reference ref_id="CVE-2024-35926" ref_url="https://www.suse.com/security/cve/CVE-2024-35926/" source="CVE"/>
		<reference ref_id="CVE-2024-35927" ref_url="https://www.suse.com/security/cve/CVE-2024-35927/" source="CVE"/>
		<reference ref_id="CVE-2024-35928" ref_url="https://www.suse.com/security/cve/CVE-2024-35928/" source="CVE"/>
		<reference ref_id="CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930/" source="CVE"/>
		<reference ref_id="CVE-2024-35931" ref_url="https://www.suse.com/security/cve/CVE-2024-35931/" source="CVE"/>
		<reference ref_id="CVE-2024-35932" ref_url="https://www.suse.com/security/cve/CVE-2024-35932/" source="CVE"/>
		<reference ref_id="CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933/" source="CVE"/>
		<reference ref_id="CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934/" source="CVE"/>
		<reference ref_id="CVE-2024-35935" ref_url="https://www.suse.com/security/cve/CVE-2024-35935/" source="CVE"/>
		<reference ref_id="CVE-2024-35936" ref_url="https://www.suse.com/security/cve/CVE-2024-35936/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938/" source="CVE"/>
		<reference ref_id="CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939/" source="CVE"/>
		<reference ref_id="CVE-2024-35940" ref_url="https://www.suse.com/security/cve/CVE-2024-35940/" source="CVE"/>
		<reference ref_id="CVE-2024-35942" ref_url="https://www.suse.com/security/cve/CVE-2024-35942/" source="CVE"/>
		<reference ref_id="CVE-2024-35943" ref_url="https://www.suse.com/security/cve/CVE-2024-35943/" source="CVE"/>
		<reference ref_id="CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944/" source="CVE"/>
		<reference ref_id="CVE-2024-35945" ref_url="https://www.suse.com/security/cve/CVE-2024-35945/" source="CVE"/>
		<reference ref_id="CVE-2024-35946" ref_url="https://www.suse.com/security/cve/CVE-2024-35946/" source="CVE"/>
		<reference ref_id="CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947/" source="CVE"/>
		<reference ref_id="CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35951" ref_url="https://www.suse.com/security/cve/CVE-2024-35951/" source="CVE"/>
		<reference ref_id="CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952/" source="CVE"/>
		<reference ref_id="CVE-2024-35953" ref_url="https://www.suse.com/security/cve/CVE-2024-35953/" source="CVE"/>
		<reference ref_id="CVE-2024-35954" ref_url="https://www.suse.com/security/cve/CVE-2024-35954/" source="CVE"/>
		<reference ref_id="CVE-2024-35955" ref_url="https://www.suse.com/security/cve/CVE-2024-35955/" source="CVE"/>
		<reference ref_id="CVE-2024-35956" ref_url="https://www.suse.com/security/cve/CVE-2024-35956/" source="CVE"/>
		<reference ref_id="CVE-2024-35957" ref_url="https://www.suse.com/security/cve/CVE-2024-35957/" source="CVE"/>
		<reference ref_id="CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958/" source="CVE"/>
		<reference ref_id="CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959/" source="CVE"/>
		<reference ref_id="CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960/" source="CVE"/>
		<reference ref_id="CVE-2024-35961" ref_url="https://www.suse.com/security/cve/CVE-2024-35961/" source="CVE"/>
		<reference ref_id="CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962/" source="CVE"/>
		<reference ref_id="CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963/" source="CVE"/>
		<reference ref_id="CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964/" source="CVE"/>
		<reference ref_id="CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965/" source="CVE"/>
		<reference ref_id="CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966/" source="CVE"/>
		<reference ref_id="CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967/" source="CVE"/>
		<reference ref_id="CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969/" source="CVE"/>
		<reference ref_id="CVE-2024-35970" ref_url="https://www.suse.com/security/cve/CVE-2024-35970/" source="CVE"/>
		<reference ref_id="CVE-2024-35971" ref_url="https://www.suse.com/security/cve/CVE-2024-35971/" source="CVE"/>
		<reference ref_id="CVE-2024-35972" ref_url="https://www.suse.com/security/cve/CVE-2024-35972/" source="CVE"/>
		<reference ref_id="CVE-2024-35973" ref_url="https://www.suse.com/security/cve/CVE-2024-35973/" source="CVE"/>
		<reference ref_id="CVE-2024-35974" ref_url="https://www.suse.com/security/cve/CVE-2024-35974/" source="CVE"/>
		<reference ref_id="CVE-2024-35975" ref_url="https://www.suse.com/security/cve/CVE-2024-35975/" source="CVE"/>
		<reference ref_id="CVE-2024-35976" ref_url="https://www.suse.com/security/cve/CVE-2024-35976/" source="CVE"/>
		<reference ref_id="CVE-2024-35977" ref_url="https://www.suse.com/security/cve/CVE-2024-35977/" source="CVE"/>
		<reference ref_id="CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978/" source="CVE"/>
		<reference ref_id="CVE-2024-35979" ref_url="https://www.suse.com/security/cve/CVE-2024-35979/" source="CVE"/>
		<reference ref_id="CVE-2024-35980" ref_url="https://www.suse.com/security/cve/CVE-2024-35980/" source="CVE"/>
		<reference ref_id="CVE-2024-35981" ref_url="https://www.suse.com/security/cve/CVE-2024-35981/" source="CVE"/>
		<reference ref_id="CVE-2024-35982" ref_url="https://www.suse.com/security/cve/CVE-2024-35982/" source="CVE"/>
		<reference ref_id="CVE-2024-35984" ref_url="https://www.suse.com/security/cve/CVE-2024-35984/" source="CVE"/>
		<reference ref_id="CVE-2024-35986" ref_url="https://www.suse.com/security/cve/CVE-2024-35986/" source="CVE"/>
		<reference ref_id="CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989/" source="CVE"/>
		<reference ref_id="CVE-2024-35990" ref_url="https://www.suse.com/security/cve/CVE-2024-35990/" source="CVE"/>
		<reference ref_id="CVE-2024-35991" ref_url="https://www.suse.com/security/cve/CVE-2024-35991/" source="CVE"/>
		<reference ref_id="CVE-2024-35992" ref_url="https://www.suse.com/security/cve/CVE-2024-35992/" source="CVE"/>
		<reference ref_id="CVE-2024-35995" ref_url="https://www.suse.com/security/cve/CVE-2024-35995/" source="CVE"/>
		<reference ref_id="CVE-2024-35997" ref_url="https://www.suse.com/security/cve/CVE-2024-35997/" source="CVE"/>
		<reference ref_id="CVE-2024-35998" ref_url="https://www.suse.com/security/cve/CVE-2024-35998/" source="CVE"/>
		<reference ref_id="CVE-2024-35999" ref_url="https://www.suse.com/security/cve/CVE-2024-35999/" source="CVE"/>
		<reference ref_id="CVE-2024-36002" ref_url="https://www.suse.com/security/cve/CVE-2024-36002/" source="CVE"/>
		<reference ref_id="CVE-2024-36003" ref_url="https://www.suse.com/security/cve/CVE-2024-36003/" source="CVE"/>
		<reference ref_id="CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004/" source="CVE"/>
		<reference ref_id="CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005/" source="CVE"/>
		<reference ref_id="CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006/" source="CVE"/>
		<reference ref_id="CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007/" source="CVE"/>
		<reference ref_id="CVE-2024-36008" ref_url="https://www.suse.com/security/cve/CVE-2024-36008/" source="CVE"/>
		<reference ref_id="CVE-2024-36009" ref_url="https://www.suse.com/security/cve/CVE-2024-36009/" source="CVE"/>
		<reference ref_id="CVE-2024-36010" ref_url="https://www.suse.com/security/cve/CVE-2024-36010/" source="CVE"/>
		<reference ref_id="CVE-2024-36011" ref_url="https://www.suse.com/security/cve/CVE-2024-36011/" source="CVE"/>
		<reference ref_id="CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012/" source="CVE"/>
		<reference ref_id="CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013/" source="CVE"/>
		<reference ref_id="CVE-2024-36014" ref_url="https://www.suse.com/security/cve/CVE-2024-36014/" source="CVE"/>
		<reference ref_id="CVE-2024-36015" ref_url="https://www.suse.com/security/cve/CVE-2024-36015/" source="CVE"/>
		<reference ref_id="CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016/" source="CVE"/>
		<reference ref_id="CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017/" source="CVE"/>
		<reference ref_id="CVE-2024-36018" ref_url="https://www.suse.com/security/cve/CVE-2024-36018/" source="CVE"/>
		<reference ref_id="CVE-2024-36019" ref_url="https://www.suse.com/security/cve/CVE-2024-36019/" source="CVE"/>
		<reference ref_id="CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020/" source="CVE"/>
		<reference ref_id="CVE-2024-36021" ref_url="https://www.suse.com/security/cve/CVE-2024-36021/" source="CVE"/>
		<reference ref_id="CVE-2024-36024" ref_url="https://www.suse.com/security/cve/CVE-2024-36024/" source="CVE"/>
		<reference ref_id="CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025/" source="CVE"/>
		<reference ref_id="CVE-2024-36026" ref_url="https://www.suse.com/security/cve/CVE-2024-36026/" source="CVE"/>
		<reference ref_id="CVE-2024-36029" ref_url="https://www.suse.com/security/cve/CVE-2024-36029/" source="CVE"/>
		<reference ref_id="CVE-2024-36030" ref_url="https://www.suse.com/security/cve/CVE-2024-36030/" source="CVE"/>
		<reference ref_id="CVE-2024-36032" ref_url="https://www.suse.com/security/cve/CVE-2024-36032/" source="CVE"/>
		<reference ref_id="CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244/" source="CVE"/>
		<reference ref_id="CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270/" source="CVE"/>
		<reference ref_id="CVE-2024-36281" ref_url="https://www.suse.com/security/cve/CVE-2024-36281/" source="CVE"/>
		<reference ref_id="CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286/" source="CVE"/>
		<reference ref_id="CVE-2024-36288" ref_url="https://www.suse.com/security/cve/CVE-2024-36288/" source="CVE"/>
		<reference ref_id="CVE-2024-36348" ref_url="https://www.suse.com/security/cve/CVE-2024-36348/" source="CVE"/>
		<reference ref_id="CVE-2024-36349" ref_url="https://www.suse.com/security/cve/CVE-2024-36349/" source="CVE"/>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<reference ref_id="CVE-2024-36476" ref_url="https://www.suse.com/security/cve/CVE-2024-36476/" source="CVE"/>
		<reference ref_id="CVE-2024-36477" ref_url="https://www.suse.com/security/cve/CVE-2024-36477/" source="CVE"/>
		<reference ref_id="CVE-2024-36478" ref_url="https://www.suse.com/security/cve/CVE-2024-36478/" source="CVE"/>
		<reference ref_id="CVE-2024-36479" ref_url="https://www.suse.com/security/cve/CVE-2024-36479/" source="CVE"/>
		<reference ref_id="CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489/" source="CVE"/>
		<reference ref_id="CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880/" source="CVE"/>
		<reference ref_id="CVE-2024-36881" ref_url="https://www.suse.com/security/cve/CVE-2024-36881/" source="CVE"/>
		<reference ref_id="CVE-2024-36882" ref_url="https://www.suse.com/security/cve/CVE-2024-36882/" source="CVE"/>
		<reference ref_id="CVE-2024-36885" ref_url="https://www.suse.com/security/cve/CVE-2024-36885/" source="CVE"/>
		<reference ref_id="CVE-2024-36887" ref_url="https://www.suse.com/security/cve/CVE-2024-36887/" source="CVE"/>
		<reference ref_id="CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889/" source="CVE"/>
		<reference ref_id="CVE-2024-36890" ref_url="https://www.suse.com/security/cve/CVE-2024-36890/" source="CVE"/>
		<reference ref_id="CVE-2024-36891" ref_url="https://www.suse.com/security/cve/CVE-2024-36891/" source="CVE"/>
		<reference ref_id="CVE-2024-36893" ref_url="https://www.suse.com/security/cve/CVE-2024-36893/" source="CVE"/>
		<reference ref_id="CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894/" source="CVE"/>
		<reference ref_id="CVE-2024-36895" ref_url="https://www.suse.com/security/cve/CVE-2024-36895/" source="CVE"/>
		<reference ref_id="CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896/" source="CVE"/>
		<reference ref_id="CVE-2024-36897" ref_url="https://www.suse.com/security/cve/CVE-2024-36897/" source="CVE"/>
		<reference ref_id="CVE-2024-36898" ref_url="https://www.suse.com/security/cve/CVE-2024-36898/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-36900" ref_url="https://www.suse.com/security/cve/CVE-2024-36900/" source="CVE"/>
		<reference ref_id="CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901/" source="CVE"/>
		<reference ref_id="CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902/" source="CVE"/>
		<reference ref_id="CVE-2024-36903" ref_url="https://www.suse.com/security/cve/CVE-2024-36903/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36906" ref_url="https://www.suse.com/security/cve/CVE-2024-36906/" source="CVE"/>
		<reference ref_id="CVE-2024-36907" ref_url="https://www.suse.com/security/cve/CVE-2024-36907/" source="CVE"/>
		<reference ref_id="CVE-2024-36909" ref_url="https://www.suse.com/security/cve/CVE-2024-36909/" source="CVE"/>
		<reference ref_id="CVE-2024-36910" ref_url="https://www.suse.com/security/cve/CVE-2024-36910/" source="CVE"/>
		<reference ref_id="CVE-2024-36911" ref_url="https://www.suse.com/security/cve/CVE-2024-36911/" source="CVE"/>
		<reference ref_id="CVE-2024-36912" ref_url="https://www.suse.com/security/cve/CVE-2024-36912/" source="CVE"/>
		<reference ref_id="CVE-2024-36913" ref_url="https://www.suse.com/security/cve/CVE-2024-36913/" source="CVE"/>
		<reference ref_id="CVE-2024-36914" ref_url="https://www.suse.com/security/cve/CVE-2024-36914/" source="CVE"/>
		<reference ref_id="CVE-2024-36915" ref_url="https://www.suse.com/security/cve/CVE-2024-36915/" source="CVE"/>
		<reference ref_id="CVE-2024-36916" ref_url="https://www.suse.com/security/cve/CVE-2024-36916/" source="CVE"/>
		<reference ref_id="CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917/" source="CVE"/>
		<reference ref_id="CVE-2024-36918" ref_url="https://www.suse.com/security/cve/CVE-2024-36918/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36921" ref_url="https://www.suse.com/security/cve/CVE-2024-36921/" source="CVE"/>
		<reference ref_id="CVE-2024-36922" ref_url="https://www.suse.com/security/cve/CVE-2024-36922/" source="CVE"/>
		<reference ref_id="CVE-2024-36923" ref_url="https://www.suse.com/security/cve/CVE-2024-36923/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928/" source="CVE"/>
		<reference ref_id="CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929/" source="CVE"/>
		<reference ref_id="CVE-2024-36930" ref_url="https://www.suse.com/security/cve/CVE-2024-36930/" source="CVE"/>
		<reference ref_id="CVE-2024-36931" ref_url="https://www.suse.com/security/cve/CVE-2024-36931/" source="CVE"/>
		<reference ref_id="CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933/" source="CVE"/>
		<reference ref_id="CVE-2024-36934" ref_url="https://www.suse.com/security/cve/CVE-2024-36934/" source="CVE"/>
		<reference ref_id="CVE-2024-36935" ref_url="https://www.suse.com/security/cve/CVE-2024-36935/" source="CVE"/>
		<reference ref_id="CVE-2024-36936" ref_url="https://www.suse.com/security/cve/CVE-2024-36936/" source="CVE"/>
		<reference ref_id="CVE-2024-36937" ref_url="https://www.suse.com/security/cve/CVE-2024-36937/" source="CVE"/>
		<reference ref_id="CVE-2024-36938" ref_url="https://www.suse.com/security/cve/CVE-2024-36938/" source="CVE"/>
		<reference ref_id="CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942/" source="CVE"/>
		<reference ref_id="CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944/" source="CVE"/>
		<reference ref_id="CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945/" source="CVE"/>
		<reference ref_id="CVE-2024-36946" ref_url="https://www.suse.com/security/cve/CVE-2024-36946/" source="CVE"/>
		<reference ref_id="CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947/" source="CVE"/>
		<reference ref_id="CVE-2024-36949" ref_url="https://www.suse.com/security/cve/CVE-2024-36949/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36951" ref_url="https://www.suse.com/security/cve/CVE-2024-36951/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953/" source="CVE"/>
		<reference ref_id="CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955/" source="CVE"/>
		<reference ref_id="CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957/" source="CVE"/>
		<reference ref_id="CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959/" source="CVE"/>
		<reference ref_id="CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960/" source="CVE"/>
		<reference ref_id="CVE-2024-36962" ref_url="https://www.suse.com/security/cve/CVE-2024-36962/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-36965" ref_url="https://www.suse.com/security/cve/CVE-2024-36965/" source="CVE"/>
		<reference ref_id="CVE-2024-36967" ref_url="https://www.suse.com/security/cve/CVE-2024-36967/" source="CVE"/>
		<reference ref_id="CVE-2024-36968" ref_url="https://www.suse.com/security/cve/CVE-2024-36968/" source="CVE"/>
		<reference ref_id="CVE-2024-36969" ref_url="https://www.suse.com/security/cve/CVE-2024-36969/" source="CVE"/>
		<reference ref_id="CVE-2024-36970" ref_url="https://www.suse.com/security/cve/CVE-2024-36970/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-36972" ref_url="https://www.suse.com/security/cve/CVE-2024-36972/" source="CVE"/>
		<reference ref_id="CVE-2024-36973" ref_url="https://www.suse.com/security/cve/CVE-2024-36973/" source="CVE"/>
		<reference ref_id="CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974/" source="CVE"/>
		<reference ref_id="CVE-2024-36975" ref_url="https://www.suse.com/security/cve/CVE-2024-36975/" source="CVE"/>
		<reference ref_id="CVE-2024-36977" ref_url="https://www.suse.com/security/cve/CVE-2024-36977/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-36979" ref_url="https://www.suse.com/security/cve/CVE-2024-36979/" source="CVE"/>
		<reference ref_id="CVE-2024-37021" ref_url="https://www.suse.com/security/cve/CVE-2024-37021/" source="CVE"/>
		<reference ref_id="CVE-2024-37078" ref_url="https://www.suse.com/security/cve/CVE-2024-37078/" source="CVE"/>
		<reference ref_id="CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353/" source="CVE"/>
		<reference ref_id="CVE-2024-37354" ref_url="https://www.suse.com/security/cve/CVE-2024-37354/" source="CVE"/>
		<reference ref_id="CVE-2024-38381" ref_url="https://www.suse.com/security/cve/CVE-2024-38381/" source="CVE"/>
		<reference ref_id="CVE-2024-38384" ref_url="https://www.suse.com/security/cve/CVE-2024-38384/" source="CVE"/>
		<reference ref_id="CVE-2024-38385" ref_url="https://www.suse.com/security/cve/CVE-2024-38385/" source="CVE"/>
		<reference ref_id="CVE-2024-38388" ref_url="https://www.suse.com/security/cve/CVE-2024-38388/" source="CVE"/>
		<reference ref_id="CVE-2024-38390" ref_url="https://www.suse.com/security/cve/CVE-2024-38390/" source="CVE"/>
		<reference ref_id="CVE-2024-38391" ref_url="https://www.suse.com/security/cve/CVE-2024-38391/" source="CVE"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-38539" ref_url="https://www.suse.com/security/cve/CVE-2024-38539/" source="CVE"/>
		<reference ref_id="CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38543" ref_url="https://www.suse.com/security/cve/CVE-2024-38543/" source="CVE"/>
		<reference ref_id="CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544/" source="CVE"/>
		<reference ref_id="CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545/" source="CVE"/>
		<reference ref_id="CVE-2024-38546" ref_url="https://www.suse.com/security/cve/CVE-2024-38546/" source="CVE"/>
		<reference ref_id="CVE-2024-38547" ref_url="https://www.suse.com/security/cve/CVE-2024-38547/" source="CVE"/>
		<reference ref_id="CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548/" source="CVE"/>
		<reference ref_id="CVE-2024-38549" ref_url="https://www.suse.com/security/cve/CVE-2024-38549/" source="CVE"/>
		<reference ref_id="CVE-2024-38550" ref_url="https://www.suse.com/security/cve/CVE-2024-38550/" source="CVE"/>
		<reference ref_id="CVE-2024-38551" ref_url="https://www.suse.com/security/cve/CVE-2024-38551/" source="CVE"/>
		<reference ref_id="CVE-2024-38552" ref_url="https://www.suse.com/security/cve/CVE-2024-38552/" source="CVE"/>
		<reference ref_id="CVE-2024-38553" ref_url="https://www.suse.com/security/cve/CVE-2024-38553/" source="CVE"/>
		<reference ref_id="CVE-2024-38554" ref_url="https://www.suse.com/security/cve/CVE-2024-38554/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556/" source="CVE"/>
		<reference ref_id="CVE-2024-38557" ref_url="https://www.suse.com/security/cve/CVE-2024-38557/" source="CVE"/>
		<reference ref_id="CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560/" source="CVE"/>
		<reference ref_id="CVE-2024-38562" ref_url="https://www.suse.com/security/cve/CVE-2024-38562/" source="CVE"/>
		<reference ref_id="CVE-2024-38563" ref_url="https://www.suse.com/security/cve/CVE-2024-38563/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-38565" ref_url="https://www.suse.com/security/cve/CVE-2024-38565/" source="CVE"/>
		<reference ref_id="CVE-2024-38566" ref_url="https://www.suse.com/security/cve/CVE-2024-38566/" source="CVE"/>
		<reference ref_id="CVE-2024-38567" ref_url="https://www.suse.com/security/cve/CVE-2024-38567/" source="CVE"/>
		<reference ref_id="CVE-2024-38568" ref_url="https://www.suse.com/security/cve/CVE-2024-38568/" source="CVE"/>
		<reference ref_id="CVE-2024-38569" ref_url="https://www.suse.com/security/cve/CVE-2024-38569/" source="CVE"/>
		<reference ref_id="CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570/" source="CVE"/>
		<reference ref_id="CVE-2024-38571" ref_url="https://www.suse.com/security/cve/CVE-2024-38571/" source="CVE"/>
		<reference ref_id="CVE-2024-38572" ref_url="https://www.suse.com/security/cve/CVE-2024-38572/" source="CVE"/>
		<reference ref_id="CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573/" source="CVE"/>
		<reference ref_id="CVE-2024-38575" ref_url="https://www.suse.com/security/cve/CVE-2024-38575/" source="CVE"/>
		<reference ref_id="CVE-2024-38576" ref_url="https://www.suse.com/security/cve/CVE-2024-38576/" source="CVE"/>
		<reference ref_id="CVE-2024-38577" ref_url="https://www.suse.com/security/cve/CVE-2024-38577/" source="CVE"/>
		<reference ref_id="CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578/" source="CVE"/>
		<reference ref_id="CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579/" source="CVE"/>
		<reference ref_id="CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580/" source="CVE"/>
		<reference ref_id="CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581/" source="CVE"/>
		<reference ref_id="CVE-2024-38582" ref_url="https://www.suse.com/security/cve/CVE-2024-38582/" source="CVE"/>
		<reference ref_id="CVE-2024-38583" ref_url="https://www.suse.com/security/cve/CVE-2024-38583/" source="CVE"/>
		<reference ref_id="CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586/" source="CVE"/>
		<reference ref_id="CVE-2024-38587" ref_url="https://www.suse.com/security/cve/CVE-2024-38587/" source="CVE"/>
		<reference ref_id="CVE-2024-38588" ref_url="https://www.suse.com/security/cve/CVE-2024-38588/" source="CVE"/>
		<reference ref_id="CVE-2024-38590" ref_url="https://www.suse.com/security/cve/CVE-2024-38590/" source="CVE"/>
		<reference ref_id="CVE-2024-38591" ref_url="https://www.suse.com/security/cve/CVE-2024-38591/" source="CVE"/>
		<reference ref_id="CVE-2024-38592" ref_url="https://www.suse.com/security/cve/CVE-2024-38592/" source="CVE"/>
		<reference ref_id="CVE-2024-38594" ref_url="https://www.suse.com/security/cve/CVE-2024-38594/" source="CVE"/>
		<reference ref_id="CVE-2024-38595" ref_url="https://www.suse.com/security/cve/CVE-2024-38595/" source="CVE"/>
		<reference ref_id="CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596/" source="CVE"/>
		<reference ref_id="CVE-2024-38597" ref_url="https://www.suse.com/security/cve/CVE-2024-38597/" source="CVE"/>
		<reference ref_id="CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598/" source="CVE"/>
		<reference ref_id="CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599/" source="CVE"/>
		<reference ref_id="CVE-2024-38600" ref_url="https://www.suse.com/security/cve/CVE-2024-38600/" source="CVE"/>
		<reference ref_id="CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601/" source="CVE"/>
		<reference ref_id="CVE-2024-38602" ref_url="https://www.suse.com/security/cve/CVE-2024-38602/" source="CVE"/>
		<reference ref_id="CVE-2024-38603" ref_url="https://www.suse.com/security/cve/CVE-2024-38603/" source="CVE"/>
		<reference ref_id="CVE-2024-38604" ref_url="https://www.suse.com/security/cve/CVE-2024-38604/" source="CVE"/>
		<reference ref_id="CVE-2024-38605" ref_url="https://www.suse.com/security/cve/CVE-2024-38605/" source="CVE"/>
		<reference ref_id="CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608/" source="CVE"/>
		<reference ref_id="CVE-2024-38609" ref_url="https://www.suse.com/security/cve/CVE-2024-38609/" source="CVE"/>
		<reference ref_id="CVE-2024-38610" ref_url="https://www.suse.com/security/cve/CVE-2024-38610/" source="CVE"/>
		<reference ref_id="CVE-2024-38611" ref_url="https://www.suse.com/security/cve/CVE-2024-38611/" source="CVE"/>
		<reference ref_id="CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615/" source="CVE"/>
		<reference ref_id="CVE-2024-38616" ref_url="https://www.suse.com/security/cve/CVE-2024-38616/" source="CVE"/>
		<reference ref_id="CVE-2024-38617" ref_url="https://www.suse.com/security/cve/CVE-2024-38617/" source="CVE"/>
		<reference ref_id="CVE-2024-38618" ref_url="https://www.suse.com/security/cve/CVE-2024-38618/" source="CVE"/>
		<reference ref_id="CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619/" source="CVE"/>
		<reference ref_id="CVE-2024-38621" ref_url="https://www.suse.com/security/cve/CVE-2024-38621/" source="CVE"/>
		<reference ref_id="CVE-2024-38622" ref_url="https://www.suse.com/security/cve/CVE-2024-38622/" source="CVE"/>
		<reference ref_id="CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627/" source="CVE"/>
		<reference ref_id="CVE-2024-38628" ref_url="https://www.suse.com/security/cve/CVE-2024-38628/" source="CVE"/>
		<reference ref_id="CVE-2024-38629" ref_url="https://www.suse.com/security/cve/CVE-2024-38629/" source="CVE"/>
		<reference ref_id="CVE-2024-38630" ref_url="https://www.suse.com/security/cve/CVE-2024-38630/" source="CVE"/>
		<reference ref_id="CVE-2024-38632" ref_url="https://www.suse.com/security/cve/CVE-2024-38632/" source="CVE"/>
		<reference ref_id="CVE-2024-38633" ref_url="https://www.suse.com/security/cve/CVE-2024-38633/" source="CVE"/>
		<reference ref_id="CVE-2024-38634" ref_url="https://www.suse.com/security/cve/CVE-2024-38634/" source="CVE"/>
		<reference ref_id="CVE-2024-38635" ref_url="https://www.suse.com/security/cve/CVE-2024-38635/" source="CVE"/>
		<reference ref_id="CVE-2024-38636" ref_url="https://www.suse.com/security/cve/CVE-2024-38636/" source="CVE"/>
		<reference ref_id="CVE-2024-38659" ref_url="https://www.suse.com/security/cve/CVE-2024-38659/" source="CVE"/>
		<reference ref_id="CVE-2024-38661" ref_url="https://www.suse.com/security/cve/CVE-2024-38661/" source="CVE"/>
		<reference ref_id="CVE-2024-38662" ref_url="https://www.suse.com/security/cve/CVE-2024-38662/" source="CVE"/>
		<reference ref_id="CVE-2024-38663" ref_url="https://www.suse.com/security/cve/CVE-2024-38663/" source="CVE"/>
		<reference ref_id="CVE-2024-38664" ref_url="https://www.suse.com/security/cve/CVE-2024-38664/" source="CVE"/>
		<reference ref_id="CVE-2024-38780" ref_url="https://www.suse.com/security/cve/CVE-2024-38780/" source="CVE"/>
		<reference ref_id="CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276/" source="CVE"/>
		<reference ref_id="CVE-2024-39277" ref_url="https://www.suse.com/security/cve/CVE-2024-39277/" source="CVE"/>
		<reference ref_id="CVE-2024-39282" ref_url="https://www.suse.com/security/cve/CVE-2024-39282/" source="CVE"/>
		<reference ref_id="CVE-2024-39291" ref_url="https://www.suse.com/security/cve/CVE-2024-39291/" source="CVE"/>
		<reference ref_id="CVE-2024-39296" ref_url="https://www.suse.com/security/cve/CVE-2024-39296/" source="CVE"/>
		<reference ref_id="CVE-2024-39301" ref_url="https://www.suse.com/security/cve/CVE-2024-39301/" source="CVE"/>
		<reference ref_id="CVE-2024-39362" ref_url="https://www.suse.com/security/cve/CVE-2024-39362/" source="CVE"/>
		<reference ref_id="CVE-2024-39371" ref_url="https://www.suse.com/security/cve/CVE-2024-39371/" source="CVE"/>
		<reference ref_id="CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463/" source="CVE"/>
		<reference ref_id="CVE-2024-39466" ref_url="https://www.suse.com/security/cve/CVE-2024-39466/" source="CVE"/>
		<reference ref_id="CVE-2024-39468" ref_url="https://www.suse.com/security/cve/CVE-2024-39468/" source="CVE"/>
		<reference ref_id="CVE-2024-39469" ref_url="https://www.suse.com/security/cve/CVE-2024-39469/" source="CVE"/>
		<reference ref_id="CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471/" source="CVE"/>
		<reference ref_id="CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472/" source="CVE"/>
		<reference ref_id="CVE-2024-39473" ref_url="https://www.suse.com/security/cve/CVE-2024-39473/" source="CVE"/>
		<reference ref_id="CVE-2024-39474" ref_url="https://www.suse.com/security/cve/CVE-2024-39474/" source="CVE"/>
		<reference ref_id="CVE-2024-39475" ref_url="https://www.suse.com/security/cve/CVE-2024-39475/" source="CVE"/>
		<reference ref_id="CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476/" source="CVE"/>
		<reference ref_id="CVE-2024-39479" ref_url="https://www.suse.com/security/cve/CVE-2024-39479/" source="CVE"/>
		<reference ref_id="CVE-2024-39481" ref_url="https://www.suse.com/security/cve/CVE-2024-39481/" source="CVE"/>
		<reference ref_id="CVE-2024-39482" ref_url="https://www.suse.com/security/cve/CVE-2024-39482/" source="CVE"/>
		<reference ref_id="CVE-2024-39483" ref_url="https://www.suse.com/security/cve/CVE-2024-39483/" source="CVE"/>
		<reference ref_id="CVE-2024-39484" ref_url="https://www.suse.com/security/cve/CVE-2024-39484/" source="CVE"/>
		<reference ref_id="CVE-2024-39486" ref_url="https://www.suse.com/security/cve/CVE-2024-39486/" source="CVE"/>
		<reference ref_id="CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487/" source="CVE"/>
		<reference ref_id="CVE-2024-39488" ref_url="https://www.suse.com/security/cve/CVE-2024-39488/" source="CVE"/>
		<reference ref_id="CVE-2024-39489" ref_url="https://www.suse.com/security/cve/CVE-2024-39489/" source="CVE"/>
		<reference ref_id="CVE-2024-39490" ref_url="https://www.suse.com/security/cve/CVE-2024-39490/" source="CVE"/>
		<reference ref_id="CVE-2024-39491" ref_url="https://www.suse.com/security/cve/CVE-2024-39491/" source="CVE"/>
		<reference ref_id="CVE-2024-39493" ref_url="https://www.suse.com/security/cve/CVE-2024-39493/" source="CVE"/>
		<reference ref_id="CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494/" source="CVE"/>
		<reference ref_id="CVE-2024-39496" ref_url="https://www.suse.com/security/cve/CVE-2024-39496/" source="CVE"/>
		<reference ref_id="CVE-2024-39497" ref_url="https://www.suse.com/security/cve/CVE-2024-39497/" source="CVE"/>
		<reference ref_id="CVE-2024-39498" ref_url="https://www.suse.com/security/cve/CVE-2024-39498/" source="CVE"/>
		<reference ref_id="CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499/" source="CVE"/>
		<reference ref_id="CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500/" source="CVE"/>
		<reference ref_id="CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501/" source="CVE"/>
		<reference ref_id="CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502/" source="CVE"/>
		<reference ref_id="CVE-2024-39504" ref_url="https://www.suse.com/security/cve/CVE-2024-39504/" source="CVE"/>
		<reference ref_id="CVE-2024-39505" ref_url="https://www.suse.com/security/cve/CVE-2024-39505/" source="CVE"/>
		<reference ref_id="CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506/" source="CVE"/>
		<reference ref_id="CVE-2024-39507" ref_url="https://www.suse.com/security/cve/CVE-2024-39507/" source="CVE"/>
		<reference ref_id="CVE-2024-39508" ref_url="https://www.suse.com/security/cve/CVE-2024-39508/" source="CVE"/>
		<reference ref_id="CVE-2024-39509" ref_url="https://www.suse.com/security/cve/CVE-2024-39509/" source="CVE"/>
		<reference ref_id="CVE-2024-39510" ref_url="https://www.suse.com/security/cve/CVE-2024-39510/" source="CVE"/>
		<reference ref_id="CVE-2024-40899" ref_url="https://www.suse.com/security/cve/CVE-2024-40899/" source="CVE"/>
		<reference ref_id="CVE-2024-40900" ref_url="https://www.suse.com/security/cve/CVE-2024-40900/" source="CVE"/>
		<reference ref_id="CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-40903" ref_url="https://www.suse.com/security/cve/CVE-2024-40903/" source="CVE"/>
		<reference ref_id="CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904/" source="CVE"/>
		<reference ref_id="CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905/" source="CVE"/>
		<reference ref_id="CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906/" source="CVE"/>
		<reference ref_id="CVE-2024-40908" ref_url="https://www.suse.com/security/cve/CVE-2024-40908/" source="CVE"/>
		<reference ref_id="CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909/" source="CVE"/>
		<reference ref_id="CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910/" source="CVE"/>
		<reference ref_id="CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911/" source="CVE"/>
		<reference ref_id="CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912/" source="CVE"/>
		<reference ref_id="CVE-2024-40913" ref_url="https://www.suse.com/security/cve/CVE-2024-40913/" source="CVE"/>
		<reference ref_id="CVE-2024-40916" ref_url="https://www.suse.com/security/cve/CVE-2024-40916/" source="CVE"/>
		<reference ref_id="CVE-2024-40919" ref_url="https://www.suse.com/security/cve/CVE-2024-40919/" source="CVE"/>
		<reference ref_id="CVE-2024-40920" ref_url="https://www.suse.com/security/cve/CVE-2024-40920/" source="CVE"/>
		<reference ref_id="CVE-2024-40921" ref_url="https://www.suse.com/security/cve/CVE-2024-40921/" source="CVE"/>
		<reference ref_id="CVE-2024-40922" ref_url="https://www.suse.com/security/cve/CVE-2024-40922/" source="CVE"/>
		<reference ref_id="CVE-2024-40923" ref_url="https://www.suse.com/security/cve/CVE-2024-40923/" source="CVE"/>
		<reference ref_id="CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924/" source="CVE"/>
		<reference ref_id="CVE-2024-40925" ref_url="https://www.suse.com/security/cve/CVE-2024-40925/" source="CVE"/>
		<reference ref_id="CVE-2024-40926" ref_url="https://www.suse.com/security/cve/CVE-2024-40926/" source="CVE"/>
		<reference ref_id="CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927/" source="CVE"/>
		<reference ref_id="CVE-2024-40928" ref_url="https://www.suse.com/security/cve/CVE-2024-40928/" source="CVE"/>
		<reference ref_id="CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929/" source="CVE"/>
		<reference ref_id="CVE-2024-40930" ref_url="https://www.suse.com/security/cve/CVE-2024-40930/" source="CVE"/>
		<reference ref_id="CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931/" source="CVE"/>
		<reference ref_id="CVE-2024-40932" ref_url="https://www.suse.com/security/cve/CVE-2024-40932/" source="CVE"/>
		<reference ref_id="CVE-2024-40934" ref_url="https://www.suse.com/security/cve/CVE-2024-40934/" source="CVE"/>
		<reference ref_id="CVE-2024-40935" ref_url="https://www.suse.com/security/cve/CVE-2024-40935/" source="CVE"/>
		<reference ref_id="CVE-2024-40936" ref_url="https://www.suse.com/security/cve/CVE-2024-40936/" source="CVE"/>
		<reference ref_id="CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937/" source="CVE"/>
		<reference ref_id="CVE-2024-40938" ref_url="https://www.suse.com/security/cve/CVE-2024-40938/" source="CVE"/>
		<reference ref_id="CVE-2024-40939" ref_url="https://www.suse.com/security/cve/CVE-2024-40939/" source="CVE"/>
		<reference ref_id="CVE-2024-40940" ref_url="https://www.suse.com/security/cve/CVE-2024-40940/" source="CVE"/>
		<reference ref_id="CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941/" source="CVE"/>
		<reference ref_id="CVE-2024-40942" ref_url="https://www.suse.com/security/cve/CVE-2024-40942/" source="CVE"/>
		<reference ref_id="CVE-2024-40943" ref_url="https://www.suse.com/security/cve/CVE-2024-40943/" source="CVE"/>
		<reference ref_id="CVE-2024-40944" ref_url="https://www.suse.com/security/cve/CVE-2024-40944/" source="CVE"/>
		<reference ref_id="CVE-2024-40945" ref_url="https://www.suse.com/security/cve/CVE-2024-40945/" source="CVE"/>
		<reference ref_id="CVE-2024-40947" ref_url="https://www.suse.com/security/cve/CVE-2024-40947/" source="CVE"/>
		<reference ref_id="CVE-2024-40948" ref_url="https://www.suse.com/security/cve/CVE-2024-40948/" source="CVE"/>
		<reference ref_id="CVE-2024-40953" ref_url="https://www.suse.com/security/cve/CVE-2024-40953/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-40957" ref_url="https://www.suse.com/security/cve/CVE-2024-40957/" source="CVE"/>
		<reference ref_id="CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958/" source="CVE"/>
		<reference ref_id="CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959/" source="CVE"/>
		<reference ref_id="CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960/" source="CVE"/>
		<reference ref_id="CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961/" source="CVE"/>
		<reference ref_id="CVE-2024-40962" ref_url="https://www.suse.com/security/cve/CVE-2024-40962/" source="CVE"/>
		<reference ref_id="CVE-2024-40964" ref_url="https://www.suse.com/security/cve/CVE-2024-40964/" source="CVE"/>
		<reference ref_id="CVE-2024-40965" ref_url="https://www.suse.com/security/cve/CVE-2024-40965/" source="CVE"/>
		<reference ref_id="CVE-2024-40966" ref_url="https://www.suse.com/security/cve/CVE-2024-40966/" source="CVE"/>
		<reference ref_id="CVE-2024-40967" ref_url="https://www.suse.com/security/cve/CVE-2024-40967/" source="CVE"/>
		<reference ref_id="CVE-2024-40970" ref_url="https://www.suse.com/security/cve/CVE-2024-40970/" source="CVE"/>
		<reference ref_id="CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972/" source="CVE"/>
		<reference ref_id="CVE-2024-40973" ref_url="https://www.suse.com/security/cve/CVE-2024-40973/" source="CVE"/>
		<reference ref_id="CVE-2024-40975" ref_url="https://www.suse.com/security/cve/CVE-2024-40975/" source="CVE"/>
		<reference ref_id="CVE-2024-40976" ref_url="https://www.suse.com/security/cve/CVE-2024-40976/" source="CVE"/>
		<reference ref_id="CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977/" source="CVE"/>
		<reference ref_id="CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978/" source="CVE"/>
		<reference ref_id="CVE-2024-40979" ref_url="https://www.suse.com/security/cve/CVE-2024-40979/" source="CVE"/>
		<reference ref_id="CVE-2024-40981" ref_url="https://www.suse.com/security/cve/CVE-2024-40981/" source="CVE"/>
		<reference ref_id="CVE-2024-40982" ref_url="https://www.suse.com/security/cve/CVE-2024-40982/" source="CVE"/>
		<reference ref_id="CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983/" source="CVE"/>
		<reference ref_id="CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984/" source="CVE"/>
		<reference ref_id="CVE-2024-40987" ref_url="https://www.suse.com/security/cve/CVE-2024-40987/" source="CVE"/>
		<reference ref_id="CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40990" ref_url="https://www.suse.com/security/cve/CVE-2024-40990/" source="CVE"/>
		<reference ref_id="CVE-2024-40992" ref_url="https://www.suse.com/security/cve/CVE-2024-40992/" source="CVE"/>
		<reference ref_id="CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994/" source="CVE"/>
		<reference ref_id="CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995/" source="CVE"/>
		<reference ref_id="CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997/" source="CVE"/>
		<reference ref_id="CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998/" source="CVE"/>
		<reference ref_id="CVE-2024-40999" ref_url="https://www.suse.com/security/cve/CVE-2024-40999/" source="CVE"/>
		<reference ref_id="CVE-2024-41000" ref_url="https://www.suse.com/security/cve/CVE-2024-41000/" source="CVE"/>
		<reference ref_id="CVE-2024-41001" ref_url="https://www.suse.com/security/cve/CVE-2024-41001/" source="CVE"/>
		<reference ref_id="CVE-2024-41002" ref_url="https://www.suse.com/security/cve/CVE-2024-41002/" source="CVE"/>
		<reference ref_id="CVE-2024-41004" ref_url="https://www.suse.com/security/cve/CVE-2024-41004/" source="CVE"/>
		<reference ref_id="CVE-2024-41006" ref_url="https://www.suse.com/security/cve/CVE-2024-41006/" source="CVE"/>
		<reference ref_id="CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41010" ref_url="https://www.suse.com/security/cve/CVE-2024-41010/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013/" source="CVE"/>
		<reference ref_id="CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014/" source="CVE"/>
		<reference ref_id="CVE-2024-41015" ref_url="https://www.suse.com/security/cve/CVE-2024-41015/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41017" ref_url="https://www.suse.com/security/cve/CVE-2024-41017/" source="CVE"/>
		<reference ref_id="CVE-2024-41020" ref_url="https://www.suse.com/security/cve/CVE-2024-41020/" source="CVE"/>
		<reference ref_id="CVE-2024-41022" ref_url="https://www.suse.com/security/cve/CVE-2024-41022/" source="CVE"/>
		<reference ref_id="CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023/" source="CVE"/>
		<reference ref_id="CVE-2024-41024" ref_url="https://www.suse.com/security/cve/CVE-2024-41024/" source="CVE"/>
		<reference ref_id="CVE-2024-41025" ref_url="https://www.suse.com/security/cve/CVE-2024-41025/" source="CVE"/>
		<reference ref_id="CVE-2024-41028" ref_url="https://www.suse.com/security/cve/CVE-2024-41028/" source="CVE"/>
		<reference ref_id="CVE-2024-41031" ref_url="https://www.suse.com/security/cve/CVE-2024-41031/" source="CVE"/>
		<reference ref_id="CVE-2024-41032" ref_url="https://www.suse.com/security/cve/CVE-2024-41032/" source="CVE"/>
		<reference ref_id="CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035/" source="CVE"/>
		<reference ref_id="CVE-2024-41036" ref_url="https://www.suse.com/security/cve/CVE-2024-41036/" source="CVE"/>
		<reference ref_id="CVE-2024-41037" ref_url="https://www.suse.com/security/cve/CVE-2024-41037/" source="CVE"/>
		<reference ref_id="CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038/" source="CVE"/>
		<reference ref_id="CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039/" source="CVE"/>
		<reference ref_id="CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040/" source="CVE"/>
		<reference ref_id="CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041/" source="CVE"/>
		<reference ref_id="CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044/" source="CVE"/>
		<reference ref_id="CVE-2024-41045" ref_url="https://www.suse.com/security/cve/CVE-2024-41045/" source="CVE"/>
		<reference ref_id="CVE-2024-41047" ref_url="https://www.suse.com/security/cve/CVE-2024-41047/" source="CVE"/>
		<reference ref_id="CVE-2024-41048" ref_url="https://www.suse.com/security/cve/CVE-2024-41048/" source="CVE"/>
		<reference ref_id="CVE-2024-41049" ref_url="https://www.suse.com/security/cve/CVE-2024-41049/" source="CVE"/>
		<reference ref_id="CVE-2024-41050" ref_url="https://www.suse.com/security/cve/CVE-2024-41050/" source="CVE"/>
		<reference ref_id="CVE-2024-41051" ref_url="https://www.suse.com/security/cve/CVE-2024-41051/" source="CVE"/>
		<reference ref_id="CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056/" source="CVE"/>
		<reference ref_id="CVE-2024-41057" ref_url="https://www.suse.com/security/cve/CVE-2024-41057/" source="CVE"/>
		<reference ref_id="CVE-2024-41058" ref_url="https://www.suse.com/security/cve/CVE-2024-41058/" source="CVE"/>
		<reference ref_id="CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059/" source="CVE"/>
		<reference ref_id="CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060/" source="CVE"/>
		<reference ref_id="CVE-2024-41061" ref_url="https://www.suse.com/security/cve/CVE-2024-41061/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41063" ref_url="https://www.suse.com/security/cve/CVE-2024-41063/" source="CVE"/>
		<reference ref_id="CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064/" source="CVE"/>
		<reference ref_id="CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065/" source="CVE"/>
		<reference ref_id="CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066/" source="CVE"/>
		<reference ref_id="CVE-2024-41068" ref_url="https://www.suse.com/security/cve/CVE-2024-41068/" source="CVE"/>
		<reference ref_id="CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069/" source="CVE"/>
		<reference ref_id="CVE-2024-41070" ref_url="https://www.suse.com/security/cve/CVE-2024-41070/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<reference ref_id="CVE-2024-41072" ref_url="https://www.suse.com/security/cve/CVE-2024-41072/" source="CVE"/>
		<reference ref_id="CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073/" source="CVE"/>
		<reference ref_id="CVE-2024-41074" ref_url="https://www.suse.com/security/cve/CVE-2024-41074/" source="CVE"/>
		<reference ref_id="CVE-2024-41075" ref_url="https://www.suse.com/security/cve/CVE-2024-41075/" source="CVE"/>
		<reference ref_id="CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076/" source="CVE"/>
		<reference ref_id="CVE-2024-41078" ref_url="https://www.suse.com/security/cve/CVE-2024-41078/" source="CVE"/>
		<reference ref_id="CVE-2024-41079" ref_url="https://www.suse.com/security/cve/CVE-2024-41079/" source="CVE"/>
		<reference ref_id="CVE-2024-41080" ref_url="https://www.suse.com/security/cve/CVE-2024-41080/" source="CVE"/>
		<reference ref_id="CVE-2024-41081" ref_url="https://www.suse.com/security/cve/CVE-2024-41081/" source="CVE"/>
		<reference ref_id="CVE-2024-41082" ref_url="https://www.suse.com/security/cve/CVE-2024-41082/" source="CVE"/>
		<reference ref_id="CVE-2024-41084" ref_url="https://www.suse.com/security/cve/CVE-2024-41084/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41088" ref_url="https://www.suse.com/security/cve/CVE-2024-41088/" source="CVE"/>
		<reference ref_id="CVE-2024-41089" ref_url="https://www.suse.com/security/cve/CVE-2024-41089/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093/" source="CVE"/>
		<reference ref_id="CVE-2024-41094" ref_url="https://www.suse.com/security/cve/CVE-2024-41094/" source="CVE"/>
		<reference ref_id="CVE-2024-41095" ref_url="https://www.suse.com/security/cve/CVE-2024-41095/" source="CVE"/>
		<reference ref_id="CVE-2024-41096" ref_url="https://www.suse.com/security/cve/CVE-2024-41096/" source="CVE"/>
		<reference ref_id="CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097/" source="CVE"/>
		<reference ref_id="CVE-2024-41098" ref_url="https://www.suse.com/security/cve/CVE-2024-41098/" source="CVE"/>
		<reference ref_id="CVE-2024-41149" ref_url="https://www.suse.com/security/cve/CVE-2024-41149/" source="CVE"/>
		<reference ref_id="CVE-2024-41932" ref_url="https://www.suse.com/security/cve/CVE-2024-41932/" source="CVE"/>
		<reference ref_id="CVE-2024-42064" ref_url="https://www.suse.com/security/cve/CVE-2024-42064/" source="CVE"/>
		<reference ref_id="CVE-2024-42069" ref_url="https://www.suse.com/security/cve/CVE-2024-42069/" source="CVE"/>
		<reference ref_id="CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070/" source="CVE"/>
		<reference ref_id="CVE-2024-42073" ref_url="https://www.suse.com/security/cve/CVE-2024-42073/" source="CVE"/>
		<reference ref_id="CVE-2024-42074" ref_url="https://www.suse.com/security/cve/CVE-2024-42074/" source="CVE"/>
		<reference ref_id="CVE-2024-42076" ref_url="https://www.suse.com/security/cve/CVE-2024-42076/" source="CVE"/>
		<reference ref_id="CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077/" source="CVE"/>
		<reference ref_id="CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079/" source="CVE"/>
		<reference ref_id="CVE-2024-42080" ref_url="https://www.suse.com/security/cve/CVE-2024-42080/" source="CVE"/>
		<reference ref_id="CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082/" source="CVE"/>
		<reference ref_id="CVE-2024-42085" ref_url="https://www.suse.com/security/cve/CVE-2024-42085/" source="CVE"/>
		<reference ref_id="CVE-2024-42086" ref_url="https://www.suse.com/security/cve/CVE-2024-42086/" source="CVE"/>
		<reference ref_id="CVE-2024-42087" ref_url="https://www.suse.com/security/cve/CVE-2024-42087/" source="CVE"/>
		<reference ref_id="CVE-2024-42089" ref_url="https://www.suse.com/security/cve/CVE-2024-42089/" source="CVE"/>
		<reference ref_id="CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090/" source="CVE"/>
		<reference ref_id="CVE-2024-42092" ref_url="https://www.suse.com/security/cve/CVE-2024-42092/" source="CVE"/>
		<reference ref_id="CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093/" source="CVE"/>
		<reference ref_id="CVE-2024-42095" ref_url="https://www.suse.com/security/cve/CVE-2024-42095/" source="CVE"/>
		<reference ref_id="CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096/" source="CVE"/>
		<reference ref_id="CVE-2024-42097" ref_url="https://www.suse.com/security/cve/CVE-2024-42097/" source="CVE"/>
		<reference ref_id="CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098/" source="CVE"/>
		<reference ref_id="CVE-2024-42101" ref_url="https://www.suse.com/security/cve/CVE-2024-42101/" source="CVE"/>
		<reference ref_id="CVE-2024-42102" ref_url="https://www.suse.com/security/cve/CVE-2024-42102/" source="CVE"/>
		<reference ref_id="CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104/" source="CVE"/>
		<reference ref_id="CVE-2024-42105" ref_url="https://www.suse.com/security/cve/CVE-2024-42105/" source="CVE"/>
		<reference ref_id="CVE-2024-42106" ref_url="https://www.suse.com/security/cve/CVE-2024-42106/" source="CVE"/>
		<reference ref_id="CVE-2024-42107" ref_url="https://www.suse.com/security/cve/CVE-2024-42107/" source="CVE"/>
		<reference ref_id="CVE-2024-42109" ref_url="https://www.suse.com/security/cve/CVE-2024-42109/" source="CVE"/>
		<reference ref_id="CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110/" source="CVE"/>
		<reference ref_id="CVE-2024-42113" ref_url="https://www.suse.com/security/cve/CVE-2024-42113/" source="CVE"/>
		<reference ref_id="CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114/" source="CVE"/>
		<reference ref_id="CVE-2024-42115" ref_url="https://www.suse.com/security/cve/CVE-2024-42115/" source="CVE"/>
		<reference ref_id="CVE-2024-42117" ref_url="https://www.suse.com/security/cve/CVE-2024-42117/" source="CVE"/>
		<reference ref_id="CVE-2024-42119" ref_url="https://www.suse.com/security/cve/CVE-2024-42119/" source="CVE"/>
		<reference ref_id="CVE-2024-42120" ref_url="https://www.suse.com/security/cve/CVE-2024-42120/" source="CVE"/>
		<reference ref_id="CVE-2024-42121" ref_url="https://www.suse.com/security/cve/CVE-2024-42121/" source="CVE"/>
		<reference ref_id="CVE-2024-42122" ref_url="https://www.suse.com/security/cve/CVE-2024-42122/" source="CVE"/>
		<reference ref_id="CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124/" source="CVE"/>
		<reference ref_id="CVE-2024-42125" ref_url="https://www.suse.com/security/cve/CVE-2024-42125/" source="CVE"/>
		<reference ref_id="CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126/" source="CVE"/>
		<reference ref_id="CVE-2024-42127" ref_url="https://www.suse.com/security/cve/CVE-2024-42127/" source="CVE"/>
		<reference ref_id="CVE-2024-42130" ref_url="https://www.suse.com/security/cve/CVE-2024-42130/" source="CVE"/>
		<reference ref_id="CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131/" source="CVE"/>
		<reference ref_id="CVE-2024-42132" ref_url="https://www.suse.com/security/cve/CVE-2024-42132/" source="CVE"/>
		<reference ref_id="CVE-2024-42133" ref_url="https://www.suse.com/security/cve/CVE-2024-42133/" source="CVE"/>
		<reference ref_id="CVE-2024-42136" ref_url="https://www.suse.com/security/cve/CVE-2024-42136/" source="CVE"/>
		<reference ref_id="CVE-2024-42137" ref_url="https://www.suse.com/security/cve/CVE-2024-42137/" source="CVE"/>
		<reference ref_id="CVE-2024-42138" ref_url="https://www.suse.com/security/cve/CVE-2024-42138/" source="CVE"/>
		<reference ref_id="CVE-2024-42139" ref_url="https://www.suse.com/security/cve/CVE-2024-42139/" source="CVE"/>
		<reference ref_id="CVE-2024-42141" ref_url="https://www.suse.com/security/cve/CVE-2024-42141/" source="CVE"/>
		<reference ref_id="CVE-2024-42142" ref_url="https://www.suse.com/security/cve/CVE-2024-42142/" source="CVE"/>
		<reference ref_id="CVE-2024-42143" ref_url="https://www.suse.com/security/cve/CVE-2024-42143/" source="CVE"/>
		<reference ref_id="CVE-2024-42144" ref_url="https://www.suse.com/security/cve/CVE-2024-42144/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42147" ref_url="https://www.suse.com/security/cve/CVE-2024-42147/" source="CVE"/>
		<reference ref_id="CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148/" source="CVE"/>
		<reference ref_id="CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152/" source="CVE"/>
		<reference ref_id="CVE-2024-42153" ref_url="https://www.suse.com/security/cve/CVE-2024-42153/" source="CVE"/>
		<reference ref_id="CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154/" source="CVE"/>
		<reference ref_id="CVE-2024-42155" ref_url="https://www.suse.com/security/cve/CVE-2024-42155/" source="CVE"/>
		<reference ref_id="CVE-2024-42156" ref_url="https://www.suse.com/security/cve/CVE-2024-42156/" source="CVE"/>
		<reference ref_id="CVE-2024-42157" ref_url="https://www.suse.com/security/cve/CVE-2024-42157/" source="CVE"/>
		<reference ref_id="CVE-2024-42158" ref_url="https://www.suse.com/security/cve/CVE-2024-42158/" source="CVE"/>
		<reference ref_id="CVE-2024-42159" ref_url="https://www.suse.com/security/cve/CVE-2024-42159/" source="CVE"/>
		<reference ref_id="CVE-2024-42161" ref_url="https://www.suse.com/security/cve/CVE-2024-42161/" source="CVE"/>
		<reference ref_id="CVE-2024-42162" ref_url="https://www.suse.com/security/cve/CVE-2024-42162/" source="CVE"/>
		<reference ref_id="CVE-2024-42223" ref_url="https://www.suse.com/security/cve/CVE-2024-42223/" source="CVE"/>
		<reference ref_id="CVE-2024-42224" ref_url="https://www.suse.com/security/cve/CVE-2024-42224/" source="CVE"/>
		<reference ref_id="CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225/" source="CVE"/>
		<reference ref_id="CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226/" source="CVE"/>
		<reference ref_id="CVE-2024-42227" ref_url="https://www.suse.com/security/cve/CVE-2024-42227/" source="CVE"/>
		<reference ref_id="CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228/" source="CVE"/>
		<reference ref_id="CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-42236" ref_url="https://www.suse.com/security/cve/CVE-2024-42236/" source="CVE"/>
		<reference ref_id="CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237/" source="CVE"/>
		<reference ref_id="CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238/" source="CVE"/>
		<reference ref_id="CVE-2024-42239" ref_url="https://www.suse.com/security/cve/CVE-2024-42239/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-42241" ref_url="https://www.suse.com/security/cve/CVE-2024-42241/" source="CVE"/>
		<reference ref_id="CVE-2024-42243" ref_url="https://www.suse.com/security/cve/CVE-2024-42243/" source="CVE"/>
		<reference ref_id="CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244/" source="CVE"/>
		<reference ref_id="CVE-2024-42245" ref_url="https://www.suse.com/security/cve/CVE-2024-42245/" source="CVE"/>
		<reference ref_id="CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246/" source="CVE"/>
		<reference ref_id="CVE-2024-42247" ref_url="https://www.suse.com/security/cve/CVE-2024-42247/" source="CVE"/>
		<reference ref_id="CVE-2024-42250" ref_url="https://www.suse.com/security/cve/CVE-2024-42250/" source="CVE"/>
		<reference ref_id="CVE-2024-42252" ref_url="https://www.suse.com/security/cve/CVE-2024-42252/" source="CVE"/>
		<reference ref_id="CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253/" source="CVE"/>
		<reference ref_id="CVE-2024-42259" ref_url="https://www.suse.com/security/cve/CVE-2024-42259/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-42268" ref_url="https://www.suse.com/security/cve/CVE-2024-42268/" source="CVE"/>
		<reference ref_id="CVE-2024-42269" ref_url="https://www.suse.com/security/cve/CVE-2024-42269/" source="CVE"/>
		<reference ref_id="CVE-2024-42270" ref_url="https://www.suse.com/security/cve/CVE-2024-42270/" source="CVE"/>
		<reference ref_id="CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271/" source="CVE"/>
		<reference ref_id="CVE-2024-42274" ref_url="https://www.suse.com/security/cve/CVE-2024-42274/" source="CVE"/>
		<reference ref_id="CVE-2024-42276" ref_url="https://www.suse.com/security/cve/CVE-2024-42276/" source="CVE"/>
		<reference ref_id="CVE-2024-42277" ref_url="https://www.suse.com/security/cve/CVE-2024-42277/" source="CVE"/>
		<reference ref_id="CVE-2024-42278" ref_url="https://www.suse.com/security/cve/CVE-2024-42278/" source="CVE"/>
		<reference ref_id="CVE-2024-42279" ref_url="https://www.suse.com/security/cve/CVE-2024-42279/" source="CVE"/>
		<reference ref_id="CVE-2024-42280" ref_url="https://www.suse.com/security/cve/CVE-2024-42280/" source="CVE"/>
		<reference ref_id="CVE-2024-42281" ref_url="https://www.suse.com/security/cve/CVE-2024-42281/" source="CVE"/>
		<reference ref_id="CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283/" source="CVE"/>
		<reference ref_id="CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284/" source="CVE"/>
		<reference ref_id="CVE-2024-42285" ref_url="https://www.suse.com/security/cve/CVE-2024-42285/" source="CVE"/>
		<reference ref_id="CVE-2024-42286" ref_url="https://www.suse.com/security/cve/CVE-2024-42286/" source="CVE"/>
		<reference ref_id="CVE-2024-42287" ref_url="https://www.suse.com/security/cve/CVE-2024-42287/" source="CVE"/>
		<reference ref_id="CVE-2024-42288" ref_url="https://www.suse.com/security/cve/CVE-2024-42288/" source="CVE"/>
		<reference ref_id="CVE-2024-42289" ref_url="https://www.suse.com/security/cve/CVE-2024-42289/" source="CVE"/>
		<reference ref_id="CVE-2024-42290" ref_url="https://www.suse.com/security/cve/CVE-2024-42290/" source="CVE"/>
		<reference ref_id="CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291/" source="CVE"/>
		<reference ref_id="CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292/" source="CVE"/>
		<reference ref_id="CVE-2024-42294" ref_url="https://www.suse.com/security/cve/CVE-2024-42294/" source="CVE"/>
		<reference ref_id="CVE-2024-42295" ref_url="https://www.suse.com/security/cve/CVE-2024-42295/" source="CVE"/>
		<reference ref_id="CVE-2024-42298" ref_url="https://www.suse.com/security/cve/CVE-2024-42298/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302/" source="CVE"/>
		<reference ref_id="CVE-2024-42303" ref_url="https://www.suse.com/security/cve/CVE-2024-42303/" source="CVE"/>
		<reference ref_id="CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304/" source="CVE"/>
		<reference ref_id="CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305/" source="CVE"/>
		<reference ref_id="CVE-2024-42306" ref_url="https://www.suse.com/security/cve/CVE-2024-42306/" source="CVE"/>
		<reference ref_id="CVE-2024-42308" ref_url="https://www.suse.com/security/cve/CVE-2024-42308/" source="CVE"/>
		<reference ref_id="CVE-2024-42309" ref_url="https://www.suse.com/security/cve/CVE-2024-42309/" source="CVE"/>
		<reference ref_id="CVE-2024-42310" ref_url="https://www.suse.com/security/cve/CVE-2024-42310/" source="CVE"/>
		<reference ref_id="CVE-2024-42311" ref_url="https://www.suse.com/security/cve/CVE-2024-42311/" source="CVE"/>
		<reference ref_id="CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312/" source="CVE"/>
		<reference ref_id="CVE-2024-42313" ref_url="https://www.suse.com/security/cve/CVE-2024-42313/" source="CVE"/>
		<reference ref_id="CVE-2024-42314" ref_url="https://www.suse.com/security/cve/CVE-2024-42314/" source="CVE"/>
		<reference ref_id="CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315/" source="CVE"/>
		<reference ref_id="CVE-2024-42316" ref_url="https://www.suse.com/security/cve/CVE-2024-42316/" source="CVE"/>
		<reference ref_id="CVE-2024-42318" ref_url="https://www.suse.com/security/cve/CVE-2024-42318/" source="CVE"/>
		<reference ref_id="CVE-2024-42319" ref_url="https://www.suse.com/security/cve/CVE-2024-42319/" source="CVE"/>
		<reference ref_id="CVE-2024-42320" ref_url="https://www.suse.com/security/cve/CVE-2024-42320/" source="CVE"/>
		<reference ref_id="CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322/" source="CVE"/>
		<reference ref_id="CVE-2024-43098" ref_url="https://www.suse.com/security/cve/CVE-2024-43098/" source="CVE"/>
		<reference ref_id="CVE-2024-43816" ref_url="https://www.suse.com/security/cve/CVE-2024-43816/" source="CVE"/>
		<reference ref_id="CVE-2024-43817" ref_url="https://www.suse.com/security/cve/CVE-2024-43817/" source="CVE"/>
		<reference ref_id="CVE-2024-43818" ref_url="https://www.suse.com/security/cve/CVE-2024-43818/" source="CVE"/>
		<reference ref_id="CVE-2024-43819" ref_url="https://www.suse.com/security/cve/CVE-2024-43819/" source="CVE"/>
		<reference ref_id="CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821/" source="CVE"/>
		<reference ref_id="CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823/" source="CVE"/>
		<reference ref_id="CVE-2024-43824" ref_url="https://www.suse.com/security/cve/CVE-2024-43824/" source="CVE"/>
		<reference ref_id="CVE-2024-43825" ref_url="https://www.suse.com/security/cve/CVE-2024-43825/" source="CVE"/>
		<reference ref_id="CVE-2024-43826" ref_url="https://www.suse.com/security/cve/CVE-2024-43826/" source="CVE"/>
		<reference ref_id="CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828/" source="CVE"/>
		<reference ref_id="CVE-2024-43829" ref_url="https://www.suse.com/security/cve/CVE-2024-43829/" source="CVE"/>
		<reference ref_id="CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830/" source="CVE"/>
		<reference ref_id="CVE-2024-43831" ref_url="https://www.suse.com/security/cve/CVE-2024-43831/" source="CVE"/>
		<reference ref_id="CVE-2024-43832" ref_url="https://www.suse.com/security/cve/CVE-2024-43832/" source="CVE"/>
		<reference ref_id="CVE-2024-43833" ref_url="https://www.suse.com/security/cve/CVE-2024-43833/" source="CVE"/>
		<reference ref_id="CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834/" source="CVE"/>
		<reference ref_id="CVE-2024-43835" ref_url="https://www.suse.com/security/cve/CVE-2024-43835/" source="CVE"/>
		<reference ref_id="CVE-2024-43837" ref_url="https://www.suse.com/security/cve/CVE-2024-43837/" source="CVE"/>
		<reference ref_id="CVE-2024-43839" ref_url="https://www.suse.com/security/cve/CVE-2024-43839/" source="CVE"/>
		<reference ref_id="CVE-2024-43840" ref_url="https://www.suse.com/security/cve/CVE-2024-43840/" source="CVE"/>
		<reference ref_id="CVE-2024-43841" ref_url="https://www.suse.com/security/cve/CVE-2024-43841/" source="CVE"/>
		<reference ref_id="CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842/" source="CVE"/>
		<reference ref_id="CVE-2024-43845" ref_url="https://www.suse.com/security/cve/CVE-2024-43845/" source="CVE"/>
		<reference ref_id="CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846/" source="CVE"/>
		<reference ref_id="CVE-2024-43847" ref_url="https://www.suse.com/security/cve/CVE-2024-43847/" source="CVE"/>
		<reference ref_id="CVE-2024-43849" ref_url="https://www.suse.com/security/cve/CVE-2024-43849/" source="CVE"/>
		<reference ref_id="CVE-2024-43850" ref_url="https://www.suse.com/security/cve/CVE-2024-43850/" source="CVE"/>
		<reference ref_id="CVE-2024-43851" ref_url="https://www.suse.com/security/cve/CVE-2024-43851/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-43855" ref_url="https://www.suse.com/security/cve/CVE-2024-43855/" source="CVE"/>
		<reference ref_id="CVE-2024-43856" ref_url="https://www.suse.com/security/cve/CVE-2024-43856/" source="CVE"/>
		<reference ref_id="CVE-2024-43858" ref_url="https://www.suse.com/security/cve/CVE-2024-43858/" source="CVE"/>
		<reference ref_id="CVE-2024-43860" ref_url="https://www.suse.com/security/cve/CVE-2024-43860/" source="CVE"/>
		<reference ref_id="CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861/" source="CVE"/>
		<reference ref_id="CVE-2024-43863" ref_url="https://www.suse.com/security/cve/CVE-2024-43863/" source="CVE"/>
		<reference ref_id="CVE-2024-43864" ref_url="https://www.suse.com/security/cve/CVE-2024-43864/" source="CVE"/>
		<reference ref_id="CVE-2024-43866" ref_url="https://www.suse.com/security/cve/CVE-2024-43866/" source="CVE"/>
		<reference ref_id="CVE-2024-43867" ref_url="https://www.suse.com/security/cve/CVE-2024-43867/" source="CVE"/>
		<reference ref_id="CVE-2024-43870" ref_url="https://www.suse.com/security/cve/CVE-2024-43870/" source="CVE"/>
		<reference ref_id="CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871/" source="CVE"/>
		<reference ref_id="CVE-2024-43872" ref_url="https://www.suse.com/security/cve/CVE-2024-43872/" source="CVE"/>
		<reference ref_id="CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873/" source="CVE"/>
		<reference ref_id="CVE-2024-43874" ref_url="https://www.suse.com/security/cve/CVE-2024-43874/" source="CVE"/>
		<reference ref_id="CVE-2024-43875" ref_url="https://www.suse.com/security/cve/CVE-2024-43875/" source="CVE"/>
		<reference ref_id="CVE-2024-43876" ref_url="https://www.suse.com/security/cve/CVE-2024-43876/" source="CVE"/>
		<reference ref_id="CVE-2024-43877" ref_url="https://www.suse.com/security/cve/CVE-2024-43877/" source="CVE"/>
		<reference ref_id="CVE-2024-43879" ref_url="https://www.suse.com/security/cve/CVE-2024-43879/" source="CVE"/>
		<reference ref_id="CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880/" source="CVE"/>
		<reference ref_id="CVE-2024-43881" ref_url="https://www.suse.com/security/cve/CVE-2024-43881/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884/" source="CVE"/>
		<reference ref_id="CVE-2024-43885" ref_url="https://www.suse.com/security/cve/CVE-2024-43885/" source="CVE"/>
		<reference ref_id="CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889/" source="CVE"/>
		<reference ref_id="CVE-2024-43890" ref_url="https://www.suse.com/security/cve/CVE-2024-43890/" source="CVE"/>
		<reference ref_id="CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892/" source="CVE"/>
		<reference ref_id="CVE-2024-43893" ref_url="https://www.suse.com/security/cve/CVE-2024-43893/" source="CVE"/>
		<reference ref_id="CVE-2024-43894" ref_url="https://www.suse.com/security/cve/CVE-2024-43894/" source="CVE"/>
		<reference ref_id="CVE-2024-43895" ref_url="https://www.suse.com/security/cve/CVE-2024-43895/" source="CVE"/>
		<reference ref_id="CVE-2024-43897" ref_url="https://www.suse.com/security/cve/CVE-2024-43897/" source="CVE"/>
		<reference ref_id="CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898/" source="CVE"/>
		<reference ref_id="CVE-2024-43899" ref_url="https://www.suse.com/security/cve/CVE-2024-43899/" source="CVE"/>
		<reference ref_id="CVE-2024-43900" ref_url="https://www.suse.com/security/cve/CVE-2024-43900/" source="CVE"/>
		<reference ref_id="CVE-2024-43902" ref_url="https://www.suse.com/security/cve/CVE-2024-43902/" source="CVE"/>
		<reference ref_id="CVE-2024-43903" ref_url="https://www.suse.com/security/cve/CVE-2024-43903/" source="CVE"/>
		<reference ref_id="CVE-2024-43904" ref_url="https://www.suse.com/security/cve/CVE-2024-43904/" source="CVE"/>
		<reference ref_id="CVE-2024-43905" ref_url="https://www.suse.com/security/cve/CVE-2024-43905/" source="CVE"/>
		<reference ref_id="CVE-2024-43906" ref_url="https://www.suse.com/security/cve/CVE-2024-43906/" source="CVE"/>
		<reference ref_id="CVE-2024-43907" ref_url="https://www.suse.com/security/cve/CVE-2024-43907/" source="CVE"/>
		<reference ref_id="CVE-2024-43908" ref_url="https://www.suse.com/security/cve/CVE-2024-43908/" source="CVE"/>
		<reference ref_id="CVE-2024-43909" ref_url="https://www.suse.com/security/cve/CVE-2024-43909/" source="CVE"/>
		<reference ref_id="CVE-2024-43911" ref_url="https://www.suse.com/security/cve/CVE-2024-43911/" source="CVE"/>
		<reference ref_id="CVE-2024-43912" ref_url="https://www.suse.com/security/cve/CVE-2024-43912/" source="CVE"/>
		<reference ref_id="CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914/" source="CVE"/>
		<reference ref_id="CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935/" source="CVE"/>
		<reference ref_id="CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938/" source="CVE"/>
		<reference ref_id="CVE-2024-44939" ref_url="https://www.suse.com/security/cve/CVE-2024-44939/" source="CVE"/>
		<reference ref_id="CVE-2024-44944" ref_url="https://www.suse.com/security/cve/CVE-2024-44944/" source="CVE"/>
		<reference ref_id="CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-44948" ref_url="https://www.suse.com/security/cve/CVE-2024-44948/" source="CVE"/>
		<reference ref_id="CVE-2024-44950" ref_url="https://www.suse.com/security/cve/CVE-2024-44950/" source="CVE"/>
		<reference ref_id="CVE-2024-44951" ref_url="https://www.suse.com/security/cve/CVE-2024-44951/" source="CVE"/>
		<reference ref_id="CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952/" source="CVE"/>
		<reference ref_id="CVE-2024-44954" ref_url="https://www.suse.com/security/cve/CVE-2024-44954/" source="CVE"/>
		<reference ref_id="CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958/" source="CVE"/>
		<reference ref_id="CVE-2024-44960" ref_url="https://www.suse.com/security/cve/CVE-2024-44960/" source="CVE"/>
		<reference ref_id="CVE-2024-44961" ref_url="https://www.suse.com/security/cve/CVE-2024-44961/" source="CVE"/>
		<reference ref_id="CVE-2024-44962" ref_url="https://www.suse.com/security/cve/CVE-2024-44962/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-44965" ref_url="https://www.suse.com/security/cve/CVE-2024-44965/" source="CVE"/>
		<reference ref_id="CVE-2024-44967" ref_url="https://www.suse.com/security/cve/CVE-2024-44967/" source="CVE"/>
		<reference ref_id="CVE-2024-44969" ref_url="https://www.suse.com/security/cve/CVE-2024-44969/" source="CVE"/>
		<reference ref_id="CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970/" source="CVE"/>
		<reference ref_id="CVE-2024-44971" ref_url="https://www.suse.com/security/cve/CVE-2024-44971/" source="CVE"/>
		<reference ref_id="CVE-2024-44977" ref_url="https://www.suse.com/security/cve/CVE-2024-44977/" source="CVE"/>
		<reference ref_id="CVE-2024-44982" ref_url="https://www.suse.com/security/cve/CVE-2024-44982/" source="CVE"/>
		<reference ref_id="CVE-2024-44984" ref_url="https://www.suse.com/security/cve/CVE-2024-44984/" source="CVE"/>
		<reference ref_id="CVE-2024-44985" ref_url="https://www.suse.com/security/cve/CVE-2024-44985/" source="CVE"/>
		<reference ref_id="CVE-2024-44986" ref_url="https://www.suse.com/security/cve/CVE-2024-44986/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2024-44988" ref_url="https://www.suse.com/security/cve/CVE-2024-44988/" source="CVE"/>
		<reference ref_id="CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989/" source="CVE"/>
		<reference ref_id="CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990/" source="CVE"/>
		<reference ref_id="CVE-2024-44991" ref_url="https://www.suse.com/security/cve/CVE-2024-44991/" source="CVE"/>
		<reference ref_id="CVE-2024-44997" ref_url="https://www.suse.com/security/cve/CVE-2024-44997/" source="CVE"/>
		<reference ref_id="CVE-2024-44998" ref_url="https://www.suse.com/security/cve/CVE-2024-44998/" source="CVE"/>
		<reference ref_id="CVE-2024-44999" ref_url="https://www.suse.com/security/cve/CVE-2024-44999/" source="CVE"/>
		<reference ref_id="CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000/" source="CVE"/>
		<reference ref_id="CVE-2024-45001" ref_url="https://www.suse.com/security/cve/CVE-2024-45001/" source="CVE"/>
		<reference ref_id="CVE-2024-45002" ref_url="https://www.suse.com/security/cve/CVE-2024-45002/" source="CVE"/>
		<reference ref_id="CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003/" source="CVE"/>
		<reference ref_id="CVE-2024-45005" ref_url="https://www.suse.com/security/cve/CVE-2024-45005/" source="CVE"/>
		<reference ref_id="CVE-2024-45006" ref_url="https://www.suse.com/security/cve/CVE-2024-45006/" source="CVE"/>
		<reference ref_id="CVE-2024-45007" ref_url="https://www.suse.com/security/cve/CVE-2024-45007/" source="CVE"/>
		<reference ref_id="CVE-2024-45008" ref_url="https://www.suse.com/security/cve/CVE-2024-45008/" source="CVE"/>
		<reference ref_id="CVE-2024-45011" ref_url="https://www.suse.com/security/cve/CVE-2024-45011/" source="CVE"/>
		<reference ref_id="CVE-2024-45012" ref_url="https://www.suse.com/security/cve/CVE-2024-45012/" source="CVE"/>
		<reference ref_id="CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013/" source="CVE"/>
		<reference ref_id="CVE-2024-45015" ref_url="https://www.suse.com/security/cve/CVE-2024-45015/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45017" ref_url="https://www.suse.com/security/cve/CVE-2024-45017/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<reference ref_id="CVE-2024-45019" ref_url="https://www.suse.com/security/cve/CVE-2024-45019/" source="CVE"/>
		<reference ref_id="CVE-2024-45020" ref_url="https://www.suse.com/security/cve/CVE-2024-45020/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="CVE-2024-45022" ref_url="https://www.suse.com/security/cve/CVE-2024-45022/" source="CVE"/>
		<reference ref_id="CVE-2024-45023" ref_url="https://www.suse.com/security/cve/CVE-2024-45023/" source="CVE"/>
		<reference ref_id="CVE-2024-45025" ref_url="https://www.suse.com/security/cve/CVE-2024-45025/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<reference ref_id="CVE-2024-45028" ref_url="https://www.suse.com/security/cve/CVE-2024-45028/" source="CVE"/>
		<reference ref_id="CVE-2024-45029" ref_url="https://www.suse.com/security/cve/CVE-2024-45029/" source="CVE"/>
		<reference ref_id="CVE-2024-45030" ref_url="https://www.suse.com/security/cve/CVE-2024-45030/" source="CVE"/>
		<reference ref_id="CVE-2024-45828" ref_url="https://www.suse.com/security/cve/CVE-2024-45828/" source="CVE"/>
		<reference ref_id="CVE-2024-46672" ref_url="https://www.suse.com/security/cve/CVE-2024-46672/" source="CVE"/>
		<reference ref_id="CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673/" source="CVE"/>
		<reference ref_id="CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674/" source="CVE"/>
		<reference ref_id="CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675/" source="CVE"/>
		<reference ref_id="CVE-2024-46676" ref_url="https://www.suse.com/security/cve/CVE-2024-46676/" source="CVE"/>
		<reference ref_id="CVE-2024-46677" ref_url="https://www.suse.com/security/cve/CVE-2024-46677/" source="CVE"/>
		<reference ref_id="CVE-2024-46678" ref_url="https://www.suse.com/security/cve/CVE-2024-46678/" source="CVE"/>
		<reference ref_id="CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679/" source="CVE"/>
		<reference ref_id="CVE-2024-46685" ref_url="https://www.suse.com/security/cve/CVE-2024-46685/" source="CVE"/>
		<reference ref_id="CVE-2024-46686" ref_url="https://www.suse.com/security/cve/CVE-2024-46686/" source="CVE"/>
		<reference ref_id="CVE-2024-46687" ref_url="https://www.suse.com/security/cve/CVE-2024-46687/" source="CVE"/>
		<reference ref_id="CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689/" source="CVE"/>
		<reference ref_id="CVE-2024-46691" ref_url="https://www.suse.com/security/cve/CVE-2024-46691/" source="CVE"/>
		<reference ref_id="CVE-2024-46692" ref_url="https://www.suse.com/security/cve/CVE-2024-46692/" source="CVE"/>
		<reference ref_id="CVE-2024-46693" ref_url="https://www.suse.com/security/cve/CVE-2024-46693/" source="CVE"/>
		<reference ref_id="CVE-2024-46694" ref_url="https://www.suse.com/security/cve/CVE-2024-46694/" source="CVE"/>
		<reference ref_id="CVE-2024-46695" ref_url="https://www.suse.com/security/cve/CVE-2024-46695/" source="CVE"/>
		<reference ref_id="CVE-2024-46702" ref_url="https://www.suse.com/security/cve/CVE-2024-46702/" source="CVE"/>
		<reference ref_id="CVE-2024-46706" ref_url="https://www.suse.com/security/cve/CVE-2024-46706/" source="CVE"/>
		<reference ref_id="CVE-2024-46707" ref_url="https://www.suse.com/security/cve/CVE-2024-46707/" source="CVE"/>
		<reference ref_id="CVE-2024-46709" ref_url="https://www.suse.com/security/cve/CVE-2024-46709/" source="CVE"/>
		<reference ref_id="CVE-2024-46710" ref_url="https://www.suse.com/security/cve/CVE-2024-46710/" source="CVE"/>
		<reference ref_id="CVE-2024-46714" ref_url="https://www.suse.com/security/cve/CVE-2024-46714/" source="CVE"/>
		<reference ref_id="CVE-2024-46715" ref_url="https://www.suse.com/security/cve/CVE-2024-46715/" source="CVE"/>
		<reference ref_id="CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716/" source="CVE"/>
		<reference ref_id="CVE-2024-46717" ref_url="https://www.suse.com/security/cve/CVE-2024-46717/" source="CVE"/>
		<reference ref_id="CVE-2024-46719" ref_url="https://www.suse.com/security/cve/CVE-2024-46719/" source="CVE"/>
		<reference ref_id="CVE-2024-46720" ref_url="https://www.suse.com/security/cve/CVE-2024-46720/" source="CVE"/>
		<reference ref_id="CVE-2024-46721" ref_url="https://www.suse.com/security/cve/CVE-2024-46721/" source="CVE"/>
		<reference ref_id="CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722/" source="CVE"/>
		<reference ref_id="CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723/" source="CVE"/>
		<reference ref_id="CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724/" source="CVE"/>
		<reference ref_id="CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725/" source="CVE"/>
		<reference ref_id="CVE-2024-46726" ref_url="https://www.suse.com/security/cve/CVE-2024-46726/" source="CVE"/>
		<reference ref_id="CVE-2024-46728" ref_url="https://www.suse.com/security/cve/CVE-2024-46728/" source="CVE"/>
		<reference ref_id="CVE-2024-46729" ref_url="https://www.suse.com/security/cve/CVE-2024-46729/" source="CVE"/>
		<reference ref_id="CVE-2024-46730" ref_url="https://www.suse.com/security/cve/CVE-2024-46730/" source="CVE"/>
		<reference ref_id="CVE-2024-46731" ref_url="https://www.suse.com/security/cve/CVE-2024-46731/" source="CVE"/>
		<reference ref_id="CVE-2024-46732" ref_url="https://www.suse.com/security/cve/CVE-2024-46732/" source="CVE"/>
		<reference ref_id="CVE-2024-46734" ref_url="https://www.suse.com/security/cve/CVE-2024-46734/" source="CVE"/>
		<reference ref_id="CVE-2024-46735" ref_url="https://www.suse.com/security/cve/CVE-2024-46735/" source="CVE"/>
		<reference ref_id="CVE-2024-46737" ref_url="https://www.suse.com/security/cve/CVE-2024-46737/" source="CVE"/>
		<reference ref_id="CVE-2024-46738" ref_url="https://www.suse.com/security/cve/CVE-2024-46738/" source="CVE"/>
		<reference ref_id="CVE-2024-46739" ref_url="https://www.suse.com/security/cve/CVE-2024-46739/" source="CVE"/>
		<reference ref_id="CVE-2024-46741" ref_url="https://www.suse.com/security/cve/CVE-2024-46741/" source="CVE"/>
		<reference ref_id="CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743/" source="CVE"/>
		<reference ref_id="CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744/" source="CVE"/>
		<reference ref_id="CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745/" source="CVE"/>
		<reference ref_id="CVE-2024-46746" ref_url="https://www.suse.com/security/cve/CVE-2024-46746/" source="CVE"/>
		<reference ref_id="CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747/" source="CVE"/>
		<reference ref_id="CVE-2024-46749" ref_url="https://www.suse.com/security/cve/CVE-2024-46749/" source="CVE"/>
		<reference ref_id="CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750/" source="CVE"/>
		<reference ref_id="CVE-2024-46751" ref_url="https://www.suse.com/security/cve/CVE-2024-46751/" source="CVE"/>
		<reference ref_id="CVE-2024-46752" ref_url="https://www.suse.com/security/cve/CVE-2024-46752/" source="CVE"/>
		<reference ref_id="CVE-2024-46753" ref_url="https://www.suse.com/security/cve/CVE-2024-46753/" source="CVE"/>
		<reference ref_id="CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754/" source="CVE"/>
		<reference ref_id="CVE-2024-46755" ref_url="https://www.suse.com/security/cve/CVE-2024-46755/" source="CVE"/>
		<reference ref_id="CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756/" source="CVE"/>
		<reference ref_id="CVE-2024-46757" ref_url="https://www.suse.com/security/cve/CVE-2024-46757/" source="CVE"/>
		<reference ref_id="CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758/" source="CVE"/>
		<reference ref_id="CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759/" source="CVE"/>
		<reference ref_id="CVE-2024-46760" ref_url="https://www.suse.com/security/cve/CVE-2024-46760/" source="CVE"/>
		<reference ref_id="CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761/" source="CVE"/>
		<reference ref_id="CVE-2024-46766" ref_url="https://www.suse.com/security/cve/CVE-2024-46766/" source="CVE"/>
		<reference ref_id="CVE-2024-46767" ref_url="https://www.suse.com/security/cve/CVE-2024-46767/" source="CVE"/>
		<reference ref_id="CVE-2024-46770" ref_url="https://www.suse.com/security/cve/CVE-2024-46770/" source="CVE"/>
		<reference ref_id="CVE-2024-46771" ref_url="https://www.suse.com/security/cve/CVE-2024-46771/" source="CVE"/>
		<reference ref_id="CVE-2024-46772" ref_url="https://www.suse.com/security/cve/CVE-2024-46772/" source="CVE"/>
		<reference ref_id="CVE-2024-46773" ref_url="https://www.suse.com/security/cve/CVE-2024-46773/" source="CVE"/>
		<reference ref_id="CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774/" source="CVE"/>
		<reference ref_id="CVE-2024-46775" ref_url="https://www.suse.com/security/cve/CVE-2024-46775/" source="CVE"/>
		<reference ref_id="CVE-2024-46776" ref_url="https://www.suse.com/security/cve/CVE-2024-46776/" source="CVE"/>
		<reference ref_id="CVE-2024-46777" ref_url="https://www.suse.com/security/cve/CVE-2024-46777/" source="CVE"/>
		<reference ref_id="CVE-2024-46778" ref_url="https://www.suse.com/security/cve/CVE-2024-46778/" source="CVE"/>
		<reference ref_id="CVE-2024-46780" ref_url="https://www.suse.com/security/cve/CVE-2024-46780/" source="CVE"/>
		<reference ref_id="CVE-2024-46781" ref_url="https://www.suse.com/security/cve/CVE-2024-46781/" source="CVE"/>
		<reference ref_id="CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783/" source="CVE"/>
		<reference ref_id="CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784/" source="CVE"/>
		<reference ref_id="CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786/" source="CVE"/>
		<reference ref_id="CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787/" source="CVE"/>
		<reference ref_id="CVE-2024-46791" ref_url="https://www.suse.com/security/cve/CVE-2024-46791/" source="CVE"/>
		<reference ref_id="CVE-2024-46794" ref_url="https://www.suse.com/security/cve/CVE-2024-46794/" source="CVE"/>
		<reference ref_id="CVE-2024-46797" ref_url="https://www.suse.com/security/cve/CVE-2024-46797/" source="CVE"/>
		<reference ref_id="CVE-2024-46798" ref_url="https://www.suse.com/security/cve/CVE-2024-46798/" source="CVE"/>
		<reference ref_id="CVE-2024-46802" ref_url="https://www.suse.com/security/cve/CVE-2024-46802/" source="CVE"/>
		<reference ref_id="CVE-2024-46803" ref_url="https://www.suse.com/security/cve/CVE-2024-46803/" source="CVE"/>
		<reference ref_id="CVE-2024-46804" ref_url="https://www.suse.com/security/cve/CVE-2024-46804/" source="CVE"/>
		<reference ref_id="CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805/" source="CVE"/>
		<reference ref_id="CVE-2024-46806" ref_url="https://www.suse.com/security/cve/CVE-2024-46806/" source="CVE"/>
		<reference ref_id="CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807/" source="CVE"/>
		<reference ref_id="CVE-2024-46809" ref_url="https://www.suse.com/security/cve/CVE-2024-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-46810" ref_url="https://www.suse.com/security/cve/CVE-2024-46810/" source="CVE"/>
		<reference ref_id="CVE-2024-46811" ref_url="https://www.suse.com/security/cve/CVE-2024-46811/" source="CVE"/>
		<reference ref_id="CVE-2024-46812" ref_url="https://www.suse.com/security/cve/CVE-2024-46812/" source="CVE"/>
		<reference ref_id="CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813/" source="CVE"/>
		<reference ref_id="CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814/" source="CVE"/>
		<reference ref_id="CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815/" source="CVE"/>
		<reference ref_id="CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816/" source="CVE"/>
		<reference ref_id="CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817/" source="CVE"/>
		<reference ref_id="CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818/" source="CVE"/>
		<reference ref_id="CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819/" source="CVE"/>
		<reference ref_id="CVE-2024-46821" ref_url="https://www.suse.com/security/cve/CVE-2024-46821/" source="CVE"/>
		<reference ref_id="CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822/" source="CVE"/>
		<reference ref_id="CVE-2024-46825" ref_url="https://www.suse.com/security/cve/CVE-2024-46825/" source="CVE"/>
		<reference ref_id="CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826/" source="CVE"/>
		<reference ref_id="CVE-2024-46827" ref_url="https://www.suse.com/security/cve/CVE-2024-46827/" source="CVE"/>
		<reference ref_id="CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828/" source="CVE"/>
		<reference ref_id="CVE-2024-46830" ref_url="https://www.suse.com/security/cve/CVE-2024-46830/" source="CVE"/>
		<reference ref_id="CVE-2024-46831" ref_url="https://www.suse.com/security/cve/CVE-2024-46831/" source="CVE"/>
		<reference ref_id="CVE-2024-46834" ref_url="https://www.suse.com/security/cve/CVE-2024-46834/" source="CVE"/>
		<reference ref_id="CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835/" source="CVE"/>
		<reference ref_id="CVE-2024-46836" ref_url="https://www.suse.com/security/cve/CVE-2024-46836/" source="CVE"/>
		<reference ref_id="CVE-2024-46840" ref_url="https://www.suse.com/security/cve/CVE-2024-46840/" source="CVE"/>
		<reference ref_id="CVE-2024-46841" ref_url="https://www.suse.com/security/cve/CVE-2024-46841/" source="CVE"/>
		<reference ref_id="CVE-2024-46842" ref_url="https://www.suse.com/security/cve/CVE-2024-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-46843" ref_url="https://www.suse.com/security/cve/CVE-2024-46843/" source="CVE"/>
		<reference ref_id="CVE-2024-46846" ref_url="https://www.suse.com/security/cve/CVE-2024-46846/" source="CVE"/>
		<reference ref_id="CVE-2024-46848" ref_url="https://www.suse.com/security/cve/CVE-2024-46848/" source="CVE"/>
		<reference ref_id="CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849/" source="CVE"/>
		<reference ref_id="CVE-2024-46851" ref_url="https://www.suse.com/security/cve/CVE-2024-46851/" source="CVE"/>
		<reference ref_id="CVE-2024-46852" ref_url="https://www.suse.com/security/cve/CVE-2024-46852/" source="CVE"/>
		<reference ref_id="CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853/" source="CVE"/>
		<reference ref_id="CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854/" source="CVE"/>
		<reference ref_id="CVE-2024-46855" ref_url="https://www.suse.com/security/cve/CVE-2024-46855/" source="CVE"/>
		<reference ref_id="CVE-2024-46857" ref_url="https://www.suse.com/security/cve/CVE-2024-46857/" source="CVE"/>
		<reference ref_id="CVE-2024-46859" ref_url="https://www.suse.com/security/cve/CVE-2024-46859/" source="CVE"/>
		<reference ref_id="CVE-2024-46860" ref_url="https://www.suse.com/security/cve/CVE-2024-46860/" source="CVE"/>
		<reference ref_id="CVE-2024-46861" ref_url="https://www.suse.com/security/cve/CVE-2024-46861/" source="CVE"/>
		<reference ref_id="CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864/" source="CVE"/>
		<reference ref_id="CVE-2024-46870" ref_url="https://www.suse.com/security/cve/CVE-2024-46870/" source="CVE"/>
		<reference ref_id="CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871/" source="CVE"/>
		<reference ref_id="CVE-2024-46896" ref_url="https://www.suse.com/security/cve/CVE-2024-46896/" source="CVE"/>
		<reference ref_id="CVE-2024-47141" ref_url="https://www.suse.com/security/cve/CVE-2024-47141/" source="CVE"/>
		<reference ref_id="CVE-2024-47143" ref_url="https://www.suse.com/security/cve/CVE-2024-47143/" source="CVE"/>
		<reference ref_id="CVE-2024-47408" ref_url="https://www.suse.com/security/cve/CVE-2024-47408/" source="CVE"/>
		<reference ref_id="CVE-2024-47658" ref_url="https://www.suse.com/security/cve/CVE-2024-47658/" source="CVE"/>
		<reference ref_id="CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660/" source="CVE"/>
		<reference ref_id="CVE-2024-47661" ref_url="https://www.suse.com/security/cve/CVE-2024-47661/" source="CVE"/>
		<reference ref_id="CVE-2024-47662" ref_url="https://www.suse.com/security/cve/CVE-2024-47662/" source="CVE"/>
		<reference ref_id="CVE-2024-47663" ref_url="https://www.suse.com/security/cve/CVE-2024-47663/" source="CVE"/>
		<reference ref_id="CVE-2024-47664" ref_url="https://www.suse.com/security/cve/CVE-2024-47664/" source="CVE"/>
		<reference ref_id="CVE-2024-47665" ref_url="https://www.suse.com/security/cve/CVE-2024-47665/" source="CVE"/>
		<reference ref_id="CVE-2024-47667" ref_url="https://www.suse.com/security/cve/CVE-2024-47667/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47669" ref_url="https://www.suse.com/security/cve/CVE-2024-47669/" source="CVE"/>
		<reference ref_id="CVE-2024-47670" ref_url="https://www.suse.com/security/cve/CVE-2024-47670/" source="CVE"/>
		<reference ref_id="CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671/" source="CVE"/>
		<reference ref_id="CVE-2024-47672" ref_url="https://www.suse.com/security/cve/CVE-2024-47672/" source="CVE"/>
		<reference ref_id="CVE-2024-47673" ref_url="https://www.suse.com/security/cve/CVE-2024-47673/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47675" ref_url="https://www.suse.com/security/cve/CVE-2024-47675/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47681" ref_url="https://www.suse.com/security/cve/CVE-2024-47681/" source="CVE"/>
		<reference ref_id="CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47686" ref_url="https://www.suse.com/security/cve/CVE-2024-47686/" source="CVE"/>
		<reference ref_id="CVE-2024-47687" ref_url="https://www.suse.com/security/cve/CVE-2024-47687/" source="CVE"/>
		<reference ref_id="CVE-2024-47688" ref_url="https://www.suse.com/security/cve/CVE-2024-47688/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693/" source="CVE"/>
		<reference ref_id="CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695/" source="CVE"/>
		<reference ref_id="CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696/" source="CVE"/>
		<reference ref_id="CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697/" source="CVE"/>
		<reference ref_id="CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698/" source="CVE"/>
		<reference ref_id="CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699/" source="CVE"/>
		<reference ref_id="CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701/" source="CVE"/>
		<reference ref_id="CVE-2024-47702" ref_url="https://www.suse.com/security/cve/CVE-2024-47702/" source="CVE"/>
		<reference ref_id="CVE-2024-47703" ref_url="https://www.suse.com/security/cve/CVE-2024-47703/" source="CVE"/>
		<reference ref_id="CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707/" source="CVE"/>
		<reference ref_id="CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47714" ref_url="https://www.suse.com/security/cve/CVE-2024-47714/" source="CVE"/>
		<reference ref_id="CVE-2024-47715" ref_url="https://www.suse.com/security/cve/CVE-2024-47715/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47719" ref_url="https://www.suse.com/security/cve/CVE-2024-47719/" source="CVE"/>
		<reference ref_id="CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720/" source="CVE"/>
		<reference ref_id="CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728/" source="CVE"/>
		<reference ref_id="CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730/" source="CVE"/>
		<reference ref_id="CVE-2024-47731" ref_url="https://www.suse.com/security/cve/CVE-2024-47731/" source="CVE"/>
		<reference ref_id="CVE-2024-47732" ref_url="https://www.suse.com/security/cve/CVE-2024-47732/" source="CVE"/>
		<reference ref_id="CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47741" ref_url="https://www.suse.com/security/cve/CVE-2024-47741/" source="CVE"/>
		<reference ref_id="CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742/" source="CVE"/>
		<reference ref_id="CVE-2024-47743" ref_url="https://www.suse.com/security/cve/CVE-2024-47743/" source="CVE"/>
		<reference ref_id="CVE-2024-47744" ref_url="https://www.suse.com/security/cve/CVE-2024-47744/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749/" source="CVE"/>
		<reference ref_id="CVE-2024-47750" ref_url="https://www.suse.com/security/cve/CVE-2024-47750/" source="CVE"/>
		<reference ref_id="CVE-2024-47751" ref_url="https://www.suse.com/security/cve/CVE-2024-47751/" source="CVE"/>
		<reference ref_id="CVE-2024-47752" ref_url="https://www.suse.com/security/cve/CVE-2024-47752/" source="CVE"/>
		<reference ref_id="CVE-2024-47753" ref_url="https://www.suse.com/security/cve/CVE-2024-47753/" source="CVE"/>
		<reference ref_id="CVE-2024-47754" ref_url="https://www.suse.com/security/cve/CVE-2024-47754/" source="CVE"/>
		<reference ref_id="CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-47794" ref_url="https://www.suse.com/security/cve/CVE-2024-47794/" source="CVE"/>
		<reference ref_id="CVE-2024-47809" ref_url="https://www.suse.com/security/cve/CVE-2024-47809/" source="CVE"/>
		<reference ref_id="CVE-2024-48873" ref_url="https://www.suse.com/security/cve/CVE-2024-48873/" source="CVE"/>
		<reference ref_id="CVE-2024-48876" ref_url="https://www.suse.com/security/cve/CVE-2024-48876/" source="CVE"/>
		<reference ref_id="CVE-2024-48881" ref_url="https://www.suse.com/security/cve/CVE-2024-48881/" source="CVE"/>
		<reference ref_id="CVE-2024-49568" ref_url="https://www.suse.com/security/cve/CVE-2024-49568/" source="CVE"/>
		<reference ref_id="CVE-2024-49569" ref_url="https://www.suse.com/security/cve/CVE-2024-49569/" source="CVE"/>
		<reference ref_id="CVE-2024-49570" ref_url="https://www.suse.com/security/cve/CVE-2024-49570/" source="CVE"/>
		<reference ref_id="CVE-2024-49571" ref_url="https://www.suse.com/security/cve/CVE-2024-49571/" source="CVE"/>
		<reference ref_id="CVE-2024-49573" ref_url="https://www.suse.com/security/cve/CVE-2024-49573/" source="CVE"/>
		<reference ref_id="CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852/" source="CVE"/>
		<reference ref_id="CVE-2024-49853" ref_url="https://www.suse.com/security/cve/CVE-2024-49853/" source="CVE"/>
		<reference ref_id="CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855/" source="CVE"/>
		<reference ref_id="CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49862" ref_url="https://www.suse.com/security/cve/CVE-2024-49862/" source="CVE"/>
		<reference ref_id="CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863/" source="CVE"/>
		<reference ref_id="CVE-2024-49864" ref_url="https://www.suse.com/security/cve/CVE-2024-49864/" source="CVE"/>
		<reference ref_id="CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871/" source="CVE"/>
		<reference ref_id="CVE-2024-49874" ref_url="https://www.suse.com/security/cve/CVE-2024-49874/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877/" source="CVE"/>
		<reference ref_id="CVE-2024-49878" ref_url="https://www.suse.com/security/cve/CVE-2024-49878/" source="CVE"/>
		<reference ref_id="CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49888" ref_url="https://www.suse.com/security/cve/CVE-2024-49888/" source="CVE"/>
		<reference ref_id="CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890/" source="CVE"/>
		<reference ref_id="CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891/" source="CVE"/>
		<reference ref_id="CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892/" source="CVE"/>
		<reference ref_id="CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894/" source="CVE"/>
		<reference ref_id="CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895/" source="CVE"/>
		<reference ref_id="CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896/" source="CVE"/>
		<reference ref_id="CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897/" source="CVE"/>
		<reference ref_id="CVE-2024-49898" ref_url="https://www.suse.com/security/cve/CVE-2024-49898/" source="CVE"/>
		<reference ref_id="CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899/" source="CVE"/>
		<reference ref_id="CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900/" source="CVE"/>
		<reference ref_id="CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901/" source="CVE"/>
		<reference ref_id="CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902/" source="CVE"/>
		<reference ref_id="CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903/" source="CVE"/>
		<reference ref_id="CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906/" source="CVE"/>
		<reference ref_id="CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909/" source="CVE"/>
		<reference ref_id="CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911/" source="CVE"/>
		<reference ref_id="CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912/" source="CVE"/>
		<reference ref_id="CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913/" source="CVE"/>
		<reference ref_id="CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914/" source="CVE"/>
		<reference ref_id="CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917/" source="CVE"/>
		<reference ref_id="CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918/" source="CVE"/>
		<reference ref_id="CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919/" source="CVE"/>
		<reference ref_id="CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920/" source="CVE"/>
		<reference ref_id="CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921/" source="CVE"/>
		<reference ref_id="CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922/" source="CVE"/>
		<reference ref_id="CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49928" ref_url="https://www.suse.com/security/cve/CVE-2024-49928/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49931" ref_url="https://www.suse.com/security/cve/CVE-2024-49931/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49937" ref_url="https://www.suse.com/security/cve/CVE-2024-49937/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49953" ref_url="https://www.suse.com/security/cve/CVE-2024-49953/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955/" source="CVE"/>
		<reference ref_id="CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957/" source="CVE"/>
		<reference ref_id="CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49961" ref_url="https://www.suse.com/security/cve/CVE-2024-49961/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963/" source="CVE"/>
		<reference ref_id="CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965/" source="CVE"/>
		<reference ref_id="CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49972" ref_url="https://www.suse.com/security/cve/CVE-2024-49972/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985/" source="CVE"/>
		<reference ref_id="CVE-2024-49986" ref_url="https://www.suse.com/security/cve/CVE-2024-49986/" source="CVE"/>
		<reference ref_id="CVE-2024-49987" ref_url="https://www.suse.com/security/cve/CVE-2024-49987/" source="CVE"/>
		<reference ref_id="CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996/" source="CVE"/>
		<reference ref_id="CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000/" source="CVE"/>
		<reference ref_id="CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003/" source="CVE"/>
		<reference ref_id="CVE-2024-50004" ref_url="https://www.suse.com/security/cve/CVE-2024-50004/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50012" ref_url="https://www.suse.com/security/cve/CVE-2024-50012/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50015" ref_url="https://www.suse.com/security/cve/CVE-2024-50015/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50020" ref_url="https://www.suse.com/security/cve/CVE-2024-50020/" source="CVE"/>
		<reference ref_id="CVE-2024-50021" ref_url="https://www.suse.com/security/cve/CVE-2024-50021/" source="CVE"/>
		<reference ref_id="CVE-2024-50022" ref_url="https://www.suse.com/security/cve/CVE-2024-50022/" source="CVE"/>
		<reference ref_id="CVE-2024-50023" ref_url="https://www.suse.com/security/cve/CVE-2024-50023/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025/" source="CVE"/>
		<reference ref_id="CVE-2024-50027" ref_url="https://www.suse.com/security/cve/CVE-2024-50027/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50040" ref_url="https://www.suse.com/security/cve/CVE-2024-50040/" source="CVE"/>
		<reference ref_id="CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041/" source="CVE"/>
		<reference ref_id="CVE-2024-50042" ref_url="https://www.suse.com/security/cve/CVE-2024-50042/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048/" source="CVE"/>
		<reference ref_id="CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049/" source="CVE"/>
		<reference ref_id="CVE-2024-50051" ref_url="https://www.suse.com/security/cve/CVE-2024-50051/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059/" source="CVE"/>
		<reference ref_id="CVE-2024-50060" ref_url="https://www.suse.com/security/cve/CVE-2024-50060/" source="CVE"/>
		<reference ref_id="CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061/" source="CVE"/>
		<reference ref_id="CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062/" source="CVE"/>
		<reference ref_id="CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063/" source="CVE"/>
		<reference ref_id="CVE-2024-50064" ref_url="https://www.suse.com/security/cve/CVE-2024-50064/" source="CVE"/>
		<reference ref_id="CVE-2024-50069" ref_url="https://www.suse.com/security/cve/CVE-2024-50069/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50075" ref_url="https://www.suse.com/security/cve/CVE-2024-50075/" source="CVE"/>
		<reference ref_id="CVE-2024-50076" ref_url="https://www.suse.com/security/cve/CVE-2024-50076/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50080" ref_url="https://www.suse.com/security/cve/CVE-2024-50080/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50084" ref_url="https://www.suse.com/security/cve/CVE-2024-50084/" source="CVE"/>
		<reference ref_id="CVE-2024-50087" ref_url="https://www.suse.com/security/cve/CVE-2024-50087/" source="CVE"/>
		<reference ref_id="CVE-2024-50088" ref_url="https://www.suse.com/security/cve/CVE-2024-50088/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50130" ref_url="https://www.suse.com/security/cve/CVE-2024-50130/" source="CVE"/>
		<reference ref_id="CVE-2024-50139" ref_url="https://www.suse.com/security/cve/CVE-2024-50139/" source="CVE"/>
		<reference ref_id="CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50228" ref_url="https://www.suse.com/security/cve/CVE-2024-50228/" source="CVE"/>
		<reference ref_id="CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230/" source="CVE"/>
		<reference ref_id="CVE-2024-50250" ref_url="https://www.suse.com/security/cve/CVE-2024-50250/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-51729" ref_url="https://www.suse.com/security/cve/CVE-2024-51729/" source="CVE"/>
		<reference ref_id="CVE-2024-52319" ref_url="https://www.suse.com/security/cve/CVE-2024-52319/" source="CVE"/>
		<reference ref_id="CVE-2024-52332" ref_url="https://www.suse.com/security/cve/CVE-2024-52332/" source="CVE"/>
		<reference ref_id="CVE-2024-52559" ref_url="https://www.suse.com/security/cve/CVE-2024-52559/" source="CVE"/>
		<reference ref_id="CVE-2024-53103" ref_url="https://www.suse.com/security/cve/CVE-2024-53103/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<reference ref_id="CVE-2024-53142" ref_url="https://www.suse.com/security/cve/CVE-2024-53142/" source="CVE"/>
		<reference ref_id="CVE-2024-53143" ref_url="https://www.suse.com/security/cve/CVE-2024-53143/" source="CVE"/>
		<reference ref_id="CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146/" source="CVE"/>
		<reference ref_id="CVE-2024-53147" ref_url="https://www.suse.com/security/cve/CVE-2024-53147/" source="CVE"/>
		<reference ref_id="CVE-2024-53148" ref_url="https://www.suse.com/security/cve/CVE-2024-53148/" source="CVE"/>
		<reference ref_id="CVE-2024-53149" ref_url="https://www.suse.com/security/cve/CVE-2024-53149/" source="CVE"/>
		<reference ref_id="CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150/" source="CVE"/>
		<reference ref_id="CVE-2024-53151" ref_url="https://www.suse.com/security/cve/CVE-2024-53151/" source="CVE"/>
		<reference ref_id="CVE-2024-53152" ref_url="https://www.suse.com/security/cve/CVE-2024-53152/" source="CVE"/>
		<reference ref_id="CVE-2024-53153" ref_url="https://www.suse.com/security/cve/CVE-2024-53153/" source="CVE"/>
		<reference ref_id="CVE-2024-53154" ref_url="https://www.suse.com/security/cve/CVE-2024-53154/" source="CVE"/>
		<reference ref_id="CVE-2024-53155" ref_url="https://www.suse.com/security/cve/CVE-2024-53155/" source="CVE"/>
		<reference ref_id="CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156/" source="CVE"/>
		<reference ref_id="CVE-2024-53157" ref_url="https://www.suse.com/security/cve/CVE-2024-53157/" source="CVE"/>
		<reference ref_id="CVE-2024-53158" ref_url="https://www.suse.com/security/cve/CVE-2024-53158/" source="CVE"/>
		<reference ref_id="CVE-2024-53160" ref_url="https://www.suse.com/security/cve/CVE-2024-53160/" source="CVE"/>
		<reference ref_id="CVE-2024-53161" ref_url="https://www.suse.com/security/cve/CVE-2024-53161/" source="CVE"/>
		<reference ref_id="CVE-2024-53162" ref_url="https://www.suse.com/security/cve/CVE-2024-53162/" source="CVE"/>
		<reference ref_id="CVE-2024-53163" ref_url="https://www.suse.com/security/cve/CVE-2024-53163/" source="CVE"/>
		<reference ref_id="CVE-2024-53166" ref_url="https://www.suse.com/security/cve/CVE-2024-53166/" source="CVE"/>
		<reference ref_id="CVE-2024-53167" ref_url="https://www.suse.com/security/cve/CVE-2024-53167/" source="CVE"/>
		<reference ref_id="CVE-2024-53168" ref_url="https://www.suse.com/security/cve/CVE-2024-53168/" source="CVE"/>
		<reference ref_id="CVE-2024-53169" ref_url="https://www.suse.com/security/cve/CVE-2024-53169/" source="CVE"/>
		<reference ref_id="CVE-2024-53170" ref_url="https://www.suse.com/security/cve/CVE-2024-53170/" source="CVE"/>
		<reference ref_id="CVE-2024-53172" ref_url="https://www.suse.com/security/cve/CVE-2024-53172/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53174" ref_url="https://www.suse.com/security/cve/CVE-2024-53174/" source="CVE"/>
		<reference ref_id="CVE-2024-53175" ref_url="https://www.suse.com/security/cve/CVE-2024-53175/" source="CVE"/>
		<reference ref_id="CVE-2024-53176" ref_url="https://www.suse.com/security/cve/CVE-2024-53176/" source="CVE"/>
		<reference ref_id="CVE-2024-53177" ref_url="https://www.suse.com/security/cve/CVE-2024-53177/" source="CVE"/>
		<reference ref_id="CVE-2024-53178" ref_url="https://www.suse.com/security/cve/CVE-2024-53178/" source="CVE"/>
		<reference ref_id="CVE-2024-53179" ref_url="https://www.suse.com/security/cve/CVE-2024-53179/" source="CVE"/>
		<reference ref_id="CVE-2024-53180" ref_url="https://www.suse.com/security/cve/CVE-2024-53180/" source="CVE"/>
		<reference ref_id="CVE-2024-53182" ref_url="https://www.suse.com/security/cve/CVE-2024-53182/" source="CVE"/>
		<reference ref_id="CVE-2024-53185" ref_url="https://www.suse.com/security/cve/CVE-2024-53185/" source="CVE"/>
		<reference ref_id="CVE-2024-53187" ref_url="https://www.suse.com/security/cve/CVE-2024-53187/" source="CVE"/>
		<reference ref_id="CVE-2024-53188" ref_url="https://www.suse.com/security/cve/CVE-2024-53188/" source="CVE"/>
		<reference ref_id="CVE-2024-53189" ref_url="https://www.suse.com/security/cve/CVE-2024-53189/" source="CVE"/>
		<reference ref_id="CVE-2024-53190" ref_url="https://www.suse.com/security/cve/CVE-2024-53190/" source="CVE"/>
		<reference ref_id="CVE-2024-53191" ref_url="https://www.suse.com/security/cve/CVE-2024-53191/" source="CVE"/>
		<reference ref_id="CVE-2024-53192" ref_url="https://www.suse.com/security/cve/CVE-2024-53192/" source="CVE"/>
		<reference ref_id="CVE-2024-53193" ref_url="https://www.suse.com/security/cve/CVE-2024-53193/" source="CVE"/>
		<reference ref_id="CVE-2024-53194" ref_url="https://www.suse.com/security/cve/CVE-2024-53194/" source="CVE"/>
		<reference ref_id="CVE-2024-53195" ref_url="https://www.suse.com/security/cve/CVE-2024-53195/" source="CVE"/>
		<reference ref_id="CVE-2024-53196" ref_url="https://www.suse.com/security/cve/CVE-2024-53196/" source="CVE"/>
		<reference ref_id="CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197/" source="CVE"/>
		<reference ref_id="CVE-2024-53198" ref_url="https://www.suse.com/security/cve/CVE-2024-53198/" source="CVE"/>
		<reference ref_id="CVE-2024-53199" ref_url="https://www.suse.com/security/cve/CVE-2024-53199/" source="CVE"/>
		<reference ref_id="CVE-2024-53200" ref_url="https://www.suse.com/security/cve/CVE-2024-53200/" source="CVE"/>
		<reference ref_id="CVE-2024-53201" ref_url="https://www.suse.com/security/cve/CVE-2024-53201/" source="CVE"/>
		<reference ref_id="CVE-2024-53202" ref_url="https://www.suse.com/security/cve/CVE-2024-53202/" source="CVE"/>
		<reference ref_id="CVE-2024-53203" ref_url="https://www.suse.com/security/cve/CVE-2024-53203/" source="CVE"/>
		<reference ref_id="CVE-2024-53204" ref_url="https://www.suse.com/security/cve/CVE-2024-53204/" source="CVE"/>
		<reference ref_id="CVE-2024-53205" ref_url="https://www.suse.com/security/cve/CVE-2024-53205/" source="CVE"/>
		<reference ref_id="CVE-2024-53206" ref_url="https://www.suse.com/security/cve/CVE-2024-53206/" source="CVE"/>
		<reference ref_id="CVE-2024-53207" ref_url="https://www.suse.com/security/cve/CVE-2024-53207/" source="CVE"/>
		<reference ref_id="CVE-2024-53208" ref_url="https://www.suse.com/security/cve/CVE-2024-53208/" source="CVE"/>
		<reference ref_id="CVE-2024-53209" ref_url="https://www.suse.com/security/cve/CVE-2024-53209/" source="CVE"/>
		<reference ref_id="CVE-2024-53210" ref_url="https://www.suse.com/security/cve/CVE-2024-53210/" source="CVE"/>
		<reference ref_id="CVE-2024-53211" ref_url="https://www.suse.com/security/cve/CVE-2024-53211/" source="CVE"/>
		<reference ref_id="CVE-2024-53212" ref_url="https://www.suse.com/security/cve/CVE-2024-53212/" source="CVE"/>
		<reference ref_id="CVE-2024-53213" ref_url="https://www.suse.com/security/cve/CVE-2024-53213/" source="CVE"/>
		<reference ref_id="CVE-2024-53214" ref_url="https://www.suse.com/security/cve/CVE-2024-53214/" source="CVE"/>
		<reference ref_id="CVE-2024-53215" ref_url="https://www.suse.com/security/cve/CVE-2024-53215/" source="CVE"/>
		<reference ref_id="CVE-2024-53216" ref_url="https://www.suse.com/security/cve/CVE-2024-53216/" source="CVE"/>
		<reference ref_id="CVE-2024-53217" ref_url="https://www.suse.com/security/cve/CVE-2024-53217/" source="CVE"/>
		<reference ref_id="CVE-2024-53219" ref_url="https://www.suse.com/security/cve/CVE-2024-53219/" source="CVE"/>
		<reference ref_id="CVE-2024-53222" ref_url="https://www.suse.com/security/cve/CVE-2024-53222/" source="CVE"/>
		<reference ref_id="CVE-2024-53223" ref_url="https://www.suse.com/security/cve/CVE-2024-53223/" source="CVE"/>
		<reference ref_id="CVE-2024-53224" ref_url="https://www.suse.com/security/cve/CVE-2024-53224/" source="CVE"/>
		<reference ref_id="CVE-2024-53225" ref_url="https://www.suse.com/security/cve/CVE-2024-53225/" source="CVE"/>
		<reference ref_id="CVE-2024-53226" ref_url="https://www.suse.com/security/cve/CVE-2024-53226/" source="CVE"/>
		<reference ref_id="CVE-2024-53227" ref_url="https://www.suse.com/security/cve/CVE-2024-53227/" source="CVE"/>
		<reference ref_id="CVE-2024-53228" ref_url="https://www.suse.com/security/cve/CVE-2024-53228/" source="CVE"/>
		<reference ref_id="CVE-2024-53229" ref_url="https://www.suse.com/security/cve/CVE-2024-53229/" source="CVE"/>
		<reference ref_id="CVE-2024-53230" ref_url="https://www.suse.com/security/cve/CVE-2024-53230/" source="CVE"/>
		<reference ref_id="CVE-2024-53231" ref_url="https://www.suse.com/security/cve/CVE-2024-53231/" source="CVE"/>
		<reference ref_id="CVE-2024-53232" ref_url="https://www.suse.com/security/cve/CVE-2024-53232/" source="CVE"/>
		<reference ref_id="CVE-2024-53233" ref_url="https://www.suse.com/security/cve/CVE-2024-53233/" source="CVE"/>
		<reference ref_id="CVE-2024-53234" ref_url="https://www.suse.com/security/cve/CVE-2024-53234/" source="CVE"/>
		<reference ref_id="CVE-2024-53235" ref_url="https://www.suse.com/security/cve/CVE-2024-53235/" source="CVE"/>
		<reference ref_id="CVE-2024-53236" ref_url="https://www.suse.com/security/cve/CVE-2024-53236/" source="CVE"/>
		<reference ref_id="CVE-2024-53237" ref_url="https://www.suse.com/security/cve/CVE-2024-53237/" source="CVE"/>
		<reference ref_id="CVE-2024-53238" ref_url="https://www.suse.com/security/cve/CVE-2024-53238/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-53240" ref_url="https://www.suse.com/security/cve/CVE-2024-53240/" source="CVE"/>
		<reference ref_id="CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241/" source="CVE"/>
		<reference ref_id="CVE-2024-53680" ref_url="https://www.suse.com/security/cve/CVE-2024-53680/" source="CVE"/>
		<reference ref_id="CVE-2024-53681" ref_url="https://www.suse.com/security/cve/CVE-2024-53681/" source="CVE"/>
		<reference ref_id="CVE-2024-53682" ref_url="https://www.suse.com/security/cve/CVE-2024-53682/" source="CVE"/>
		<reference ref_id="CVE-2024-53685" ref_url="https://www.suse.com/security/cve/CVE-2024-53685/" source="CVE"/>
		<reference ref_id="CVE-2024-54191" ref_url="https://www.suse.com/security/cve/CVE-2024-54191/" source="CVE"/>
		<reference ref_id="CVE-2024-54193" ref_url="https://www.suse.com/security/cve/CVE-2024-54193/" source="CVE"/>
		<reference ref_id="CVE-2024-54455" ref_url="https://www.suse.com/security/cve/CVE-2024-54455/" source="CVE"/>
		<reference ref_id="CVE-2024-54456" ref_url="https://www.suse.com/security/cve/CVE-2024-54456/" source="CVE"/>
		<reference ref_id="CVE-2024-54458" ref_url="https://www.suse.com/security/cve/CVE-2024-54458/" source="CVE"/>
		<reference ref_id="CVE-2024-54460" ref_url="https://www.suse.com/security/cve/CVE-2024-54460/" source="CVE"/>
		<reference ref_id="CVE-2024-54680" ref_url="https://www.suse.com/security/cve/CVE-2024-54680/" source="CVE"/>
		<reference ref_id="CVE-2024-54683" ref_url="https://www.suse.com/security/cve/CVE-2024-54683/" source="CVE"/>
		<reference ref_id="CVE-2024-55639" ref_url="https://www.suse.com/security/cve/CVE-2024-55639/" source="CVE"/>
		<reference ref_id="CVE-2024-55641" ref_url="https://www.suse.com/security/cve/CVE-2024-55641/" source="CVE"/>
		<reference ref_id="CVE-2024-55642" ref_url="https://www.suse.com/security/cve/CVE-2024-55642/" source="CVE"/>
		<reference ref_id="CVE-2024-55881" ref_url="https://www.suse.com/security/cve/CVE-2024-55881/" source="CVE"/>
		<reference ref_id="CVE-2024-55916" ref_url="https://www.suse.com/security/cve/CVE-2024-55916/" source="CVE"/>
		<reference ref_id="CVE-2024-56368" ref_url="https://www.suse.com/security/cve/CVE-2024-56368/" source="CVE"/>
		<reference ref_id="CVE-2024-56369" ref_url="https://www.suse.com/security/cve/CVE-2024-56369/" source="CVE"/>
		<reference ref_id="CVE-2024-56372" ref_url="https://www.suse.com/security/cve/CVE-2024-56372/" source="CVE"/>
		<reference ref_id="CVE-2024-56531" ref_url="https://www.suse.com/security/cve/CVE-2024-56531/" source="CVE"/>
		<reference ref_id="CVE-2024-56532" ref_url="https://www.suse.com/security/cve/CVE-2024-56532/" source="CVE"/>
		<reference ref_id="CVE-2024-56533" ref_url="https://www.suse.com/security/cve/CVE-2024-56533/" source="CVE"/>
		<reference ref_id="CVE-2024-56534" ref_url="https://www.suse.com/security/cve/CVE-2024-56534/" source="CVE"/>
		<reference ref_id="CVE-2024-56535" ref_url="https://www.suse.com/security/cve/CVE-2024-56535/" source="CVE"/>
		<reference ref_id="CVE-2024-56536" ref_url="https://www.suse.com/security/cve/CVE-2024-56536/" source="CVE"/>
		<reference ref_id="CVE-2024-56537" ref_url="https://www.suse.com/security/cve/CVE-2024-56537/" source="CVE"/>
		<reference ref_id="CVE-2024-56538" ref_url="https://www.suse.com/security/cve/CVE-2024-56538/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56540" ref_url="https://www.suse.com/security/cve/CVE-2024-56540/" source="CVE"/>
		<reference ref_id="CVE-2024-56541" ref_url="https://www.suse.com/security/cve/CVE-2024-56541/" source="CVE"/>
		<reference ref_id="CVE-2024-56542" ref_url="https://www.suse.com/security/cve/CVE-2024-56542/" source="CVE"/>
		<reference ref_id="CVE-2024-56543" ref_url="https://www.suse.com/security/cve/CVE-2024-56543/" source="CVE"/>
		<reference ref_id="CVE-2024-56544" ref_url="https://www.suse.com/security/cve/CVE-2024-56544/" source="CVE"/>
		<reference ref_id="CVE-2024-56545" ref_url="https://www.suse.com/security/cve/CVE-2024-56545/" source="CVE"/>
		<reference ref_id="CVE-2024-56546" ref_url="https://www.suse.com/security/cve/CVE-2024-56546/" source="CVE"/>
		<reference ref_id="CVE-2024-56549" ref_url="https://www.suse.com/security/cve/CVE-2024-56549/" source="CVE"/>
		<reference ref_id="CVE-2024-56550" ref_url="https://www.suse.com/security/cve/CVE-2024-56550/" source="CVE"/>
		<reference ref_id="CVE-2024-56551" ref_url="https://www.suse.com/security/cve/CVE-2024-56551/" source="CVE"/>
		<reference ref_id="CVE-2024-56552" ref_url="https://www.suse.com/security/cve/CVE-2024-56552/" source="CVE"/>
		<reference ref_id="CVE-2024-56557" ref_url="https://www.suse.com/security/cve/CVE-2024-56557/" source="CVE"/>
		<reference ref_id="CVE-2024-56558" ref_url="https://www.suse.com/security/cve/CVE-2024-56558/" source="CVE"/>
		<reference ref_id="CVE-2024-56560" ref_url="https://www.suse.com/security/cve/CVE-2024-56560/" source="CVE"/>
		<reference ref_id="CVE-2024-56561" ref_url="https://www.suse.com/security/cve/CVE-2024-56561/" source="CVE"/>
		<reference ref_id="CVE-2024-56562" ref_url="https://www.suse.com/security/cve/CVE-2024-56562/" source="CVE"/>
		<reference ref_id="CVE-2024-56563" ref_url="https://www.suse.com/security/cve/CVE-2024-56563/" source="CVE"/>
		<reference ref_id="CVE-2024-56566" ref_url="https://www.suse.com/security/cve/CVE-2024-56566/" source="CVE"/>
		<reference ref_id="CVE-2024-56567" ref_url="https://www.suse.com/security/cve/CVE-2024-56567/" source="CVE"/>
		<reference ref_id="CVE-2024-56568" ref_url="https://www.suse.com/security/cve/CVE-2024-56568/" source="CVE"/>
		<reference ref_id="CVE-2024-56569" ref_url="https://www.suse.com/security/cve/CVE-2024-56569/" source="CVE"/>
		<reference ref_id="CVE-2024-56570" ref_url="https://www.suse.com/security/cve/CVE-2024-56570/" source="CVE"/>
		<reference ref_id="CVE-2024-56571" ref_url="https://www.suse.com/security/cve/CVE-2024-56571/" source="CVE"/>
		<reference ref_id="CVE-2024-56572" ref_url="https://www.suse.com/security/cve/CVE-2024-56572/" source="CVE"/>
		<reference ref_id="CVE-2024-56573" ref_url="https://www.suse.com/security/cve/CVE-2024-56573/" source="CVE"/>
		<reference ref_id="CVE-2024-56574" ref_url="https://www.suse.com/security/cve/CVE-2024-56574/" source="CVE"/>
		<reference ref_id="CVE-2024-56575" ref_url="https://www.suse.com/security/cve/CVE-2024-56575/" source="CVE"/>
		<reference ref_id="CVE-2024-56576" ref_url="https://www.suse.com/security/cve/CVE-2024-56576/" source="CVE"/>
		<reference ref_id="CVE-2024-56577" ref_url="https://www.suse.com/security/cve/CVE-2024-56577/" source="CVE"/>
		<reference ref_id="CVE-2024-56578" ref_url="https://www.suse.com/security/cve/CVE-2024-56578/" source="CVE"/>
		<reference ref_id="CVE-2024-56579" ref_url="https://www.suse.com/security/cve/CVE-2024-56579/" source="CVE"/>
		<reference ref_id="CVE-2024-56580" ref_url="https://www.suse.com/security/cve/CVE-2024-56580/" source="CVE"/>
		<reference ref_id="CVE-2024-56582" ref_url="https://www.suse.com/security/cve/CVE-2024-56582/" source="CVE"/>
		<reference ref_id="CVE-2024-56583" ref_url="https://www.suse.com/security/cve/CVE-2024-56583/" source="CVE"/>
		<reference ref_id="CVE-2024-56584" ref_url="https://www.suse.com/security/cve/CVE-2024-56584/" source="CVE"/>
		<reference ref_id="CVE-2024-56587" ref_url="https://www.suse.com/security/cve/CVE-2024-56587/" source="CVE"/>
		<reference ref_id="CVE-2024-56588" ref_url="https://www.suse.com/security/cve/CVE-2024-56588/" source="CVE"/>
		<reference ref_id="CVE-2024-56589" ref_url="https://www.suse.com/security/cve/CVE-2024-56589/" source="CVE"/>
		<reference ref_id="CVE-2024-56590" ref_url="https://www.suse.com/security/cve/CVE-2024-56590/" source="CVE"/>
		<reference ref_id="CVE-2024-56591" ref_url="https://www.suse.com/security/cve/CVE-2024-56591/" source="CVE"/>
		<reference ref_id="CVE-2024-56592" ref_url="https://www.suse.com/security/cve/CVE-2024-56592/" source="CVE"/>
		<reference ref_id="CVE-2024-56593" ref_url="https://www.suse.com/security/cve/CVE-2024-56593/" source="CVE"/>
		<reference ref_id="CVE-2024-56594" ref_url="https://www.suse.com/security/cve/CVE-2024-56594/" source="CVE"/>
		<reference ref_id="CVE-2024-56599" ref_url="https://www.suse.com/security/cve/CVE-2024-56599/" source="CVE"/>
		<reference ref_id="CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600/" source="CVE"/>
		<reference ref_id="CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601/" source="CVE"/>
		<reference ref_id="CVE-2024-56602" ref_url="https://www.suse.com/security/cve/CVE-2024-56602/" source="CVE"/>
		<reference ref_id="CVE-2024-56603" ref_url="https://www.suse.com/security/cve/CVE-2024-56603/" source="CVE"/>
		<reference ref_id="CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-56606" ref_url="https://www.suse.com/security/cve/CVE-2024-56606/" source="CVE"/>
		<reference ref_id="CVE-2024-56607" ref_url="https://www.suse.com/security/cve/CVE-2024-56607/" source="CVE"/>
		<reference ref_id="CVE-2024-56608" ref_url="https://www.suse.com/security/cve/CVE-2024-56608/" source="CVE"/>
		<reference ref_id="CVE-2024-56609" ref_url="https://www.suse.com/security/cve/CVE-2024-56609/" source="CVE"/>
		<reference ref_id="CVE-2024-56610" ref_url="https://www.suse.com/security/cve/CVE-2024-56610/" source="CVE"/>
		<reference ref_id="CVE-2024-56611" ref_url="https://www.suse.com/security/cve/CVE-2024-56611/" source="CVE"/>
		<reference ref_id="CVE-2024-56612" ref_url="https://www.suse.com/security/cve/CVE-2024-56612/" source="CVE"/>
		<reference ref_id="CVE-2024-56613" ref_url="https://www.suse.com/security/cve/CVE-2024-56613/" source="CVE"/>
		<reference ref_id="CVE-2024-56614" ref_url="https://www.suse.com/security/cve/CVE-2024-56614/" source="CVE"/>
		<reference ref_id="CVE-2024-56615" ref_url="https://www.suse.com/security/cve/CVE-2024-56615/" source="CVE"/>
		<reference ref_id="CVE-2024-56616" ref_url="https://www.suse.com/security/cve/CVE-2024-56616/" source="CVE"/>
		<reference ref_id="CVE-2024-56617" ref_url="https://www.suse.com/security/cve/CVE-2024-56617/" source="CVE"/>
		<reference ref_id="CVE-2024-56618" ref_url="https://www.suse.com/security/cve/CVE-2024-56618/" source="CVE"/>
		<reference ref_id="CVE-2024-56620" ref_url="https://www.suse.com/security/cve/CVE-2024-56620/" source="CVE"/>
		<reference ref_id="CVE-2024-56621" ref_url="https://www.suse.com/security/cve/CVE-2024-56621/" source="CVE"/>
		<reference ref_id="CVE-2024-56622" ref_url="https://www.suse.com/security/cve/CVE-2024-56622/" source="CVE"/>
		<reference ref_id="CVE-2024-56623" ref_url="https://www.suse.com/security/cve/CVE-2024-56623/" source="CVE"/>
		<reference ref_id="CVE-2024-56624" ref_url="https://www.suse.com/security/cve/CVE-2024-56624/" source="CVE"/>
		<reference ref_id="CVE-2024-56625" ref_url="https://www.suse.com/security/cve/CVE-2024-56625/" source="CVE"/>
		<reference ref_id="CVE-2024-56629" ref_url="https://www.suse.com/security/cve/CVE-2024-56629/" source="CVE"/>
		<reference ref_id="CVE-2024-56630" ref_url="https://www.suse.com/security/cve/CVE-2024-56630/" source="CVE"/>
		<reference ref_id="CVE-2024-56631" ref_url="https://www.suse.com/security/cve/CVE-2024-56631/" source="CVE"/>
		<reference ref_id="CVE-2024-56632" ref_url="https://www.suse.com/security/cve/CVE-2024-56632/" source="CVE"/>
		<reference ref_id="CVE-2024-56633" ref_url="https://www.suse.com/security/cve/CVE-2024-56633/" source="CVE"/>
		<reference ref_id="CVE-2024-56634" ref_url="https://www.suse.com/security/cve/CVE-2024-56634/" source="CVE"/>
		<reference ref_id="CVE-2024-56635" ref_url="https://www.suse.com/security/cve/CVE-2024-56635/" source="CVE"/>
		<reference ref_id="CVE-2024-56636" ref_url="https://www.suse.com/security/cve/CVE-2024-56636/" source="CVE"/>
		<reference ref_id="CVE-2024-56637" ref_url="https://www.suse.com/security/cve/CVE-2024-56637/" source="CVE"/>
		<reference ref_id="CVE-2024-56638" ref_url="https://www.suse.com/security/cve/CVE-2024-56638/" source="CVE"/>
		<reference ref_id="CVE-2024-56639" ref_url="https://www.suse.com/security/cve/CVE-2024-56639/" source="CVE"/>
		<reference ref_id="CVE-2024-56640" ref_url="https://www.suse.com/security/cve/CVE-2024-56640/" source="CVE"/>
		<reference ref_id="CVE-2024-56641" ref_url="https://www.suse.com/security/cve/CVE-2024-56641/" source="CVE"/>
		<reference ref_id="CVE-2024-56642" ref_url="https://www.suse.com/security/cve/CVE-2024-56642/" source="CVE"/>
		<reference ref_id="CVE-2024-56643" ref_url="https://www.suse.com/security/cve/CVE-2024-56643/" source="CVE"/>
		<reference ref_id="CVE-2024-56644" ref_url="https://www.suse.com/security/cve/CVE-2024-56644/" source="CVE"/>
		<reference ref_id="CVE-2024-56645" ref_url="https://www.suse.com/security/cve/CVE-2024-56645/" source="CVE"/>
		<reference ref_id="CVE-2024-56646" ref_url="https://www.suse.com/security/cve/CVE-2024-56646/" source="CVE"/>
		<reference ref_id="CVE-2024-56647" ref_url="https://www.suse.com/security/cve/CVE-2024-56647/" source="CVE"/>
		<reference ref_id="CVE-2024-56648" ref_url="https://www.suse.com/security/cve/CVE-2024-56648/" source="CVE"/>
		<reference ref_id="CVE-2024-56649" ref_url="https://www.suse.com/security/cve/CVE-2024-56649/" source="CVE"/>
		<reference ref_id="CVE-2024-56650" ref_url="https://www.suse.com/security/cve/CVE-2024-56650/" source="CVE"/>
		<reference ref_id="CVE-2024-56651" ref_url="https://www.suse.com/security/cve/CVE-2024-56651/" source="CVE"/>
		<reference ref_id="CVE-2024-56652" ref_url="https://www.suse.com/security/cve/CVE-2024-56652/" source="CVE"/>
		<reference ref_id="CVE-2024-56653" ref_url="https://www.suse.com/security/cve/CVE-2024-56653/" source="CVE"/>
		<reference ref_id="CVE-2024-56654" ref_url="https://www.suse.com/security/cve/CVE-2024-56654/" source="CVE"/>
		<reference ref_id="CVE-2024-56655" ref_url="https://www.suse.com/security/cve/CVE-2024-56655/" source="CVE"/>
		<reference ref_id="CVE-2024-56656" ref_url="https://www.suse.com/security/cve/CVE-2024-56656/" source="CVE"/>
		<reference ref_id="CVE-2024-56657" ref_url="https://www.suse.com/security/cve/CVE-2024-56657/" source="CVE"/>
		<reference ref_id="CVE-2024-56658" ref_url="https://www.suse.com/security/cve/CVE-2024-56658/" source="CVE"/>
		<reference ref_id="CVE-2024-56659" ref_url="https://www.suse.com/security/cve/CVE-2024-56659/" source="CVE"/>
		<reference ref_id="CVE-2024-56660" ref_url="https://www.suse.com/security/cve/CVE-2024-56660/" source="CVE"/>
		<reference ref_id="CVE-2024-56661" ref_url="https://www.suse.com/security/cve/CVE-2024-56661/" source="CVE"/>
		<reference ref_id="CVE-2024-56662" ref_url="https://www.suse.com/security/cve/CVE-2024-56662/" source="CVE"/>
		<reference ref_id="CVE-2024-56663" ref_url="https://www.suse.com/security/cve/CVE-2024-56663/" source="CVE"/>
		<reference ref_id="CVE-2024-56664" ref_url="https://www.suse.com/security/cve/CVE-2024-56664/" source="CVE"/>
		<reference ref_id="CVE-2024-56665" ref_url="https://www.suse.com/security/cve/CVE-2024-56665/" source="CVE"/>
		<reference ref_id="CVE-2024-56666" ref_url="https://www.suse.com/security/cve/CVE-2024-56666/" source="CVE"/>
		<reference ref_id="CVE-2024-56667" ref_url="https://www.suse.com/security/cve/CVE-2024-56667/" source="CVE"/>
		<reference ref_id="CVE-2024-56668" ref_url="https://www.suse.com/security/cve/CVE-2024-56668/" source="CVE"/>
		<reference ref_id="CVE-2024-56669" ref_url="https://www.suse.com/security/cve/CVE-2024-56669/" source="CVE"/>
		<reference ref_id="CVE-2024-56670" ref_url="https://www.suse.com/security/cve/CVE-2024-56670/" source="CVE"/>
		<reference ref_id="CVE-2024-56671" ref_url="https://www.suse.com/security/cve/CVE-2024-56671/" source="CVE"/>
		<reference ref_id="CVE-2024-56672" ref_url="https://www.suse.com/security/cve/CVE-2024-56672/" source="CVE"/>
		<reference ref_id="CVE-2024-56674" ref_url="https://www.suse.com/security/cve/CVE-2024-56674/" source="CVE"/>
		<reference ref_id="CVE-2024-56675" ref_url="https://www.suse.com/security/cve/CVE-2024-56675/" source="CVE"/>
		<reference ref_id="CVE-2024-56676" ref_url="https://www.suse.com/security/cve/CVE-2024-56676/" source="CVE"/>
		<reference ref_id="CVE-2024-56677" ref_url="https://www.suse.com/security/cve/CVE-2024-56677/" source="CVE"/>
		<reference ref_id="CVE-2024-56678" ref_url="https://www.suse.com/security/cve/CVE-2024-56678/" source="CVE"/>
		<reference ref_id="CVE-2024-56679" ref_url="https://www.suse.com/security/cve/CVE-2024-56679/" source="CVE"/>
		<reference ref_id="CVE-2024-56680" ref_url="https://www.suse.com/security/cve/CVE-2024-56680/" source="CVE"/>
		<reference ref_id="CVE-2024-56681" ref_url="https://www.suse.com/security/cve/CVE-2024-56681/" source="CVE"/>
		<reference ref_id="CVE-2024-56682" ref_url="https://www.suse.com/security/cve/CVE-2024-56682/" source="CVE"/>
		<reference ref_id="CVE-2024-56683" ref_url="https://www.suse.com/security/cve/CVE-2024-56683/" source="CVE"/>
		<reference ref_id="CVE-2024-56684" ref_url="https://www.suse.com/security/cve/CVE-2024-56684/" source="CVE"/>
		<reference ref_id="CVE-2024-56685" ref_url="https://www.suse.com/security/cve/CVE-2024-56685/" source="CVE"/>
		<reference ref_id="CVE-2024-56687" ref_url="https://www.suse.com/security/cve/CVE-2024-56687/" source="CVE"/>
		<reference ref_id="CVE-2024-56688" ref_url="https://www.suse.com/security/cve/CVE-2024-56688/" source="CVE"/>
		<reference ref_id="CVE-2024-56689" ref_url="https://www.suse.com/security/cve/CVE-2024-56689/" source="CVE"/>
		<reference ref_id="CVE-2024-56690" ref_url="https://www.suse.com/security/cve/CVE-2024-56690/" source="CVE"/>
		<reference ref_id="CVE-2024-56691" ref_url="https://www.suse.com/security/cve/CVE-2024-56691/" source="CVE"/>
		<reference ref_id="CVE-2024-56693" ref_url="https://www.suse.com/security/cve/CVE-2024-56693/" source="CVE"/>
		<reference ref_id="CVE-2024-56694" ref_url="https://www.suse.com/security/cve/CVE-2024-56694/" source="CVE"/>
		<reference ref_id="CVE-2024-56695" ref_url="https://www.suse.com/security/cve/CVE-2024-56695/" source="CVE"/>
		<reference ref_id="CVE-2024-56696" ref_url="https://www.suse.com/security/cve/CVE-2024-56696/" source="CVE"/>
		<reference ref_id="CVE-2024-56697" ref_url="https://www.suse.com/security/cve/CVE-2024-56697/" source="CVE"/>
		<reference ref_id="CVE-2024-56698" ref_url="https://www.suse.com/security/cve/CVE-2024-56698/" source="CVE"/>
		<reference ref_id="CVE-2024-56699" ref_url="https://www.suse.com/security/cve/CVE-2024-56699/" source="CVE"/>
		<reference ref_id="CVE-2024-56700" ref_url="https://www.suse.com/security/cve/CVE-2024-56700/" source="CVE"/>
		<reference ref_id="CVE-2024-56701" ref_url="https://www.suse.com/security/cve/CVE-2024-56701/" source="CVE"/>
		<reference ref_id="CVE-2024-56702" ref_url="https://www.suse.com/security/cve/CVE-2024-56702/" source="CVE"/>
		<reference ref_id="CVE-2024-56703" ref_url="https://www.suse.com/security/cve/CVE-2024-56703/" source="CVE"/>
		<reference ref_id="CVE-2024-56704" ref_url="https://www.suse.com/security/cve/CVE-2024-56704/" source="CVE"/>
		<reference ref_id="CVE-2024-56705" ref_url="https://www.suse.com/security/cve/CVE-2024-56705/" source="CVE"/>
		<reference ref_id="CVE-2024-56706" ref_url="https://www.suse.com/security/cve/CVE-2024-56706/" source="CVE"/>
		<reference ref_id="CVE-2024-56707" ref_url="https://www.suse.com/security/cve/CVE-2024-56707/" source="CVE"/>
		<reference ref_id="CVE-2024-56708" ref_url="https://www.suse.com/security/cve/CVE-2024-56708/" source="CVE"/>
		<reference ref_id="CVE-2024-56709" ref_url="https://www.suse.com/security/cve/CVE-2024-56709/" source="CVE"/>
		<reference ref_id="CVE-2024-56711" ref_url="https://www.suse.com/security/cve/CVE-2024-56711/" source="CVE"/>
		<reference ref_id="CVE-2024-56712" ref_url="https://www.suse.com/security/cve/CVE-2024-56712/" source="CVE"/>
		<reference ref_id="CVE-2024-56713" ref_url="https://www.suse.com/security/cve/CVE-2024-56713/" source="CVE"/>
		<reference ref_id="CVE-2024-56714" ref_url="https://www.suse.com/security/cve/CVE-2024-56714/" source="CVE"/>
		<reference ref_id="CVE-2024-56715" ref_url="https://www.suse.com/security/cve/CVE-2024-56715/" source="CVE"/>
		<reference ref_id="CVE-2024-56716" ref_url="https://www.suse.com/security/cve/CVE-2024-56716/" source="CVE"/>
		<reference ref_id="CVE-2024-56717" ref_url="https://www.suse.com/security/cve/CVE-2024-56717/" source="CVE"/>
		<reference ref_id="CVE-2024-56718" ref_url="https://www.suse.com/security/cve/CVE-2024-56718/" source="CVE"/>
		<reference ref_id="CVE-2024-56719" ref_url="https://www.suse.com/security/cve/CVE-2024-56719/" source="CVE"/>
		<reference ref_id="CVE-2024-56720" ref_url="https://www.suse.com/security/cve/CVE-2024-56720/" source="CVE"/>
		<reference ref_id="CVE-2024-56721" ref_url="https://www.suse.com/security/cve/CVE-2024-56721/" source="CVE"/>
		<reference ref_id="CVE-2024-56722" ref_url="https://www.suse.com/security/cve/CVE-2024-56722/" source="CVE"/>
		<reference ref_id="CVE-2024-56723" ref_url="https://www.suse.com/security/cve/CVE-2024-56723/" source="CVE"/>
		<reference ref_id="CVE-2024-56724" ref_url="https://www.suse.com/security/cve/CVE-2024-56724/" source="CVE"/>
		<reference ref_id="CVE-2024-56725" ref_url="https://www.suse.com/security/cve/CVE-2024-56725/" source="CVE"/>
		<reference ref_id="CVE-2024-56726" ref_url="https://www.suse.com/security/cve/CVE-2024-56726/" source="CVE"/>
		<reference ref_id="CVE-2024-56727" ref_url="https://www.suse.com/security/cve/CVE-2024-56727/" source="CVE"/>
		<reference ref_id="CVE-2024-56728" ref_url="https://www.suse.com/security/cve/CVE-2024-56728/" source="CVE"/>
		<reference ref_id="CVE-2024-56729" ref_url="https://www.suse.com/security/cve/CVE-2024-56729/" source="CVE"/>
		<reference ref_id="CVE-2024-56730" ref_url="https://www.suse.com/security/cve/CVE-2024-56730/" source="CVE"/>
		<reference ref_id="CVE-2024-56739" ref_url="https://www.suse.com/security/cve/CVE-2024-56739/" source="CVE"/>
		<reference ref_id="CVE-2024-56740" ref_url="https://www.suse.com/security/cve/CVE-2024-56740/" source="CVE"/>
		<reference ref_id="CVE-2024-56741" ref_url="https://www.suse.com/security/cve/CVE-2024-56741/" source="CVE"/>
		<reference ref_id="CVE-2024-56742" ref_url="https://www.suse.com/security/cve/CVE-2024-56742/" source="CVE"/>
		<reference ref_id="CVE-2024-56743" ref_url="https://www.suse.com/security/cve/CVE-2024-56743/" source="CVE"/>
		<reference ref_id="CVE-2024-56745" ref_url="https://www.suse.com/security/cve/CVE-2024-56745/" source="CVE"/>
		<reference ref_id="CVE-2024-56746" ref_url="https://www.suse.com/security/cve/CVE-2024-56746/" source="CVE"/>
		<reference ref_id="CVE-2024-56747" ref_url="https://www.suse.com/security/cve/CVE-2024-56747/" source="CVE"/>
		<reference ref_id="CVE-2024-56748" ref_url="https://www.suse.com/security/cve/CVE-2024-56748/" source="CVE"/>
		<reference ref_id="CVE-2024-56749" ref_url="https://www.suse.com/security/cve/CVE-2024-56749/" source="CVE"/>
		<reference ref_id="CVE-2024-56750" ref_url="https://www.suse.com/security/cve/CVE-2024-56750/" source="CVE"/>
		<reference ref_id="CVE-2024-56751" ref_url="https://www.suse.com/security/cve/CVE-2024-56751/" source="CVE"/>
		<reference ref_id="CVE-2024-56752" ref_url="https://www.suse.com/security/cve/CVE-2024-56752/" source="CVE"/>
		<reference ref_id="CVE-2024-56753" ref_url="https://www.suse.com/security/cve/CVE-2024-56753/" source="CVE"/>
		<reference ref_id="CVE-2024-56754" ref_url="https://www.suse.com/security/cve/CVE-2024-56754/" source="CVE"/>
		<reference ref_id="CVE-2024-56755" ref_url="https://www.suse.com/security/cve/CVE-2024-56755/" source="CVE"/>
		<reference ref_id="CVE-2024-56756" ref_url="https://www.suse.com/security/cve/CVE-2024-56756/" source="CVE"/>
		<reference ref_id="CVE-2024-56757" ref_url="https://www.suse.com/security/cve/CVE-2024-56757/" source="CVE"/>
		<reference ref_id="CVE-2024-56758" ref_url="https://www.suse.com/security/cve/CVE-2024-56758/" source="CVE"/>
		<reference ref_id="CVE-2024-56760" ref_url="https://www.suse.com/security/cve/CVE-2024-56760/" source="CVE"/>
		<reference ref_id="CVE-2024-56761" ref_url="https://www.suse.com/security/cve/CVE-2024-56761/" source="CVE"/>
		<reference ref_id="CVE-2024-56763" ref_url="https://www.suse.com/security/cve/CVE-2024-56763/" source="CVE"/>
		<reference ref_id="CVE-2024-56764" ref_url="https://www.suse.com/security/cve/CVE-2024-56764/" source="CVE"/>
		<reference ref_id="CVE-2024-56765" ref_url="https://www.suse.com/security/cve/CVE-2024-56765/" source="CVE"/>
		<reference ref_id="CVE-2024-56766" ref_url="https://www.suse.com/security/cve/CVE-2024-56766/" source="CVE"/>
		<reference ref_id="CVE-2024-56767" ref_url="https://www.suse.com/security/cve/CVE-2024-56767/" source="CVE"/>
		<reference ref_id="CVE-2024-56769" ref_url="https://www.suse.com/security/cve/CVE-2024-56769/" source="CVE"/>
		<reference ref_id="CVE-2024-56770" ref_url="https://www.suse.com/security/cve/CVE-2024-56770/" source="CVE"/>
		<reference ref_id="CVE-2024-56771" ref_url="https://www.suse.com/security/cve/CVE-2024-56771/" source="CVE"/>
		<reference ref_id="CVE-2024-56772" ref_url="https://www.suse.com/security/cve/CVE-2024-56772/" source="CVE"/>
		<reference ref_id="CVE-2024-56773" ref_url="https://www.suse.com/security/cve/CVE-2024-56773/" source="CVE"/>
		<reference ref_id="CVE-2024-56774" ref_url="https://www.suse.com/security/cve/CVE-2024-56774/" source="CVE"/>
		<reference ref_id="CVE-2024-56775" ref_url="https://www.suse.com/security/cve/CVE-2024-56775/" source="CVE"/>
		<reference ref_id="CVE-2024-56776" ref_url="https://www.suse.com/security/cve/CVE-2024-56776/" source="CVE"/>
		<reference ref_id="CVE-2024-56777" ref_url="https://www.suse.com/security/cve/CVE-2024-56777/" source="CVE"/>
		<reference ref_id="CVE-2024-56778" ref_url="https://www.suse.com/security/cve/CVE-2024-56778/" source="CVE"/>
		<reference ref_id="CVE-2024-56779" ref_url="https://www.suse.com/security/cve/CVE-2024-56779/" source="CVE"/>
		<reference ref_id="CVE-2024-56780" ref_url="https://www.suse.com/security/cve/CVE-2024-56780/" source="CVE"/>
		<reference ref_id="CVE-2024-56782" ref_url="https://www.suse.com/security/cve/CVE-2024-56782/" source="CVE"/>
		<reference ref_id="CVE-2024-56783" ref_url="https://www.suse.com/security/cve/CVE-2024-56783/" source="CVE"/>
		<reference ref_id="CVE-2024-56784" ref_url="https://www.suse.com/security/cve/CVE-2024-56784/" source="CVE"/>
		<reference ref_id="CVE-2024-56786" ref_url="https://www.suse.com/security/cve/CVE-2024-56786/" source="CVE"/>
		<reference ref_id="CVE-2024-56787" ref_url="https://www.suse.com/security/cve/CVE-2024-56787/" source="CVE"/>
		<reference ref_id="CVE-2024-56788" ref_url="https://www.suse.com/security/cve/CVE-2024-56788/" source="CVE"/>
		<reference ref_id="CVE-2024-57791" ref_url="https://www.suse.com/security/cve/CVE-2024-57791/" source="CVE"/>
		<reference ref_id="CVE-2024-57792" ref_url="https://www.suse.com/security/cve/CVE-2024-57792/" source="CVE"/>
		<reference ref_id="CVE-2024-57793" ref_url="https://www.suse.com/security/cve/CVE-2024-57793/" source="CVE"/>
		<reference ref_id="CVE-2024-57795" ref_url="https://www.suse.com/security/cve/CVE-2024-57795/" source="CVE"/>
		<reference ref_id="CVE-2024-57798" ref_url="https://www.suse.com/security/cve/CVE-2024-57798/" source="CVE"/>
		<reference ref_id="CVE-2024-57799" ref_url="https://www.suse.com/security/cve/CVE-2024-57799/" source="CVE"/>
		<reference ref_id="CVE-2024-57800" ref_url="https://www.suse.com/security/cve/CVE-2024-57800/" source="CVE"/>
		<reference ref_id="CVE-2024-57801" ref_url="https://www.suse.com/security/cve/CVE-2024-57801/" source="CVE"/>
		<reference ref_id="CVE-2024-57802" ref_url="https://www.suse.com/security/cve/CVE-2024-57802/" source="CVE"/>
		<reference ref_id="CVE-2024-57804" ref_url="https://www.suse.com/security/cve/CVE-2024-57804/" source="CVE"/>
		<reference ref_id="CVE-2024-57805" ref_url="https://www.suse.com/security/cve/CVE-2024-57805/" source="CVE"/>
		<reference ref_id="CVE-2024-57806" ref_url="https://www.suse.com/security/cve/CVE-2024-57806/" source="CVE"/>
		<reference ref_id="CVE-2024-57807" ref_url="https://www.suse.com/security/cve/CVE-2024-57807/" source="CVE"/>
		<reference ref_id="CVE-2024-57809" ref_url="https://www.suse.com/security/cve/CVE-2024-57809/" source="CVE"/>
		<reference ref_id="CVE-2024-57834" ref_url="https://www.suse.com/security/cve/CVE-2024-57834/" source="CVE"/>
		<reference ref_id="CVE-2024-57838" ref_url="https://www.suse.com/security/cve/CVE-2024-57838/" source="CVE"/>
		<reference ref_id="CVE-2024-57839" ref_url="https://www.suse.com/security/cve/CVE-2024-57839/" source="CVE"/>
		<reference ref_id="CVE-2024-57841" ref_url="https://www.suse.com/security/cve/CVE-2024-57841/" source="CVE"/>
		<reference ref_id="CVE-2024-57844" ref_url="https://www.suse.com/security/cve/CVE-2024-57844/" source="CVE"/>
		<reference ref_id="CVE-2024-57849" ref_url="https://www.suse.com/security/cve/CVE-2024-57849/" source="CVE"/>
		<reference ref_id="CVE-2024-57852" ref_url="https://www.suse.com/security/cve/CVE-2024-57852/" source="CVE"/>
		<reference ref_id="CVE-2024-57857" ref_url="https://www.suse.com/security/cve/CVE-2024-57857/" source="CVE"/>
		<reference ref_id="CVE-2024-57874" ref_url="https://www.suse.com/security/cve/CVE-2024-57874/" source="CVE"/>
		<reference ref_id="CVE-2024-57875" ref_url="https://www.suse.com/security/cve/CVE-2024-57875/" source="CVE"/>
		<reference ref_id="CVE-2024-57876" ref_url="https://www.suse.com/security/cve/CVE-2024-57876/" source="CVE"/>
		<reference ref_id="CVE-2024-57877" ref_url="https://www.suse.com/security/cve/CVE-2024-57877/" source="CVE"/>
		<reference ref_id="CVE-2024-57878" ref_url="https://www.suse.com/security/cve/CVE-2024-57878/" source="CVE"/>
		<reference ref_id="CVE-2024-57879" ref_url="https://www.suse.com/security/cve/CVE-2024-57879/" source="CVE"/>
		<reference ref_id="CVE-2024-57880" ref_url="https://www.suse.com/security/cve/CVE-2024-57880/" source="CVE"/>
		<reference ref_id="CVE-2024-57881" ref_url="https://www.suse.com/security/cve/CVE-2024-57881/" source="CVE"/>
		<reference ref_id="CVE-2024-57882" ref_url="https://www.suse.com/security/cve/CVE-2024-57882/" source="CVE"/>
		<reference ref_id="CVE-2024-57883" ref_url="https://www.suse.com/security/cve/CVE-2024-57883/" source="CVE"/>
		<reference ref_id="CVE-2024-57884" ref_url="https://www.suse.com/security/cve/CVE-2024-57884/" source="CVE"/>
		<reference ref_id="CVE-2024-57887" ref_url="https://www.suse.com/security/cve/CVE-2024-57887/" source="CVE"/>
		<reference ref_id="CVE-2024-57888" ref_url="https://www.suse.com/security/cve/CVE-2024-57888/" source="CVE"/>
		<reference ref_id="CVE-2024-57889" ref_url="https://www.suse.com/security/cve/CVE-2024-57889/" source="CVE"/>
		<reference ref_id="CVE-2024-57890" ref_url="https://www.suse.com/security/cve/CVE-2024-57890/" source="CVE"/>
		<reference ref_id="CVE-2024-57892" ref_url="https://www.suse.com/security/cve/CVE-2024-57892/" source="CVE"/>
		<reference ref_id="CVE-2024-57893" ref_url="https://www.suse.com/security/cve/CVE-2024-57893/" source="CVE"/>
		<reference ref_id="CVE-2024-57896" ref_url="https://www.suse.com/security/cve/CVE-2024-57896/" source="CVE"/>
		<reference ref_id="CVE-2024-57897" ref_url="https://www.suse.com/security/cve/CVE-2024-57897/" source="CVE"/>
		<reference ref_id="CVE-2024-57898" ref_url="https://www.suse.com/security/cve/CVE-2024-57898/" source="CVE"/>
		<reference ref_id="CVE-2024-57899" ref_url="https://www.suse.com/security/cve/CVE-2024-57899/" source="CVE"/>
		<reference ref_id="CVE-2024-57900" ref_url="https://www.suse.com/security/cve/CVE-2024-57900/" source="CVE"/>
		<reference ref_id="CVE-2024-57901" ref_url="https://www.suse.com/security/cve/CVE-2024-57901/" source="CVE"/>
		<reference ref_id="CVE-2024-57902" ref_url="https://www.suse.com/security/cve/CVE-2024-57902/" source="CVE"/>
		<reference ref_id="CVE-2024-57903" ref_url="https://www.suse.com/security/cve/CVE-2024-57903/" source="CVE"/>
		<reference ref_id="CVE-2024-57904" ref_url="https://www.suse.com/security/cve/CVE-2024-57904/" source="CVE"/>
		<reference ref_id="CVE-2024-57905" ref_url="https://www.suse.com/security/cve/CVE-2024-57905/" source="CVE"/>
		<reference ref_id="CVE-2024-57906" ref_url="https://www.suse.com/security/cve/CVE-2024-57906/" source="CVE"/>
		<reference ref_id="CVE-2024-57907" ref_url="https://www.suse.com/security/cve/CVE-2024-57907/" source="CVE"/>
		<reference ref_id="CVE-2024-57908" ref_url="https://www.suse.com/security/cve/CVE-2024-57908/" source="CVE"/>
		<reference ref_id="CVE-2024-57909" ref_url="https://www.suse.com/security/cve/CVE-2024-57909/" source="CVE"/>
		<reference ref_id="CVE-2024-57910" ref_url="https://www.suse.com/security/cve/CVE-2024-57910/" source="CVE"/>
		<reference ref_id="CVE-2024-57911" ref_url="https://www.suse.com/security/cve/CVE-2024-57911/" source="CVE"/>
		<reference ref_id="CVE-2024-57912" ref_url="https://www.suse.com/security/cve/CVE-2024-57912/" source="CVE"/>
		<reference ref_id="CVE-2024-57913" ref_url="https://www.suse.com/security/cve/CVE-2024-57913/" source="CVE"/>
		<reference ref_id="CVE-2024-57914" ref_url="https://www.suse.com/security/cve/CVE-2024-57914/" source="CVE"/>
		<reference ref_id="CVE-2024-57915" ref_url="https://www.suse.com/security/cve/CVE-2024-57915/" source="CVE"/>
		<reference ref_id="CVE-2024-57916" ref_url="https://www.suse.com/security/cve/CVE-2024-57916/" source="CVE"/>
		<reference ref_id="CVE-2024-57917" ref_url="https://www.suse.com/security/cve/CVE-2024-57917/" source="CVE"/>
		<reference ref_id="CVE-2024-57918" ref_url="https://www.suse.com/security/cve/CVE-2024-57918/" source="CVE"/>
		<reference ref_id="CVE-2024-57919" ref_url="https://www.suse.com/security/cve/CVE-2024-57919/" source="CVE"/>
		<reference ref_id="CVE-2024-57920" ref_url="https://www.suse.com/security/cve/CVE-2024-57920/" source="CVE"/>
		<reference ref_id="CVE-2024-57921" ref_url="https://www.suse.com/security/cve/CVE-2024-57921/" source="CVE"/>
		<reference ref_id="CVE-2024-57922" ref_url="https://www.suse.com/security/cve/CVE-2024-57922/" source="CVE"/>
		<reference ref_id="CVE-2024-57923" ref_url="https://www.suse.com/security/cve/CVE-2024-57923/" source="CVE"/>
		<reference ref_id="CVE-2024-57924" ref_url="https://www.suse.com/security/cve/CVE-2024-57924/" source="CVE"/>
		<reference ref_id="CVE-2024-57926" ref_url="https://www.suse.com/security/cve/CVE-2024-57926/" source="CVE"/>
		<reference ref_id="CVE-2024-57927" ref_url="https://www.suse.com/security/cve/CVE-2024-57927/" source="CVE"/>
		<reference ref_id="CVE-2024-57928" ref_url="https://www.suse.com/security/cve/CVE-2024-57928/" source="CVE"/>
		<reference ref_id="CVE-2024-57929" ref_url="https://www.suse.com/security/cve/CVE-2024-57929/" source="CVE"/>
		<reference ref_id="CVE-2024-57930" ref_url="https://www.suse.com/security/cve/CVE-2024-57930/" source="CVE"/>
		<reference ref_id="CVE-2024-57931" ref_url="https://www.suse.com/security/cve/CVE-2024-57931/" source="CVE"/>
		<reference ref_id="CVE-2024-57932" ref_url="https://www.suse.com/security/cve/CVE-2024-57932/" source="CVE"/>
		<reference ref_id="CVE-2024-57933" ref_url="https://www.suse.com/security/cve/CVE-2024-57933/" source="CVE"/>
		<reference ref_id="CVE-2024-57934" ref_url="https://www.suse.com/security/cve/CVE-2024-57934/" source="CVE"/>
		<reference ref_id="CVE-2024-57935" ref_url="https://www.suse.com/security/cve/CVE-2024-57935/" source="CVE"/>
		<reference ref_id="CVE-2024-57936" ref_url="https://www.suse.com/security/cve/CVE-2024-57936/" source="CVE"/>
		<reference ref_id="CVE-2024-57938" ref_url="https://www.suse.com/security/cve/CVE-2024-57938/" source="CVE"/>
		<reference ref_id="CVE-2024-57940" ref_url="https://www.suse.com/security/cve/CVE-2024-57940/" source="CVE"/>
		<reference ref_id="CVE-2024-57941" ref_url="https://www.suse.com/security/cve/CVE-2024-57941/" source="CVE"/>
		<reference ref_id="CVE-2024-57942" ref_url="https://www.suse.com/security/cve/CVE-2024-57942/" source="CVE"/>
		<reference ref_id="CVE-2024-57943" ref_url="https://www.suse.com/security/cve/CVE-2024-57943/" source="CVE"/>
		<reference ref_id="CVE-2024-57944" ref_url="https://www.suse.com/security/cve/CVE-2024-57944/" source="CVE"/>
		<reference ref_id="CVE-2024-57946" ref_url="https://www.suse.com/security/cve/CVE-2024-57946/" source="CVE"/>
		<reference ref_id="CVE-2024-57948" ref_url="https://www.suse.com/security/cve/CVE-2024-57948/" source="CVE"/>
		<reference ref_id="CVE-2024-57949" ref_url="https://www.suse.com/security/cve/CVE-2024-57949/" source="CVE"/>
		<reference ref_id="CVE-2024-57950" ref_url="https://www.suse.com/security/cve/CVE-2024-57950/" source="CVE"/>
		<reference ref_id="CVE-2024-57953" ref_url="https://www.suse.com/security/cve/CVE-2024-57953/" source="CVE"/>
		<reference ref_id="CVE-2024-57973" ref_url="https://www.suse.com/security/cve/CVE-2024-57973/" source="CVE"/>
		<reference ref_id="CVE-2024-57974" ref_url="https://www.suse.com/security/cve/CVE-2024-57974/" source="CVE"/>
		<reference ref_id="CVE-2024-57975" ref_url="https://www.suse.com/security/cve/CVE-2024-57975/" source="CVE"/>
		<reference ref_id="CVE-2024-57976" ref_url="https://www.suse.com/security/cve/CVE-2024-57976/" source="CVE"/>
		<reference ref_id="CVE-2024-57978" ref_url="https://www.suse.com/security/cve/CVE-2024-57978/" source="CVE"/>
		<reference ref_id="CVE-2024-57979" ref_url="https://www.suse.com/security/cve/CVE-2024-57979/" source="CVE"/>
		<reference ref_id="CVE-2024-57980" ref_url="https://www.suse.com/security/cve/CVE-2024-57980/" source="CVE"/>
		<reference ref_id="CVE-2024-57981" ref_url="https://www.suse.com/security/cve/CVE-2024-57981/" source="CVE"/>
		<reference ref_id="CVE-2024-57982" ref_url="https://www.suse.com/security/cve/CVE-2024-57982/" source="CVE"/>
		<reference ref_id="CVE-2024-57984" ref_url="https://www.suse.com/security/cve/CVE-2024-57984/" source="CVE"/>
		<reference ref_id="CVE-2024-57985" ref_url="https://www.suse.com/security/cve/CVE-2024-57985/" source="CVE"/>
		<reference ref_id="CVE-2024-57986" ref_url="https://www.suse.com/security/cve/CVE-2024-57986/" source="CVE"/>
		<reference ref_id="CVE-2024-57987" ref_url="https://www.suse.com/security/cve/CVE-2024-57987/" source="CVE"/>
		<reference ref_id="CVE-2024-57988" ref_url="https://www.suse.com/security/cve/CVE-2024-57988/" source="CVE"/>
		<reference ref_id="CVE-2024-57989" ref_url="https://www.suse.com/security/cve/CVE-2024-57989/" source="CVE"/>
		<reference ref_id="CVE-2024-57990" ref_url="https://www.suse.com/security/cve/CVE-2024-57990/" source="CVE"/>
		<reference ref_id="CVE-2024-57991" ref_url="https://www.suse.com/security/cve/CVE-2024-57991/" source="CVE"/>
		<reference ref_id="CVE-2024-57993" ref_url="https://www.suse.com/security/cve/CVE-2024-57993/" source="CVE"/>
		<reference ref_id="CVE-2024-57994" ref_url="https://www.suse.com/security/cve/CVE-2024-57994/" source="CVE"/>
		<reference ref_id="CVE-2024-57995" ref_url="https://www.suse.com/security/cve/CVE-2024-57995/" source="CVE"/>
		<reference ref_id="CVE-2024-57996" ref_url="https://www.suse.com/security/cve/CVE-2024-57996/" source="CVE"/>
		<reference ref_id="CVE-2024-57997" ref_url="https://www.suse.com/security/cve/CVE-2024-57997/" source="CVE"/>
		<reference ref_id="CVE-2024-57998" ref_url="https://www.suse.com/security/cve/CVE-2024-57998/" source="CVE"/>
		<reference ref_id="CVE-2024-57999" ref_url="https://www.suse.com/security/cve/CVE-2024-57999/" source="CVE"/>
		<reference ref_id="CVE-2024-58001" ref_url="https://www.suse.com/security/cve/CVE-2024-58001/" source="CVE"/>
		<reference ref_id="CVE-2024-58002" ref_url="https://www.suse.com/security/cve/CVE-2024-58002/" source="CVE"/>
		<reference ref_id="CVE-2024-58003" ref_url="https://www.suse.com/security/cve/CVE-2024-58003/" source="CVE"/>
		<reference ref_id="CVE-2024-58004" ref_url="https://www.suse.com/security/cve/CVE-2024-58004/" source="CVE"/>
		<reference ref_id="CVE-2024-58005" ref_url="https://www.suse.com/security/cve/CVE-2024-58005/" source="CVE"/>
		<reference ref_id="CVE-2024-58006" ref_url="https://www.suse.com/security/cve/CVE-2024-58006/" source="CVE"/>
		<reference ref_id="CVE-2024-58007" ref_url="https://www.suse.com/security/cve/CVE-2024-58007/" source="CVE"/>
		<reference ref_id="CVE-2024-58008" ref_url="https://www.suse.com/security/cve/CVE-2024-58008/" source="CVE"/>
		<reference ref_id="CVE-2024-58009" ref_url="https://www.suse.com/security/cve/CVE-2024-58009/" source="CVE"/>
		<reference ref_id="CVE-2024-58011" ref_url="https://www.suse.com/security/cve/CVE-2024-58011/" source="CVE"/>
		<reference ref_id="CVE-2024-58012" ref_url="https://www.suse.com/security/cve/CVE-2024-58012/" source="CVE"/>
		<reference ref_id="CVE-2024-58013" ref_url="https://www.suse.com/security/cve/CVE-2024-58013/" source="CVE"/>
		<reference ref_id="CVE-2024-58014" ref_url="https://www.suse.com/security/cve/CVE-2024-58014/" source="CVE"/>
		<reference ref_id="CVE-2024-58015" ref_url="https://www.suse.com/security/cve/CVE-2024-58015/" source="CVE"/>
		<reference ref_id="CVE-2024-58017" ref_url="https://www.suse.com/security/cve/CVE-2024-58017/" source="CVE"/>
		<reference ref_id="CVE-2024-58018" ref_url="https://www.suse.com/security/cve/CVE-2024-58018/" source="CVE"/>
		<reference ref_id="CVE-2024-58019" ref_url="https://www.suse.com/security/cve/CVE-2024-58019/" source="CVE"/>
		<reference ref_id="CVE-2024-58020" ref_url="https://www.suse.com/security/cve/CVE-2024-58020/" source="CVE"/>
		<reference ref_id="CVE-2024-58021" ref_url="https://www.suse.com/security/cve/CVE-2024-58021/" source="CVE"/>
		<reference ref_id="CVE-2024-58034" ref_url="https://www.suse.com/security/cve/CVE-2024-58034/" source="CVE"/>
		<reference ref_id="CVE-2024-58042" ref_url="https://www.suse.com/security/cve/CVE-2024-58042/" source="CVE"/>
		<reference ref_id="CVE-2024-58051" ref_url="https://www.suse.com/security/cve/CVE-2024-58051/" source="CVE"/>
		<reference ref_id="CVE-2024-58052" ref_url="https://www.suse.com/security/cve/CVE-2024-58052/" source="CVE"/>
		<reference ref_id="CVE-2024-58053" ref_url="https://www.suse.com/security/cve/CVE-2024-58053/" source="CVE"/>
		<reference ref_id="CVE-2024-58054" ref_url="https://www.suse.com/security/cve/CVE-2024-58054/" source="CVE"/>
		<reference ref_id="CVE-2024-58055" ref_url="https://www.suse.com/security/cve/CVE-2024-58055/" source="CVE"/>
		<reference ref_id="CVE-2024-58056" ref_url="https://www.suse.com/security/cve/CVE-2024-58056/" source="CVE"/>
		<reference ref_id="CVE-2024-58057" ref_url="https://www.suse.com/security/cve/CVE-2024-58057/" source="CVE"/>
		<reference ref_id="CVE-2024-58059" ref_url="https://www.suse.com/security/cve/CVE-2024-58059/" source="CVE"/>
		<reference ref_id="CVE-2024-58060" ref_url="https://www.suse.com/security/cve/CVE-2024-58060/" source="CVE"/>
		<reference ref_id="CVE-2024-58061" ref_url="https://www.suse.com/security/cve/CVE-2024-58061/" source="CVE"/>
		<reference ref_id="CVE-2024-58062" ref_url="https://www.suse.com/security/cve/CVE-2024-58062/" source="CVE"/>
		<reference ref_id="CVE-2024-58063" ref_url="https://www.suse.com/security/cve/CVE-2024-58063/" source="CVE"/>
		<reference ref_id="CVE-2024-58064" ref_url="https://www.suse.com/security/cve/CVE-2024-58064/" source="CVE"/>
		<reference ref_id="CVE-2024-58068" ref_url="https://www.suse.com/security/cve/CVE-2024-58068/" source="CVE"/>
		<reference ref_id="CVE-2024-58069" ref_url="https://www.suse.com/security/cve/CVE-2024-58069/" source="CVE"/>
		<reference ref_id="CVE-2024-58070" ref_url="https://www.suse.com/security/cve/CVE-2024-58070/" source="CVE"/>
		<reference ref_id="CVE-2024-58071" ref_url="https://www.suse.com/security/cve/CVE-2024-58071/" source="CVE"/>
		<reference ref_id="CVE-2024-58072" ref_url="https://www.suse.com/security/cve/CVE-2024-58072/" source="CVE"/>
		<reference ref_id="CVE-2024-58074" ref_url="https://www.suse.com/security/cve/CVE-2024-58074/" source="CVE"/>
		<reference ref_id="CVE-2024-58075" ref_url="https://www.suse.com/security/cve/CVE-2024-58075/" source="CVE"/>
		<reference ref_id="CVE-2024-58076" ref_url="https://www.suse.com/security/cve/CVE-2024-58076/" source="CVE"/>
		<reference ref_id="CVE-2024-58077" ref_url="https://www.suse.com/security/cve/CVE-2024-58077/" source="CVE"/>
		<reference ref_id="CVE-2024-58078" ref_url="https://www.suse.com/security/cve/CVE-2024-58078/" source="CVE"/>
		<reference ref_id="CVE-2024-58079" ref_url="https://www.suse.com/security/cve/CVE-2024-58079/" source="CVE"/>
		<reference ref_id="CVE-2024-58080" ref_url="https://www.suse.com/security/cve/CVE-2024-58080/" source="CVE"/>
		<reference ref_id="CVE-2024-58081" ref_url="https://www.suse.com/security/cve/CVE-2024-58081/" source="CVE"/>
		<reference ref_id="CVE-2024-58082" ref_url="https://www.suse.com/security/cve/CVE-2024-58082/" source="CVE"/>
		<reference ref_id="CVE-2024-58083" ref_url="https://www.suse.com/security/cve/CVE-2024-58083/" source="CVE"/>
		<reference ref_id="CVE-2024-58084" ref_url="https://www.suse.com/security/cve/CVE-2024-58084/" source="CVE"/>
		<reference ref_id="CVE-2024-58086" ref_url="https://www.suse.com/security/cve/CVE-2024-58086/" source="CVE"/>
		<reference ref_id="CVE-2024-58088" ref_url="https://www.suse.com/security/cve/CVE-2024-58088/" source="CVE"/>
		<reference ref_id="CVE-2024-58089" ref_url="https://www.suse.com/security/cve/CVE-2024-58089/" source="CVE"/>
		<reference ref_id="CVE-2024-58091" ref_url="https://www.suse.com/security/cve/CVE-2024-58091/" source="CVE"/>
		<reference ref_id="CVE-2024-58092" ref_url="https://www.suse.com/security/cve/CVE-2024-58092/" source="CVE"/>
		<reference ref_id="CVE-2024-58093" ref_url="https://www.suse.com/security/cve/CVE-2024-58093/" source="CVE"/>
		<reference ref_id="CVE-2024-58096" ref_url="https://www.suse.com/security/cve/CVE-2024-58096/" source="CVE"/>
		<reference ref_id="CVE-2024-58097" ref_url="https://www.suse.com/security/cve/CVE-2024-58097/" source="CVE"/>
		<reference ref_id="CVE-2024-58098" ref_url="https://www.suse.com/security/cve/CVE-2024-58098/" source="CVE"/>
		<reference ref_id="CVE-2024-58100" ref_url="https://www.suse.com/security/cve/CVE-2024-58100/" source="CVE"/>
		<reference ref_id="CVE-2024-58237" ref_url="https://www.suse.com/security/cve/CVE-2024-58237/" source="CVE"/>
		<reference ref_id="CVE-2025-21629" ref_url="https://www.suse.com/security/cve/CVE-2025-21629/" source="CVE"/>
		<reference ref_id="CVE-2025-21631" ref_url="https://www.suse.com/security/cve/CVE-2025-21631/" source="CVE"/>
		<reference ref_id="CVE-2025-21632" ref_url="https://www.suse.com/security/cve/CVE-2025-21632/" source="CVE"/>
		<reference ref_id="CVE-2025-21633" ref_url="https://www.suse.com/security/cve/CVE-2025-21633/" source="CVE"/>
		<reference ref_id="CVE-2025-21634" ref_url="https://www.suse.com/security/cve/CVE-2025-21634/" source="CVE"/>
		<reference ref_id="CVE-2025-21635" ref_url="https://www.suse.com/security/cve/CVE-2025-21635/" source="CVE"/>
		<reference ref_id="CVE-2025-21636" ref_url="https://www.suse.com/security/cve/CVE-2025-21636/" source="CVE"/>
		<reference ref_id="CVE-2025-21637" ref_url="https://www.suse.com/security/cve/CVE-2025-21637/" source="CVE"/>
		<reference ref_id="CVE-2025-21638" ref_url="https://www.suse.com/security/cve/CVE-2025-21638/" source="CVE"/>
		<reference ref_id="CVE-2025-21639" ref_url="https://www.suse.com/security/cve/CVE-2025-21639/" source="CVE"/>
		<reference ref_id="CVE-2025-21640" ref_url="https://www.suse.com/security/cve/CVE-2025-21640/" source="CVE"/>
		<reference ref_id="CVE-2025-21641" ref_url="https://www.suse.com/security/cve/CVE-2025-21641/" source="CVE"/>
		<reference ref_id="CVE-2025-21642" ref_url="https://www.suse.com/security/cve/CVE-2025-21642/" source="CVE"/>
		<reference ref_id="CVE-2025-21643" ref_url="https://www.suse.com/security/cve/CVE-2025-21643/" source="CVE"/>
		<reference ref_id="CVE-2025-21644" ref_url="https://www.suse.com/security/cve/CVE-2025-21644/" source="CVE"/>
		<reference ref_id="CVE-2025-21645" ref_url="https://www.suse.com/security/cve/CVE-2025-21645/" source="CVE"/>
		<reference ref_id="CVE-2025-21647" ref_url="https://www.suse.com/security/cve/CVE-2025-21647/" source="CVE"/>
		<reference ref_id="CVE-2025-21648" ref_url="https://www.suse.com/security/cve/CVE-2025-21648/" source="CVE"/>
		<reference ref_id="CVE-2025-21649" ref_url="https://www.suse.com/security/cve/CVE-2025-21649/" source="CVE"/>
		<reference ref_id="CVE-2025-21650" ref_url="https://www.suse.com/security/cve/CVE-2025-21650/" source="CVE"/>
		<reference ref_id="CVE-2025-21651" ref_url="https://www.suse.com/security/cve/CVE-2025-21651/" source="CVE"/>
		<reference ref_id="CVE-2025-21652" ref_url="https://www.suse.com/security/cve/CVE-2025-21652/" source="CVE"/>
		<reference ref_id="CVE-2025-21653" ref_url="https://www.suse.com/security/cve/CVE-2025-21653/" source="CVE"/>
		<reference ref_id="CVE-2025-21654" ref_url="https://www.suse.com/security/cve/CVE-2025-21654/" source="CVE"/>
		<reference ref_id="CVE-2025-21655" ref_url="https://www.suse.com/security/cve/CVE-2025-21655/" source="CVE"/>
		<reference ref_id="CVE-2025-21656" ref_url="https://www.suse.com/security/cve/CVE-2025-21656/" source="CVE"/>
		<reference ref_id="CVE-2025-21658" ref_url="https://www.suse.com/security/cve/CVE-2025-21658/" source="CVE"/>
		<reference ref_id="CVE-2025-21659" ref_url="https://www.suse.com/security/cve/CVE-2025-21659/" source="CVE"/>
		<reference ref_id="CVE-2025-21661" ref_url="https://www.suse.com/security/cve/CVE-2025-21661/" source="CVE"/>
		<reference ref_id="CVE-2025-21662" ref_url="https://www.suse.com/security/cve/CVE-2025-21662/" source="CVE"/>
		<reference ref_id="CVE-2025-21663" ref_url="https://www.suse.com/security/cve/CVE-2025-21663/" source="CVE"/>
		<reference ref_id="CVE-2025-21664" ref_url="https://www.suse.com/security/cve/CVE-2025-21664/" source="CVE"/>
		<reference ref_id="CVE-2025-21666" ref_url="https://www.suse.com/security/cve/CVE-2025-21666/" source="CVE"/>
		<reference ref_id="CVE-2025-21667" ref_url="https://www.suse.com/security/cve/CVE-2025-21667/" source="CVE"/>
		<reference ref_id="CVE-2025-21668" ref_url="https://www.suse.com/security/cve/CVE-2025-21668/" source="CVE"/>
		<reference ref_id="CVE-2025-21669" ref_url="https://www.suse.com/security/cve/CVE-2025-21669/" source="CVE"/>
		<reference ref_id="CVE-2025-21670" ref_url="https://www.suse.com/security/cve/CVE-2025-21670/" source="CVE"/>
		<reference ref_id="CVE-2025-21671" ref_url="https://www.suse.com/security/cve/CVE-2025-21671/" source="CVE"/>
		<reference ref_id="CVE-2025-21673" ref_url="https://www.suse.com/security/cve/CVE-2025-21673/" source="CVE"/>
		<reference ref_id="CVE-2025-21674" ref_url="https://www.suse.com/security/cve/CVE-2025-21674/" source="CVE"/>
		<reference ref_id="CVE-2025-21675" ref_url="https://www.suse.com/security/cve/CVE-2025-21675/" source="CVE"/>
		<reference ref_id="CVE-2025-21676" ref_url="https://www.suse.com/security/cve/CVE-2025-21676/" source="CVE"/>
		<reference ref_id="CVE-2025-21677" ref_url="https://www.suse.com/security/cve/CVE-2025-21677/" source="CVE"/>
		<reference ref_id="CVE-2025-21678" ref_url="https://www.suse.com/security/cve/CVE-2025-21678/" source="CVE"/>
		<reference ref_id="CVE-2025-21680" ref_url="https://www.suse.com/security/cve/CVE-2025-21680/" source="CVE"/>
		<reference ref_id="CVE-2025-21681" ref_url="https://www.suse.com/security/cve/CVE-2025-21681/" source="CVE"/>
		<reference ref_id="CVE-2025-21682" ref_url="https://www.suse.com/security/cve/CVE-2025-21682/" source="CVE"/>
		<reference ref_id="CVE-2025-21683" ref_url="https://www.suse.com/security/cve/CVE-2025-21683/" source="CVE"/>
		<reference ref_id="CVE-2025-21684" ref_url="https://www.suse.com/security/cve/CVE-2025-21684/" source="CVE"/>
		<reference ref_id="CVE-2025-21685" ref_url="https://www.suse.com/security/cve/CVE-2025-21685/" source="CVE"/>
		<reference ref_id="CVE-2025-21686" ref_url="https://www.suse.com/security/cve/CVE-2025-21686/" source="CVE"/>
		<reference ref_id="CVE-2025-21687" ref_url="https://www.suse.com/security/cve/CVE-2025-21687/" source="CVE"/>
		<reference ref_id="CVE-2025-21688" ref_url="https://www.suse.com/security/cve/CVE-2025-21688/" source="CVE"/>
		<reference ref_id="CVE-2025-21689" ref_url="https://www.suse.com/security/cve/CVE-2025-21689/" source="CVE"/>
		<reference ref_id="CVE-2025-21690" ref_url="https://www.suse.com/security/cve/CVE-2025-21690/" source="CVE"/>
		<reference ref_id="CVE-2025-21691" ref_url="https://www.suse.com/security/cve/CVE-2025-21691/" source="CVE"/>
		<reference ref_id="CVE-2025-21692" ref_url="https://www.suse.com/security/cve/CVE-2025-21692/" source="CVE"/>
		<reference ref_id="CVE-2025-21693" ref_url="https://www.suse.com/security/cve/CVE-2025-21693/" source="CVE"/>
		<reference ref_id="CVE-2025-21695" ref_url="https://www.suse.com/security/cve/CVE-2025-21695/" source="CVE"/>
		<reference ref_id="CVE-2025-21696" ref_url="https://www.suse.com/security/cve/CVE-2025-21696/" source="CVE"/>
		<reference ref_id="CVE-2025-21697" ref_url="https://www.suse.com/security/cve/CVE-2025-21697/" source="CVE"/>
		<reference ref_id="CVE-2025-21699" ref_url="https://www.suse.com/security/cve/CVE-2025-21699/" source="CVE"/>
		<reference ref_id="CVE-2025-21700" ref_url="https://www.suse.com/security/cve/CVE-2025-21700/" source="CVE"/>
		<reference ref_id="CVE-2025-21701" ref_url="https://www.suse.com/security/cve/CVE-2025-21701/" source="CVE"/>
		<reference ref_id="CVE-2025-21702" ref_url="https://www.suse.com/security/cve/CVE-2025-21702/" source="CVE"/>
		<reference ref_id="CVE-2025-21703" ref_url="https://www.suse.com/security/cve/CVE-2025-21703/" source="CVE"/>
		<reference ref_id="CVE-2025-21704" ref_url="https://www.suse.com/security/cve/CVE-2025-21704/" source="CVE"/>
		<reference ref_id="CVE-2025-21705" ref_url="https://www.suse.com/security/cve/CVE-2025-21705/" source="CVE"/>
		<reference ref_id="CVE-2025-21706" ref_url="https://www.suse.com/security/cve/CVE-2025-21706/" source="CVE"/>
		<reference ref_id="CVE-2025-21707" ref_url="https://www.suse.com/security/cve/CVE-2025-21707/" source="CVE"/>
		<reference ref_id="CVE-2025-21708" ref_url="https://www.suse.com/security/cve/CVE-2025-21708/" source="CVE"/>
		<reference ref_id="CVE-2025-21709" ref_url="https://www.suse.com/security/cve/CVE-2025-21709/" source="CVE"/>
		<reference ref_id="CVE-2025-21710" ref_url="https://www.suse.com/security/cve/CVE-2025-21710/" source="CVE"/>
		<reference ref_id="CVE-2025-21711" ref_url="https://www.suse.com/security/cve/CVE-2025-21711/" source="CVE"/>
		<reference ref_id="CVE-2025-21712" ref_url="https://www.suse.com/security/cve/CVE-2025-21712/" source="CVE"/>
		<reference ref_id="CVE-2025-21713" ref_url="https://www.suse.com/security/cve/CVE-2025-21713/" source="CVE"/>
		<reference ref_id="CVE-2025-21714" ref_url="https://www.suse.com/security/cve/CVE-2025-21714/" source="CVE"/>
		<reference ref_id="CVE-2025-21715" ref_url="https://www.suse.com/security/cve/CVE-2025-21715/" source="CVE"/>
		<reference ref_id="CVE-2025-21716" ref_url="https://www.suse.com/security/cve/CVE-2025-21716/" source="CVE"/>
		<reference ref_id="CVE-2025-21717" ref_url="https://www.suse.com/security/cve/CVE-2025-21717/" source="CVE"/>
		<reference ref_id="CVE-2025-21718" ref_url="https://www.suse.com/security/cve/CVE-2025-21718/" source="CVE"/>
		<reference ref_id="CVE-2025-21719" ref_url="https://www.suse.com/security/cve/CVE-2025-21719/" source="CVE"/>
		<reference ref_id="CVE-2025-21720" ref_url="https://www.suse.com/security/cve/CVE-2025-21720/" source="CVE"/>
		<reference ref_id="CVE-2025-21723" ref_url="https://www.suse.com/security/cve/CVE-2025-21723/" source="CVE"/>
		<reference ref_id="CVE-2025-21724" ref_url="https://www.suse.com/security/cve/CVE-2025-21724/" source="CVE"/>
		<reference ref_id="CVE-2025-21725" ref_url="https://www.suse.com/security/cve/CVE-2025-21725/" source="CVE"/>
		<reference ref_id="CVE-2025-21726" ref_url="https://www.suse.com/security/cve/CVE-2025-21726/" source="CVE"/>
		<reference ref_id="CVE-2025-21727" ref_url="https://www.suse.com/security/cve/CVE-2025-21727/" source="CVE"/>
		<reference ref_id="CVE-2025-21728" ref_url="https://www.suse.com/security/cve/CVE-2025-21728/" source="CVE"/>
		<reference ref_id="CVE-2025-21729" ref_url="https://www.suse.com/security/cve/CVE-2025-21729/" source="CVE"/>
		<reference ref_id="CVE-2025-21730" ref_url="https://www.suse.com/security/cve/CVE-2025-21730/" source="CVE"/>
		<reference ref_id="CVE-2025-21731" ref_url="https://www.suse.com/security/cve/CVE-2025-21731/" source="CVE"/>
		<reference ref_id="CVE-2025-21732" ref_url="https://www.suse.com/security/cve/CVE-2025-21732/" source="CVE"/>
		<reference ref_id="CVE-2025-21733" ref_url="https://www.suse.com/security/cve/CVE-2025-21733/" source="CVE"/>
		<reference ref_id="CVE-2025-21734" ref_url="https://www.suse.com/security/cve/CVE-2025-21734/" source="CVE"/>
		<reference ref_id="CVE-2025-21735" ref_url="https://www.suse.com/security/cve/CVE-2025-21735/" source="CVE"/>
		<reference ref_id="CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738/" source="CVE"/>
		<reference ref_id="CVE-2025-21739" ref_url="https://www.suse.com/security/cve/CVE-2025-21739/" source="CVE"/>
		<reference ref_id="CVE-2025-21741" ref_url="https://www.suse.com/security/cve/CVE-2025-21741/" source="CVE"/>
		<reference ref_id="CVE-2025-21742" ref_url="https://www.suse.com/security/cve/CVE-2025-21742/" source="CVE"/>
		<reference ref_id="CVE-2025-21743" ref_url="https://www.suse.com/security/cve/CVE-2025-21743/" source="CVE"/>
		<reference ref_id="CVE-2025-21744" ref_url="https://www.suse.com/security/cve/CVE-2025-21744/" source="CVE"/>
		<reference ref_id="CVE-2025-21745" ref_url="https://www.suse.com/security/cve/CVE-2025-21745/" source="CVE"/>
		<reference ref_id="CVE-2025-21746" ref_url="https://www.suse.com/security/cve/CVE-2025-21746/" source="CVE"/>
		<reference ref_id="CVE-2025-21749" ref_url="https://www.suse.com/security/cve/CVE-2025-21749/" source="CVE"/>
		<reference ref_id="CVE-2025-21750" ref_url="https://www.suse.com/security/cve/CVE-2025-21750/" source="CVE"/>
		<reference ref_id="CVE-2025-21751" ref_url="https://www.suse.com/security/cve/CVE-2025-21751/" source="CVE"/>
		<reference ref_id="CVE-2025-21753" ref_url="https://www.suse.com/security/cve/CVE-2025-21753/" source="CVE"/>
		<reference ref_id="CVE-2025-21754" ref_url="https://www.suse.com/security/cve/CVE-2025-21754/" source="CVE"/>
		<reference ref_id="CVE-2025-21755" ref_url="https://www.suse.com/security/cve/CVE-2025-21755/" source="CVE"/>
		<reference ref_id="CVE-2025-21756" ref_url="https://www.suse.com/security/cve/CVE-2025-21756/" source="CVE"/>
		<reference ref_id="CVE-2025-21758" ref_url="https://www.suse.com/security/cve/CVE-2025-21758/" source="CVE"/>
		<reference ref_id="CVE-2025-21759" ref_url="https://www.suse.com/security/cve/CVE-2025-21759/" source="CVE"/>
		<reference ref_id="CVE-2025-21760" ref_url="https://www.suse.com/security/cve/CVE-2025-21760/" source="CVE"/>
		<reference ref_id="CVE-2025-21761" ref_url="https://www.suse.com/security/cve/CVE-2025-21761/" source="CVE"/>
		<reference ref_id="CVE-2025-21762" ref_url="https://www.suse.com/security/cve/CVE-2025-21762/" source="CVE"/>
		<reference ref_id="CVE-2025-21763" ref_url="https://www.suse.com/security/cve/CVE-2025-21763/" source="CVE"/>
		<reference ref_id="CVE-2025-21764" ref_url="https://www.suse.com/security/cve/CVE-2025-21764/" source="CVE"/>
		<reference ref_id="CVE-2025-21765" ref_url="https://www.suse.com/security/cve/CVE-2025-21765/" source="CVE"/>
		<reference ref_id="CVE-2025-21766" ref_url="https://www.suse.com/security/cve/CVE-2025-21766/" source="CVE"/>
		<reference ref_id="CVE-2025-21767" ref_url="https://www.suse.com/security/cve/CVE-2025-21767/" source="CVE"/>
		<reference ref_id="CVE-2025-21768" ref_url="https://www.suse.com/security/cve/CVE-2025-21768/" source="CVE"/>
		<reference ref_id="CVE-2025-21770" ref_url="https://www.suse.com/security/cve/CVE-2025-21770/" source="CVE"/>
		<reference ref_id="CVE-2025-21771" ref_url="https://www.suse.com/security/cve/CVE-2025-21771/" source="CVE"/>
		<reference ref_id="CVE-2025-21772" ref_url="https://www.suse.com/security/cve/CVE-2025-21772/" source="CVE"/>
		<reference ref_id="CVE-2025-21773" ref_url="https://www.suse.com/security/cve/CVE-2025-21773/" source="CVE"/>
		<reference ref_id="CVE-2025-21774" ref_url="https://www.suse.com/security/cve/CVE-2025-21774/" source="CVE"/>
		<reference ref_id="CVE-2025-21775" ref_url="https://www.suse.com/security/cve/CVE-2025-21775/" source="CVE"/>
		<reference ref_id="CVE-2025-21776" ref_url="https://www.suse.com/security/cve/CVE-2025-21776/" source="CVE"/>
		<reference ref_id="CVE-2025-21777" ref_url="https://www.suse.com/security/cve/CVE-2025-21777/" source="CVE"/>
		<reference ref_id="CVE-2025-21778" ref_url="https://www.suse.com/security/cve/CVE-2025-21778/" source="CVE"/>
		<reference ref_id="CVE-2025-21779" ref_url="https://www.suse.com/security/cve/CVE-2025-21779/" source="CVE"/>
		<reference ref_id="CVE-2025-21780" ref_url="https://www.suse.com/security/cve/CVE-2025-21780/" source="CVE"/>
		<reference ref_id="CVE-2025-21781" ref_url="https://www.suse.com/security/cve/CVE-2025-21781/" source="CVE"/>
		<reference ref_id="CVE-2025-21783" ref_url="https://www.suse.com/security/cve/CVE-2025-21783/" source="CVE"/>
		<reference ref_id="CVE-2025-21784" ref_url="https://www.suse.com/security/cve/CVE-2025-21784/" source="CVE"/>
		<reference ref_id="CVE-2025-21785" ref_url="https://www.suse.com/security/cve/CVE-2025-21785/" source="CVE"/>
		<reference ref_id="CVE-2025-21786" ref_url="https://www.suse.com/security/cve/CVE-2025-21786/" source="CVE"/>
		<reference ref_id="CVE-2025-21787" ref_url="https://www.suse.com/security/cve/CVE-2025-21787/" source="CVE"/>
		<reference ref_id="CVE-2025-21788" ref_url="https://www.suse.com/security/cve/CVE-2025-21788/" source="CVE"/>
		<reference ref_id="CVE-2025-21790" ref_url="https://www.suse.com/security/cve/CVE-2025-21790/" source="CVE"/>
		<reference ref_id="CVE-2025-21791" ref_url="https://www.suse.com/security/cve/CVE-2025-21791/" source="CVE"/>
		<reference ref_id="CVE-2025-21792" ref_url="https://www.suse.com/security/cve/CVE-2025-21792/" source="CVE"/>
		<reference ref_id="CVE-2025-21793" ref_url="https://www.suse.com/security/cve/CVE-2025-21793/" source="CVE"/>
		<reference ref_id="CVE-2025-21794" ref_url="https://www.suse.com/security/cve/CVE-2025-21794/" source="CVE"/>
		<reference ref_id="CVE-2025-21795" ref_url="https://www.suse.com/security/cve/CVE-2025-21795/" source="CVE"/>
		<reference ref_id="CVE-2025-21796" ref_url="https://www.suse.com/security/cve/CVE-2025-21796/" source="CVE"/>
		<reference ref_id="CVE-2025-21798" ref_url="https://www.suse.com/security/cve/CVE-2025-21798/" source="CVE"/>
		<reference ref_id="CVE-2025-21799" ref_url="https://www.suse.com/security/cve/CVE-2025-21799/" source="CVE"/>
		<reference ref_id="CVE-2025-21800" ref_url="https://www.suse.com/security/cve/CVE-2025-21800/" source="CVE"/>
		<reference ref_id="CVE-2025-21801" ref_url="https://www.suse.com/security/cve/CVE-2025-21801/" source="CVE"/>
		<reference ref_id="CVE-2025-21802" ref_url="https://www.suse.com/security/cve/CVE-2025-21802/" source="CVE"/>
		<reference ref_id="CVE-2025-21803" ref_url="https://www.suse.com/security/cve/CVE-2025-21803/" source="CVE"/>
		<reference ref_id="CVE-2025-21804" ref_url="https://www.suse.com/security/cve/CVE-2025-21804/" source="CVE"/>
		<reference ref_id="CVE-2025-21805" ref_url="https://www.suse.com/security/cve/CVE-2025-21805/" source="CVE"/>
		<reference ref_id="CVE-2025-21806" ref_url="https://www.suse.com/security/cve/CVE-2025-21806/" source="CVE"/>
		<reference ref_id="CVE-2025-21807" ref_url="https://www.suse.com/security/cve/CVE-2025-21807/" source="CVE"/>
		<reference ref_id="CVE-2025-21808" ref_url="https://www.suse.com/security/cve/CVE-2025-21808/" source="CVE"/>
		<reference ref_id="CVE-2025-21809" ref_url="https://www.suse.com/security/cve/CVE-2025-21809/" source="CVE"/>
		<reference ref_id="CVE-2025-21810" ref_url="https://www.suse.com/security/cve/CVE-2025-21810/" source="CVE"/>
		<reference ref_id="CVE-2025-21812" ref_url="https://www.suse.com/security/cve/CVE-2025-21812/" source="CVE"/>
		<reference ref_id="CVE-2025-21814" ref_url="https://www.suse.com/security/cve/CVE-2025-21814/" source="CVE"/>
		<reference ref_id="CVE-2025-21815" ref_url="https://www.suse.com/security/cve/CVE-2025-21815/" source="CVE"/>
		<reference ref_id="CVE-2025-21817" ref_url="https://www.suse.com/security/cve/CVE-2025-21817/" source="CVE"/>
		<reference ref_id="CVE-2025-21819" ref_url="https://www.suse.com/security/cve/CVE-2025-21819/" source="CVE"/>
		<reference ref_id="CVE-2025-21820" ref_url="https://www.suse.com/security/cve/CVE-2025-21820/" source="CVE"/>
		<reference ref_id="CVE-2025-21821" ref_url="https://www.suse.com/security/cve/CVE-2025-21821/" source="CVE"/>
		<reference ref_id="CVE-2025-21823" ref_url="https://www.suse.com/security/cve/CVE-2025-21823/" source="CVE"/>
		<reference ref_id="CVE-2025-21824" ref_url="https://www.suse.com/security/cve/CVE-2025-21824/" source="CVE"/>
		<reference ref_id="CVE-2025-21825" ref_url="https://www.suse.com/security/cve/CVE-2025-21825/" source="CVE"/>
		<reference ref_id="CVE-2025-21826" ref_url="https://www.suse.com/security/cve/CVE-2025-21826/" source="CVE"/>
		<reference ref_id="CVE-2025-21827" ref_url="https://www.suse.com/security/cve/CVE-2025-21827/" source="CVE"/>
		<reference ref_id="CVE-2025-21828" ref_url="https://www.suse.com/security/cve/CVE-2025-21828/" source="CVE"/>
		<reference ref_id="CVE-2025-21829" ref_url="https://www.suse.com/security/cve/CVE-2025-21829/" source="CVE"/>
		<reference ref_id="CVE-2025-21830" ref_url="https://www.suse.com/security/cve/CVE-2025-21830/" source="CVE"/>
		<reference ref_id="CVE-2025-21831" ref_url="https://www.suse.com/security/cve/CVE-2025-21831/" source="CVE"/>
		<reference ref_id="CVE-2025-21832" ref_url="https://www.suse.com/security/cve/CVE-2025-21832/" source="CVE"/>
		<reference ref_id="CVE-2025-21833" ref_url="https://www.suse.com/security/cve/CVE-2025-21833/" source="CVE"/>
		<reference ref_id="CVE-2025-21834" ref_url="https://www.suse.com/security/cve/CVE-2025-21834/" source="CVE"/>
		<reference ref_id="CVE-2025-21835" ref_url="https://www.suse.com/security/cve/CVE-2025-21835/" source="CVE"/>
		<reference ref_id="CVE-2025-21836" ref_url="https://www.suse.com/security/cve/CVE-2025-21836/" source="CVE"/>
		<reference ref_id="CVE-2025-21837" ref_url="https://www.suse.com/security/cve/CVE-2025-21837/" source="CVE"/>
		<reference ref_id="CVE-2025-21838" ref_url="https://www.suse.com/security/cve/CVE-2025-21838/" source="CVE"/>
		<reference ref_id="CVE-2025-21839" ref_url="https://www.suse.com/security/cve/CVE-2025-21839/" source="CVE"/>
		<reference ref_id="CVE-2025-21841" ref_url="https://www.suse.com/security/cve/CVE-2025-21841/" source="CVE"/>
		<reference ref_id="CVE-2025-21842" ref_url="https://www.suse.com/security/cve/CVE-2025-21842/" source="CVE"/>
		<reference ref_id="CVE-2025-21844" ref_url="https://www.suse.com/security/cve/CVE-2025-21844/" source="CVE"/>
		<reference ref_id="CVE-2025-21845" ref_url="https://www.suse.com/security/cve/CVE-2025-21845/" source="CVE"/>
		<reference ref_id="CVE-2025-21846" ref_url="https://www.suse.com/security/cve/CVE-2025-21846/" source="CVE"/>
		<reference ref_id="CVE-2025-21847" ref_url="https://www.suse.com/security/cve/CVE-2025-21847/" source="CVE"/>
		<reference ref_id="CVE-2025-21848" ref_url="https://www.suse.com/security/cve/CVE-2025-21848/" source="CVE"/>
		<reference ref_id="CVE-2025-21849" ref_url="https://www.suse.com/security/cve/CVE-2025-21849/" source="CVE"/>
		<reference ref_id="CVE-2025-21850" ref_url="https://www.suse.com/security/cve/CVE-2025-21850/" source="CVE"/>
		<reference ref_id="CVE-2025-21851" ref_url="https://www.suse.com/security/cve/CVE-2025-21851/" source="CVE"/>
		<reference ref_id="CVE-2025-21852" ref_url="https://www.suse.com/security/cve/CVE-2025-21852/" source="CVE"/>
		<reference ref_id="CVE-2025-21853" ref_url="https://www.suse.com/security/cve/CVE-2025-21853/" source="CVE"/>
		<reference ref_id="CVE-2025-21854" ref_url="https://www.suse.com/security/cve/CVE-2025-21854/" source="CVE"/>
		<reference ref_id="CVE-2025-21855" ref_url="https://www.suse.com/security/cve/CVE-2025-21855/" source="CVE"/>
		<reference ref_id="CVE-2025-21856" ref_url="https://www.suse.com/security/cve/CVE-2025-21856/" source="CVE"/>
		<reference ref_id="CVE-2025-21857" ref_url="https://www.suse.com/security/cve/CVE-2025-21857/" source="CVE"/>
		<reference ref_id="CVE-2025-21858" ref_url="https://www.suse.com/security/cve/CVE-2025-21858/" source="CVE"/>
		<reference ref_id="CVE-2025-21859" ref_url="https://www.suse.com/security/cve/CVE-2025-21859/" source="CVE"/>
		<reference ref_id="CVE-2025-21861" ref_url="https://www.suse.com/security/cve/CVE-2025-21861/" source="CVE"/>
		<reference ref_id="CVE-2025-21862" ref_url="https://www.suse.com/security/cve/CVE-2025-21862/" source="CVE"/>
		<reference ref_id="CVE-2025-21863" ref_url="https://www.suse.com/security/cve/CVE-2025-21863/" source="CVE"/>
		<reference ref_id="CVE-2025-21864" ref_url="https://www.suse.com/security/cve/CVE-2025-21864/" source="CVE"/>
		<reference ref_id="CVE-2025-21865" ref_url="https://www.suse.com/security/cve/CVE-2025-21865/" source="CVE"/>
		<reference ref_id="CVE-2025-21866" ref_url="https://www.suse.com/security/cve/CVE-2025-21866/" source="CVE"/>
		<reference ref_id="CVE-2025-21867" ref_url="https://www.suse.com/security/cve/CVE-2025-21867/" source="CVE"/>
		<reference ref_id="CVE-2025-21868" ref_url="https://www.suse.com/security/cve/CVE-2025-21868/" source="CVE"/>
		<reference ref_id="CVE-2025-21869" ref_url="https://www.suse.com/security/cve/CVE-2025-21869/" source="CVE"/>
		<reference ref_id="CVE-2025-21870" ref_url="https://www.suse.com/security/cve/CVE-2025-21870/" source="CVE"/>
		<reference ref_id="CVE-2025-21871" ref_url="https://www.suse.com/security/cve/CVE-2025-21871/" source="CVE"/>
		<reference ref_id="CVE-2025-21872" ref_url="https://www.suse.com/security/cve/CVE-2025-21872/" source="CVE"/>
		<reference ref_id="CVE-2025-21873" ref_url="https://www.suse.com/security/cve/CVE-2025-21873/" source="CVE"/>
		<reference ref_id="CVE-2025-21874" ref_url="https://www.suse.com/security/cve/CVE-2025-21874/" source="CVE"/>
		<reference ref_id="CVE-2025-21875" ref_url="https://www.suse.com/security/cve/CVE-2025-21875/" source="CVE"/>
		<reference ref_id="CVE-2025-21876" ref_url="https://www.suse.com/security/cve/CVE-2025-21876/" source="CVE"/>
		<reference ref_id="CVE-2025-21877" ref_url="https://www.suse.com/security/cve/CVE-2025-21877/" source="CVE"/>
		<reference ref_id="CVE-2025-21878" ref_url="https://www.suse.com/security/cve/CVE-2025-21878/" source="CVE"/>
		<reference ref_id="CVE-2025-21880" ref_url="https://www.suse.com/security/cve/CVE-2025-21880/" source="CVE"/>
		<reference ref_id="CVE-2025-21881" ref_url="https://www.suse.com/security/cve/CVE-2025-21881/" source="CVE"/>
		<reference ref_id="CVE-2025-21882" ref_url="https://www.suse.com/security/cve/CVE-2025-21882/" source="CVE"/>
		<reference ref_id="CVE-2025-21883" ref_url="https://www.suse.com/security/cve/CVE-2025-21883/" source="CVE"/>
		<reference ref_id="CVE-2025-21884" ref_url="https://www.suse.com/security/cve/CVE-2025-21884/" source="CVE"/>
		<reference ref_id="CVE-2025-21885" ref_url="https://www.suse.com/security/cve/CVE-2025-21885/" source="CVE"/>
		<reference ref_id="CVE-2025-21886" ref_url="https://www.suse.com/security/cve/CVE-2025-21886/" source="CVE"/>
		<reference ref_id="CVE-2025-21887" ref_url="https://www.suse.com/security/cve/CVE-2025-21887/" source="CVE"/>
		<reference ref_id="CVE-2025-21888" ref_url="https://www.suse.com/security/cve/CVE-2025-21888/" source="CVE"/>
		<reference ref_id="CVE-2025-21889" ref_url="https://www.suse.com/security/cve/CVE-2025-21889/" source="CVE"/>
		<reference ref_id="CVE-2025-21890" ref_url="https://www.suse.com/security/cve/CVE-2025-21890/" source="CVE"/>
		<reference ref_id="CVE-2025-21891" ref_url="https://www.suse.com/security/cve/CVE-2025-21891/" source="CVE"/>
		<reference ref_id="CVE-2025-21892" ref_url="https://www.suse.com/security/cve/CVE-2025-21892/" source="CVE"/>
		<reference ref_id="CVE-2025-21893" ref_url="https://www.suse.com/security/cve/CVE-2025-21893/" source="CVE"/>
		<reference ref_id="CVE-2025-21894" ref_url="https://www.suse.com/security/cve/CVE-2025-21894/" source="CVE"/>
		<reference ref_id="CVE-2025-21895" ref_url="https://www.suse.com/security/cve/CVE-2025-21895/" source="CVE"/>
		<reference ref_id="CVE-2025-21898" ref_url="https://www.suse.com/security/cve/CVE-2025-21898/" source="CVE"/>
		<reference ref_id="CVE-2025-21899" ref_url="https://www.suse.com/security/cve/CVE-2025-21899/" source="CVE"/>
		<reference ref_id="CVE-2025-21900" ref_url="https://www.suse.com/security/cve/CVE-2025-21900/" source="CVE"/>
		<reference ref_id="CVE-2025-21901" ref_url="https://www.suse.com/security/cve/CVE-2025-21901/" source="CVE"/>
		<reference ref_id="CVE-2025-21902" ref_url="https://www.suse.com/security/cve/CVE-2025-21902/" source="CVE"/>
		<reference ref_id="CVE-2025-21903" ref_url="https://www.suse.com/security/cve/CVE-2025-21903/" source="CVE"/>
		<reference ref_id="CVE-2025-21904" ref_url="https://www.suse.com/security/cve/CVE-2025-21904/" source="CVE"/>
		<reference ref_id="CVE-2025-21905" ref_url="https://www.suse.com/security/cve/CVE-2025-21905/" source="CVE"/>
		<reference ref_id="CVE-2025-21906" ref_url="https://www.suse.com/security/cve/CVE-2025-21906/" source="CVE"/>
		<reference ref_id="CVE-2025-21907" ref_url="https://www.suse.com/security/cve/CVE-2025-21907/" source="CVE"/>
		<reference ref_id="CVE-2025-21908" ref_url="https://www.suse.com/security/cve/CVE-2025-21908/" source="CVE"/>
		<reference ref_id="CVE-2025-21909" ref_url="https://www.suse.com/security/cve/CVE-2025-21909/" source="CVE"/>
		<reference ref_id="CVE-2025-21910" ref_url="https://www.suse.com/security/cve/CVE-2025-21910/" source="CVE"/>
		<reference ref_id="CVE-2025-21911" ref_url="https://www.suse.com/security/cve/CVE-2025-21911/" source="CVE"/>
		<reference ref_id="CVE-2025-21912" ref_url="https://www.suse.com/security/cve/CVE-2025-21912/" source="CVE"/>
		<reference ref_id="CVE-2025-21913" ref_url="https://www.suse.com/security/cve/CVE-2025-21913/" source="CVE"/>
		<reference ref_id="CVE-2025-21914" ref_url="https://www.suse.com/security/cve/CVE-2025-21914/" source="CVE"/>
		<reference ref_id="CVE-2025-21915" ref_url="https://www.suse.com/security/cve/CVE-2025-21915/" source="CVE"/>
		<reference ref_id="CVE-2025-21916" ref_url="https://www.suse.com/security/cve/CVE-2025-21916/" source="CVE"/>
		<reference ref_id="CVE-2025-21917" ref_url="https://www.suse.com/security/cve/CVE-2025-21917/" source="CVE"/>
		<reference ref_id="CVE-2025-21918" ref_url="https://www.suse.com/security/cve/CVE-2025-21918/" source="CVE"/>
		<reference ref_id="CVE-2025-21919" ref_url="https://www.suse.com/security/cve/CVE-2025-21919/" source="CVE"/>
		<reference ref_id="CVE-2025-21920" ref_url="https://www.suse.com/security/cve/CVE-2025-21920/" source="CVE"/>
		<reference ref_id="CVE-2025-21921" ref_url="https://www.suse.com/security/cve/CVE-2025-21921/" source="CVE"/>
		<reference ref_id="CVE-2025-21922" ref_url="https://www.suse.com/security/cve/CVE-2025-21922/" source="CVE"/>
		<reference ref_id="CVE-2025-21923" ref_url="https://www.suse.com/security/cve/CVE-2025-21923/" source="CVE"/>
		<reference ref_id="CVE-2025-21924" ref_url="https://www.suse.com/security/cve/CVE-2025-21924/" source="CVE"/>
		<reference ref_id="CVE-2025-21925" ref_url="https://www.suse.com/security/cve/CVE-2025-21925/" source="CVE"/>
		<reference ref_id="CVE-2025-21926" ref_url="https://www.suse.com/security/cve/CVE-2025-21926/" source="CVE"/>
		<reference ref_id="CVE-2025-21927" ref_url="https://www.suse.com/security/cve/CVE-2025-21927/" source="CVE"/>
		<reference ref_id="CVE-2025-21928" ref_url="https://www.suse.com/security/cve/CVE-2025-21928/" source="CVE"/>
		<reference ref_id="CVE-2025-21929" ref_url="https://www.suse.com/security/cve/CVE-2025-21929/" source="CVE"/>
		<reference ref_id="CVE-2025-21930" ref_url="https://www.suse.com/security/cve/CVE-2025-21930/" source="CVE"/>
		<reference ref_id="CVE-2025-21931" ref_url="https://www.suse.com/security/cve/CVE-2025-21931/" source="CVE"/>
		<reference ref_id="CVE-2025-21932" ref_url="https://www.suse.com/security/cve/CVE-2025-21932/" source="CVE"/>
		<reference ref_id="CVE-2025-21934" ref_url="https://www.suse.com/security/cve/CVE-2025-21934/" source="CVE"/>
		<reference ref_id="CVE-2025-21935" ref_url="https://www.suse.com/security/cve/CVE-2025-21935/" source="CVE"/>
		<reference ref_id="CVE-2025-21936" ref_url="https://www.suse.com/security/cve/CVE-2025-21936/" source="CVE"/>
		<reference ref_id="CVE-2025-21937" ref_url="https://www.suse.com/security/cve/CVE-2025-21937/" source="CVE"/>
		<reference ref_id="CVE-2025-21938" ref_url="https://www.suse.com/security/cve/CVE-2025-21938/" source="CVE"/>
		<reference ref_id="CVE-2025-21939" ref_url="https://www.suse.com/security/cve/CVE-2025-21939/" source="CVE"/>
		<reference ref_id="CVE-2025-21940" ref_url="https://www.suse.com/security/cve/CVE-2025-21940/" source="CVE"/>
		<reference ref_id="CVE-2025-21941" ref_url="https://www.suse.com/security/cve/CVE-2025-21941/" source="CVE"/>
		<reference ref_id="CVE-2025-21942" ref_url="https://www.suse.com/security/cve/CVE-2025-21942/" source="CVE"/>
		<reference ref_id="CVE-2025-21943" ref_url="https://www.suse.com/security/cve/CVE-2025-21943/" source="CVE"/>
		<reference ref_id="CVE-2025-21948" ref_url="https://www.suse.com/security/cve/CVE-2025-21948/" source="CVE"/>
		<reference ref_id="CVE-2025-21950" ref_url="https://www.suse.com/security/cve/CVE-2025-21950/" source="CVE"/>
		<reference ref_id="CVE-2025-21951" ref_url="https://www.suse.com/security/cve/CVE-2025-21951/" source="CVE"/>
		<reference ref_id="CVE-2025-21953" ref_url="https://www.suse.com/security/cve/CVE-2025-21953/" source="CVE"/>
		<reference ref_id="CVE-2025-21954" ref_url="https://www.suse.com/security/cve/CVE-2025-21954/" source="CVE"/>
		<reference ref_id="CVE-2025-21956" ref_url="https://www.suse.com/security/cve/CVE-2025-21956/" source="CVE"/>
		<reference ref_id="CVE-2025-21958" ref_url="https://www.suse.com/security/cve/CVE-2025-21958/" source="CVE"/>
		<reference ref_id="CVE-2025-21959" ref_url="https://www.suse.com/security/cve/CVE-2025-21959/" source="CVE"/>
		<reference ref_id="CVE-2025-21960" ref_url="https://www.suse.com/security/cve/CVE-2025-21960/" source="CVE"/>
		<reference ref_id="CVE-2025-21961" ref_url="https://www.suse.com/security/cve/CVE-2025-21961/" source="CVE"/>
		<reference ref_id="CVE-2025-21962" ref_url="https://www.suse.com/security/cve/CVE-2025-21962/" source="CVE"/>
		<reference ref_id="CVE-2025-21963" ref_url="https://www.suse.com/security/cve/CVE-2025-21963/" source="CVE"/>
		<reference ref_id="CVE-2025-21964" ref_url="https://www.suse.com/security/cve/CVE-2025-21964/" source="CVE"/>
		<reference ref_id="CVE-2025-21966" ref_url="https://www.suse.com/security/cve/CVE-2025-21966/" source="CVE"/>
		<reference ref_id="CVE-2025-21968" ref_url="https://www.suse.com/security/cve/CVE-2025-21968/" source="CVE"/>
		<reference ref_id="CVE-2025-21969" ref_url="https://www.suse.com/security/cve/CVE-2025-21969/" source="CVE"/>
		<reference ref_id="CVE-2025-21970" ref_url="https://www.suse.com/security/cve/CVE-2025-21970/" source="CVE"/>
		<reference ref_id="CVE-2025-21971" ref_url="https://www.suse.com/security/cve/CVE-2025-21971/" source="CVE"/>
		<reference ref_id="CVE-2025-21972" ref_url="https://www.suse.com/security/cve/CVE-2025-21972/" source="CVE"/>
		<reference ref_id="CVE-2025-21973" ref_url="https://www.suse.com/security/cve/CVE-2025-21973/" source="CVE"/>
		<reference ref_id="CVE-2025-21974" ref_url="https://www.suse.com/security/cve/CVE-2025-21974/" source="CVE"/>
		<reference ref_id="CVE-2025-21975" ref_url="https://www.suse.com/security/cve/CVE-2025-21975/" source="CVE"/>
		<reference ref_id="CVE-2025-21976" ref_url="https://www.suse.com/security/cve/CVE-2025-21976/" source="CVE"/>
		<reference ref_id="CVE-2025-21977" ref_url="https://www.suse.com/security/cve/CVE-2025-21977/" source="CVE"/>
		<reference ref_id="CVE-2025-21978" ref_url="https://www.suse.com/security/cve/CVE-2025-21978/" source="CVE"/>
		<reference ref_id="CVE-2025-21979" ref_url="https://www.suse.com/security/cve/CVE-2025-21979/" source="CVE"/>
		<reference ref_id="CVE-2025-21980" ref_url="https://www.suse.com/security/cve/CVE-2025-21980/" source="CVE"/>
		<reference ref_id="CVE-2025-21981" ref_url="https://www.suse.com/security/cve/CVE-2025-21981/" source="CVE"/>
		<reference ref_id="CVE-2025-21982" ref_url="https://www.suse.com/security/cve/CVE-2025-21982/" source="CVE"/>
		<reference ref_id="CVE-2025-21983" ref_url="https://www.suse.com/security/cve/CVE-2025-21983/" source="CVE"/>
		<reference ref_id="CVE-2025-21984" ref_url="https://www.suse.com/security/cve/CVE-2025-21984/" source="CVE"/>
		<reference ref_id="CVE-2025-21985" ref_url="https://www.suse.com/security/cve/CVE-2025-21985/" source="CVE"/>
		<reference ref_id="CVE-2025-21986" ref_url="https://www.suse.com/security/cve/CVE-2025-21986/" source="CVE"/>
		<reference ref_id="CVE-2025-21987" ref_url="https://www.suse.com/security/cve/CVE-2025-21987/" source="CVE"/>
		<reference ref_id="CVE-2025-21988" ref_url="https://www.suse.com/security/cve/CVE-2025-21988/" source="CVE"/>
		<reference ref_id="CVE-2025-21989" ref_url="https://www.suse.com/security/cve/CVE-2025-21989/" source="CVE"/>
		<reference ref_id="CVE-2025-21990" ref_url="https://www.suse.com/security/cve/CVE-2025-21990/" source="CVE"/>
		<reference ref_id="CVE-2025-21991" ref_url="https://www.suse.com/security/cve/CVE-2025-21991/" source="CVE"/>
		<reference ref_id="CVE-2025-21992" ref_url="https://www.suse.com/security/cve/CVE-2025-21992/" source="CVE"/>
		<reference ref_id="CVE-2025-21993" ref_url="https://www.suse.com/security/cve/CVE-2025-21993/" source="CVE"/>
		<reference ref_id="CVE-2025-21995" ref_url="https://www.suse.com/security/cve/CVE-2025-21995/" source="CVE"/>
		<reference ref_id="CVE-2025-21996" ref_url="https://www.suse.com/security/cve/CVE-2025-21996/" source="CVE"/>
		<reference ref_id="CVE-2025-21997" ref_url="https://www.suse.com/security/cve/CVE-2025-21997/" source="CVE"/>
		<reference ref_id="CVE-2025-21998" ref_url="https://www.suse.com/security/cve/CVE-2025-21998/" source="CVE"/>
		<reference ref_id="CVE-2025-21999" ref_url="https://www.suse.com/security/cve/CVE-2025-21999/" source="CVE"/>
		<reference ref_id="CVE-2025-22000" ref_url="https://www.suse.com/security/cve/CVE-2025-22000/" source="CVE"/>
		<reference ref_id="CVE-2025-22001" ref_url="https://www.suse.com/security/cve/CVE-2025-22001/" source="CVE"/>
		<reference ref_id="CVE-2025-22002" ref_url="https://www.suse.com/security/cve/CVE-2025-22002/" source="CVE"/>
		<reference ref_id="CVE-2025-22003" ref_url="https://www.suse.com/security/cve/CVE-2025-22003/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<reference ref_id="CVE-2025-22005" ref_url="https://www.suse.com/security/cve/CVE-2025-22005/" source="CVE"/>
		<reference ref_id="CVE-2025-22007" ref_url="https://www.suse.com/security/cve/CVE-2025-22007/" source="CVE"/>
		<reference ref_id="CVE-2025-22008" ref_url="https://www.suse.com/security/cve/CVE-2025-22008/" source="CVE"/>
		<reference ref_id="CVE-2025-22009" ref_url="https://www.suse.com/security/cve/CVE-2025-22009/" source="CVE"/>
		<reference ref_id="CVE-2025-22010" ref_url="https://www.suse.com/security/cve/CVE-2025-22010/" source="CVE"/>
		<reference ref_id="CVE-2025-22013" ref_url="https://www.suse.com/security/cve/CVE-2025-22013/" source="CVE"/>
		<reference ref_id="CVE-2025-22014" ref_url="https://www.suse.com/security/cve/CVE-2025-22014/" source="CVE"/>
		<reference ref_id="CVE-2025-22015" ref_url="https://www.suse.com/security/cve/CVE-2025-22015/" source="CVE"/>
		<reference ref_id="CVE-2025-22016" ref_url="https://www.suse.com/security/cve/CVE-2025-22016/" source="CVE"/>
		<reference ref_id="CVE-2025-22017" ref_url="https://www.suse.com/security/cve/CVE-2025-22017/" source="CVE"/>
		<reference ref_id="CVE-2025-22018" ref_url="https://www.suse.com/security/cve/CVE-2025-22018/" source="CVE"/>
		<reference ref_id="CVE-2025-22020" ref_url="https://www.suse.com/security/cve/CVE-2025-22020/" source="CVE"/>
		<reference ref_id="CVE-2025-22021" ref_url="https://www.suse.com/security/cve/CVE-2025-22021/" source="CVE"/>
		<reference ref_id="CVE-2025-22022" ref_url="https://www.suse.com/security/cve/CVE-2025-22022/" source="CVE"/>
		<reference ref_id="CVE-2025-22023" ref_url="https://www.suse.com/security/cve/CVE-2025-22023/" source="CVE"/>
		<reference ref_id="CVE-2025-22024" ref_url="https://www.suse.com/security/cve/CVE-2025-22024/" source="CVE"/>
		<reference ref_id="CVE-2025-22025" ref_url="https://www.suse.com/security/cve/CVE-2025-22025/" source="CVE"/>
		<reference ref_id="CVE-2025-22027" ref_url="https://www.suse.com/security/cve/CVE-2025-22027/" source="CVE"/>
		<reference ref_id="CVE-2025-22028" ref_url="https://www.suse.com/security/cve/CVE-2025-22028/" source="CVE"/>
		<reference ref_id="CVE-2025-22029" ref_url="https://www.suse.com/security/cve/CVE-2025-22029/" source="CVE"/>
		<reference ref_id="CVE-2025-22030" ref_url="https://www.suse.com/security/cve/CVE-2025-22030/" source="CVE"/>
		<reference ref_id="CVE-2025-22032" ref_url="https://www.suse.com/security/cve/CVE-2025-22032/" source="CVE"/>
		<reference ref_id="CVE-2025-22033" ref_url="https://www.suse.com/security/cve/CVE-2025-22033/" source="CVE"/>
		<reference ref_id="CVE-2025-22035" ref_url="https://www.suse.com/security/cve/CVE-2025-22035/" source="CVE"/>
		<reference ref_id="CVE-2025-22036" ref_url="https://www.suse.com/security/cve/CVE-2025-22036/" source="CVE"/>
		<reference ref_id="CVE-2025-22044" ref_url="https://www.suse.com/security/cve/CVE-2025-22044/" source="CVE"/>
		<reference ref_id="CVE-2025-22045" ref_url="https://www.suse.com/security/cve/CVE-2025-22045/" source="CVE"/>
		<reference ref_id="CVE-2025-22046" ref_url="https://www.suse.com/security/cve/CVE-2025-22046/" source="CVE"/>
		<reference ref_id="CVE-2025-22047" ref_url="https://www.suse.com/security/cve/CVE-2025-22047/" source="CVE"/>
		<reference ref_id="CVE-2025-22050" ref_url="https://www.suse.com/security/cve/CVE-2025-22050/" source="CVE"/>
		<reference ref_id="CVE-2025-22053" ref_url="https://www.suse.com/security/cve/CVE-2025-22053/" source="CVE"/>
		<reference ref_id="CVE-2025-22055" ref_url="https://www.suse.com/security/cve/CVE-2025-22055/" source="CVE"/>
		<reference ref_id="CVE-2025-22056" ref_url="https://www.suse.com/security/cve/CVE-2025-22056/" source="CVE"/>
		<reference ref_id="CVE-2025-22057" ref_url="https://www.suse.com/security/cve/CVE-2025-22057/" source="CVE"/>
		<reference ref_id="CVE-2025-22058" ref_url="https://www.suse.com/security/cve/CVE-2025-22058/" source="CVE"/>
		<reference ref_id="CVE-2025-22059" ref_url="https://www.suse.com/security/cve/CVE-2025-22059/" source="CVE"/>
		<reference ref_id="CVE-2025-22060" ref_url="https://www.suse.com/security/cve/CVE-2025-22060/" source="CVE"/>
		<reference ref_id="CVE-2025-22062" ref_url="https://www.suse.com/security/cve/CVE-2025-22062/" source="CVE"/>
		<reference ref_id="CVE-2025-22063" ref_url="https://www.suse.com/security/cve/CVE-2025-22063/" source="CVE"/>
		<reference ref_id="CVE-2025-22064" ref_url="https://www.suse.com/security/cve/CVE-2025-22064/" source="CVE"/>
		<reference ref_id="CVE-2025-22065" ref_url="https://www.suse.com/security/cve/CVE-2025-22065/" source="CVE"/>
		<reference ref_id="CVE-2025-22066" ref_url="https://www.suse.com/security/cve/CVE-2025-22066/" source="CVE"/>
		<reference ref_id="CVE-2025-22068" ref_url="https://www.suse.com/security/cve/CVE-2025-22068/" source="CVE"/>
		<reference ref_id="CVE-2025-22070" ref_url="https://www.suse.com/security/cve/CVE-2025-22070/" source="CVE"/>
		<reference ref_id="CVE-2025-22075" ref_url="https://www.suse.com/security/cve/CVE-2025-22075/" source="CVE"/>
		<reference ref_id="CVE-2025-22076" ref_url="https://www.suse.com/security/cve/CVE-2025-22076/" source="CVE"/>
		<reference ref_id="CVE-2025-22078" ref_url="https://www.suse.com/security/cve/CVE-2025-22078/" source="CVE"/>
		<reference ref_id="CVE-2025-22080" ref_url="https://www.suse.com/security/cve/CVE-2025-22080/" source="CVE"/>
		<reference ref_id="CVE-2025-22082" ref_url="https://www.suse.com/security/cve/CVE-2025-22082/" source="CVE"/>
		<reference ref_id="CVE-2025-22083" ref_url="https://www.suse.com/security/cve/CVE-2025-22083/" source="CVE"/>
		<reference ref_id="CVE-2025-22084" ref_url="https://www.suse.com/security/cve/CVE-2025-22084/" source="CVE"/>
		<reference ref_id="CVE-2025-22085" ref_url="https://www.suse.com/security/cve/CVE-2025-22085/" source="CVE"/>
		<reference ref_id="CVE-2025-22086" ref_url="https://www.suse.com/security/cve/CVE-2025-22086/" source="CVE"/>
		<reference ref_id="CVE-2025-22087" ref_url="https://www.suse.com/security/cve/CVE-2025-22087/" source="CVE"/>
		<reference ref_id="CVE-2025-22088" ref_url="https://www.suse.com/security/cve/CVE-2025-22088/" source="CVE"/>
		<reference ref_id="CVE-2025-22089" ref_url="https://www.suse.com/security/cve/CVE-2025-22089/" source="CVE"/>
		<reference ref_id="CVE-2025-22090" ref_url="https://www.suse.com/security/cve/CVE-2025-22090/" source="CVE"/>
		<reference ref_id="CVE-2025-22091" ref_url="https://www.suse.com/security/cve/CVE-2025-22091/" source="CVE"/>
		<reference ref_id="CVE-2025-22093" ref_url="https://www.suse.com/security/cve/CVE-2025-22093/" source="CVE"/>
		<reference ref_id="CVE-2025-22094" ref_url="https://www.suse.com/security/cve/CVE-2025-22094/" source="CVE"/>
		<reference ref_id="CVE-2025-22095" ref_url="https://www.suse.com/security/cve/CVE-2025-22095/" source="CVE"/>
		<reference ref_id="CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097/" source="CVE"/>
		<reference ref_id="CVE-2025-22101" ref_url="https://www.suse.com/security/cve/CVE-2025-22101/" source="CVE"/>
		<reference ref_id="CVE-2025-22102" ref_url="https://www.suse.com/security/cve/CVE-2025-22102/" source="CVE"/>
		<reference ref_id="CVE-2025-22103" ref_url="https://www.suse.com/security/cve/CVE-2025-22103/" source="CVE"/>
		<reference ref_id="CVE-2025-22104" ref_url="https://www.suse.com/security/cve/CVE-2025-22104/" source="CVE"/>
		<reference ref_id="CVE-2025-22105" ref_url="https://www.suse.com/security/cve/CVE-2025-22105/" source="CVE"/>
		<reference ref_id="CVE-2025-22106" ref_url="https://www.suse.com/security/cve/CVE-2025-22106/" source="CVE"/>
		<reference ref_id="CVE-2025-22107" ref_url="https://www.suse.com/security/cve/CVE-2025-22107/" source="CVE"/>
		<reference ref_id="CVE-2025-22108" ref_url="https://www.suse.com/security/cve/CVE-2025-22108/" source="CVE"/>
		<reference ref_id="CVE-2025-22109" ref_url="https://www.suse.com/security/cve/CVE-2025-22109/" source="CVE"/>
		<reference ref_id="CVE-2025-22111" ref_url="https://www.suse.com/security/cve/CVE-2025-22111/" source="CVE"/>
		<reference ref_id="CVE-2025-22112" ref_url="https://www.suse.com/security/cve/CVE-2025-22112/" source="CVE"/>
		<reference ref_id="CVE-2025-22113" ref_url="https://www.suse.com/security/cve/CVE-2025-22113/" source="CVE"/>
		<reference ref_id="CVE-2025-22115" ref_url="https://www.suse.com/security/cve/CVE-2025-22115/" source="CVE"/>
		<reference ref_id="CVE-2025-22116" ref_url="https://www.suse.com/security/cve/CVE-2025-22116/" source="CVE"/>
		<reference ref_id="CVE-2025-22117" ref_url="https://www.suse.com/security/cve/CVE-2025-22117/" source="CVE"/>
		<reference ref_id="CVE-2025-22118" ref_url="https://www.suse.com/security/cve/CVE-2025-22118/" source="CVE"/>
		<reference ref_id="CVE-2025-22119" ref_url="https://www.suse.com/security/cve/CVE-2025-22119/" source="CVE"/>
		<reference ref_id="CVE-2025-22120" ref_url="https://www.suse.com/security/cve/CVE-2025-22120/" source="CVE"/>
		<reference ref_id="CVE-2025-22121" ref_url="https://www.suse.com/security/cve/CVE-2025-22121/" source="CVE"/>
		<reference ref_id="CVE-2025-22122" ref_url="https://www.suse.com/security/cve/CVE-2025-22122/" source="CVE"/>
		<reference ref_id="CVE-2025-22124" ref_url="https://www.suse.com/security/cve/CVE-2025-22124/" source="CVE"/>
		<reference ref_id="CVE-2025-22125" ref_url="https://www.suse.com/security/cve/CVE-2025-22125/" source="CVE"/>
		<reference ref_id="CVE-2025-22126" ref_url="https://www.suse.com/security/cve/CVE-2025-22126/" source="CVE"/>
		<reference ref_id="CVE-2025-22128" ref_url="https://www.suse.com/security/cve/CVE-2025-22128/" source="CVE"/>
		<reference ref_id="CVE-2025-23129" ref_url="https://www.suse.com/security/cve/CVE-2025-23129/" source="CVE"/>
		<reference ref_id="CVE-2025-23131" ref_url="https://www.suse.com/security/cve/CVE-2025-23131/" source="CVE"/>
		<reference ref_id="CVE-2025-23133" ref_url="https://www.suse.com/security/cve/CVE-2025-23133/" source="CVE"/>
		<reference ref_id="CVE-2025-23134" ref_url="https://www.suse.com/security/cve/CVE-2025-23134/" source="CVE"/>
		<reference ref_id="CVE-2025-23136" ref_url="https://www.suse.com/security/cve/CVE-2025-23136/" source="CVE"/>
		<reference ref_id="CVE-2025-23137" ref_url="https://www.suse.com/security/cve/CVE-2025-23137/" source="CVE"/>
		<reference ref_id="CVE-2025-23138" ref_url="https://www.suse.com/security/cve/CVE-2025-23138/" source="CVE"/>
		<reference ref_id="CVE-2025-23140" ref_url="https://www.suse.com/security/cve/CVE-2025-23140/" source="CVE"/>
		<reference ref_id="CVE-2025-23142" ref_url="https://www.suse.com/security/cve/CVE-2025-23142/" source="CVE"/>
		<reference ref_id="CVE-2025-23144" ref_url="https://www.suse.com/security/cve/CVE-2025-23144/" source="CVE"/>
		<reference ref_id="CVE-2025-23145" ref_url="https://www.suse.com/security/cve/CVE-2025-23145/" source="CVE"/>
		<reference ref_id="CVE-2025-23146" ref_url="https://www.suse.com/security/cve/CVE-2025-23146/" source="CVE"/>
		<reference ref_id="CVE-2025-23147" ref_url="https://www.suse.com/security/cve/CVE-2025-23147/" source="CVE"/>
		<reference ref_id="CVE-2025-23148" ref_url="https://www.suse.com/security/cve/CVE-2025-23148/" source="CVE"/>
		<reference ref_id="CVE-2025-23149" ref_url="https://www.suse.com/security/cve/CVE-2025-23149/" source="CVE"/>
		<reference ref_id="CVE-2025-23150" ref_url="https://www.suse.com/security/cve/CVE-2025-23150/" source="CVE"/>
		<reference ref_id="CVE-2025-23151" ref_url="https://www.suse.com/security/cve/CVE-2025-23151/" source="CVE"/>
		<reference ref_id="CVE-2025-23154" ref_url="https://www.suse.com/security/cve/CVE-2025-23154/" source="CVE"/>
		<reference ref_id="CVE-2025-23155" ref_url="https://www.suse.com/security/cve/CVE-2025-23155/" source="CVE"/>
		<reference ref_id="CVE-2025-23156" ref_url="https://www.suse.com/security/cve/CVE-2025-23156/" source="CVE"/>
		<reference ref_id="CVE-2025-23157" ref_url="https://www.suse.com/security/cve/CVE-2025-23157/" source="CVE"/>
		<reference ref_id="CVE-2025-23158" ref_url="https://www.suse.com/security/cve/CVE-2025-23158/" source="CVE"/>
		<reference ref_id="CVE-2025-23159" ref_url="https://www.suse.com/security/cve/CVE-2025-23159/" source="CVE"/>
		<reference ref_id="CVE-2025-23160" ref_url="https://www.suse.com/security/cve/CVE-2025-23160/" source="CVE"/>
		<reference ref_id="CVE-2025-23161" ref_url="https://www.suse.com/security/cve/CVE-2025-23161/" source="CVE"/>
		<reference ref_id="CVE-2025-23162" ref_url="https://www.suse.com/security/cve/CVE-2025-23162/" source="CVE"/>
		<reference ref_id="CVE-2025-23163" ref_url="https://www.suse.com/security/cve/CVE-2025-23163/" source="CVE"/>
		<reference ref_id="CVE-2025-37738" ref_url="https://www.suse.com/security/cve/CVE-2025-37738/" source="CVE"/>
		<reference ref_id="CVE-2025-37743" ref_url="https://www.suse.com/security/cve/CVE-2025-37743/" source="CVE"/>
		<reference ref_id="CVE-2025-37745" ref_url="https://www.suse.com/security/cve/CVE-2025-37745/" source="CVE"/>
		<reference ref_id="CVE-2025-37746" ref_url="https://www.suse.com/security/cve/CVE-2025-37746/" source="CVE"/>
		<reference ref_id="CVE-2025-37747" ref_url="https://www.suse.com/security/cve/CVE-2025-37747/" source="CVE"/>
		<reference ref_id="CVE-2025-37748" ref_url="https://www.suse.com/security/cve/CVE-2025-37748/" source="CVE"/>
		<reference ref_id="CVE-2025-37749" ref_url="https://www.suse.com/security/cve/CVE-2025-37749/" source="CVE"/>
		<reference ref_id="CVE-2025-37750" ref_url="https://www.suse.com/security/cve/CVE-2025-37750/" source="CVE"/>
		<reference ref_id="CVE-2025-37752" ref_url="https://www.suse.com/security/cve/CVE-2025-37752/" source="CVE"/>
		<reference ref_id="CVE-2025-37754" ref_url="https://www.suse.com/security/cve/CVE-2025-37754/" source="CVE"/>
		<reference ref_id="CVE-2025-37755" ref_url="https://www.suse.com/security/cve/CVE-2025-37755/" source="CVE"/>
		<reference ref_id="CVE-2025-37756" ref_url="https://www.suse.com/security/cve/CVE-2025-37756/" source="CVE"/>
		<reference ref_id="CVE-2025-37757" ref_url="https://www.suse.com/security/cve/CVE-2025-37757/" source="CVE"/>
		<reference ref_id="CVE-2025-37758" ref_url="https://www.suse.com/security/cve/CVE-2025-37758/" source="CVE"/>
		<reference ref_id="CVE-2025-37759" ref_url="https://www.suse.com/security/cve/CVE-2025-37759/" source="CVE"/>
		<reference ref_id="CVE-2025-37760" ref_url="https://www.suse.com/security/cve/CVE-2025-37760/" source="CVE"/>
		<reference ref_id="CVE-2025-37761" ref_url="https://www.suse.com/security/cve/CVE-2025-37761/" source="CVE"/>
		<reference ref_id="CVE-2025-37763" ref_url="https://www.suse.com/security/cve/CVE-2025-37763/" source="CVE"/>
		<reference ref_id="CVE-2025-37764" ref_url="https://www.suse.com/security/cve/CVE-2025-37764/" source="CVE"/>
		<reference ref_id="CVE-2025-37765" ref_url="https://www.suse.com/security/cve/CVE-2025-37765/" source="CVE"/>
		<reference ref_id="CVE-2025-37766" ref_url="https://www.suse.com/security/cve/CVE-2025-37766/" source="CVE"/>
		<reference ref_id="CVE-2025-37767" ref_url="https://www.suse.com/security/cve/CVE-2025-37767/" source="CVE"/>
		<reference ref_id="CVE-2025-37768" ref_url="https://www.suse.com/security/cve/CVE-2025-37768/" source="CVE"/>
		<reference ref_id="CVE-2025-37769" ref_url="https://www.suse.com/security/cve/CVE-2025-37769/" source="CVE"/>
		<reference ref_id="CVE-2025-37770" ref_url="https://www.suse.com/security/cve/CVE-2025-37770/" source="CVE"/>
		<reference ref_id="CVE-2025-37771" ref_url="https://www.suse.com/security/cve/CVE-2025-37771/" source="CVE"/>
		<reference ref_id="CVE-2025-37772" ref_url="https://www.suse.com/security/cve/CVE-2025-37772/" source="CVE"/>
		<reference ref_id="CVE-2025-37773" ref_url="https://www.suse.com/security/cve/CVE-2025-37773/" source="CVE"/>
		<reference ref_id="CVE-2025-37774" ref_url="https://www.suse.com/security/cve/CVE-2025-37774/" source="CVE"/>
		<reference ref_id="CVE-2025-37779" ref_url="https://www.suse.com/security/cve/CVE-2025-37779/" source="CVE"/>
		<reference ref_id="CVE-2025-37780" ref_url="https://www.suse.com/security/cve/CVE-2025-37780/" source="CVE"/>
		<reference ref_id="CVE-2025-37781" ref_url="https://www.suse.com/security/cve/CVE-2025-37781/" source="CVE"/>
		<reference ref_id="CVE-2025-37785" ref_url="https://www.suse.com/security/cve/CVE-2025-37785/" source="CVE"/>
		<reference ref_id="CVE-2025-37786" ref_url="https://www.suse.com/security/cve/CVE-2025-37786/" source="CVE"/>
		<reference ref_id="CVE-2025-37787" ref_url="https://www.suse.com/security/cve/CVE-2025-37787/" source="CVE"/>
		<reference ref_id="CVE-2025-37788" ref_url="https://www.suse.com/security/cve/CVE-2025-37788/" source="CVE"/>
		<reference ref_id="CVE-2025-37789" ref_url="https://www.suse.com/security/cve/CVE-2025-37789/" source="CVE"/>
		<reference ref_id="CVE-2025-37790" ref_url="https://www.suse.com/security/cve/CVE-2025-37790/" source="CVE"/>
		<reference ref_id="CVE-2025-37791" ref_url="https://www.suse.com/security/cve/CVE-2025-37791/" source="CVE"/>
		<reference ref_id="CVE-2025-37792" ref_url="https://www.suse.com/security/cve/CVE-2025-37792/" source="CVE"/>
		<reference ref_id="CVE-2025-37793" ref_url="https://www.suse.com/security/cve/CVE-2025-37793/" source="CVE"/>
		<reference ref_id="CVE-2025-37794" ref_url="https://www.suse.com/security/cve/CVE-2025-37794/" source="CVE"/>
		<reference ref_id="CVE-2025-37796" ref_url="https://www.suse.com/security/cve/CVE-2025-37796/" source="CVE"/>
		<reference ref_id="CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-37799" ref_url="https://www.suse.com/security/cve/CVE-2025-37799/" source="CVE"/>
		<reference ref_id="CVE-2025-37800" ref_url="https://www.suse.com/security/cve/CVE-2025-37800/" source="CVE"/>
		<reference ref_id="CVE-2025-37801" ref_url="https://www.suse.com/security/cve/CVE-2025-37801/" source="CVE"/>
		<reference ref_id="CVE-2025-37803" ref_url="https://www.suse.com/security/cve/CVE-2025-37803/" source="CVE"/>
		<reference ref_id="CVE-2025-37804" ref_url="https://www.suse.com/security/cve/CVE-2025-37804/" source="CVE"/>
		<reference ref_id="CVE-2025-37805" ref_url="https://www.suse.com/security/cve/CVE-2025-37805/" source="CVE"/>
		<reference ref_id="CVE-2025-37808" ref_url="https://www.suse.com/security/cve/CVE-2025-37808/" source="CVE"/>
		<reference ref_id="CVE-2025-37809" ref_url="https://www.suse.com/security/cve/CVE-2025-37809/" source="CVE"/>
		<reference ref_id="CVE-2025-37810" ref_url="https://www.suse.com/security/cve/CVE-2025-37810/" source="CVE"/>
		<reference ref_id="CVE-2025-37811" ref_url="https://www.suse.com/security/cve/CVE-2025-37811/" source="CVE"/>
		<reference ref_id="CVE-2025-37812" ref_url="https://www.suse.com/security/cve/CVE-2025-37812/" source="CVE"/>
		<reference ref_id="CVE-2025-37813" ref_url="https://www.suse.com/security/cve/CVE-2025-37813/" source="CVE"/>
		<reference ref_id="CVE-2025-37814" ref_url="https://www.suse.com/security/cve/CVE-2025-37814/" source="CVE"/>
		<reference ref_id="CVE-2025-37815" ref_url="https://www.suse.com/security/cve/CVE-2025-37815/" source="CVE"/>
		<reference ref_id="CVE-2025-37816" ref_url="https://www.suse.com/security/cve/CVE-2025-37816/" source="CVE"/>
		<reference ref_id="CVE-2025-37819" ref_url="https://www.suse.com/security/cve/CVE-2025-37819/" source="CVE"/>
		<reference ref_id="CVE-2025-37820" ref_url="https://www.suse.com/security/cve/CVE-2025-37820/" source="CVE"/>
		<reference ref_id="CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823/" source="CVE"/>
		<reference ref_id="CVE-2025-37824" ref_url="https://www.suse.com/security/cve/CVE-2025-37824/" source="CVE"/>
		<reference ref_id="CVE-2025-37825" ref_url="https://www.suse.com/security/cve/CVE-2025-37825/" source="CVE"/>
		<reference ref_id="CVE-2025-37826" ref_url="https://www.suse.com/security/cve/CVE-2025-37826/" source="CVE"/>
		<reference ref_id="CVE-2025-37827" ref_url="https://www.suse.com/security/cve/CVE-2025-37827/" source="CVE"/>
		<reference ref_id="CVE-2025-37828" ref_url="https://www.suse.com/security/cve/CVE-2025-37828/" source="CVE"/>
		<reference ref_id="CVE-2025-37829" ref_url="https://www.suse.com/security/cve/CVE-2025-37829/" source="CVE"/>
		<reference ref_id="CVE-2025-37830" ref_url="https://www.suse.com/security/cve/CVE-2025-37830/" source="CVE"/>
		<reference ref_id="CVE-2025-37831" ref_url="https://www.suse.com/security/cve/CVE-2025-37831/" source="CVE"/>
		<reference ref_id="CVE-2025-37833" ref_url="https://www.suse.com/security/cve/CVE-2025-37833/" source="CVE"/>
		<reference ref_id="CVE-2025-37836" ref_url="https://www.suse.com/security/cve/CVE-2025-37836/" source="CVE"/>
		<reference ref_id="CVE-2025-37837" ref_url="https://www.suse.com/security/cve/CVE-2025-37837/" source="CVE"/>
		<reference ref_id="CVE-2025-37838" ref_url="https://www.suse.com/security/cve/CVE-2025-37838/" source="CVE"/>
		<reference ref_id="CVE-2025-37839" ref_url="https://www.suse.com/security/cve/CVE-2025-37839/" source="CVE"/>
		<reference ref_id="CVE-2025-37840" ref_url="https://www.suse.com/security/cve/CVE-2025-37840/" source="CVE"/>
		<reference ref_id="CVE-2025-37842" ref_url="https://www.suse.com/security/cve/CVE-2025-37842/" source="CVE"/>
		<reference ref_id="CVE-2025-37843" ref_url="https://www.suse.com/security/cve/CVE-2025-37843/" source="CVE"/>
		<reference ref_id="CVE-2025-37844" ref_url="https://www.suse.com/security/cve/CVE-2025-37844/" source="CVE"/>
		<reference ref_id="CVE-2025-37846" ref_url="https://www.suse.com/security/cve/CVE-2025-37846/" source="CVE"/>
		<reference ref_id="CVE-2025-37847" ref_url="https://www.suse.com/security/cve/CVE-2025-37847/" source="CVE"/>
		<reference ref_id="CVE-2025-37848" ref_url="https://www.suse.com/security/cve/CVE-2025-37848/" source="CVE"/>
		<reference ref_id="CVE-2025-37850" ref_url="https://www.suse.com/security/cve/CVE-2025-37850/" source="CVE"/>
		<reference ref_id="CVE-2025-37851" ref_url="https://www.suse.com/security/cve/CVE-2025-37851/" source="CVE"/>
		<reference ref_id="CVE-2025-37852" ref_url="https://www.suse.com/security/cve/CVE-2025-37852/" source="CVE"/>
		<reference ref_id="CVE-2025-37853" ref_url="https://www.suse.com/security/cve/CVE-2025-37853/" source="CVE"/>
		<reference ref_id="CVE-2025-37854" ref_url="https://www.suse.com/security/cve/CVE-2025-37854/" source="CVE"/>
		<reference ref_id="CVE-2025-37859" ref_url="https://www.suse.com/security/cve/CVE-2025-37859/" source="CVE"/>
		<reference ref_id="CVE-2025-37860" ref_url="https://www.suse.com/security/cve/CVE-2025-37860/" source="CVE"/>
		<reference ref_id="CVE-2025-37862" ref_url="https://www.suse.com/security/cve/CVE-2025-37862/" source="CVE"/>
		<reference ref_id="CVE-2025-37863" ref_url="https://www.suse.com/security/cve/CVE-2025-37863/" source="CVE"/>
		<reference ref_id="CVE-2025-37865" ref_url="https://www.suse.com/security/cve/CVE-2025-37865/" source="CVE"/>
		<reference ref_id="CVE-2025-37867" ref_url="https://www.suse.com/security/cve/CVE-2025-37867/" source="CVE"/>
		<reference ref_id="CVE-2025-37868" ref_url="https://www.suse.com/security/cve/CVE-2025-37868/" source="CVE"/>
		<reference ref_id="CVE-2025-37869" ref_url="https://www.suse.com/security/cve/CVE-2025-37869/" source="CVE"/>
		<reference ref_id="CVE-2025-37870" ref_url="https://www.suse.com/security/cve/CVE-2025-37870/" source="CVE"/>
		<reference ref_id="CVE-2025-37871" ref_url="https://www.suse.com/security/cve/CVE-2025-37871/" source="CVE"/>
		<reference ref_id="CVE-2025-37872" ref_url="https://www.suse.com/security/cve/CVE-2025-37872/" source="CVE"/>
		<reference ref_id="CVE-2025-37873" ref_url="https://www.suse.com/security/cve/CVE-2025-37873/" source="CVE"/>
		<reference ref_id="CVE-2025-37874" ref_url="https://www.suse.com/security/cve/CVE-2025-37874/" source="CVE"/>
		<reference ref_id="CVE-2025-37875" ref_url="https://www.suse.com/security/cve/CVE-2025-37875/" source="CVE"/>
		<reference ref_id="CVE-2025-37877" ref_url="https://www.suse.com/security/cve/CVE-2025-37877/" source="CVE"/>
		<reference ref_id="CVE-2025-37878" ref_url="https://www.suse.com/security/cve/CVE-2025-37878/" source="CVE"/>
		<reference ref_id="CVE-2025-37879" ref_url="https://www.suse.com/security/cve/CVE-2025-37879/" source="CVE"/>
		<reference ref_id="CVE-2025-37881" ref_url="https://www.suse.com/security/cve/CVE-2025-37881/" source="CVE"/>
		<reference ref_id="CVE-2025-37882" ref_url="https://www.suse.com/security/cve/CVE-2025-37882/" source="CVE"/>
		<reference ref_id="CVE-2025-37884" ref_url="https://www.suse.com/security/cve/CVE-2025-37884/" source="CVE"/>
		<reference ref_id="CVE-2025-37885" ref_url="https://www.suse.com/security/cve/CVE-2025-37885/" source="CVE"/>
		<reference ref_id="CVE-2025-37886" ref_url="https://www.suse.com/security/cve/CVE-2025-37886/" source="CVE"/>
		<reference ref_id="CVE-2025-37887" ref_url="https://www.suse.com/security/cve/CVE-2025-37887/" source="CVE"/>
		<reference ref_id="CVE-2025-37888" ref_url="https://www.suse.com/security/cve/CVE-2025-37888/" source="CVE"/>
		<reference ref_id="CVE-2025-37889" ref_url="https://www.suse.com/security/cve/CVE-2025-37889/" source="CVE"/>
		<reference ref_id="CVE-2025-37890" ref_url="https://www.suse.com/security/cve/CVE-2025-37890/" source="CVE"/>
		<reference ref_id="CVE-2025-37891" ref_url="https://www.suse.com/security/cve/CVE-2025-37891/" source="CVE"/>
		<reference ref_id="CVE-2025-37892" ref_url="https://www.suse.com/security/cve/CVE-2025-37892/" source="CVE"/>
		<reference ref_id="CVE-2025-37894" ref_url="https://www.suse.com/security/cve/CVE-2025-37894/" source="CVE"/>
		<reference ref_id="CVE-2025-37895" ref_url="https://www.suse.com/security/cve/CVE-2025-37895/" source="CVE"/>
		<reference ref_id="CVE-2025-37897" ref_url="https://www.suse.com/security/cve/CVE-2025-37897/" source="CVE"/>
		<reference ref_id="CVE-2025-37898" ref_url="https://www.suse.com/security/cve/CVE-2025-37898/" source="CVE"/>
		<reference ref_id="CVE-2025-37900" ref_url="https://www.suse.com/security/cve/CVE-2025-37900/" source="CVE"/>
		<reference ref_id="CVE-2025-37901" ref_url="https://www.suse.com/security/cve/CVE-2025-37901/" source="CVE"/>
		<reference ref_id="CVE-2025-37903" ref_url="https://www.suse.com/security/cve/CVE-2025-37903/" source="CVE"/>
		<reference ref_id="CVE-2025-37905" ref_url="https://www.suse.com/security/cve/CVE-2025-37905/" source="CVE"/>
		<reference ref_id="CVE-2025-37907" ref_url="https://www.suse.com/security/cve/CVE-2025-37907/" source="CVE"/>
		<reference ref_id="CVE-2025-37908" ref_url="https://www.suse.com/security/cve/CVE-2025-37908/" source="CVE"/>
		<reference ref_id="CVE-2025-37909" ref_url="https://www.suse.com/security/cve/CVE-2025-37909/" source="CVE"/>
		<reference ref_id="CVE-2025-37910" ref_url="https://www.suse.com/security/cve/CVE-2025-37910/" source="CVE"/>
		<reference ref_id="CVE-2025-37911" ref_url="https://www.suse.com/security/cve/CVE-2025-37911/" source="CVE"/>
		<reference ref_id="CVE-2025-37912" ref_url="https://www.suse.com/security/cve/CVE-2025-37912/" source="CVE"/>
		<reference ref_id="CVE-2025-37913" ref_url="https://www.suse.com/security/cve/CVE-2025-37913/" source="CVE"/>
		<reference ref_id="CVE-2025-37914" ref_url="https://www.suse.com/security/cve/CVE-2025-37914/" source="CVE"/>
		<reference ref_id="CVE-2025-37915" ref_url="https://www.suse.com/security/cve/CVE-2025-37915/" source="CVE"/>
		<reference ref_id="CVE-2025-37917" ref_url="https://www.suse.com/security/cve/CVE-2025-37917/" source="CVE"/>
		<reference ref_id="CVE-2025-37918" ref_url="https://www.suse.com/security/cve/CVE-2025-37918/" source="CVE"/>
		<reference ref_id="CVE-2025-37919" ref_url="https://www.suse.com/security/cve/CVE-2025-37919/" source="CVE"/>
		<reference ref_id="CVE-2025-37920" ref_url="https://www.suse.com/security/cve/CVE-2025-37920/" source="CVE"/>
		<reference ref_id="CVE-2025-37921" ref_url="https://www.suse.com/security/cve/CVE-2025-37921/" source="CVE"/>
		<reference ref_id="CVE-2025-37922" ref_url="https://www.suse.com/security/cve/CVE-2025-37922/" source="CVE"/>
		<reference ref_id="CVE-2025-37923" ref_url="https://www.suse.com/security/cve/CVE-2025-37923/" source="CVE"/>
		<reference ref_id="CVE-2025-37927" ref_url="https://www.suse.com/security/cve/CVE-2025-37927/" source="CVE"/>
		<reference ref_id="CVE-2025-37928" ref_url="https://www.suse.com/security/cve/CVE-2025-37928/" source="CVE"/>
		<reference ref_id="CVE-2025-37929" ref_url="https://www.suse.com/security/cve/CVE-2025-37929/" source="CVE"/>
		<reference ref_id="CVE-2025-37930" ref_url="https://www.suse.com/security/cve/CVE-2025-37930/" source="CVE"/>
		<reference ref_id="CVE-2025-37931" ref_url="https://www.suse.com/security/cve/CVE-2025-37931/" source="CVE"/>
		<reference ref_id="CVE-2025-37932" ref_url="https://www.suse.com/security/cve/CVE-2025-37932/" source="CVE"/>
		<reference ref_id="CVE-2025-37933" ref_url="https://www.suse.com/security/cve/CVE-2025-37933/" source="CVE"/>
		<reference ref_id="CVE-2025-37934" ref_url="https://www.suse.com/security/cve/CVE-2025-37934/" source="CVE"/>
		<reference ref_id="CVE-2025-37935" ref_url="https://www.suse.com/security/cve/CVE-2025-37935/" source="CVE"/>
		<reference ref_id="CVE-2025-37936" ref_url="https://www.suse.com/security/cve/CVE-2025-37936/" source="CVE"/>
		<reference ref_id="CVE-2025-37937" ref_url="https://www.suse.com/security/cve/CVE-2025-37937/" source="CVE"/>
		<reference ref_id="CVE-2025-37938" ref_url="https://www.suse.com/security/cve/CVE-2025-37938/" source="CVE"/>
		<reference ref_id="CVE-2025-37941" ref_url="https://www.suse.com/security/cve/CVE-2025-37941/" source="CVE"/>
		<reference ref_id="CVE-2025-37942" ref_url="https://www.suse.com/security/cve/CVE-2025-37942/" source="CVE"/>
		<reference ref_id="CVE-2025-37943" ref_url="https://www.suse.com/security/cve/CVE-2025-37943/" source="CVE"/>
		<reference ref_id="CVE-2025-37944" ref_url="https://www.suse.com/security/cve/CVE-2025-37944/" source="CVE"/>
		<reference ref_id="CVE-2025-37945" ref_url="https://www.suse.com/security/cve/CVE-2025-37945/" source="CVE"/>
		<reference ref_id="CVE-2025-37946" ref_url="https://www.suse.com/security/cve/CVE-2025-37946/" source="CVE"/>
		<reference ref_id="CVE-2025-37948" ref_url="https://www.suse.com/security/cve/CVE-2025-37948/" source="CVE"/>
		<reference ref_id="CVE-2025-37949" ref_url="https://www.suse.com/security/cve/CVE-2025-37949/" source="CVE"/>
		<reference ref_id="CVE-2025-37951" ref_url="https://www.suse.com/security/cve/CVE-2025-37951/" source="CVE"/>
		<reference ref_id="CVE-2025-37953" ref_url="https://www.suse.com/security/cve/CVE-2025-37953/" source="CVE"/>
		<reference ref_id="CVE-2025-37954" ref_url="https://www.suse.com/security/cve/CVE-2025-37954/" source="CVE"/>
		<reference ref_id="CVE-2025-37955" ref_url="https://www.suse.com/security/cve/CVE-2025-37955/" source="CVE"/>
		<reference ref_id="CVE-2025-37957" ref_url="https://www.suse.com/security/cve/CVE-2025-37957/" source="CVE"/>
		<reference ref_id="CVE-2025-37958" ref_url="https://www.suse.com/security/cve/CVE-2025-37958/" source="CVE"/>
		<reference ref_id="CVE-2025-37959" ref_url="https://www.suse.com/security/cve/CVE-2025-37959/" source="CVE"/>
		<reference ref_id="CVE-2025-37960" ref_url="https://www.suse.com/security/cve/CVE-2025-37960/" source="CVE"/>
		<reference ref_id="CVE-2025-37961" ref_url="https://www.suse.com/security/cve/CVE-2025-37961/" source="CVE"/>
		<reference ref_id="CVE-2025-37963" ref_url="https://www.suse.com/security/cve/CVE-2025-37963/" source="CVE"/>
		<reference ref_id="CVE-2025-37965" ref_url="https://www.suse.com/security/cve/CVE-2025-37965/" source="CVE"/>
		<reference ref_id="CVE-2025-37967" ref_url="https://www.suse.com/security/cve/CVE-2025-37967/" source="CVE"/>
		<reference ref_id="CVE-2025-37968" ref_url="https://www.suse.com/security/cve/CVE-2025-37968/" source="CVE"/>
		<reference ref_id="CVE-2025-37969" ref_url="https://www.suse.com/security/cve/CVE-2025-37969/" source="CVE"/>
		<reference ref_id="CVE-2025-37970" ref_url="https://www.suse.com/security/cve/CVE-2025-37970/" source="CVE"/>
		<reference ref_id="CVE-2025-37971" ref_url="https://www.suse.com/security/cve/CVE-2025-37971/" source="CVE"/>
		<reference ref_id="CVE-2025-37972" ref_url="https://www.suse.com/security/cve/CVE-2025-37972/" source="CVE"/>
		<reference ref_id="CVE-2025-37973" ref_url="https://www.suse.com/security/cve/CVE-2025-37973/" source="CVE"/>
		<reference ref_id="CVE-2025-37974" ref_url="https://www.suse.com/security/cve/CVE-2025-37974/" source="CVE"/>
		<reference ref_id="CVE-2025-37978" ref_url="https://www.suse.com/security/cve/CVE-2025-37978/" source="CVE"/>
		<reference ref_id="CVE-2025-37979" ref_url="https://www.suse.com/security/cve/CVE-2025-37979/" source="CVE"/>
		<reference ref_id="CVE-2025-37980" ref_url="https://www.suse.com/security/cve/CVE-2025-37980/" source="CVE"/>
		<reference ref_id="CVE-2025-37981" ref_url="https://www.suse.com/security/cve/CVE-2025-37981/" source="CVE"/>
		<reference ref_id="CVE-2025-37982" ref_url="https://www.suse.com/security/cve/CVE-2025-37982/" source="CVE"/>
		<reference ref_id="CVE-2025-37983" ref_url="https://www.suse.com/security/cve/CVE-2025-37983/" source="CVE"/>
		<reference ref_id="CVE-2025-37984" ref_url="https://www.suse.com/security/cve/CVE-2025-37984/" source="CVE"/>
		<reference ref_id="CVE-2025-37985" ref_url="https://www.suse.com/security/cve/CVE-2025-37985/" source="CVE"/>
		<reference ref_id="CVE-2025-37986" ref_url="https://www.suse.com/security/cve/CVE-2025-37986/" source="CVE"/>
		<reference ref_id="CVE-2025-37987" ref_url="https://www.suse.com/security/cve/CVE-2025-37987/" source="CVE"/>
		<reference ref_id="CVE-2025-37988" ref_url="https://www.suse.com/security/cve/CVE-2025-37988/" source="CVE"/>
		<reference ref_id="CVE-2025-37989" ref_url="https://www.suse.com/security/cve/CVE-2025-37989/" source="CVE"/>
		<reference ref_id="CVE-2025-37990" ref_url="https://www.suse.com/security/cve/CVE-2025-37990/" source="CVE"/>
		<reference ref_id="CVE-2025-37992" ref_url="https://www.suse.com/security/cve/CVE-2025-37992/" source="CVE"/>
		<reference ref_id="CVE-2025-37993" ref_url="https://www.suse.com/security/cve/CVE-2025-37993/" source="CVE"/>
		<reference ref_id="CVE-2025-37994" ref_url="https://www.suse.com/security/cve/CVE-2025-37994/" source="CVE"/>
		<reference ref_id="CVE-2025-37995" ref_url="https://www.suse.com/security/cve/CVE-2025-37995/" source="CVE"/>
		<reference ref_id="CVE-2025-37996" ref_url="https://www.suse.com/security/cve/CVE-2025-37996/" source="CVE"/>
		<reference ref_id="CVE-2025-37997" ref_url="https://www.suse.com/security/cve/CVE-2025-37997/" source="CVE"/>
		<reference ref_id="CVE-2025-37998" ref_url="https://www.suse.com/security/cve/CVE-2025-37998/" source="CVE"/>
		<reference ref_id="CVE-2025-37999" ref_url="https://www.suse.com/security/cve/CVE-2025-37999/" source="CVE"/>
		<reference ref_id="CVE-2025-38000" ref_url="https://www.suse.com/security/cve/CVE-2025-38000/" source="CVE"/>
		<reference ref_id="CVE-2025-38001" ref_url="https://www.suse.com/security/cve/CVE-2025-38001/" source="CVE"/>
		<reference ref_id="CVE-2025-38003" ref_url="https://www.suse.com/security/cve/CVE-2025-38003/" source="CVE"/>
		<reference ref_id="CVE-2025-38004" ref_url="https://www.suse.com/security/cve/CVE-2025-38004/" source="CVE"/>
		<reference ref_id="CVE-2025-38005" ref_url="https://www.suse.com/security/cve/CVE-2025-38005/" source="CVE"/>
		<reference ref_id="CVE-2025-38007" ref_url="https://www.suse.com/security/cve/CVE-2025-38007/" source="CVE"/>
		<reference ref_id="CVE-2025-38009" ref_url="https://www.suse.com/security/cve/CVE-2025-38009/" source="CVE"/>
		<reference ref_id="CVE-2025-38010" ref_url="https://www.suse.com/security/cve/CVE-2025-38010/" source="CVE"/>
		<reference ref_id="CVE-2025-38011" ref_url="https://www.suse.com/security/cve/CVE-2025-38011/" source="CVE"/>
		<reference ref_id="CVE-2025-38013" ref_url="https://www.suse.com/security/cve/CVE-2025-38013/" source="CVE"/>
		<reference ref_id="CVE-2025-38014" ref_url="https://www.suse.com/security/cve/CVE-2025-38014/" source="CVE"/>
		<reference ref_id="CVE-2025-38015" ref_url="https://www.suse.com/security/cve/CVE-2025-38015/" source="CVE"/>
		<reference ref_id="CVE-2025-38016" ref_url="https://www.suse.com/security/cve/CVE-2025-38016/" source="CVE"/>
		<reference ref_id="CVE-2025-38018" ref_url="https://www.suse.com/security/cve/CVE-2025-38018/" source="CVE"/>
		<reference ref_id="CVE-2025-38020" ref_url="https://www.suse.com/security/cve/CVE-2025-38020/" source="CVE"/>
		<reference ref_id="CVE-2025-38022" ref_url="https://www.suse.com/security/cve/CVE-2025-38022/" source="CVE"/>
		<reference ref_id="CVE-2025-38023" ref_url="https://www.suse.com/security/cve/CVE-2025-38023/" source="CVE"/>
		<reference ref_id="CVE-2025-38024" ref_url="https://www.suse.com/security/cve/CVE-2025-38024/" source="CVE"/>
		<reference ref_id="CVE-2025-38027" ref_url="https://www.suse.com/security/cve/CVE-2025-38027/" source="CVE"/>
		<reference ref_id="CVE-2025-38031" ref_url="https://www.suse.com/security/cve/CVE-2025-38031/" source="CVE"/>
		<reference ref_id="CVE-2025-38035" ref_url="https://www.suse.com/security/cve/CVE-2025-38035/" source="CVE"/>
		<reference ref_id="CVE-2025-38040" ref_url="https://www.suse.com/security/cve/CVE-2025-38040/" source="CVE"/>
		<reference ref_id="CVE-2025-38043" ref_url="https://www.suse.com/security/cve/CVE-2025-38043/" source="CVE"/>
		<reference ref_id="CVE-2025-38044" ref_url="https://www.suse.com/security/cve/CVE-2025-38044/" source="CVE"/>
		<reference ref_id="CVE-2025-38045" ref_url="https://www.suse.com/security/cve/CVE-2025-38045/" source="CVE"/>
		<reference ref_id="CVE-2025-38047" ref_url="https://www.suse.com/security/cve/CVE-2025-38047/" source="CVE"/>
		<reference ref_id="CVE-2025-38050" ref_url="https://www.suse.com/security/cve/CVE-2025-38050/" source="CVE"/>
		<reference ref_id="CVE-2025-38051" ref_url="https://www.suse.com/security/cve/CVE-2025-38051/" source="CVE"/>
		<reference ref_id="CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052/" source="CVE"/>
		<reference ref_id="CVE-2025-38053" ref_url="https://www.suse.com/security/cve/CVE-2025-38053/" source="CVE"/>
		<reference ref_id="CVE-2025-38054" ref_url="https://www.suse.com/security/cve/CVE-2025-38054/" source="CVE"/>
		<reference ref_id="CVE-2025-38055" ref_url="https://www.suse.com/security/cve/CVE-2025-38055/" source="CVE"/>
		<reference ref_id="CVE-2025-38056" ref_url="https://www.suse.com/security/cve/CVE-2025-38056/" source="CVE"/>
		<reference ref_id="CVE-2025-38057" ref_url="https://www.suse.com/security/cve/CVE-2025-38057/" source="CVE"/>
		<reference ref_id="CVE-2025-38059" ref_url="https://www.suse.com/security/cve/CVE-2025-38059/" source="CVE"/>
		<reference ref_id="CVE-2025-38060" ref_url="https://www.suse.com/security/cve/CVE-2025-38060/" source="CVE"/>
		<reference ref_id="CVE-2025-38061" ref_url="https://www.suse.com/security/cve/CVE-2025-38061/" source="CVE"/>
		<reference ref_id="CVE-2025-38063" ref_url="https://www.suse.com/security/cve/CVE-2025-38063/" source="CVE"/>
		<reference ref_id="CVE-2025-38064" ref_url="https://www.suse.com/security/cve/CVE-2025-38064/" source="CVE"/>
		<reference ref_id="CVE-2025-38066" ref_url="https://www.suse.com/security/cve/CVE-2025-38066/" source="CVE"/>
		<reference ref_id="CVE-2025-38068" ref_url="https://www.suse.com/security/cve/CVE-2025-38068/" source="CVE"/>
		<reference ref_id="CVE-2025-38069" ref_url="https://www.suse.com/security/cve/CVE-2025-38069/" source="CVE"/>
		<reference ref_id="CVE-2025-38072" ref_url="https://www.suse.com/security/cve/CVE-2025-38072/" source="CVE"/>
		<reference ref_id="CVE-2025-38073" ref_url="https://www.suse.com/security/cve/CVE-2025-38073/" source="CVE"/>
		<reference ref_id="CVE-2025-38074" ref_url="https://www.suse.com/security/cve/CVE-2025-38074/" source="CVE"/>
		<reference ref_id="CVE-2025-38077" ref_url="https://www.suse.com/security/cve/CVE-2025-38077/" source="CVE"/>
		<reference ref_id="CVE-2025-38078" ref_url="https://www.suse.com/security/cve/CVE-2025-38078/" source="CVE"/>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<reference ref_id="CVE-2025-38080" ref_url="https://www.suse.com/security/cve/CVE-2025-38080/" source="CVE"/>
		<reference ref_id="CVE-2025-38081" ref_url="https://www.suse.com/security/cve/CVE-2025-38081/" source="CVE"/>
		<reference ref_id="CVE-2025-38082" ref_url="https://www.suse.com/security/cve/CVE-2025-38082/" source="CVE"/>
		<reference ref_id="CVE-2025-38083" ref_url="https://www.suse.com/security/cve/CVE-2025-38083/" source="CVE"/>
		<reference ref_id="CVE-2025-38094" ref_url="https://www.suse.com/security/cve/CVE-2025-38094/" source="CVE"/>
		<reference ref_id="CVE-2025-38097" ref_url="https://www.suse.com/security/cve/CVE-2025-38097/" source="CVE"/>
		<reference ref_id="CVE-2025-38100" ref_url="https://www.suse.com/security/cve/CVE-2025-38100/" source="CVE"/>
		<reference ref_id="CVE-2025-38104" ref_url="https://www.suse.com/security/cve/CVE-2025-38104/" source="CVE"/>
		<reference ref_id="CVE-2025-38105" ref_url="https://www.suse.com/security/cve/CVE-2025-38105/" source="CVE"/>
		<reference ref_id="CVE-2025-38115" ref_url="https://www.suse.com/security/cve/CVE-2025-38115/" source="CVE"/>
		<reference ref_id="CVE-2025-38126" ref_url="https://www.suse.com/security/cve/CVE-2025-38126/" source="CVE"/>
		<reference ref_id="CVE-2025-38131" ref_url="https://www.suse.com/security/cve/CVE-2025-38131/" source="CVE"/>
		<reference ref_id="CVE-2025-38132" ref_url="https://www.suse.com/security/cve/CVE-2025-38132/" source="CVE"/>
		<reference ref_id="CVE-2025-38139" ref_url="https://www.suse.com/security/cve/CVE-2025-38139/" source="CVE"/>
		<reference ref_id="CVE-2025-38140" ref_url="https://www.suse.com/security/cve/CVE-2025-38140/" source="CVE"/>
		<reference ref_id="CVE-2025-38147" ref_url="https://www.suse.com/security/cve/CVE-2025-38147/" source="CVE"/>
		<reference ref_id="CVE-2025-38152" ref_url="https://www.suse.com/security/cve/CVE-2025-38152/" source="CVE"/>
		<reference ref_id="CVE-2025-38154" ref_url="https://www.suse.com/security/cve/CVE-2025-38154/" source="CVE"/>
		<reference ref_id="CVE-2025-38158" ref_url="https://www.suse.com/security/cve/CVE-2025-38158/" source="CVE"/>
		<reference ref_id="CVE-2025-38162" ref_url="https://www.suse.com/security/cve/CVE-2025-38162/" source="CVE"/>
		<reference ref_id="CVE-2025-38166" ref_url="https://www.suse.com/security/cve/CVE-2025-38166/" source="CVE"/>
		<reference ref_id="CVE-2025-38183" ref_url="https://www.suse.com/security/cve/CVE-2025-38183/" source="CVE"/>
		<reference ref_id="CVE-2025-38187" ref_url="https://www.suse.com/security/cve/CVE-2025-38187/" source="CVE"/>
		<reference ref_id="CVE-2025-38192" ref_url="https://www.suse.com/security/cve/CVE-2025-38192/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<reference ref_id="CVE-2025-38202" ref_url="https://www.suse.com/security/cve/CVE-2025-38202/" source="CVE"/>
		<reference ref_id="CVE-2025-38206" ref_url="https://www.suse.com/security/cve/CVE-2025-38206/" source="CVE"/>
		<reference ref_id="CVE-2025-38207" ref_url="https://www.suse.com/security/cve/CVE-2025-38207/" source="CVE"/>
		<reference ref_id="CVE-2025-38210" ref_url="https://www.suse.com/security/cve/CVE-2025-38210/" source="CVE"/>
		<reference ref_id="CVE-2025-38212" ref_url="https://www.suse.com/security/cve/CVE-2025-38212/" source="CVE"/>
		<reference ref_id="CVE-2025-38236" ref_url="https://www.suse.com/security/cve/CVE-2025-38236/" source="CVE"/>
		<reference ref_id="CVE-2025-38239" ref_url="https://www.suse.com/security/cve/CVE-2025-38239/" source="CVE"/>
		<reference ref_id="CVE-2025-38240" ref_url="https://www.suse.com/security/cve/CVE-2025-38240/" source="CVE"/>
		<reference ref_id="CVE-2025-38248" ref_url="https://www.suse.com/security/cve/CVE-2025-38248/" source="CVE"/>
		<reference ref_id="CVE-2025-38250" ref_url="https://www.suse.com/security/cve/CVE-2025-38250/" source="CVE"/>
		<reference ref_id="CVE-2025-38279" ref_url="https://www.suse.com/security/cve/CVE-2025-38279/" source="CVE"/>
		<reference ref_id="CVE-2025-38283" ref_url="https://www.suse.com/security/cve/CVE-2025-38283/" source="CVE"/>
		<reference ref_id="CVE-2025-38310" ref_url="https://www.suse.com/security/cve/CVE-2025-38310/" source="CVE"/>
		<reference ref_id="CVE-2025-38334" ref_url="https://www.suse.com/security/cve/CVE-2025-38334/" source="CVE"/>
		<reference ref_id="CVE-2025-38479" ref_url="https://www.suse.com/security/cve/CVE-2025-38479/" source="CVE"/>
		<reference ref_id="CVE-2025-38637" ref_url="https://www.suse.com/security/cve/CVE-2025-38637/" source="CVE"/>
		<reference ref_id="CVE-2025-39688" ref_url="https://www.suse.com/security/cve/CVE-2025-39688/" source="CVE"/>
		<reference ref_id="CVE-2025-39728" ref_url="https://www.suse.com/security/cve/CVE-2025-39728/" source="CVE"/>
		<reference ref_id="CVE-2025-39778" ref_url="https://www.suse.com/security/cve/CVE-2025-39778/" source="CVE"/>
		<reference ref_id="CVE-2025-39989" ref_url="https://www.suse.com/security/cve/CVE-2025-39989/" source="CVE"/>
		<reference ref_id="CVE-2025-40014" ref_url="https://www.suse.com/security/cve/CVE-2025-40014/" source="CVE"/>
		<reference ref_id="CVE-2025-40114" ref_url="https://www.suse.com/security/cve/CVE-2025-40114/" source="CVE"/>
		<reference ref_id="CVE-2025-40325" ref_url="https://www.suse.com/security/cve/CVE-2025-40325/" source="CVE"/>
		<reference ref_id="CVE-2025-40364" ref_url="https://www.suse.com/security/cve/CVE-2025-40364/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-azure-6.12.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3695">CVE-2016-3695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48628/">CVE-2022-48628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48772/">CVE-2022-48772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49145/">CVE-2022-49145 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49145">CVE-2022-49145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49320/">CVE-2022-49320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49320">CVE-2022-49320 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3269/">CVE-2023-3269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3773/">CVE-2023-3773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38417/">CVE-2023-38417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38417">CVE-2023-38417 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42752/">CVE-2023-42752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42756/">CVE-2023-42756 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4611/">CVE-2023-4611 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4611">CVE-2023-4611 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47210/">CVE-2023-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47210">CVE-2023-47210 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50431/">CVE-2023-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52433/">CVE-2023-52433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52433">CVE-2023-52433 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52434/">CVE-2023-52434 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52435/">CVE-2023-52435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52437/">CVE-2023-52437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52437">CVE-2023-52437 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52440/">CVE-2023-52440 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52440">CVE-2023-52440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52446/">CVE-2023-52446 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52446">CVE-2023-52446 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52453/">CVE-2023-52453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52455/">CVE-2023-52455 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52455">CVE-2023-52455 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52460/">CVE-2023-52460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52460">CVE-2023-52460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52461/">CVE-2023-52461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52461">CVE-2023-52461 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52462/">CVE-2023-52462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52468/">CVE-2023-52468 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52468">CVE-2023-52468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52471/">CVE-2023-52471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52471">CVE-2023-52471 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52472/">CVE-2023-52472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52472">CVE-2023-52472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52473/">CVE-2023-52473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52473">CVE-2023-52473 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52481/">CVE-2023-52481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52483/">CVE-2023-52483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52483">CVE-2023-52483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52485/">CVE-2023-52485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52485">CVE-2023-52485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52487/">CVE-2023-52487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52487">CVE-2023-52487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52488/">CVE-2023-52488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52490/">CVE-2023-52490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52490">CVE-2023-52490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52491/">CVE-2023-52491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52491">CVE-2023-52491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52493/">CVE-2023-52493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52494/">CVE-2023-52494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52495/">CVE-2023-52495 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52495">CVE-2023-52495 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52498/">CVE-2023-52498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52503/">CVE-2023-52503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52505/">CVE-2023-52505 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52505">CVE-2023-52505 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52512/">CVE-2023-52512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52512">CVE-2023-52512 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52518/">CVE-2023-52518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52522/">CVE-2023-52522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52522">CVE-2023-52522 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52526/">CVE-2023-52526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52526">CVE-2023-52526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52527/">CVE-2023-52527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52527">CVE-2023-52527 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52561/">CVE-2023-52561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52562/">CVE-2023-52562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52562">CVE-2023-52562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52563/">CVE-2023-52563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52565/">CVE-2023-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52565">CVE-2023-52565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52568/">CVE-2023-52568 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52568">CVE-2023-52568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52570/">CVE-2023-52570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52570">CVE-2023-52570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52571/">CVE-2023-52571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52571">CVE-2023-52571 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52572/">CVE-2023-52572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52572">CVE-2023-52572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52573/">CVE-2023-52573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52577/">CVE-2023-52577 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52577">CVE-2023-52577 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52578/">CVE-2023-52578 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52578">CVE-2023-52578 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52584/">CVE-2023-52584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52584">CVE-2023-52584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52585/">CVE-2023-52585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52585">CVE-2023-52585 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52586/">CVE-2023-52586 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52586">CVE-2023-52586 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52587/">CVE-2023-52587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52589/">CVE-2023-52589 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52593/">CVE-2023-52593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52599/">CVE-2023-52599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52600/">CVE-2023-52600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52601/">CVE-2023-52601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52602/">CVE-2023-52602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52603/">CVE-2023-52603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52604/">CVE-2023-52604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52608/">CVE-2023-52608 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52611/">CVE-2023-52611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52611">CVE-2023-52611 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52612/">CVE-2023-52612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52614/">CVE-2023-52614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52617/">CVE-2023-52617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52618/">CVE-2023-52618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52624/">CVE-2023-52624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52624">CVE-2023-52624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52625/">CVE-2023-52625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52625">CVE-2023-52625 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52626/">CVE-2023-52626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52626">CVE-2023-52626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52627/">CVE-2023-52627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52631/">CVE-2023-52631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52631">CVE-2023-52631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52632/">CVE-2023-52632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52634/">CVE-2023-52634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52634">CVE-2023-52634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52635/">CVE-2023-52635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52636/">CVE-2023-52636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52637/">CVE-2023-52637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52638/">CVE-2023-52638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52638">CVE-2023-52638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52639/">CVE-2023-52639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52640/">CVE-2023-52640 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52640">CVE-2023-52640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52641/">CVE-2023-52641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52641">CVE-2023-52641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52642/">CVE-2023-52642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52642">CVE-2023-52642 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52643/">CVE-2023-52643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52643">CVE-2023-52643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52644/">CVE-2023-52644 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52644">CVE-2023-52644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52645/">CVE-2023-52645 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52645">CVE-2023-52645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52647/">CVE-2023-52647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52647">CVE-2023-52647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52648/">CVE-2023-52648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52648">CVE-2023-52648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52649/">CVE-2023-52649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52649">CVE-2023-52649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52650/">CVE-2023-52650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52650">CVE-2023-52650 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52652/">CVE-2023-52652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52652">CVE-2023-52652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52656/">CVE-2023-52656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52656">CVE-2023-52656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52657/">CVE-2023-52657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52657">CVE-2023-52657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52659/">CVE-2023-52659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52659">CVE-2023-52659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52660/">CVE-2023-52660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52660">CVE-2023-52660 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52661/">CVE-2023-52661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52661">CVE-2023-52661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52663/">CVE-2023-52663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52663">CVE-2023-52663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52664/">CVE-2023-52664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52664">CVE-2023-52664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52668/">CVE-2023-52668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52668">CVE-2023-52668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52671/">CVE-2023-52671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52673/">CVE-2023-52673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52673">CVE-2023-52673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52674/">CVE-2023-52674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52674">CVE-2023-52674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52678/">CVE-2023-52678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52678">CVE-2023-52678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52680/">CVE-2023-52680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52680">CVE-2023-52680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52681/">CVE-2023-52681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52681">CVE-2023-52681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52685/">CVE-2023-52685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52685">CVE-2023-52685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52687/">CVE-2023-52687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52687">CVE-2023-52687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52688/">CVE-2023-52688 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52688">CVE-2023-52688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52691/">CVE-2023-52691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52691">CVE-2023-52691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52692/">CVE-2023-52692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52692">CVE-2023-52692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52693/">CVE-2023-52693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52693">CVE-2023-52693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52694/">CVE-2023-52694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52694">CVE-2023-52694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52695/">CVE-2023-52695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52695">CVE-2023-52695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52696/">CVE-2023-52696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52696">CVE-2023-52696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52697/">CVE-2023-52697 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52697">CVE-2023-52697 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52698/">CVE-2023-52698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52698">CVE-2023-52698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52699/">CVE-2023-52699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52749/">CVE-2023-52749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52749">CVE-2023-52749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52750/">CVE-2023-52750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52750">CVE-2023-52750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52751/">CVE-2023-52751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52751">CVE-2023-52751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52757/">CVE-2023-52757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52757">CVE-2023-52757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52765/">CVE-2023-52765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52765">CVE-2023-52765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52767/">CVE-2023-52767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52767">CVE-2023-52767 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52768/">CVE-2023-52768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52768">CVE-2023-52768 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52769/">CVE-2023-52769 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52769">CVE-2023-52769 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52771/">CVE-2023-52771 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52771">CVE-2023-52771 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52772/">CVE-2023-52772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52772">CVE-2023-52772 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52773/">CVE-2023-52773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52773">CVE-2023-52773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52776/">CVE-2023-52776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52776">CVE-2023-52776 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52778/">CVE-2023-52778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52778">CVE-2023-52778 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52780/">CVE-2023-52780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52780">CVE-2023-52780 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52782/">CVE-2023-52782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52782">CVE-2023-52782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52783/">CVE-2023-52783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52783">CVE-2023-52783 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52786/">CVE-2023-52786 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52786">CVE-2023-52786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52787/">CVE-2023-52787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52787">CVE-2023-52787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52792/">CVE-2023-52792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52792">CVE-2023-52792 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52794/">CVE-2023-52794 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52794">CVE-2023-52794 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52795/">CVE-2023-52795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52795">CVE-2023-52795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52801/">CVE-2023-52801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52801">CVE-2023-52801 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52807/">CVE-2023-52807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52807">CVE-2023-52807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52808/">CVE-2023-52808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52808">CVE-2023-52808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52812/">CVE-2023-52812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52812">CVE-2023-52812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52813/">CVE-2023-52813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52813">CVE-2023-52813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52815/">CVE-2023-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52815">CVE-2023-52815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52827/">CVE-2023-52827 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52827">CVE-2023-52827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52829/">CVE-2023-52829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52829">CVE-2023-52829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52836/">CVE-2023-52836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52836">CVE-2023-52836 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52842/">CVE-2023-52842 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52842">CVE-2023-52842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52843/">CVE-2023-52843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52843">CVE-2023-52843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52849/">CVE-2023-52849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52849">CVE-2023-52849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52850/">CVE-2023-52850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52850">CVE-2023-52850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52851/">CVE-2023-52851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52851">CVE-2023-52851 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52857/">CVE-2023-52857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52857">CVE-2023-52857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52859/">CVE-2023-52859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52859">CVE-2023-52859 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52860/">CVE-2023-52860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52860">CVE-2023-52860 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52861/">CVE-2023-52861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52861">CVE-2023-52861 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52862/">CVE-2023-52862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52862">CVE-2023-52862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52863/">CVE-2023-52863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52863">CVE-2023-52863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52866/">CVE-2023-52866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52866">CVE-2023-52866 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52869/">CVE-2023-52869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52869">CVE-2023-52869 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52874/">CVE-2023-52874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52874">CVE-2023-52874 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52879/">CVE-2023-52879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52879">CVE-2023-52879 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52882/">CVE-2023-52882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52883/">CVE-2023-52883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52883">CVE-2023-52883 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52887/">CVE-2023-52887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52889/">CVE-2023-52889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52915/">CVE-2023-52915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52915">CVE-2023-52915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52916/">CVE-2023-52916 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52916">CVE-2023-52916 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52918/">CVE-2023-52918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52918">CVE-2023-52918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53034/">CVE-2023-53034 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5972/">CVE-2023-5972 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5972">CVE-2023-5972 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6238/">CVE-2023-6238 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6238">CVE-2023-6238 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6679/">CVE-2023-6679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6679">CVE-2023-6679 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0193/">CVE-2024-0193 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0193">CVE-2024-0193 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0646/">CVE-2024-0646 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1312/">CVE-2024-1312 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1312">CVE-2024-1312 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-21823/">CVE-2024-21823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21823">CVE-2024-21823 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24861/">CVE-2024-24861 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24861">CVE-2024-24861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-25741/">CVE-2024-25741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25741">CVE-2024-25741 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26581/">CVE-2024-26581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26582/">CVE-2024-26582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26590/">CVE-2024-26590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26590">CVE-2024-26590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26597/">CVE-2024-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26599/">CVE-2024-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26605/">CVE-2024-26605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26605">CVE-2024-26605 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26611/">CVE-2024-26611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26611">CVE-2024-26611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26612/">CVE-2024-26612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26616/">CVE-2024-26616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26616">CVE-2024-26616 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26618/">CVE-2024-26618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26618">CVE-2024-26618 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26620/">CVE-2024-26620 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26623/">CVE-2024-26623 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26623">CVE-2024-26623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26625/">CVE-2024-26625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26627/">CVE-2024-26627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26631/">CVE-2024-26631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26632/">CVE-2024-26632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26632">CVE-2024-26632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26635/">CVE-2024-26635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26636/">CVE-2024-26636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26637/">CVE-2024-26637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26637">CVE-2024-26637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26638/">CVE-2024-26638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26638">CVE-2024-26638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26641/">CVE-2024-26641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26644/">CVE-2024-26644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26646/">CVE-2024-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26647/">CVE-2024-26647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26647">CVE-2024-26647 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26648/">CVE-2024-26648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26648">CVE-2024-26648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26649/">CVE-2024-26649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26650/">CVE-2024-26650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26650">CVE-2024-26650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26651/">CVE-2024-26651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26652/">CVE-2024-26652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26652">CVE-2024-26652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26654/">CVE-2024-26654 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26657/">CVE-2024-26657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26657">CVE-2024-26657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26661/">CVE-2024-26661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26662/">CVE-2024-26662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26662">CVE-2024-26662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26663/">CVE-2024-26663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26666/">CVE-2024-26666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26666">CVE-2024-26666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26667/">CVE-2024-26667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26670/">CVE-2024-26670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26672/">CVE-2024-26672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26672">CVE-2024-26672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26674/">CVE-2024-26674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26674">CVE-2024-26674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26676/">CVE-2024-26676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26676">CVE-2024-26676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26677/">CVE-2024-26677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26677">CVE-2024-26677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26679/">CVE-2024-26679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26680/">CVE-2024-26680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26681/">CVE-2024-26681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26682/">CVE-2024-26682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26682">CVE-2024-26682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26683/">CVE-2024-26683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26683">CVE-2024-26683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26684/">CVE-2024-26684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26685/">CVE-2024-26685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26691/">CVE-2024-26691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26691">CVE-2024-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26692/">CVE-2024-26692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26693/">CVE-2024-26693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26693">CVE-2024-26693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26694/">CVE-2024-26694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26694">CVE-2024-26694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26695/">CVE-2024-26695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26696/">CVE-2024-26696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26697/">CVE-2024-26697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26699/">CVE-2024-26699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26699">CVE-2024-26699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26700/">CVE-2024-26700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26702/">CVE-2024-26702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26709/">CVE-2024-26709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26709">CVE-2024-26709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26710/">CVE-2024-26710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26710">CVE-2024-26710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26711/">CVE-2024-26711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26711">CVE-2024-26711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26714/">CVE-2024-26714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26714">CVE-2024-26714 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26715/">CVE-2024-26715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26716/">CVE-2024-26716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26716">CVE-2024-26716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26718/">CVE-2024-26718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26721/">CVE-2024-26721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26721">CVE-2024-26721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26722/">CVE-2024-26722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26722">CVE-2024-26722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26723/">CVE-2024-26723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26723">CVE-2024-26723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26724/">CVE-2024-26724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26724">CVE-2024-26724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26725/">CVE-2024-26725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26725">CVE-2024-26725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26726/">CVE-2024-26726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26726">CVE-2024-26726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26728/">CVE-2024-26728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26728">CVE-2024-26728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26729/">CVE-2024-26729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26729">CVE-2024-26729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26731/">CVE-2024-26731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26731">CVE-2024-26731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26734/">CVE-2024-26734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26734">CVE-2024-26734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26736/">CVE-2024-26736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26738/">CVE-2024-26738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26738">CVE-2024-26738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26740/">CVE-2024-26740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26740">CVE-2024-26740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26742/">CVE-2024-26742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26746/">CVE-2024-26746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26746">CVE-2024-26746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26747/">CVE-2024-26747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26748/">CVE-2024-26748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26749/">CVE-2024-26749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26750/">CVE-2024-26750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26750">CVE-2024-26750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26751/">CVE-2024-26751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26752/">CVE-2024-26752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26752">CVE-2024-26752 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-26753/">CVE-2024-26753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26753">CVE-2024-26753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26754/">CVE-2024-26754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26755/">CVE-2024-26755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26755">CVE-2024-26755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26756/">CVE-2024-26756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26756">CVE-2024-26756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26757/">CVE-2024-26757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26757">CVE-2024-26757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26758/">CVE-2024-26758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26758">CVE-2024-26758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26759/">CVE-2024-26759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26761/">CVE-2024-26761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26761">CVE-2024-26761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26763/">CVE-2024-26763 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-26767/">CVE-2024-26767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26771/">CVE-2024-26771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26774/">CVE-2024-26774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26774">CVE-2024-26774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26775/">CVE-2024-26775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26776/">CVE-2024-26776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26777/">CVE-2024-26777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26778/">CVE-2024-26778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26780/">CVE-2024-26780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26780">CVE-2024-26780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26785/">CVE-2024-26785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26785">CVE-2024-26785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26786/">CVE-2024-26786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26786">CVE-2024-26786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26787/">CVE-2024-26787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26788/">CVE-2024-26788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26789/">CVE-2024-26789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26789">CVE-2024-26789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26790/">CVE-2024-26790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26791/">CVE-2024-26791 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26793/">CVE-2024-26793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26794/">CVE-2024-26794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26794">CVE-2024-26794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26797/">CVE-2024-26797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26797">CVE-2024-26797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26798/">CVE-2024-26798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26799/">CVE-2024-26799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26799">CVE-2024-26799 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26803/">CVE-2024-26803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26803">CVE-2024-26803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26805/">CVE-2024-26805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26807/">CVE-2024-26807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26809/">CVE-2024-26809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26812/">CVE-2024-26812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26815/">CVE-2024-26815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26815">CVE-2024-26815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26820/">CVE-2024-26820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26820">CVE-2024-26820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26822/">CVE-2024-26822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26822">CVE-2024-26822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26824/">CVE-2024-26824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26824">CVE-2024-26824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26825/">CVE-2024-26825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26825">CVE-2024-26825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26826/">CVE-2024-26826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26826">CVE-2024-26826 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26829/">CVE-2024-26829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26829">CVE-2024-26829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26832/">CVE-2024-26832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26832">CVE-2024-26832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26833/">CVE-2024-26833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26833">CVE-2024-26833 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26835/">CVE-2024-26835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26835">CVE-2024-26835 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26836/">CVE-2024-26836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26836">CVE-2024-26836 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26838/">CVE-2024-26838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26838">CVE-2024-26838 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26839/">CVE-2024-26839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26839">CVE-2024-26839 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26844/">CVE-2024-26844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26844">CVE-2024-26844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26845/">CVE-2024-26845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26845">CVE-2024-26845 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26847/">CVE-2024-26847 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26847">CVE-2024-26847 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26848/">CVE-2024-26848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26848">CVE-2024-26848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26849/">CVE-2024-26849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26849">CVE-2024-26849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26854/">CVE-2024-26854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26854">CVE-2024-26854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26856/">CVE-2024-26856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26856">CVE-2024-26856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26857/">CVE-2024-26857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26857">CVE-2024-26857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26858/">CVE-2024-26858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26858">CVE-2024-26858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26860/">CVE-2024-26860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26860">CVE-2024-26860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26861/">CVE-2024-26861 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26861">CVE-2024-26861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26863/">CVE-2024-26863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26863">CVE-2024-26863 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26865/">CVE-2024-26865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26865">CVE-2024-26865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26866/">CVE-2024-26866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26866">CVE-2024-26866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26868/">CVE-2024-26868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26868">CVE-2024-26868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26874/">CVE-2024-26874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26874">CVE-2024-26874 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26875/">CVE-2024-26875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26875">CVE-2024-26875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26876/">CVE-2024-26876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26876">CVE-2024-26876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26877/">CVE-2024-26877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26877">CVE-2024-26877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26879/">CVE-2024-26879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26879">CVE-2024-26879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26881/">CVE-2024-26881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26881">CVE-2024-26881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26882/">CVE-2024-26882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26882">CVE-2024-26882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26883/">CVE-2024-26883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26883">CVE-2024-26883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26884/">CVE-2024-26884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26884">CVE-2024-26884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26885/">CVE-2024-26885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26885">CVE-2024-26885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26886/">CVE-2024-26886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26886">CVE-2024-26886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26890/">CVE-2024-26890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26890">CVE-2024-26890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26891/">CVE-2024-26891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26891">CVE-2024-26891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26892/">CVE-2024-26892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26892">CVE-2024-26892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26893/">CVE-2024-26893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26893">CVE-2024-26893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26895/">CVE-2024-26895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26895">CVE-2024-26895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26896/">CVE-2024-26896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26896">CVE-2024-26896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26899/">CVE-2024-26899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26899">CVE-2024-26899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26900/">CVE-2024-26900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26900">CVE-2024-26900 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26909/">CVE-2024-26909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26909">CVE-2024-26909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26911/">CVE-2024-26911 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26911">CVE-2024-26911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26912/">CVE-2024-26912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26912">CVE-2024-26912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26913/">CVE-2024-26913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26913">CVE-2024-26913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26914/">CVE-2024-26914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26914">CVE-2024-26914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26915/">CVE-2024-26915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26915">CVE-2024-26915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26916/">CVE-2024-26916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26916">CVE-2024-26916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26917/">CVE-2024-26917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26917">CVE-2024-26917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26922/">CVE-2024-26922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26922">CVE-2024-26922 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26927/">CVE-2024-26927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26927">CVE-2024-26927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26932/">CVE-2024-26932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26932">CVE-2024-26932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26937/">CVE-2024-26937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26938/">CVE-2024-26938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26943/">CVE-2024-26943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26944/">CVE-2024-26944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26944">CVE-2024-26944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26945/">CVE-2024-26945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26945">CVE-2024-26945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26946/">CVE-2024-26946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26946">CVE-2024-26946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26948/">CVE-2024-26948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26948">CVE-2024-26948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26949/">CVE-2024-26949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26949">CVE-2024-26949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26950/">CVE-2024-26950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26951/">CVE-2024-26951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26955/">CVE-2024-26955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26956/">CVE-2024-26956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26957/">CVE-2024-26957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26959/">CVE-2024-26959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26959">CVE-2024-26959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26962/">CVE-2024-26962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26962">CVE-2024-26962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26963/">CVE-2024-26963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26963">CVE-2024-26963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26965/">CVE-2024-26965 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26966/">CVE-2024-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26968/">CVE-2024-26968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26968">CVE-2024-26968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26969/">CVE-2024-26969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26970/">CVE-2024-26970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26972/">CVE-2024-26972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26972">CVE-2024-26972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26975/">CVE-2024-26975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26975">CVE-2024-26975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26977/">CVE-2024-26977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26978/">CVE-2024-26978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26978">CVE-2024-26978 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26979/">CVE-2024-26979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26979">CVE-2024-26979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26981/">CVE-2024-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26983/">CVE-2024-26983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26983">CVE-2024-26983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26986/">CVE-2024-26986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26986">CVE-2024-26986 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26988/">CVE-2024-26988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26989/">CVE-2024-26989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26990/">CVE-2024-26990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26990">CVE-2024-26990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26991/">CVE-2024-26991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26991">CVE-2024-26991 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26992/">CVE-2024-26992 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26992">CVE-2024-26992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26994/">CVE-2024-26994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26995/">CVE-2024-26995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26995">CVE-2024-26995 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26996/">CVE-2024-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26997/">CVE-2024-26997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26999/">CVE-2024-26999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27000/">CVE-2024-27000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27001/">CVE-2024-27001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27001">CVE-2024-27001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27002/">CVE-2024-27002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27002">CVE-2024-27002 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27003/">CVE-2024-27003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27003">CVE-2024-27003 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27004/">CVE-2024-27004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27009/">CVE-2024-27009 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27009">CVE-2024-27009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27012/">CVE-2024-27012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27012">CVE-2024-27012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27015/">CVE-2024-27015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27022/">CVE-2024-27022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27022">CVE-2024-27022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27023/">CVE-2024-27023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27023">CVE-2024-27023 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27024/">CVE-2024-27024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27024">CVE-2024-27024 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27026/">CVE-2024-27026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27026">CVE-2024-27026 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27027/">CVE-2024-27027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27027">CVE-2024-27027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27028/">CVE-2024-27028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27028">CVE-2024-27028 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27029/">CVE-2024-27029 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27029">CVE-2024-27029 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27031/">CVE-2024-27031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27031">CVE-2024-27031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27036/">CVE-2024-27036 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27036">CVE-2024-27036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27037/">CVE-2024-27037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27037">CVE-2024-27037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27038/">CVE-2024-27038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27038">CVE-2024-27038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27039/">CVE-2024-27039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27039">CVE-2024-27039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27040/">CVE-2024-27040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27040">CVE-2024-27040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27041/">CVE-2024-27041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27041">CVE-2024-27041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27044/">CVE-2024-27044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27044">CVE-2024-27044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27045/">CVE-2024-27045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27045">CVE-2024-27045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27047/">CVE-2024-27047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27047">CVE-2024-27047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27048/">CVE-2024-27048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27048">CVE-2024-27048 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27049/">CVE-2024-27049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27049">CVE-2024-27049 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27050/">CVE-2024-27050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27050">CVE-2024-27050 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27051/">CVE-2024-27051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27051">CVE-2024-27051 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27053/">CVE-2024-27053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27053">CVE-2024-27053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27054/">CVE-2024-27054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27054">CVE-2024-27054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27057/">CVE-2024-27057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27057">CVE-2024-27057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27060/">CVE-2024-27060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27060">CVE-2024-27060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27064/">CVE-2024-27064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27064">CVE-2024-27064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27067/">CVE-2024-27067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27067">CVE-2024-27067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27068/">CVE-2024-27068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27068">CVE-2024-27068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27071/">CVE-2024-27071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27071">CVE-2024-27071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27072/">CVE-2024-27072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27072">CVE-2024-27072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27073/">CVE-2024-27073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27073">CVE-2024-27073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27074/">CVE-2024-27074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27074">CVE-2024-27074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27075/">CVE-2024-27075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27075">CVE-2024-27075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27076/">CVE-2024-27076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27076">CVE-2024-27076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27077/">CVE-2024-27077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27077">CVE-2024-27077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27078/">CVE-2024-27078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27078">CVE-2024-27078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27079/">CVE-2024-27079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27079">CVE-2024-27079 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27080/">CVE-2024-27080 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27080">CVE-2024-27080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27391/">CVE-2024-27391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27391">CVE-2024-27391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27396/">CVE-2024-27396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27400/">CVE-2024-27400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27400">CVE-2024-27400 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27401/">CVE-2024-27401 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27401">CVE-2024-27401 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27402/">CVE-2024-27402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27402">CVE-2024-27402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27404/">CVE-2024-27404 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27404">CVE-2024-27404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27405/">CVE-2024-27405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27405">CVE-2024-27405 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27408/">CVE-2024-27408 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27408">CVE-2024-27408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27411/">CVE-2024-27411 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27411">CVE-2024-27411 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27412/">CVE-2024-27412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27412">CVE-2024-27412 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27414/">CVE-2024-27414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27414">CVE-2024-27414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27416/">CVE-2024-27416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27416">CVE-2024-27416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27418/">CVE-2024-27418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27418">CVE-2024-27418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27431/">CVE-2024-27431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27431">CVE-2024-27431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27432/">CVE-2024-27432 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27432">CVE-2024-27432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27433/">CVE-2024-27433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27433">CVE-2024-27433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27434/">CVE-2024-27434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27434">CVE-2024-27434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27436/">CVE-2024-27436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27436">CVE-2024-27436 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27437/">CVE-2024-27437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33619/">CVE-2024-33619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34777/">CVE-2024-34777 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-34777">CVE-2024-34777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35247/">CVE-2024-35247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35784/">CVE-2024-35784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35784">CVE-2024-35784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35786/">CVE-2024-35786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35786">CVE-2024-35786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35788/">CVE-2024-35788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35788">CVE-2024-35788 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35794/">CVE-2024-35794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35794">CVE-2024-35794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35795/">CVE-2024-35795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35795">CVE-2024-35795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35796/">CVE-2024-35796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35799/">CVE-2024-35799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35800/">CVE-2024-35800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35800">CVE-2024-35800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35803/">CVE-2024-35803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35803">CVE-2024-35803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35804/">CVE-2024-35804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35805/">CVE-2024-35805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35806/">CVE-2024-35806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35808/">CVE-2024-35808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35808">CVE-2024-35808 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35809/">CVE-2024-35809 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35810/">CVE-2024-35810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35810">CVE-2024-35810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35812/">CVE-2024-35812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35813/">CVE-2024-35813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35819/">CVE-2024-35819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35821/">CVE-2024-35821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35822/">CVE-2024-35822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35824/">CVE-2024-35824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35824">CVE-2024-35824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35825/">CVE-2024-35825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35827/">CVE-2024-35827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35827">CVE-2024-35827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35828/">CVE-2024-35828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35828">CVE-2024-35828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35829/">CVE-2024-35829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35829">CVE-2024-35829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35830/">CVE-2024-35830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35830">CVE-2024-35830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35831/">CVE-2024-35831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35831">CVE-2024-35831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35833/">CVE-2024-35833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35833">CVE-2024-35833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35834/">CVE-2024-35834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35834">CVE-2024-35834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35836/">CVE-2024-35836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35836">CVE-2024-35836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35837/">CVE-2024-35837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35837">CVE-2024-35837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35838/">CVE-2024-35838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35838">CVE-2024-35838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35841/">CVE-2024-35841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35841">CVE-2024-35841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35842/">CVE-2024-35842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35842">CVE-2024-35842 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35843/">CVE-2024-35843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35843">CVE-2024-35843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35849/">CVE-2024-35849 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35850/">CVE-2024-35850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35850">CVE-2024-35850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35851/">CVE-2024-35851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35860/">CVE-2024-35860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35865/">CVE-2024-35865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35866/">CVE-2024-35866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35872/">CVE-2024-35872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35879/">CVE-2024-35879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35880/">CVE-2024-35880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35880">CVE-2024-35880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35883/">CVE-2024-35883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35883">CVE-2024-35883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35886/">CVE-2024-35886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35887/">CVE-2024-35887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35889/">CVE-2024-35889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35889">CVE-2024-35889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35891/">CVE-2024-35891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35891">CVE-2024-35891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35892/">CVE-2024-35892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35892">CVE-2024-35892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35902/">CVE-2024-35902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35903/">CVE-2024-35903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35903">CVE-2024-35903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35908/">CVE-2024-35908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35908">CVE-2024-35908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35909/">CVE-2024-35909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35909">CVE-2024-35909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35911/">CVE-2024-35911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35911">CVE-2024-35911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35913/">CVE-2024-35913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35913">CVE-2024-35913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35915/">CVE-2024-35915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35916/">CVE-2024-35916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35916">CVE-2024-35916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35917/">CVE-2024-35917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35917">CVE-2024-35917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35921/">CVE-2024-35921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35921">CVE-2024-35921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35922/">CVE-2024-35922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35926/">CVE-2024-35926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35926">CVE-2024-35926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35927/">CVE-2024-35927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35927">CVE-2024-35927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35928/">CVE-2024-35928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35928">CVE-2024-35928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35931/">CVE-2024-35931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35931">CVE-2024-35931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35932/">CVE-2024-35932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35935/">CVE-2024-35935 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35936/">CVE-2024-35936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35940/">CVE-2024-35940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35942/">CVE-2024-35942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35942">CVE-2024-35942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35943/">CVE-2024-35943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35945/">CVE-2024-35945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35946/">CVE-2024-35946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35946">CVE-2024-35946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35951/">CVE-2024-35951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35953/">CVE-2024-35953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35953">CVE-2024-35953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35954/">CVE-2024-35954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35954">CVE-2024-35954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35955/">CVE-2024-35955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35956/">CVE-2024-35956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35957/">CVE-2024-35957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35957">CVE-2024-35957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35961/">CVE-2024-35961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35970/">CVE-2024-35970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35970">CVE-2024-35970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35971/">CVE-2024-35971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35972/">CVE-2024-35972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35972">CVE-2024-35972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35973/">CVE-2024-35973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35974/">CVE-2024-35974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35974">CVE-2024-35974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35975/">CVE-2024-35975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35975">CVE-2024-35975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35976/">CVE-2024-35976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35977/">CVE-2024-35977 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35977">CVE-2024-35977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35979/">CVE-2024-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35980/">CVE-2024-35980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35981/">CVE-2024-35981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35981">CVE-2024-35981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35982/">CVE-2024-35982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35984/">CVE-2024-35984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35986/">CVE-2024-35986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35986">CVE-2024-35986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35990/">CVE-2024-35990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35991/">CVE-2024-35991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35991">CVE-2024-35991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35992/">CVE-2024-35992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35992">CVE-2024-35992 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-35995/">CVE-2024-35995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35997/">CVE-2024-35997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35998/">CVE-2024-35998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35999/">CVE-2024-35999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36002/">CVE-2024-36002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36002">CVE-2024-36002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36003/">CVE-2024-36003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36003">CVE-2024-36003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36008/">CVE-2024-36008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36009/">CVE-2024-36009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36010/">CVE-2024-36010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36010">CVE-2024-36010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36011/">CVE-2024-36011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36011">CVE-2024-36011 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36014/">CVE-2024-36014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36014">CVE-2024-36014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36015/">CVE-2024-36015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36015">CVE-2024-36015 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36018/">CVE-2024-36018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36018">CVE-2024-36018 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36019/">CVE-2024-36019 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36019">CVE-2024-36019 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36021/">CVE-2024-36021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36024/">CVE-2024-36024 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36024">CVE-2024-36024 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36026/">CVE-2024-36026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36029/">CVE-2024-36029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36030/">CVE-2024-36030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36030">CVE-2024-36030 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36032/">CVE-2024-36032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36281/">CVE-2024-36281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36281">CVE-2024-36281 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36288/">CVE-2024-36288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36288">CVE-2024-36288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36348/">CVE-2024-36348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36348">CVE-2024-36348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36349/">CVE-2024-36349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36349">CVE-2024-36349 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36476/">CVE-2024-36476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36477/">CVE-2024-36477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36478/">CVE-2024-36478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36478">CVE-2024-36478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36479/">CVE-2024-36479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36881/">CVE-2024-36881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36881">CVE-2024-36881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36882/">CVE-2024-36882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36882">CVE-2024-36882 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36885/">CVE-2024-36885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36885">CVE-2024-36885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36887/">CVE-2024-36887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36887">CVE-2024-36887 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36890/">CVE-2024-36890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36891/">CVE-2024-36891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36891">CVE-2024-36891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36893/">CVE-2024-36893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36895/">CVE-2024-36895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36895">CVE-2024-36895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36897/">CVE-2024-36897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36898/">CVE-2024-36898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36898">CVE-2024-36898 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36900/">CVE-2024-36900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36903/">CVE-2024-36903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36903">CVE-2024-36903 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36906/">CVE-2024-36906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36907/">CVE-2024-36907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36907">CVE-2024-36907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36909/">CVE-2024-36909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36910/">CVE-2024-36910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36911/">CVE-2024-36911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36912/">CVE-2024-36912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36913/">CVE-2024-36913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36914/">CVE-2024-36914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36915/">CVE-2024-36915 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36915">CVE-2024-36915 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36916/">CVE-2024-36916 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36918/">CVE-2024-36918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36921/">CVE-2024-36921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36922/">CVE-2024-36922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36923/">CVE-2024-36923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36923">CVE-2024-36923 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36930/">CVE-2024-36930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36930">CVE-2024-36930 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36931/">CVE-2024-36931 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36934/">CVE-2024-36934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36935/">CVE-2024-36935 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36935">CVE-2024-36935 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36936/">CVE-2024-36936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36936">CVE-2024-36936 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36937/">CVE-2024-36937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36938/">CVE-2024-36938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36946/">CVE-2024-36946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36949/">CVE-2024-36949 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36951/">CVE-2024-36951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36951">CVE-2024-36951 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36962/">CVE-2024-36962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36965/">CVE-2024-36965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36967/">CVE-2024-36967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36968/">CVE-2024-36968 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36968">CVE-2024-36968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36969/">CVE-2024-36969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36970/">CVE-2024-36970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36970">CVE-2024-36970 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36972/">CVE-2024-36972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36972">CVE-2024-36972 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36973/">CVE-2024-36973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36973">CVE-2024-36973 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36975/">CVE-2024-36975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36977/">CVE-2024-36977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36977">CVE-2024-36977 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36979/">CVE-2024-36979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37021/">CVE-2024-37021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-37078/">CVE-2024-37078 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-37354/">CVE-2024-37354 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38381/">CVE-2024-38381 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38384/">CVE-2024-38384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38384">CVE-2024-38384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38385/">CVE-2024-38385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38385">CVE-2024-38385 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38388/">CVE-2024-38388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38390/">CVE-2024-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38391/">CVE-2024-38391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38391">CVE-2024-38391 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38539/">CVE-2024-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38539">CVE-2024-38539 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38543/">CVE-2024-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38543">CVE-2024-38543 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38546/">CVE-2024-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38547/">CVE-2024-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38549/">CVE-2024-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38550/">CVE-2024-38550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38551/">CVE-2024-38551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38551">CVE-2024-38551 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38552/">CVE-2024-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38553/">CVE-2024-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38554/">CVE-2024-38554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38557/">CVE-2024-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38562/">CVE-2024-38562 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38562">CVE-2024-38562 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38563/">CVE-2024-38563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38563">CVE-2024-38563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38565/">CVE-2024-38565 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38566/">CVE-2024-38566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38566">CVE-2024-38566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38567/">CVE-2024-38567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38568/">CVE-2024-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38569/">CVE-2024-38569 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38569">CVE-2024-38569 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38571/">CVE-2024-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38572/">CVE-2024-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38572">CVE-2024-38572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38575/">CVE-2024-38575 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38576/">CVE-2024-38576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38576">CVE-2024-38576 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38577/">CVE-2024-38577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38582/">CVE-2024-38582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38583/">CVE-2024-38583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38587/">CVE-2024-38587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38588/">CVE-2024-38588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38590/">CVE-2024-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38591/">CVE-2024-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38592/">CVE-2024-38592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38592">CVE-2024-38592 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38594/">CVE-2024-38594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38594">CVE-2024-38594 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38595/">CVE-2024-38595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38595">CVE-2024-38595 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38597/">CVE-2024-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38600/">CVE-2024-38600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38602/">CVE-2024-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38603/">CVE-2024-38603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38604/">CVE-2024-38604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38604">CVE-2024-38604 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38605/">CVE-2024-38605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38609/">CVE-2024-38609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38609">CVE-2024-38609 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38610/">CVE-2024-38610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38610">CVE-2024-38610 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38611/">CVE-2024-38611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38611">CVE-2024-38611 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38616/">CVE-2024-38616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38617/">CVE-2024-38617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38617">CVE-2024-38617 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38618/">CVE-2024-38618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38621/">CVE-2024-38621 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38622/">CVE-2024-38622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38622">CVE-2024-38622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38628/">CVE-2024-38628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38629/">CVE-2024-38629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38629">CVE-2024-38629 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38630/">CVE-2024-38630 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38632/">CVE-2024-38632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38633/">CVE-2024-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38634/">CVE-2024-38634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38635/">CVE-2024-38635 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38636/">CVE-2024-38636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38636">CVE-2024-38636 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38659/">CVE-2024-38659 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38661/">CVE-2024-38661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38662/">CVE-2024-38662 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38663/">CVE-2024-38663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38663">CVE-2024-38663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38664/">CVE-2024-38664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38664">CVE-2024-38664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38780/">CVE-2024-38780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-39277/">CVE-2024-39277 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39277">CVE-2024-39277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39282/">CVE-2024-39282 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39282">CVE-2024-39282 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39291/">CVE-2024-39291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39291">CVE-2024-39291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39296/">CVE-2024-39296 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39296">CVE-2024-39296 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39301/">CVE-2024-39301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39362/">CVE-2024-39362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39362">CVE-2024-39362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39371/">CVE-2024-39371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39466/">CVE-2024-39466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39466">CVE-2024-39466 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39468/">CVE-2024-39468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39469/">CVE-2024-39469 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39473/">CVE-2024-39473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39473">CVE-2024-39473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39474/">CVE-2024-39474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39474">CVE-2024-39474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39475/">CVE-2024-39475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39479/">CVE-2024-39479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39479">CVE-2024-39479 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39481/">CVE-2024-39481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39481">CVE-2024-39481 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39482/">CVE-2024-39482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39483/">CVE-2024-39483 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39483">CVE-2024-39483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39484/">CVE-2024-39484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39484">CVE-2024-39484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39486/">CVE-2024-39486 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39486">CVE-2024-39486 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39488/">CVE-2024-39488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39489/">CVE-2024-39489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39490/">CVE-2024-39490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-39491/">CVE-2024-39491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39491">CVE-2024-39491 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39493/">CVE-2024-39493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39496/">CVE-2024-39496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39496">CVE-2024-39496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39497/">CVE-2024-39497 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39498/">CVE-2024-39498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39498">CVE-2024-39498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39504/">CVE-2024-39504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39504">CVE-2024-39504 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39505/">CVE-2024-39505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39507/">CVE-2024-39507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39508/">CVE-2024-39508 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39509/">CVE-2024-39509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39510/">CVE-2024-39510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39510">CVE-2024-39510 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40899/">CVE-2024-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40899">CVE-2024-40899 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40900/">CVE-2024-40900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40903/">CVE-2024-40903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40908/">CVE-2024-40908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40913/">CVE-2024-40913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40913">CVE-2024-40913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40916/">CVE-2024-40916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40919/">CVE-2024-40919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40920/">CVE-2024-40920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40920">CVE-2024-40920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40921/">CVE-2024-40921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40921">CVE-2024-40921 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40922/">CVE-2024-40922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40922">CVE-2024-40922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40923/">CVE-2024-40923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40925/">CVE-2024-40925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40925">CVE-2024-40925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40926/">CVE-2024-40926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40926">CVE-2024-40926 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40928/">CVE-2024-40928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40928">CVE-2024-40928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40930/">CVE-2024-40930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40930">CVE-2024-40930 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40932/">CVE-2024-40932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40934/">CVE-2024-40934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40935/">CVE-2024-40935 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40936/">CVE-2024-40936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40936">CVE-2024-40936 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40938/">CVE-2024-40938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40938">CVE-2024-40938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40939/">CVE-2024-40939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40939">CVE-2024-40939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40940/">CVE-2024-40940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40942/">CVE-2024-40942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40943/">CVE-2024-40943 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40944/">CVE-2024-40944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40944">CVE-2024-40944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40945/">CVE-2024-40945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40947/">CVE-2024-40947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40947">CVE-2024-40947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40948/">CVE-2024-40948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40948">CVE-2024-40948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40953/">CVE-2024-40953 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40957/">CVE-2024-40957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40962/">CVE-2024-40962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40962">CVE-2024-40962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40964/">CVE-2024-40964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40964">CVE-2024-40964 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40965/">CVE-2024-40965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40965">CVE-2024-40965 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40966/">CVE-2024-40966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40967/">CVE-2024-40967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40970/">CVE-2024-40970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40973/">CVE-2024-40973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40975/">CVE-2024-40975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40975">CVE-2024-40975 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40976/">CVE-2024-40976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40979/">CVE-2024-40979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40979">CVE-2024-40979 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40981/">CVE-2024-40981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40982/">CVE-2024-40982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40987/">CVE-2024-40987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40990/">CVE-2024-40990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40992/">CVE-2024-40992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40992">CVE-2024-40992 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40999/">CVE-2024-40999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40999">CVE-2024-40999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41000/">CVE-2024-41000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41001/">CVE-2024-41001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41001">CVE-2024-41001 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41002/">CVE-2024-41002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41004/">CVE-2024-41004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41006/">CVE-2024-41006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41010/">CVE-2024-41010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41010">CVE-2024-41010 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41015/">CVE-2024-41015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41017/">CVE-2024-41017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41020/">CVE-2024-41020 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41022/">CVE-2024-41022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41024/">CVE-2024-41024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41024">CVE-2024-41024 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41025/">CVE-2024-41025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41025">CVE-2024-41025 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41028/">CVE-2024-41028 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41028">CVE-2024-41028 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41031/">CVE-2024-41031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41031">CVE-2024-41031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41032/">CVE-2024-41032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41032">CVE-2024-41032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41036/">CVE-2024-41036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41037/">CVE-2024-41037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41037">CVE-2024-41037 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41045/">CVE-2024-41045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41045">CVE-2024-41045 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41047/">CVE-2024-41047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41047">CVE-2024-41047 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41048/">CVE-2024-41048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41049/">CVE-2024-41049 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41050/">CVE-2024-41050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41050">CVE-2024-41050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41051/">CVE-2024-41051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41051">CVE-2024-41051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41057/">CVE-2024-41057 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41058/">CVE-2024-41058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41061/">CVE-2024-41061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41061">CVE-2024-41061 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41063/">CVE-2024-41063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41068/">CVE-2024-41068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41070/">CVE-2024-41070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41072/">CVE-2024-41072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41074/">CVE-2024-41074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41074">CVE-2024-41074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41075/">CVE-2024-41075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41075">CVE-2024-41075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41078/">CVE-2024-41078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41079/">CVE-2024-41079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41080/">CVE-2024-41080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41080">CVE-2024-41080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41081/">CVE-2024-41081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41082/">CVE-2024-41082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41082">CVE-2024-41082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41084/">CVE-2024-41084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41084">CVE-2024-41084 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41088/">CVE-2024-41088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41089/">CVE-2024-41089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41094/">CVE-2024-41094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41094">CVE-2024-41094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41095/">CVE-2024-41095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41096/">CVE-2024-41096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41098/">CVE-2024-41098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41149/">CVE-2024-41149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41149">CVE-2024-41149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41932/">CVE-2024-41932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41932">CVE-2024-41932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42064/">CVE-2024-42064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42064">CVE-2024-42064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42069/">CVE-2024-42069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42073/">CVE-2024-42073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42073">CVE-2024-42073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42074/">CVE-2024-42074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42076/">CVE-2024-42076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42080/">CVE-2024-42080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42085/">CVE-2024-42085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42086/">CVE-2024-42086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42087/">CVE-2024-42087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42089/">CVE-2024-42089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42092/">CVE-2024-42092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42095/">CVE-2024-42095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42097/">CVE-2024-42097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42101/">CVE-2024-42101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42102/">CVE-2024-42102 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42105/">CVE-2024-42105 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42106/">CVE-2024-42106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42107/">CVE-2024-42107 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42107">CVE-2024-42107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42109/">CVE-2024-42109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42109">CVE-2024-42109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42113/">CVE-2024-42113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42113">CVE-2024-42113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42115/">CVE-2024-42115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42117/">CVE-2024-42117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42117">CVE-2024-42117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42119/">CVE-2024-42119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42120/">CVE-2024-42120 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42121/">CVE-2024-42121 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42122/">CVE-2024-42122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42122">CVE-2024-42122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42125/">CVE-2024-42125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42125">CVE-2024-42125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42127/">CVE-2024-42127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42130/">CVE-2024-42130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42132/">CVE-2024-42132 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42132">CVE-2024-42132 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42133/">CVE-2024-42133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42136/">CVE-2024-42136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42136">CVE-2024-42136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42137/">CVE-2024-42137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42138/">CVE-2024-42138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42138">CVE-2024-42138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42139/">CVE-2024-42139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42139">CVE-2024-42139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42141/">CVE-2024-42141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42141">CVE-2024-42141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42142/">CVE-2024-42142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42143/">CVE-2024-42143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42144/">CVE-2024-42144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42144">CVE-2024-42144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42147/">CVE-2024-42147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42147">CVE-2024-42147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42153/">CVE-2024-42153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42153">CVE-2024-42153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42155/">CVE-2024-42155 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42155">CVE-2024-42155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42156/">CVE-2024-42156 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42156">CVE-2024-42156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42157/">CVE-2024-42157 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42158/">CVE-2024-42158 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42158">CVE-2024-42158 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42159/">CVE-2024-42159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42159">CVE-2024-42159 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42161/">CVE-2024-42161 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42162/">CVE-2024-42162 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42162">CVE-2024-42162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42223/">CVE-2024-42223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42224/">CVE-2024-42224 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42227/">CVE-2024-42227 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42227">CVE-2024-42227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42236/">CVE-2024-42236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42239/">CVE-2024-42239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42239">CVE-2024-42239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42241/">CVE-2024-42241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42241">CVE-2024-42241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42243/">CVE-2024-42243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42243">CVE-2024-42243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42245/">CVE-2024-42245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42245">CVE-2024-42245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42247/">CVE-2024-42247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42250/">CVE-2024-42250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42250">CVE-2024-42250 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42252/">CVE-2024-42252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42252">CVE-2024-42252 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42259/">CVE-2024-42259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42268/">CVE-2024-42268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42269/">CVE-2024-42269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42269">CVE-2024-42269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42270/">CVE-2024-42270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42270">CVE-2024-42270 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42274/">CVE-2024-42274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42276/">CVE-2024-42276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42277/">CVE-2024-42277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42278/">CVE-2024-42278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42279/">CVE-2024-42279 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42279">CVE-2024-42279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42280/">CVE-2024-42280 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42281/">CVE-2024-42281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42285/">CVE-2024-42285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42286/">CVE-2024-42286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42287/">CVE-2024-42287 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42288/">CVE-2024-42288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42289/">CVE-2024-42289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42290/">CVE-2024-42290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42290">CVE-2024-42290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42294/">CVE-2024-42294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42295/">CVE-2024-42295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42298/">CVE-2024-42298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42298">CVE-2024-42298 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42303/">CVE-2024-42303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42303">CVE-2024-42303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42306/">CVE-2024-42306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42308/">CVE-2024-42308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42309/">CVE-2024-42309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42310/">CVE-2024-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42311/">CVE-2024-42311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42313/">CVE-2024-42313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42314/">CVE-2024-42314 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42314">CVE-2024-42314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42316/">CVE-2024-42316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42318/">CVE-2024-42318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42319/">CVE-2024-42319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42319">CVE-2024-42319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42320/">CVE-2024-42320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43098/">CVE-2024-43098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43816/">CVE-2024-43816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43816">CVE-2024-43816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43817/">CVE-2024-43817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43818/">CVE-2024-43818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43819/">CVE-2024-43819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43819">CVE-2024-43819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43824/">CVE-2024-43824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43824">CVE-2024-43824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43825/">CVE-2024-43825 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43825">CVE-2024-43825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43826/">CVE-2024-43826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43826">CVE-2024-43826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43829/">CVE-2024-43829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43831/">CVE-2024-43831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43832/">CVE-2024-43832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43832">CVE-2024-43832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43833/">CVE-2024-43833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43833">CVE-2024-43833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43835/">CVE-2024-43835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43835">CVE-2024-43835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43837/">CVE-2024-43837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43839/">CVE-2024-43839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43840/">CVE-2024-43840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43840">CVE-2024-43840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43841/">CVE-2024-43841 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43845/">CVE-2024-43845 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43845">CVE-2024-43845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43847/">CVE-2024-43847 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43847">CVE-2024-43847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43849/">CVE-2024-43849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43850/">CVE-2024-43850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43850">CVE-2024-43850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43851/">CVE-2024-43851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43851">CVE-2024-43851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43855/">CVE-2024-43855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43856/">CVE-2024-43856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43858/">CVE-2024-43858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43860/">CVE-2024-43860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43863/">CVE-2024-43863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43864/">CVE-2024-43864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43864">CVE-2024-43864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43866/">CVE-2024-43866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43867/">CVE-2024-43867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43870/">CVE-2024-43870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43870">CVE-2024-43870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43872/">CVE-2024-43872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43872">CVE-2024-43872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43874/">CVE-2024-43874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43874">CVE-2024-43874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43875/">CVE-2024-43875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43875">CVE-2024-43875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43876/">CVE-2024-43876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43876">CVE-2024-43876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43877/">CVE-2024-43877 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43877">CVE-2024-43877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43879/">CVE-2024-43879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43881/">CVE-2024-43881 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43881">CVE-2024-43881 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-43885/">CVE-2024-43885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43885">CVE-2024-43885 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43890/">CVE-2024-43890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43893/">CVE-2024-43893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43894/">CVE-2024-43894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43895/">CVE-2024-43895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43897/">CVE-2024-43897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43899/">CVE-2024-43899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43899">CVE-2024-43899 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43900/">CVE-2024-43900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43902/">CVE-2024-43902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43903/">CVE-2024-43903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43904/">CVE-2024-43904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43904">CVE-2024-43904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43905/">CVE-2024-43905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43906/">CVE-2024-43906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43906">CVE-2024-43906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43907/">CVE-2024-43907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43908/">CVE-2024-43908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43909/">CVE-2024-43909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43911/">CVE-2024-43911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43911">CVE-2024-43911 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43912/">CVE-2024-43912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44939/">CVE-2024-44939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44944/">CVE-2024-44944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44948/">CVE-2024-44948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44950/">CVE-2024-44950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44950">CVE-2024-44950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44951/">CVE-2024-44951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44951">CVE-2024-44951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44954/">CVE-2024-44954 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44960/">CVE-2024-44960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44960">CVE-2024-44960 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44961/">CVE-2024-44961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44961">CVE-2024-44961 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44962/">CVE-2024-44962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44962">CVE-2024-44962 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44965/">CVE-2024-44965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44965">CVE-2024-44965 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44967/">CVE-2024-44967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44967">CVE-2024-44967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44969/">CVE-2024-44969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44971/">CVE-2024-44971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44977/">CVE-2024-44977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44977">CVE-2024-44977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44982/">CVE-2024-44982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-44984/">CVE-2024-44984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44984">CVE-2024-44984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44985/">CVE-2024-44985 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44985">CVE-2024-44985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44986/">CVE-2024-44986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44988/">CVE-2024-44988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44991/">CVE-2024-44991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44991">CVE-2024-44991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44997/">CVE-2024-44997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44997">CVE-2024-44997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44998/">CVE-2024-44998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44999/">CVE-2024-44999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45001/">CVE-2024-45001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45001">CVE-2024-45001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45002/">CVE-2024-45002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45002">CVE-2024-45002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45005/">CVE-2024-45005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45005">CVE-2024-45005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45006/">CVE-2024-45006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45007/">CVE-2024-45007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45008/">CVE-2024-45008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45008">CVE-2024-45008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45011/">CVE-2024-45011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45012/">CVE-2024-45012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45012">CVE-2024-45012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45015/">CVE-2024-45015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45015">CVE-2024-45015 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45017/">CVE-2024-45017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45017">CVE-2024-45017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45019/">CVE-2024-45019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45019">CVE-2024-45019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45020/">CVE-2024-45020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45020">CVE-2024-45020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45022/">CVE-2024-45022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45022">CVE-2024-45022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45023/">CVE-2024-45023 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45023">CVE-2024-45023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45025/">CVE-2024-45025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45025">CVE-2024-45025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45028/">CVE-2024-45028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45029/">CVE-2024-45029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45029">CVE-2024-45029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45030/">CVE-2024-45030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45030">CVE-2024-45030 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45828/">CVE-2024-45828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46672/">CVE-2024-46672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46672">CVE-2024-46672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46676/">CVE-2024-46676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46677/">CVE-2024-46677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46678/">CVE-2024-46678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46685/">CVE-2024-46685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46686/">CVE-2024-46686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46687/">CVE-2024-46687 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46687">CVE-2024-46687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46691/">CVE-2024-46691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46691">CVE-2024-46691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46692/">CVE-2024-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46692">CVE-2024-46692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46693/">CVE-2024-46693 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46693">CVE-2024-46693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46694/">CVE-2024-46694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46695/">CVE-2024-46695 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46702/">CVE-2024-46702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46706/">CVE-2024-46706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46706">CVE-2024-46706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46707/">CVE-2024-46707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46709/">CVE-2024-46709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46709">CVE-2024-46709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46710/">CVE-2024-46710 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46710">CVE-2024-46710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46714/">CVE-2024-46714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46715/">CVE-2024-46715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46717/">CVE-2024-46717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46719/">CVE-2024-46719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46720/">CVE-2024-46720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46721/">CVE-2024-46721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46726/">CVE-2024-46726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46728/">CVE-2024-46728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46729/">CVE-2024-46729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46729">CVE-2024-46729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46730/">CVE-2024-46730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46730">CVE-2024-46730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46731/">CVE-2024-46731 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46732/">CVE-2024-46732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46734/">CVE-2024-46734 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46734">CVE-2024-46734 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46735/">CVE-2024-46735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46735">CVE-2024-46735 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46737/">CVE-2024-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46738/">CVE-2024-46738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46739/">CVE-2024-46739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46741/">CVE-2024-46741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46741">CVE-2024-46741 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46746/">CVE-2024-46746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46749/">CVE-2024-46749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46749">CVE-2024-46749 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46751/">CVE-2024-46751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46751">CVE-2024-46751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46752/">CVE-2024-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46753/">CVE-2024-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46753">CVE-2024-46753 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46755/">CVE-2024-46755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46757/">CVE-2024-46757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46757">CVE-2024-46757 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46760/">CVE-2024-46760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46760">CVE-2024-46760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46766/">CVE-2024-46766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46766">CVE-2024-46766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46767/">CVE-2024-46767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46767">CVE-2024-46767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46770/">CVE-2024-46770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46771/">CVE-2024-46771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46772/">CVE-2024-46772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46772">CVE-2024-46772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46773/">CVE-2024-46773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46775/">CVE-2024-46775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46775">CVE-2024-46775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46776/">CVE-2024-46776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46776">CVE-2024-46776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46777/">CVE-2024-46777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46778/">CVE-2024-46778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46778">CVE-2024-46778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46780/">CVE-2024-46780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46781/">CVE-2024-46781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46791/">CVE-2024-46791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46794/">CVE-2024-46794 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46797/">CVE-2024-46797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46797">CVE-2024-46797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46798/">CVE-2024-46798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46802/">CVE-2024-46802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46803/">CVE-2024-46803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46803">CVE-2024-46803 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46804/">CVE-2024-46804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46806/">CVE-2024-46806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46809/">CVE-2024-46809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46810/">CVE-2024-46810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46811/">CVE-2024-46811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46812/">CVE-2024-46812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46821/">CVE-2024-46821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46825/">CVE-2024-46825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46825">CVE-2024-46825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46827/">CVE-2024-46827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46827">CVE-2024-46827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46830/">CVE-2024-46830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46831/">CVE-2024-46831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46831">CVE-2024-46831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46834/">CVE-2024-46834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46834">CVE-2024-46834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46836/">CVE-2024-46836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46836">CVE-2024-46836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46840/">CVE-2024-46840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46841/">CVE-2024-46841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46841">CVE-2024-46841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46842/">CVE-2024-46842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46842">CVE-2024-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46843/">CVE-2024-46843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46843">CVE-2024-46843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46846/">CVE-2024-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46846">CVE-2024-46846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46848/">CVE-2024-46848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46851/">CVE-2024-46851 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46851">CVE-2024-46851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46852/">CVE-2024-46852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46852">CVE-2024-46852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46855/">CVE-2024-46855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46857/">CVE-2024-46857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46859/">CVE-2024-46859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46860/">CVE-2024-46860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46860">CVE-2024-46860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46861/">CVE-2024-46861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46861">CVE-2024-46861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46870/">CVE-2024-46870 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46870">CVE-2024-46870 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46896/">CVE-2024-46896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47141/">CVE-2024-47141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47143/">CVE-2024-47143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47408/">CVE-2024-47408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47658/">CVE-2024-47658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47658">CVE-2024-47658 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47661/">CVE-2024-47661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47661">CVE-2024-47661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47662/">CVE-2024-47662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47662">CVE-2024-47662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47663/">CVE-2024-47663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47664/">CVE-2024-47664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47664">CVE-2024-47664 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47665/">CVE-2024-47665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47667/">CVE-2024-47667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47669/">CVE-2024-47669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47669">CVE-2024-47669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47670/">CVE-2024-47670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47670">CVE-2024-47670 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47672/">CVE-2024-47672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47672">CVE-2024-47672 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47673/">CVE-2024-47673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47673">CVE-2024-47673 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47675/">CVE-2024-47675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47675">CVE-2024-47675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47681/">CVE-2024-47681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47681">CVE-2024-47681 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47686/">CVE-2024-47686 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47686">CVE-2024-47686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47687/">CVE-2024-47687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47687">CVE-2024-47687 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47688/">CVE-2024-47688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47688">CVE-2024-47688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47702/">CVE-2024-47702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47702">CVE-2024-47702 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47703/">CVE-2024-47703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47703">CVE-2024-47703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47714/">CVE-2024-47714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47714">CVE-2024-47714 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47715/">CVE-2024-47715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47715">CVE-2024-47715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47719/">CVE-2024-47719 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47719">CVE-2024-47719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47731/">CVE-2024-47731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47731">CVE-2024-47731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47732/">CVE-2024-47732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47732">CVE-2024-47732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47741/">CVE-2024-47741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47741">CVE-2024-47741 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47743/">CVE-2024-47743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47743">CVE-2024-47743 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47744/">CVE-2024-47744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47744">CVE-2024-47744 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47750/">CVE-2024-47750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47750">CVE-2024-47750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47751/">CVE-2024-47751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47751">CVE-2024-47751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47752/">CVE-2024-47752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47752">CVE-2024-47752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47753/">CVE-2024-47753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47753">CVE-2024-47753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47754/">CVE-2024-47754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47754">CVE-2024-47754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47794/">CVE-2024-47794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47794">CVE-2024-47794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47809/">CVE-2024-47809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48873/">CVE-2024-48873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48876/">CVE-2024-48876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48876">CVE-2024-48876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48881/">CVE-2024-48881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49568/">CVE-2024-49568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49569/">CVE-2024-49569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49569">CVE-2024-49569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49570/">CVE-2024-49570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49570">CVE-2024-49570 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49571/">CVE-2024-49571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49573/">CVE-2024-49573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49573">CVE-2024-49573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49853/">CVE-2024-49853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49853">CVE-2024-49853 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49862/">CVE-2024-49862 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49862">CVE-2024-49862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49864/">CVE-2024-49864 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49874/">CVE-2024-49874 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49878/">CVE-2024-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49888/">CVE-2024-49888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49888">CVE-2024-49888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49898/">CVE-2024-49898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49898">CVE-2024-49898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49928/">CVE-2024-49928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49928">CVE-2024-49928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49931/">CVE-2024-49931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49937/">CVE-2024-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49953/">CVE-2024-49953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49961/">CVE-2024-49961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49972/">CVE-2024-49972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49972">CVE-2024-49972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49986/">CVE-2024-49986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49987/">CVE-2024-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50004/">CVE-2024-50004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50004">CVE-2024-50004 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50012/">CVE-2024-50012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50015/">CVE-2024-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50020/">CVE-2024-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50020">CVE-2024-50020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50021/">CVE-2024-50021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50021">CVE-2024-50021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50022/">CVE-2024-50022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50023/">CVE-2024-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50027/">CVE-2024-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50027">CVE-2024-50027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50040/">CVE-2024-50040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50042/">CVE-2024-50042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50042">CVE-2024-50042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50051/">CVE-2024-50051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50060/">CVE-2024-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50064/">CVE-2024-50064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50069/">CVE-2024-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50075/">CVE-2024-50075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50076/">CVE-2024-50076 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50080/">CVE-2024-50080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50084/">CVE-2024-50084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50087/">CVE-2024-50087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50088/">CVE-2024-50088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50130/">CVE-2024-50130 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50139/">CVE-2024-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50228/">CVE-2024-50228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50250/">CVE-2024-50250 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51729/">CVE-2024-51729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-51729">CVE-2024-51729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52319/">CVE-2024-52319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52319">CVE-2024-52319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52332/">CVE-2024-52332 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-52559/">CVE-2024-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52559">CVE-2024-52559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53103/">CVE-2024-53103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-53142/">CVE-2024-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53142">CVE-2024-53142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53143/">CVE-2024-53143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53143">CVE-2024-53143 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53147/">CVE-2024-53147 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53147">CVE-2024-53147 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53148/">CVE-2024-53148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53148">CVE-2024-53148 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53149/">CVE-2024-53149 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53149">CVE-2024-53149 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53151/">CVE-2024-53151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53151">CVE-2024-53151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53152/">CVE-2024-53152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53152">CVE-2024-53152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53153/">CVE-2024-53153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53153">CVE-2024-53153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53154/">CVE-2024-53154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53154">CVE-2024-53154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53155/">CVE-2024-53155 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53155">CVE-2024-53155 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53157/">CVE-2024-53157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53157">CVE-2024-53157 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53158/">CVE-2024-53158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53158">CVE-2024-53158 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53160/">CVE-2024-53160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53160">CVE-2024-53160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53161/">CVE-2024-53161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53161">CVE-2024-53161 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53162/">CVE-2024-53162 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53162">CVE-2024-53162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53163/">CVE-2024-53163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53163">CVE-2024-53163 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53166/">CVE-2024-53166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53166">CVE-2024-53166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53167/">CVE-2024-53167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53167">CVE-2024-53167 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53168/">CVE-2024-53168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53168">CVE-2024-53168 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53169/">CVE-2024-53169 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53169">CVE-2024-53169 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53170/">CVE-2024-53170 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53170">CVE-2024-53170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53172/">CVE-2024-53172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53172">CVE-2024-53172 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53174/">CVE-2024-53174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53174">CVE-2024-53174 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53175/">CVE-2024-53175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53175">CVE-2024-53175 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53176/">CVE-2024-53176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53176">CVE-2024-53176 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53177/">CVE-2024-53177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53177">CVE-2024-53177 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53178/">CVE-2024-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53178">CVE-2024-53178 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53179/">CVE-2024-53179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53179">CVE-2024-53179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53180/">CVE-2024-53180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53180">CVE-2024-53180 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53182/">CVE-2024-53182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53182">CVE-2024-53182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53185/">CVE-2024-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53185">CVE-2024-53185 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53187/">CVE-2024-53187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53187">CVE-2024-53187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53188/">CVE-2024-53188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53188">CVE-2024-53188 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53189/">CVE-2024-53189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53189">CVE-2024-53189 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53190/">CVE-2024-53190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53190">CVE-2024-53190 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53191/">CVE-2024-53191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53191">CVE-2024-53191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53192/">CVE-2024-53192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53192">CVE-2024-53192 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53193/">CVE-2024-53193 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53193">CVE-2024-53193 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53194/">CVE-2024-53194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53194">CVE-2024-53194 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53195/">CVE-2024-53195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53195">CVE-2024-53195 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53196/">CVE-2024-53196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53198/">CVE-2024-53198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53198">CVE-2024-53198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53199/">CVE-2024-53199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53199">CVE-2024-53199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53200/">CVE-2024-53200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53200">CVE-2024-53200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53201/">CVE-2024-53201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53201">CVE-2024-53201 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53202/">CVE-2024-53202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53202">CVE-2024-53202 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53203/">CVE-2024-53203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53203">CVE-2024-53203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53204/">CVE-2024-53204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53204">CVE-2024-53204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53205/">CVE-2024-53205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53205">CVE-2024-53205 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53206/">CVE-2024-53206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53206">CVE-2024-53206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53207/">CVE-2024-53207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53207">CVE-2024-53207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53208/">CVE-2024-53208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53208">CVE-2024-53208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53209/">CVE-2024-53209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53209">CVE-2024-53209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53210/">CVE-2024-53210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53210">CVE-2024-53210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53211/">CVE-2024-53211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53211">CVE-2024-53211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53212/">CVE-2024-53212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53212">CVE-2024-53212 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53213/">CVE-2024-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53213">CVE-2024-53213 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53214/">CVE-2024-53214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53214">CVE-2024-53214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53215/">CVE-2024-53215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53215">CVE-2024-53215 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53216/">CVE-2024-53216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53216">CVE-2024-53216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53217/">CVE-2024-53217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53217">CVE-2024-53217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53219/">CVE-2024-53219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53219">CVE-2024-53219 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53222/">CVE-2024-53222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53222">CVE-2024-53222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53223/">CVE-2024-53223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53223">CVE-2024-53223 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53224/">CVE-2024-53224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53224">CVE-2024-53224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53225/">CVE-2024-53225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53225">CVE-2024-53225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53226/">CVE-2024-53226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53226">CVE-2024-53226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53227/">CVE-2024-53227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53227">CVE-2024-53227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53228/">CVE-2024-53228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53228">CVE-2024-53228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53229/">CVE-2024-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53229">CVE-2024-53229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53230/">CVE-2024-53230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53230">CVE-2024-53230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53231/">CVE-2024-53231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53231">CVE-2024-53231 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53232/">CVE-2024-53232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53232">CVE-2024-53232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53233/">CVE-2024-53233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53233">CVE-2024-53233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53234/">CVE-2024-53234 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53234">CVE-2024-53234 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53235/">CVE-2024-53235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53235">CVE-2024-53235 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53236/">CVE-2024-53236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53236">CVE-2024-53236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53237/">CVE-2024-53237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53237">CVE-2024-53237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53238/">CVE-2024-53238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53238">CVE-2024-53238 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53240/">CVE-2024-53240 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53680/">CVE-2024-53680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53681/">CVE-2024-53681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53681">CVE-2024-53681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53682/">CVE-2024-53682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53682">CVE-2024-53682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53685/">CVE-2024-53685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54191/">CVE-2024-54191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54191">CVE-2024-54191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54193/">CVE-2024-54193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54193">CVE-2024-54193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54455/">CVE-2024-54455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54455">CVE-2024-54455 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54456/">CVE-2024-54456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54458/">CVE-2024-54458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54458">CVE-2024-54458 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54460/">CVE-2024-54460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54680/">CVE-2024-54680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54683/">CVE-2024-54683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55639/">CVE-2024-55639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55641/">CVE-2024-55641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55641">CVE-2024-55641 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55642/">CVE-2024-55642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55642">CVE-2024-55642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55881/">CVE-2024-55881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55916/">CVE-2024-55916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56368/">CVE-2024-56368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56368">CVE-2024-56368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56369/">CVE-2024-56369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56372/">CVE-2024-56372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56531/">CVE-2024-56531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56531">CVE-2024-56531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56532/">CVE-2024-56532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56532">CVE-2024-56532 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56533/">CVE-2024-56533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56533">CVE-2024-56533 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56534/">CVE-2024-56534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56534">CVE-2024-56534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56535/">CVE-2024-56535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56535">CVE-2024-56535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56536/">CVE-2024-56536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56536">CVE-2024-56536 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56537/">CVE-2024-56537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56537">CVE-2024-56537 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56538/">CVE-2024-56538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56538">CVE-2024-56538 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56540/">CVE-2024-56540 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56540">CVE-2024-56540 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56541/">CVE-2024-56541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56541">CVE-2024-56541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56542/">CVE-2024-56542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56542">CVE-2024-56542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56543/">CVE-2024-56543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56543">CVE-2024-56543 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56544/">CVE-2024-56544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56544">CVE-2024-56544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56545/">CVE-2024-56545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56545">CVE-2024-56545 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56546/">CVE-2024-56546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56546">CVE-2024-56546 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56549/">CVE-2024-56549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56549">CVE-2024-56549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56550/">CVE-2024-56550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56550">CVE-2024-56550 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56551/">CVE-2024-56551 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56551">CVE-2024-56551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56552/">CVE-2024-56552 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56552">CVE-2024-56552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56557/">CVE-2024-56557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56557">CVE-2024-56557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56558/">CVE-2024-56558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56560/">CVE-2024-56560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56560">CVE-2024-56560 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56561/">CVE-2024-56561 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56561">CVE-2024-56561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56562/">CVE-2024-56562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56563/">CVE-2024-56563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56563">CVE-2024-56563 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56566/">CVE-2024-56566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56566">CVE-2024-56566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56567/">CVE-2024-56567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56567">CVE-2024-56567 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56568/">CVE-2024-56568 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56569/">CVE-2024-56569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56569">CVE-2024-56569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56570/">CVE-2024-56570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56571/">CVE-2024-56571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56571">CVE-2024-56571 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56572/">CVE-2024-56572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56572">CVE-2024-56572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56573/">CVE-2024-56573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56573">CVE-2024-56573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56574/">CVE-2024-56574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56574">CVE-2024-56574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56575/">CVE-2024-56575 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56575">CVE-2024-56575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56576/">CVE-2024-56576 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56576">CVE-2024-56576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56577/">CVE-2024-56577 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56577">CVE-2024-56577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56578/">CVE-2024-56578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56578">CVE-2024-56578 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56579/">CVE-2024-56579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56579">CVE-2024-56579 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56580/">CVE-2024-56580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56580">CVE-2024-56580 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56582/">CVE-2024-56582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56582">CVE-2024-56582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56583/">CVE-2024-56583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56584/">CVE-2024-56584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56587/">CVE-2024-56587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56588/">CVE-2024-56588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56588">CVE-2024-56588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56589/">CVE-2024-56589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56590/">CVE-2024-56590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56591/">CVE-2024-56591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56591">CVE-2024-56591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56592/">CVE-2024-56592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56593/">CVE-2024-56593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56594/">CVE-2024-56594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56599/">CVE-2024-56599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56599">CVE-2024-56599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56602/">CVE-2024-56602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56603/">CVE-2024-56603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56606/">CVE-2024-56606 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56607/">CVE-2024-56607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56607">CVE-2024-56607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56608/">CVE-2024-56608 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56608">CVE-2024-56608 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56609/">CVE-2024-56609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56609">CVE-2024-56609 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56610/">CVE-2024-56610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56611/">CVE-2024-56611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56612/">CVE-2024-56612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56612">CVE-2024-56612 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56613/">CVE-2024-56613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56614/">CVE-2024-56614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56615/">CVE-2024-56615 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56616/">CVE-2024-56616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56617/">CVE-2024-56617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56618/">CVE-2024-56618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56618">CVE-2024-56618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56620/">CVE-2024-56620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56620">CVE-2024-56620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56621/">CVE-2024-56621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56621">CVE-2024-56621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56622/">CVE-2024-56622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56623/">CVE-2024-56623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56624/">CVE-2024-56624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56624">CVE-2024-56624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56625/">CVE-2024-56625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56629/">CVE-2024-56629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56630/">CVE-2024-56630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56631/">CVE-2024-56631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56632/">CVE-2024-56632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56632">CVE-2024-56632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56633/">CVE-2024-56633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56634/">CVE-2024-56634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56635/">CVE-2024-56635 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56636/">CVE-2024-56636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56637/">CVE-2024-56637 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56638/">CVE-2024-56638 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56639/">CVE-2024-56639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56639">CVE-2024-56639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56640/">CVE-2024-56640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56641/">CVE-2024-56641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56642/">CVE-2024-56642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56643/">CVE-2024-56643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56644/">CVE-2024-56644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56645/">CVE-2024-56645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56646/">CVE-2024-56646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56646">CVE-2024-56646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56647/">CVE-2024-56647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56647">CVE-2024-56647 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56648/">CVE-2024-56648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56649/">CVE-2024-56649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56650/">CVE-2024-56650 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56651/">CVE-2024-56651 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56652/">CVE-2024-56652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56652">CVE-2024-56652 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56653/">CVE-2024-56653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56654/">CVE-2024-56654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56655/">CVE-2024-56655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56656/">CVE-2024-56656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56656">CVE-2024-56656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56657/">CVE-2024-56657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56658/">CVE-2024-56658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56659/">CVE-2024-56659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56660/">CVE-2024-56660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56661/">CVE-2024-56661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56662/">CVE-2024-56662 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56663/">CVE-2024-56663 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56664/">CVE-2024-56664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56665/">CVE-2024-56665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56666/">CVE-2024-56666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56666">CVE-2024-56666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56667/">CVE-2024-56667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56668/">CVE-2024-56668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56668">CVE-2024-56668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56669/">CVE-2024-56669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56669">CVE-2024-56669 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56670/">CVE-2024-56670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56671/">CVE-2024-56671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56671">CVE-2024-56671 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56672/">CVE-2024-56672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56674/">CVE-2024-56674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56674">CVE-2024-56674 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56675/">CVE-2024-56675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56676/">CVE-2024-56676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56676">CVE-2024-56676 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56677/">CVE-2024-56677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56677">CVE-2024-56677 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56678/">CVE-2024-56678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56678">CVE-2024-56678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56679/">CVE-2024-56679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56679">CVE-2024-56679 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56680/">CVE-2024-56680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56680">CVE-2024-56680 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56681/">CVE-2024-56681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56681">CVE-2024-56681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56682/">CVE-2024-56682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56682">CVE-2024-56682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56683/">CVE-2024-56683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56683">CVE-2024-56683 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56684/">CVE-2024-56684 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56684">CVE-2024-56684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56685/">CVE-2024-56685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56685">CVE-2024-56685 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56687/">CVE-2024-56687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56687">CVE-2024-56687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56688/">CVE-2024-56688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56688">CVE-2024-56688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56689/">CVE-2024-56689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56689">CVE-2024-56689 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56690/">CVE-2024-56690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56690">CVE-2024-56690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56691/">CVE-2024-56691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56691">CVE-2024-56691 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56693/">CVE-2024-56693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56693">CVE-2024-56693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56694/">CVE-2024-56694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56694">CVE-2024-56694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56695/">CVE-2024-56695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56695">CVE-2024-56695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56696/">CVE-2024-56696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56696">CVE-2024-56696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56697/">CVE-2024-56697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56697">CVE-2024-56697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56698/">CVE-2024-56698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56698">CVE-2024-56698 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56699/">CVE-2024-56699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56699">CVE-2024-56699 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56700/">CVE-2024-56700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56700">CVE-2024-56700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56701/">CVE-2024-56701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56701">CVE-2024-56701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56702/">CVE-2024-56702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56702">CVE-2024-56702 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56703/">CVE-2024-56703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56703">CVE-2024-56703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56704/">CVE-2024-56704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56704">CVE-2024-56704 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56705/">CVE-2024-56705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56705">CVE-2024-56705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56706/">CVE-2024-56706 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56706">CVE-2024-56706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56707/">CVE-2024-56707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56707">CVE-2024-56707 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56708/">CVE-2024-56708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56708">CVE-2024-56708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56709/">CVE-2024-56709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56711/">CVE-2024-56711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56711">CVE-2024-56711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56712/">CVE-2024-56712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56712">CVE-2024-56712 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56713/">CVE-2024-56713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56713">CVE-2024-56713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56714/">CVE-2024-56714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56714">CVE-2024-56714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56715/">CVE-2024-56715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56716/">CVE-2024-56716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56717/">CVE-2024-56717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56718/">CVE-2024-56718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56719/">CVE-2024-56719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56720/">CVE-2024-56720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56720">CVE-2024-56720 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56721/">CVE-2024-56721 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56721">CVE-2024-56721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56722/">CVE-2024-56722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56722">CVE-2024-56722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56723/">CVE-2024-56723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56723">CVE-2024-56723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56724/">CVE-2024-56724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56724">CVE-2024-56724 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56725/">CVE-2024-56725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56725">CVE-2024-56725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56726/">CVE-2024-56726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56726">CVE-2024-56726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56727/">CVE-2024-56727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56727">CVE-2024-56727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56728/">CVE-2024-56728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56728">CVE-2024-56728 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56729/">CVE-2024-56729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56729">CVE-2024-56729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56730/">CVE-2024-56730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56730">CVE-2024-56730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56739/">CVE-2024-56739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56739">CVE-2024-56739 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56740/">CVE-2024-56740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56740">CVE-2024-56740 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56741/">CVE-2024-56741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56741">CVE-2024-56741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56742/">CVE-2024-56742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56742">CVE-2024-56742 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56743/">CVE-2024-56743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56743">CVE-2024-56743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56745/">CVE-2024-56745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56745">CVE-2024-56745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56746/">CVE-2024-56746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56746">CVE-2024-56746 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56747/">CVE-2024-56747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56747">CVE-2024-56747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56748/">CVE-2024-56748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56748">CVE-2024-56748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56749/">CVE-2024-56749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56749">CVE-2024-56749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56750/">CVE-2024-56750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56750">CVE-2024-56750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56751/">CVE-2024-56751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56751">CVE-2024-56751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56752/">CVE-2024-56752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56752">CVE-2024-56752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56753/">CVE-2024-56753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56753">CVE-2024-56753 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56754/">CVE-2024-56754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56754">CVE-2024-56754 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56755/">CVE-2024-56755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56755">CVE-2024-56755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56756/">CVE-2024-56756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56756">CVE-2024-56756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56757/">CVE-2024-56757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56757">CVE-2024-56757 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56758/">CVE-2024-56758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56758">CVE-2024-56758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56760/">CVE-2024-56760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56761/">CVE-2024-56761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56761">CVE-2024-56761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56763/">CVE-2024-56763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56764/">CVE-2024-56764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56764">CVE-2024-56764 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56765/">CVE-2024-56765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56766/">CVE-2024-56766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56767/">CVE-2024-56767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56769/">CVE-2024-56769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56770/">CVE-2024-56770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56771/">CVE-2024-56771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56771">CVE-2024-56771 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56772/">CVE-2024-56772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56772">CVE-2024-56772 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56773/">CVE-2024-56773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56773">CVE-2024-56773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56774/">CVE-2024-56774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56774">CVE-2024-56774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56775/">CVE-2024-56775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56775">CVE-2024-56775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56776/">CVE-2024-56776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56776">CVE-2024-56776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56777/">CVE-2024-56777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56777">CVE-2024-56777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56778/">CVE-2024-56778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56778">CVE-2024-56778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56779/">CVE-2024-56779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56780/">CVE-2024-56780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56780">CVE-2024-56780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56782/">CVE-2024-56782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56782">CVE-2024-56782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56783/">CVE-2024-56783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56784/">CVE-2024-56784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56784">CVE-2024-56784 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56786/">CVE-2024-56786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56787/">CVE-2024-56787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56788/">CVE-2024-56788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56788">CVE-2024-56788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57791/">CVE-2024-57791 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57792/">CVE-2024-57792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-57793/">CVE-2024-57793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57793">CVE-2024-57793 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57795/">CVE-2024-57795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57795">CVE-2024-57795 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57798/">CVE-2024-57798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57799/">CVE-2024-57799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57799">CVE-2024-57799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57800/">CVE-2024-57800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57800">CVE-2024-57800 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57801/">CVE-2024-57801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57801">CVE-2024-57801 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57802/">CVE-2024-57802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57804/">CVE-2024-57804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57804">CVE-2024-57804 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57805/">CVE-2024-57805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57805">CVE-2024-57805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57806/">CVE-2024-57806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57806">CVE-2024-57806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57807/">CVE-2024-57807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57809/">CVE-2024-57809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57809">CVE-2024-57809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57834/">CVE-2024-57834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57834">CVE-2024-57834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57838/">CVE-2024-57838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57838">CVE-2024-57838 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57839/">CVE-2024-57839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57839">CVE-2024-57839 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57841/">CVE-2024-57841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57844/">CVE-2024-57844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57844">CVE-2024-57844 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57849/">CVE-2024-57849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57852/">CVE-2024-57852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57852">CVE-2024-57852 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57857/">CVE-2024-57857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57857">CVE-2024-57857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57874/">CVE-2024-57874 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57875/">CVE-2024-57875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57875">CVE-2024-57875 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57876/">CVE-2024-57876 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57877/">CVE-2024-57877 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57877">CVE-2024-57877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57878/">CVE-2024-57878 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57878">CVE-2024-57878 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57879/">CVE-2024-57879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57880/">CVE-2024-57880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57880">CVE-2024-57880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57881/">CVE-2024-57881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57881">CVE-2024-57881 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57882/">CVE-2024-57882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57882">CVE-2024-57882 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57883/">CVE-2024-57883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57883">CVE-2024-57883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57884/">CVE-2024-57884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57887/">CVE-2024-57887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57887">CVE-2024-57887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57888/">CVE-2024-57888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57888">CVE-2024-57888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57889/">CVE-2024-57889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57890/">CVE-2024-57890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57892/">CVE-2024-57892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57892">CVE-2024-57892 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57893/">CVE-2024-57893 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57896/">CVE-2024-57896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57897/">CVE-2024-57897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57898/">CVE-2024-57898 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57898">CVE-2024-57898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57899/">CVE-2024-57899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57899">CVE-2024-57899 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57900/">CVE-2024-57900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57901/">CVE-2024-57901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57902/">CVE-2024-57902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57903/">CVE-2024-57903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57904/">CVE-2024-57904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57904">CVE-2024-57904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57905/">CVE-2024-57905 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57905">CVE-2024-57905 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57906/">CVE-2024-57906 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57906">CVE-2024-57906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57907/">CVE-2024-57907 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57907">CVE-2024-57907 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57908/">CVE-2024-57908 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57908">CVE-2024-57908 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57909/">CVE-2024-57909 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57909">CVE-2024-57909 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57910/">CVE-2024-57910 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57910">CVE-2024-57910 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-57911/">CVE-2024-57911 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57911">CVE-2024-57911 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57912/">CVE-2024-57912 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57912">CVE-2024-57912 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57913/">CVE-2024-57913 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57913">CVE-2024-57913 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57914/">CVE-2024-57914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57914">CVE-2024-57914 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57915/">CVE-2024-57915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57915">CVE-2024-57915 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57916/">CVE-2024-57916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57916">CVE-2024-57916 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57917/">CVE-2024-57917 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57917">CVE-2024-57917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57918/">CVE-2024-57918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57918">CVE-2024-57918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57919/">CVE-2024-57919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57919">CVE-2024-57919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57920/">CVE-2024-57920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57920">CVE-2024-57920 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57921/">CVE-2024-57921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57921">CVE-2024-57921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57922/">CVE-2024-57922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57922">CVE-2024-57922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57923/">CVE-2024-57923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57923">CVE-2024-57923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57924/">CVE-2024-57924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57924">CVE-2024-57924 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57926/">CVE-2024-57926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57926">CVE-2024-57926 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57927/">CVE-2024-57927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57927">CVE-2024-57927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57928/">CVE-2024-57928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57928">CVE-2024-57928 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57929/">CVE-2024-57929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57930/">CVE-2024-57930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57930">CVE-2024-57930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57931/">CVE-2024-57931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57932/">CVE-2024-57932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57932">CVE-2024-57932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57933/">CVE-2024-57933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57933">CVE-2024-57933 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57934/">CVE-2024-57934 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57934">CVE-2024-57934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57935/">CVE-2024-57935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57935">CVE-2024-57935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57936/">CVE-2024-57936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57936">CVE-2024-57936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57938/">CVE-2024-57938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57940/">CVE-2024-57940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57941/">CVE-2024-57941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57941">CVE-2024-57941 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57942/">CVE-2024-57942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57942">CVE-2024-57942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57943/">CVE-2024-57943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57943">CVE-2024-57943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57944/">CVE-2024-57944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57944">CVE-2024-57944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57946/">CVE-2024-57946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57948/">CVE-2024-57948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57948">CVE-2024-57948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57949/">CVE-2024-57949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57949">CVE-2024-57949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57950/">CVE-2024-57950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57950">CVE-2024-57950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57953/">CVE-2024-57953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57953">CVE-2024-57953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57973/">CVE-2024-57973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57973">CVE-2024-57973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57974/">CVE-2024-57974 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57974">CVE-2024-57974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57975/">CVE-2024-57975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57975">CVE-2024-57975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57976/">CVE-2024-57976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57976">CVE-2024-57976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57978/">CVE-2024-57978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57978">CVE-2024-57978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57979/">CVE-2024-57979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57979">CVE-2024-57979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57980/">CVE-2024-57980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57980">CVE-2024-57980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57981/">CVE-2024-57981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57981">CVE-2024-57981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57982/">CVE-2024-57982 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57982">CVE-2024-57982 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-57984/">CVE-2024-57984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57984">CVE-2024-57984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57985/">CVE-2024-57985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57985">CVE-2024-57985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57986/">CVE-2024-57986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57986">CVE-2024-57986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57987/">CVE-2024-57987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57987">CVE-2024-57987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57988/">CVE-2024-57988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57988">CVE-2024-57988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57989/">CVE-2024-57989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57989">CVE-2024-57989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57990/">CVE-2024-57990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57990">CVE-2024-57990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57991/">CVE-2024-57991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57991">CVE-2024-57991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57993/">CVE-2024-57993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57993">CVE-2024-57993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57994/">CVE-2024-57994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57994">CVE-2024-57994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57995/">CVE-2024-57995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57995">CVE-2024-57995 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57996/">CVE-2024-57996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57996">CVE-2024-57996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57997/">CVE-2024-57997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57997">CVE-2024-57997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57998/">CVE-2024-57998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57998">CVE-2024-57998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57999/">CVE-2024-57999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57999">CVE-2024-57999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58001/">CVE-2024-58001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58001">CVE-2024-58001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58002/">CVE-2024-58002 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58002">CVE-2024-58002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58003/">CVE-2024-58003 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58003">CVE-2024-58003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58004/">CVE-2024-58004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58004">CVE-2024-58004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58005/">CVE-2024-58005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58005">CVE-2024-58005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58006/">CVE-2024-58006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58006">CVE-2024-58006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58007/">CVE-2024-58007 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58007">CVE-2024-58007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58008/">CVE-2024-58008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58008">CVE-2024-58008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58009/">CVE-2024-58009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58009">CVE-2024-58009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58011/">CVE-2024-58011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58011">CVE-2024-58011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58012/">CVE-2024-58012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58012">CVE-2024-58012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58013/">CVE-2024-58013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58013">CVE-2024-58013 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58014/">CVE-2024-58014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58014">CVE-2024-58014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58015/">CVE-2024-58015 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58015">CVE-2024-58015 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58017/">CVE-2024-58017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58017">CVE-2024-58017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58018/">CVE-2024-58018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58018">CVE-2024-58018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58019/">CVE-2024-58019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58019">CVE-2024-58019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58020/">CVE-2024-58020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58020">CVE-2024-58020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58021/">CVE-2024-58021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58021">CVE-2024-58021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58034/">CVE-2024-58034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58034">CVE-2024-58034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58042/">CVE-2024-58042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58042">CVE-2024-58042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58051/">CVE-2024-58051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58051">CVE-2024-58051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58052/">CVE-2024-58052 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58052">CVE-2024-58052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58053/">CVE-2024-58053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58053">CVE-2024-58053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58054/">CVE-2024-58054 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58054">CVE-2024-58054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58055/">CVE-2024-58055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58055">CVE-2024-58055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58056/">CVE-2024-58056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58056">CVE-2024-58056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58057/">CVE-2024-58057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58057">CVE-2024-58057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58059/">CVE-2024-58059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58059">CVE-2024-58059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58060/">CVE-2024-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58060">CVE-2024-58060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58061/">CVE-2024-58061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58061">CVE-2024-58061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58062/">CVE-2024-58062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58062">CVE-2024-58062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58063/">CVE-2024-58063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58063">CVE-2024-58063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58064/">CVE-2024-58064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58064">CVE-2024-58064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58068/">CVE-2024-58068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58068">CVE-2024-58068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58069/">CVE-2024-58069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58069">CVE-2024-58069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58070/">CVE-2024-58070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58070">CVE-2024-58070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58071/">CVE-2024-58071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58071">CVE-2024-58071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58072/">CVE-2024-58072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58072">CVE-2024-58072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58074/">CVE-2024-58074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58074">CVE-2024-58074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58075/">CVE-2024-58075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58075">CVE-2024-58075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58076/">CVE-2024-58076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58076">CVE-2024-58076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58077/">CVE-2024-58077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58077">CVE-2024-58077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58078/">CVE-2024-58078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58078">CVE-2024-58078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58079/">CVE-2024-58079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58079">CVE-2024-58079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58080/">CVE-2024-58080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58080">CVE-2024-58080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58081/">CVE-2024-58081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58081">CVE-2024-58081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58082/">CVE-2024-58082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58082">CVE-2024-58082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58083/">CVE-2024-58083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58083">CVE-2024-58083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58084/">CVE-2024-58084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58084">CVE-2024-58084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58086/">CVE-2024-58086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58086">CVE-2024-58086 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58088/">CVE-2024-58088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58089/">CVE-2024-58089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58089">CVE-2024-58089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58091/">CVE-2024-58091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58091">CVE-2024-58091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58092/">CVE-2024-58092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58092">CVE-2024-58092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58093/">CVE-2024-58093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58093">CVE-2024-58093 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58096/">CVE-2024-58096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58096">CVE-2024-58096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58097/">CVE-2024-58097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58097">CVE-2024-58097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58098/">CVE-2024-58098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58098">CVE-2024-58098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58100/">CVE-2024-58100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58100">CVE-2024-58100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58237/">CVE-2024-58237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58237">CVE-2024-58237 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21629/">CVE-2025-21629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21629">CVE-2025-21629 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21631/">CVE-2025-21631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21632/">CVE-2025-21632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21632">CVE-2025-21632 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21633/">CVE-2025-21633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21633">CVE-2025-21633 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21634/">CVE-2025-21634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21634">CVE-2025-21634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21635/">CVE-2025-21635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21635">CVE-2025-21635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21636/">CVE-2025-21636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21636">CVE-2025-21636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21637/">CVE-2025-21637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21637">CVE-2025-21637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21638/">CVE-2025-21638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21638">CVE-2025-21638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21639/">CVE-2025-21639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21639">CVE-2025-21639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21640/">CVE-2025-21640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21640">CVE-2025-21640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21641/">CVE-2025-21641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21641">CVE-2025-21641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21642/">CVE-2025-21642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21642">CVE-2025-21642 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21643/">CVE-2025-21643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21643">CVE-2025-21643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21644/">CVE-2025-21644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21644">CVE-2025-21644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21645/">CVE-2025-21645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21645">CVE-2025-21645 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21647/">CVE-2025-21647 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21648/">CVE-2025-21648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21649/">CVE-2025-21649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21649">CVE-2025-21649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21650/">CVE-2025-21650 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21650">CVE-2025-21650 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21651/">CVE-2025-21651 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21651">CVE-2025-21651 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21652/">CVE-2025-21652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21652">CVE-2025-21652 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21653/">CVE-2025-21653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21653">CVE-2025-21653 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21654/">CVE-2025-21654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21654">CVE-2025-21654 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21655/">CVE-2025-21655 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21655">CVE-2025-21655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21656/">CVE-2025-21656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21656">CVE-2025-21656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21658/">CVE-2025-21658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21659/">CVE-2025-21659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21659">CVE-2025-21659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21661/">CVE-2025-21661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21661">CVE-2025-21661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21662/">CVE-2025-21662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21662">CVE-2025-21662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21663/">CVE-2025-21663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21664/">CVE-2025-21664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21664">CVE-2025-21664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21666/">CVE-2025-21666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21666">CVE-2025-21666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21667/">CVE-2025-21667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21667">CVE-2025-21667 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21668/">CVE-2025-21668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21668">CVE-2025-21668 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21669/">CVE-2025-21669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21669">CVE-2025-21669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21670/">CVE-2025-21670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21670">CVE-2025-21670 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21671/">CVE-2025-21671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21671">CVE-2025-21671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21673/">CVE-2025-21673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21673">CVE-2025-21673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21674/">CVE-2025-21674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21674">CVE-2025-21674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21675/">CVE-2025-21675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21675">CVE-2025-21675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21676/">CVE-2025-21676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21676">CVE-2025-21676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21677/">CVE-2025-21677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21677">CVE-2025-21677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21678/">CVE-2025-21678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21678">CVE-2025-21678 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21680/">CVE-2025-21680 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21680">CVE-2025-21680 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-21681/">CVE-2025-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21681">CVE-2025-21681 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21682/">CVE-2025-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21682">CVE-2025-21682 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21683/">CVE-2025-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21683">CVE-2025-21683 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21684/">CVE-2025-21684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21684">CVE-2025-21684 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21685/">CVE-2025-21685 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21685">CVE-2025-21685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21686/">CVE-2025-21686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21686">CVE-2025-21686 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21687/">CVE-2025-21687 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21687">CVE-2025-21687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21688/">CVE-2025-21688 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21688">CVE-2025-21688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21689/">CVE-2025-21689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21689">CVE-2025-21689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21690/">CVE-2025-21690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21690">CVE-2025-21690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21691/">CVE-2025-21691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21691">CVE-2025-21691 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21692/">CVE-2025-21692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21692">CVE-2025-21692 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21693/">CVE-2025-21693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21693">CVE-2025-21693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21695/">CVE-2025-21695 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21695">CVE-2025-21695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21696/">CVE-2025-21696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21696">CVE-2025-21696 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-21697/">CVE-2025-21697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21697">CVE-2025-21697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21699/">CVE-2025-21699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21699">CVE-2025-21699 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21700/">CVE-2025-21700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21700">CVE-2025-21700 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21701/">CVE-2025-21701 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21701">CVE-2025-21701 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21702/">CVE-2025-21702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21702">CVE-2025-21702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21703/">CVE-2025-21703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21703">CVE-2025-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21704/">CVE-2025-21704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21704">CVE-2025-21704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21705/">CVE-2025-21705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21705">CVE-2025-21705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21706/">CVE-2025-21706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21706">CVE-2025-21706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21707/">CVE-2025-21707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21707">CVE-2025-21707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21708/">CVE-2025-21708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21708">CVE-2025-21708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21709/">CVE-2025-21709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21709">CVE-2025-21709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21710/">CVE-2025-21710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21710">CVE-2025-21710 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21711/">CVE-2025-21711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21711">CVE-2025-21711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21712/">CVE-2025-21712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21712">CVE-2025-21712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21713/">CVE-2025-21713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21713">CVE-2025-21713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21714/">CVE-2025-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21714">CVE-2025-21714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21715/">CVE-2025-21715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21715">CVE-2025-21715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21716/">CVE-2025-21716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21716">CVE-2025-21716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21717/">CVE-2025-21717 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21717">CVE-2025-21717 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21718/">CVE-2025-21718 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21718">CVE-2025-21718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21719/">CVE-2025-21719 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21719">CVE-2025-21719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21720/">CVE-2025-21720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21720">CVE-2025-21720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21723/">CVE-2025-21723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21723">CVE-2025-21723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21724/">CVE-2025-21724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21724">CVE-2025-21724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21725/">CVE-2025-21725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21725">CVE-2025-21725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21726/">CVE-2025-21726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21726">CVE-2025-21726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21727/">CVE-2025-21727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21727">CVE-2025-21727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21728/">CVE-2025-21728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21728">CVE-2025-21728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21729/">CVE-2025-21729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21729">CVE-2025-21729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21730/">CVE-2025-21730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21730">CVE-2025-21730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21731/">CVE-2025-21731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21731">CVE-2025-21731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21732/">CVE-2025-21732 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21732">CVE-2025-21732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21733/">CVE-2025-21733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21733">CVE-2025-21733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21734/">CVE-2025-21734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21734">CVE-2025-21734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21735/">CVE-2025-21735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21735">CVE-2025-21735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21739/">CVE-2025-21739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21739">CVE-2025-21739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21741/">CVE-2025-21741 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21741">CVE-2025-21741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21742/">CVE-2025-21742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21742">CVE-2025-21742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21743/">CVE-2025-21743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21743">CVE-2025-21743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21744/">CVE-2025-21744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21744">CVE-2025-21744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21745/">CVE-2025-21745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21745">CVE-2025-21745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21746/">CVE-2025-21746 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21746">CVE-2025-21746 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21749/">CVE-2025-21749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21749">CVE-2025-21749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21750/">CVE-2025-21750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21750">CVE-2025-21750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21751/">CVE-2025-21751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21751">CVE-2025-21751 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21753/">CVE-2025-21753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21753">CVE-2025-21753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21754/">CVE-2025-21754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21754">CVE-2025-21754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21755/">CVE-2025-21755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21755">CVE-2025-21755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21756/">CVE-2025-21756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21758/">CVE-2025-21758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21758">CVE-2025-21758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21759/">CVE-2025-21759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21760/">CVE-2025-21760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21761/">CVE-2025-21761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21761">CVE-2025-21761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21762/">CVE-2025-21762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21762">CVE-2025-21762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21763/">CVE-2025-21763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21763">CVE-2025-21763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21764/">CVE-2025-21764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21765/">CVE-2025-21765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21766/">CVE-2025-21766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21767/">CVE-2025-21767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21767">CVE-2025-21767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21768/">CVE-2025-21768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21768">CVE-2025-21768 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21770/">CVE-2025-21770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21770">CVE-2025-21770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21771/">CVE-2025-21771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21771">CVE-2025-21771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21772/">CVE-2025-21772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21773/">CVE-2025-21773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21773">CVE-2025-21773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21774/">CVE-2025-21774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21774">CVE-2025-21774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21775/">CVE-2025-21775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21775">CVE-2025-21775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21776/">CVE-2025-21776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21776">CVE-2025-21776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21777/">CVE-2025-21777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21777">CVE-2025-21777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21778/">CVE-2025-21778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21778">CVE-2025-21778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21779/">CVE-2025-21779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21779">CVE-2025-21779 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21780/">CVE-2025-21780 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21781/">CVE-2025-21781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21781">CVE-2025-21781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21783/">CVE-2025-21783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21783">CVE-2025-21783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21784/">CVE-2025-21784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21784">CVE-2025-21784 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21785/">CVE-2025-21785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21786/">CVE-2025-21786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21786">CVE-2025-21786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21787/">CVE-2025-21787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21788/">CVE-2025-21788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21788">CVE-2025-21788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21790/">CVE-2025-21790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21791/">CVE-2025-21791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21792/">CVE-2025-21792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21792">CVE-2025-21792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21793/">CVE-2025-21793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21793">CVE-2025-21793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21794/">CVE-2025-21794 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21794">CVE-2025-21794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21795/">CVE-2025-21795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21796/">CVE-2025-21796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21798/">CVE-2025-21798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21798">CVE-2025-21798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21799/">CVE-2025-21799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21799">CVE-2025-21799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21800/">CVE-2025-21800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21800">CVE-2025-21800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21801/">CVE-2025-21801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21801">CVE-2025-21801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21802/">CVE-2025-21802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21802">CVE-2025-21802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21803/">CVE-2025-21803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21803">CVE-2025-21803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21804/">CVE-2025-21804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21804">CVE-2025-21804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21805/">CVE-2025-21805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21805">CVE-2025-21805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21806/">CVE-2025-21806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21806">CVE-2025-21806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21807/">CVE-2025-21807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21807">CVE-2025-21807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21808/">CVE-2025-21808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21808">CVE-2025-21808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21809/">CVE-2025-21809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21809">CVE-2025-21809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21810/">CVE-2025-21810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21810">CVE-2025-21810 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21812/">CVE-2025-21812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21812">CVE-2025-21812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21814/">CVE-2025-21814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21814">CVE-2025-21814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21815/">CVE-2025-21815 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21815">CVE-2025-21815 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21817/">CVE-2025-21817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21817">CVE-2025-21817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21819/">CVE-2025-21819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21819">CVE-2025-21819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21820/">CVE-2025-21820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21820">CVE-2025-21820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21821/">CVE-2025-21821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21821">CVE-2025-21821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21823/">CVE-2025-21823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21823">CVE-2025-21823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21824/">CVE-2025-21824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21824">CVE-2025-21824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21825/">CVE-2025-21825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21825">CVE-2025-21825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21826/">CVE-2025-21826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21826">CVE-2025-21826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21827/">CVE-2025-21827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21827">CVE-2025-21827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21828/">CVE-2025-21828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21828">CVE-2025-21828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21829/">CVE-2025-21829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21829">CVE-2025-21829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21830/">CVE-2025-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21830">CVE-2025-21830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21831/">CVE-2025-21831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21831">CVE-2025-21831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21832/">CVE-2025-21832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21832">CVE-2025-21832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21833/">CVE-2025-21833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21833">CVE-2025-21833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21834/">CVE-2025-21834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21834">CVE-2025-21834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21835/">CVE-2025-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21835">CVE-2025-21835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21836/">CVE-2025-21836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21836">CVE-2025-21836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21837/">CVE-2025-21837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21837">CVE-2025-21837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21838/">CVE-2025-21838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21838">CVE-2025-21838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21839/">CVE-2025-21839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21839">CVE-2025-21839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21841/">CVE-2025-21841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21841">CVE-2025-21841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21842/">CVE-2025-21842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21842">CVE-2025-21842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21844/">CVE-2025-21844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21845/">CVE-2025-21845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21845">CVE-2025-21845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21846/">CVE-2025-21846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21847/">CVE-2025-21847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21848/">CVE-2025-21848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21849/">CVE-2025-21849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21849">CVE-2025-21849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21850/">CVE-2025-21850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21850">CVE-2025-21850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21851/">CVE-2025-21851 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21851">CVE-2025-21851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21852/">CVE-2025-21852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21852">CVE-2025-21852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21853/">CVE-2025-21853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21854/">CVE-2025-21854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21854">CVE-2025-21854 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21855/">CVE-2025-21855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21856/">CVE-2025-21856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21856">CVE-2025-21856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21857/">CVE-2025-21857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21857">CVE-2025-21857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21858/">CVE-2025-21858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21858">CVE-2025-21858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21859/">CVE-2025-21859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21859">CVE-2025-21859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21861/">CVE-2025-21861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21861">CVE-2025-21861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21862/">CVE-2025-21862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21862">CVE-2025-21862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21863/">CVE-2025-21863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21864/">CVE-2025-21864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21865/">CVE-2025-21865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21865">CVE-2025-21865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21866/">CVE-2025-21866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21866">CVE-2025-21866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21867/">CVE-2025-21867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21867">CVE-2025-21867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21868/">CVE-2025-21868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21868">CVE-2025-21868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21869/">CVE-2025-21869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21869">CVE-2025-21869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21870/">CVE-2025-21870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21870">CVE-2025-21870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21871/">CVE-2025-21871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21871">CVE-2025-21871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21872/">CVE-2025-21872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21872">CVE-2025-21872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21873/">CVE-2025-21873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21873">CVE-2025-21873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21874/">CVE-2025-21874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21874">CVE-2025-21874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21875/">CVE-2025-21875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21875">CVE-2025-21875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21876/">CVE-2025-21876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21876">CVE-2025-21876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21877/">CVE-2025-21877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21877">CVE-2025-21877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21878/">CVE-2025-21878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21878">CVE-2025-21878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21880/">CVE-2025-21880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21880">CVE-2025-21880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21881/">CVE-2025-21881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21881">CVE-2025-21881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21882/">CVE-2025-21882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21882">CVE-2025-21882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21883/">CVE-2025-21883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21883">CVE-2025-21883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21884/">CVE-2025-21884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21884">CVE-2025-21884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21885/">CVE-2025-21885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21885">CVE-2025-21885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21886/">CVE-2025-21886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21886">CVE-2025-21886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21887/">CVE-2025-21887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21887">CVE-2025-21887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21888/">CVE-2025-21888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21888">CVE-2025-21888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21889/">CVE-2025-21889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21889">CVE-2025-21889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21890/">CVE-2025-21890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21890">CVE-2025-21890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21891/">CVE-2025-21891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21891">CVE-2025-21891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21892/">CVE-2025-21892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21892">CVE-2025-21892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21893/">CVE-2025-21893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21893">CVE-2025-21893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21894/">CVE-2025-21894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21894">CVE-2025-21894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21895/">CVE-2025-21895 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21895">CVE-2025-21895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21898/">CVE-2025-21898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21898">CVE-2025-21898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21899/">CVE-2025-21899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21899">CVE-2025-21899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21900/">CVE-2025-21900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21900">CVE-2025-21900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21901/">CVE-2025-21901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21901">CVE-2025-21901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21902/">CVE-2025-21902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21902">CVE-2025-21902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21903/">CVE-2025-21903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21903">CVE-2025-21903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21904/">CVE-2025-21904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21904">CVE-2025-21904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21905/">CVE-2025-21905 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21905">CVE-2025-21905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21906/">CVE-2025-21906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21906">CVE-2025-21906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21907/">CVE-2025-21907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21907">CVE-2025-21907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21908/">CVE-2025-21908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21908">CVE-2025-21908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21909/">CVE-2025-21909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21909">CVE-2025-21909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21910/">CVE-2025-21910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21910">CVE-2025-21910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21911/">CVE-2025-21911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21911">CVE-2025-21911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21912/">CVE-2025-21912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21912">CVE-2025-21912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21913/">CVE-2025-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21913">CVE-2025-21913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21914/">CVE-2025-21914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21914">CVE-2025-21914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21915/">CVE-2025-21915 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21915">CVE-2025-21915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21916/">CVE-2025-21916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21916">CVE-2025-21916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21917/">CVE-2025-21917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21917">CVE-2025-21917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21918/">CVE-2025-21918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21918">CVE-2025-21918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21919/">CVE-2025-21919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21919">CVE-2025-21919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21920/">CVE-2025-21920 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21920">CVE-2025-21920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21921/">CVE-2025-21921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21921">CVE-2025-21921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21922/">CVE-2025-21922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21922">CVE-2025-21922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21923/">CVE-2025-21923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21923">CVE-2025-21923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21924/">CVE-2025-21924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21924">CVE-2025-21924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21925/">CVE-2025-21925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21925">CVE-2025-21925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21926/">CVE-2025-21926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21926">CVE-2025-21926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21927/">CVE-2025-21927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21927">CVE-2025-21927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21928/">CVE-2025-21928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21928">CVE-2025-21928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21929/">CVE-2025-21929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21929">CVE-2025-21929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21930/">CVE-2025-21930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21930">CVE-2025-21930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21931/">CVE-2025-21931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21931">CVE-2025-21931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21932/">CVE-2025-21932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21932">CVE-2025-21932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21934/">CVE-2025-21934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21934">CVE-2025-21934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21935/">CVE-2025-21935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21935">CVE-2025-21935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21936/">CVE-2025-21936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21936">CVE-2025-21936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21937/">CVE-2025-21937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21937">CVE-2025-21937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21938/">CVE-2025-21938 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21938">CVE-2025-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21939/">CVE-2025-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21939">CVE-2025-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21940/">CVE-2025-21940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21940">CVE-2025-21940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21941/">CVE-2025-21941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21941">CVE-2025-21941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21942/">CVE-2025-21942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21942">CVE-2025-21942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21943/">CVE-2025-21943 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21943">CVE-2025-21943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21948/">CVE-2025-21948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21948">CVE-2025-21948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21950/">CVE-2025-21950 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21950">CVE-2025-21950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21951/">CVE-2025-21951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21951">CVE-2025-21951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21953/">CVE-2025-21953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21953">CVE-2025-21953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21954/">CVE-2025-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21954">CVE-2025-21954 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21956/">CVE-2025-21956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21956">CVE-2025-21956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21958/">CVE-2025-21958 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21958">CVE-2025-21958 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21959/">CVE-2025-21959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21959">CVE-2025-21959 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21960/">CVE-2025-21960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21960">CVE-2025-21960 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21961/">CVE-2025-21961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21961">CVE-2025-21961 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21962/">CVE-2025-21962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21963/">CVE-2025-21963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21964/">CVE-2025-21964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21966/">CVE-2025-21966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21968/">CVE-2025-21968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21968">CVE-2025-21968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21969/">CVE-2025-21969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21970/">CVE-2025-21970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21970">CVE-2025-21970 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21971/">CVE-2025-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21972/">CVE-2025-21972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21972">CVE-2025-21972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21973/">CVE-2025-21973 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21973">CVE-2025-21973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21974/">CVE-2025-21974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21974">CVE-2025-21974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21975/">CVE-2025-21975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21975">CVE-2025-21975 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-21976/">CVE-2025-21976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21976">CVE-2025-21976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21977/">CVE-2025-21977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21977">CVE-2025-21977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21978/">CVE-2025-21978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21978">CVE-2025-21978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21979/">CVE-2025-21979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21980/">CVE-2025-21980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21980">CVE-2025-21980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21981/">CVE-2025-21981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21981">CVE-2025-21981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21982/">CVE-2025-21982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21982">CVE-2025-21982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21983/">CVE-2025-21983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21983">CVE-2025-21983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21984/">CVE-2025-21984 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21984">CVE-2025-21984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21985/">CVE-2025-21985 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21985">CVE-2025-21985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21986/">CVE-2025-21986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21986">CVE-2025-21986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21987/">CVE-2025-21987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21987">CVE-2025-21987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21988/">CVE-2025-21988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21988">CVE-2025-21988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21989/">CVE-2025-21989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21989">CVE-2025-21989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21990/">CVE-2025-21990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21990">CVE-2025-21990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21991/">CVE-2025-21991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21992/">CVE-2025-21992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21992">CVE-2025-21992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21993/">CVE-2025-21993 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21995/">CVE-2025-21995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21995">CVE-2025-21995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21996/">CVE-2025-21996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21996">CVE-2025-21996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21997/">CVE-2025-21997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21998/">CVE-2025-21998 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21998">CVE-2025-21998 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21999/">CVE-2025-21999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22000/">CVE-2025-22000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22000">CVE-2025-22000 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22001/">CVE-2025-22001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22001">CVE-2025-22001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22002/">CVE-2025-22002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22002">CVE-2025-22002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22003/">CVE-2025-22003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22003">CVE-2025-22003 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22005/">CVE-2025-22005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22005">CVE-2025-22005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22007/">CVE-2025-22007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22007">CVE-2025-22007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22008/">CVE-2025-22008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22008">CVE-2025-22008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22009/">CVE-2025-22009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22009">CVE-2025-22009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22010/">CVE-2025-22010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22010">CVE-2025-22010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22013/">CVE-2025-22013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22013">CVE-2025-22013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22014/">CVE-2025-22014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22014">CVE-2025-22014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22015/">CVE-2025-22015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22015">CVE-2025-22015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22016/">CVE-2025-22016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22016">CVE-2025-22016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22017/">CVE-2025-22017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22017">CVE-2025-22017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22018/">CVE-2025-22018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22018">CVE-2025-22018 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22020/">CVE-2025-22020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22021/">CVE-2025-22021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22021">CVE-2025-22021 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22022/">CVE-2025-22022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22022">CVE-2025-22022 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22023/">CVE-2025-22023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22023">CVE-2025-22023 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22024/">CVE-2025-22024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22024">CVE-2025-22024 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22025/">CVE-2025-22025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22025">CVE-2025-22025 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22027/">CVE-2025-22027 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22027">CVE-2025-22027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22028/">CVE-2025-22028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22028">CVE-2025-22028 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22029/">CVE-2025-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22029">CVE-2025-22029 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22030/">CVE-2025-22030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22030">CVE-2025-22030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22032/">CVE-2025-22032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22032">CVE-2025-22032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22033/">CVE-2025-22033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22033">CVE-2025-22033 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-22035/">CVE-2025-22035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22035">CVE-2025-22035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22036/">CVE-2025-22036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22036">CVE-2025-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22044/">CVE-2025-22044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22044">CVE-2025-22044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22045/">CVE-2025-22045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22046/">CVE-2025-22046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22046">CVE-2025-22046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22047/">CVE-2025-22047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22047">CVE-2025-22047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22050/">CVE-2025-22050 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22050">CVE-2025-22050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22053/">CVE-2025-22053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22053">CVE-2025-22053 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22055/">CVE-2025-22055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22056/">CVE-2025-22056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22057/">CVE-2025-22057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22057">CVE-2025-22057 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22058/">CVE-2025-22058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22059/">CVE-2025-22059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22059">CVE-2025-22059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22060/">CVE-2025-22060 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22062/">CVE-2025-22062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22062">CVE-2025-22062 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22063/">CVE-2025-22063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22063">CVE-2025-22063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22064/">CVE-2025-22064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22064">CVE-2025-22064 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22065/">CVE-2025-22065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22065">CVE-2025-22065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22066/">CVE-2025-22066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22066">CVE-2025-22066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22068/">CVE-2025-22068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22068">CVE-2025-22068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22070/">CVE-2025-22070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22070">CVE-2025-22070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22075/">CVE-2025-22075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22075">CVE-2025-22075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22076/">CVE-2025-22076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22076">CVE-2025-22076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22078/">CVE-2025-22078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22078">CVE-2025-22078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22080/">CVE-2025-22080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22080">CVE-2025-22080 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22082/">CVE-2025-22082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22082">CVE-2025-22082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22083/">CVE-2025-22083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22083">CVE-2025-22083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22084/">CVE-2025-22084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22084">CVE-2025-22084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22085/">CVE-2025-22085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22085">CVE-2025-22085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22086/">CVE-2025-22086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22087/">CVE-2025-22087 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22087">CVE-2025-22087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22088/">CVE-2025-22088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22088">CVE-2025-22088 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22089/">CVE-2025-22089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22090/">CVE-2025-22090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22090">CVE-2025-22090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22091/">CVE-2025-22091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22091">CVE-2025-22091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22093/">CVE-2025-22093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22093">CVE-2025-22093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22094/">CVE-2025-22094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22094">CVE-2025-22094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22095/">CVE-2025-22095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22095">CVE-2025-22095 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22101/">CVE-2025-22101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22101">CVE-2025-22101 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22102/">CVE-2025-22102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22102">CVE-2025-22102 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22103/">CVE-2025-22103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22103">CVE-2025-22103 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22104/">CVE-2025-22104 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22104">CVE-2025-22104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22105/">CVE-2025-22105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22105">CVE-2025-22105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22106/">CVE-2025-22106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22106">CVE-2025-22106 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22107/">CVE-2025-22107 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22107">CVE-2025-22107 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22108/">CVE-2025-22108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22108">CVE-2025-22108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22109/">CVE-2025-22109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22109">CVE-2025-22109 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22111/">CVE-2025-22111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22111">CVE-2025-22111 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22112/">CVE-2025-22112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22112">CVE-2025-22112 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22113/">CVE-2025-22113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22113">CVE-2025-22113 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22115/">CVE-2025-22115 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22115">CVE-2025-22115 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22116/">CVE-2025-22116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22116">CVE-2025-22116 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22117/">CVE-2025-22117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22117">CVE-2025-22117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-22118/">CVE-2025-22118 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22118">CVE-2025-22118 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22119/">CVE-2025-22119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22119">CVE-2025-22119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22120/">CVE-2025-22120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22120">CVE-2025-22120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22121/">CVE-2025-22121 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22121">CVE-2025-22121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22122/">CVE-2025-22122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22122">CVE-2025-22122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22124/">CVE-2025-22124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22124">CVE-2025-22124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22125/">CVE-2025-22125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22125">CVE-2025-22125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22126/">CVE-2025-22126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22126">CVE-2025-22126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22128/">CVE-2025-22128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22128">CVE-2025-22128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23129/">CVE-2025-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23129">CVE-2025-23129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23131/">CVE-2025-23131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23131">CVE-2025-23131 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23133/">CVE-2025-23133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23133">CVE-2025-23133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23134/">CVE-2025-23134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23134">CVE-2025-23134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23136/">CVE-2025-23136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23136">CVE-2025-23136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23137/">CVE-2025-23137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23137">CVE-2025-23137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23138/">CVE-2025-23138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23140/">CVE-2025-23140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23140">CVE-2025-23140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23142/">CVE-2025-23142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23142">CVE-2025-23142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23144/">CVE-2025-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23144">CVE-2025-23144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23145/">CVE-2025-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23145">CVE-2025-23145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23146/">CVE-2025-23146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23146">CVE-2025-23146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23147/">CVE-2025-23147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23147">CVE-2025-23147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23148/">CVE-2025-23148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23148">CVE-2025-23148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23149/">CVE-2025-23149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23149">CVE-2025-23149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23150/">CVE-2025-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23150">CVE-2025-23150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23151/">CVE-2025-23151 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23151">CVE-2025-23151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23154/">CVE-2025-23154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23154">CVE-2025-23154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23155/">CVE-2025-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23155">CVE-2025-23155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23156/">CVE-2025-23156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23156">CVE-2025-23156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23157/">CVE-2025-23157 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23157">CVE-2025-23157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23158/">CVE-2025-23158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23158">CVE-2025-23158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23159/">CVE-2025-23159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23159">CVE-2025-23159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23160/">CVE-2025-23160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23160">CVE-2025-23160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23161/">CVE-2025-23161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23161">CVE-2025-23161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23162/">CVE-2025-23162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23162">CVE-2025-23162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23163/">CVE-2025-23163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23163">CVE-2025-23163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37738/">CVE-2025-37738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37738">CVE-2025-37738 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37743/">CVE-2025-37743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37743">CVE-2025-37743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37745/">CVE-2025-37745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37745">CVE-2025-37745 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37746/">CVE-2025-37746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37746">CVE-2025-37746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37747/">CVE-2025-37747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37747">CVE-2025-37747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37748/">CVE-2025-37748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37748">CVE-2025-37748 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37749/">CVE-2025-37749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37749">CVE-2025-37749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37750/">CVE-2025-37750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37750">CVE-2025-37750 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37752/">CVE-2025-37752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37752">CVE-2025-37752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37754/">CVE-2025-37754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37754">CVE-2025-37754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37755/">CVE-2025-37755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37755">CVE-2025-37755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37756/">CVE-2025-37756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37756">CVE-2025-37756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37757/">CVE-2025-37757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37757">CVE-2025-37757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37758/">CVE-2025-37758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37758">CVE-2025-37758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37759/">CVE-2025-37759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37759">CVE-2025-37759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37760/">CVE-2025-37760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37760">CVE-2025-37760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37761/">CVE-2025-37761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37761">CVE-2025-37761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37763/">CVE-2025-37763 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37763">CVE-2025-37763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37764/">CVE-2025-37764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37764">CVE-2025-37764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37765/">CVE-2025-37765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37765">CVE-2025-37765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37766/">CVE-2025-37766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37766">CVE-2025-37766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37767/">CVE-2025-37767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37767">CVE-2025-37767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37768/">CVE-2025-37768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37768">CVE-2025-37768 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37769/">CVE-2025-37769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37769">CVE-2025-37769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37770/">CVE-2025-37770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37770">CVE-2025-37770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37771/">CVE-2025-37771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37771">CVE-2025-37771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37772/">CVE-2025-37772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37772">CVE-2025-37772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37773/">CVE-2025-37773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37773">CVE-2025-37773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37774/">CVE-2025-37774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37774">CVE-2025-37774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37779/">CVE-2025-37779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37779">CVE-2025-37779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37780/">CVE-2025-37780 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37780">CVE-2025-37780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37781/">CVE-2025-37781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37781">CVE-2025-37781 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37785/">CVE-2025-37785 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37786/">CVE-2025-37786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37786">CVE-2025-37786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37787/">CVE-2025-37787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37787">CVE-2025-37787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37788/">CVE-2025-37788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37788">CVE-2025-37788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37789/">CVE-2025-37789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37789">CVE-2025-37789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37790/">CVE-2025-37790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37790">CVE-2025-37790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37791/">CVE-2025-37791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37791">CVE-2025-37791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37792/">CVE-2025-37792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37792">CVE-2025-37792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37793/">CVE-2025-37793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37793">CVE-2025-37793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37794/">CVE-2025-37794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37794">CVE-2025-37794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37796/">CVE-2025-37796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37796">CVE-2025-37796 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37799/">CVE-2025-37799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37800/">CVE-2025-37800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37800">CVE-2025-37800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37801/">CVE-2025-37801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37801">CVE-2025-37801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37803/">CVE-2025-37803 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37804/">CVE-2025-37804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-37804">CVE-2025-37804 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-37805/">CVE-2025-37805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37805">CVE-2025-37805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37808/">CVE-2025-37808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37808">CVE-2025-37808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37809/">CVE-2025-37809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37809">CVE-2025-37809 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37810/">CVE-2025-37810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37811/">CVE-2025-37811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37811">CVE-2025-37811 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37812/">CVE-2025-37812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37812">CVE-2025-37812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37813/">CVE-2025-37813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37813">CVE-2025-37813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37814/">CVE-2025-37814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37814">CVE-2025-37814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37815/">CVE-2025-37815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37815">CVE-2025-37815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37816/">CVE-2025-37816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37816">CVE-2025-37816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37819/">CVE-2025-37819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37820/">CVE-2025-37820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37820">CVE-2025-37820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37824/">CVE-2025-37824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37824">CVE-2025-37824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37825/">CVE-2025-37825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37825">CVE-2025-37825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37826/">CVE-2025-37826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37826">CVE-2025-37826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37827/">CVE-2025-37827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37827">CVE-2025-37827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37828/">CVE-2025-37828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37828">CVE-2025-37828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37829/">CVE-2025-37829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37829">CVE-2025-37829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37830/">CVE-2025-37830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37830">CVE-2025-37830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37831/">CVE-2025-37831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37831">CVE-2025-37831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37833/">CVE-2025-37833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37833">CVE-2025-37833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37836/">CVE-2025-37836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37836">CVE-2025-37836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37837/">CVE-2025-37837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37837">CVE-2025-37837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37838/">CVE-2025-37838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-37838">CVE-2025-37838 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37839/">CVE-2025-37839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37839">CVE-2025-37839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37840/">CVE-2025-37840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37840">CVE-2025-37840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37842/">CVE-2025-37842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37842">CVE-2025-37842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37843/">CVE-2025-37843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37843">CVE-2025-37843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37844/">CVE-2025-37844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37844">CVE-2025-37844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37846/">CVE-2025-37846 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37846">CVE-2025-37846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37847/">CVE-2025-37847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37847">CVE-2025-37847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37848/">CVE-2025-37848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37848">CVE-2025-37848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37850/">CVE-2025-37850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37850">CVE-2025-37850 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37851/">CVE-2025-37851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37851">CVE-2025-37851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37852/">CVE-2025-37852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37852">CVE-2025-37852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37853/">CVE-2025-37853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37853">CVE-2025-37853 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37854/">CVE-2025-37854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37854">CVE-2025-37854 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37859/">CVE-2025-37859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37859">CVE-2025-37859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37860/">CVE-2025-37860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37860">CVE-2025-37860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37862/">CVE-2025-37862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37862">CVE-2025-37862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37863/">CVE-2025-37863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37863">CVE-2025-37863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37865/">CVE-2025-37865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37865">CVE-2025-37865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37867/">CVE-2025-37867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37867">CVE-2025-37867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37868/">CVE-2025-37868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37868">CVE-2025-37868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37869/">CVE-2025-37869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37869">CVE-2025-37869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37870/">CVE-2025-37870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37870">CVE-2025-37870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37871/">CVE-2025-37871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37871">CVE-2025-37871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37872/">CVE-2025-37872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37872">CVE-2025-37872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37873/">CVE-2025-37873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37873">CVE-2025-37873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37874/">CVE-2025-37874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37874">CVE-2025-37874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37875/">CVE-2025-37875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37875">CVE-2025-37875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37877/">CVE-2025-37877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37877">CVE-2025-37877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37878/">CVE-2025-37878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37878">CVE-2025-37878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37879/">CVE-2025-37879 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37879">CVE-2025-37879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37881/">CVE-2025-37881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37881">CVE-2025-37881 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-37882/">CVE-2025-37882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37882">CVE-2025-37882 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37884/">CVE-2025-37884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37884">CVE-2025-37884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37885/">CVE-2025-37885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37886/">CVE-2025-37886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37886">CVE-2025-37886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37887/">CVE-2025-37887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37887">CVE-2025-37887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37888/">CVE-2025-37888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37888">CVE-2025-37888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37889/">CVE-2025-37889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37889">CVE-2025-37889 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37890/">CVE-2025-37890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-37891/">CVE-2025-37891 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37891">CVE-2025-37891 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37892/">CVE-2025-37892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37892">CVE-2025-37892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37894/">CVE-2025-37894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37894">CVE-2025-37894 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37895/">CVE-2025-37895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37895">CVE-2025-37895 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37897/">CVE-2025-37897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37897">CVE-2025-37897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37898/">CVE-2025-37898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37898">CVE-2025-37898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37900/">CVE-2025-37900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37900">CVE-2025-37900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37901/">CVE-2025-37901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37901">CVE-2025-37901 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37903/">CVE-2025-37903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37903">CVE-2025-37903 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37905/">CVE-2025-37905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37905">CVE-2025-37905 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37907/">CVE-2025-37907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37907">CVE-2025-37907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37908/">CVE-2025-37908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37908">CVE-2025-37908 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37909/">CVE-2025-37909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37909">CVE-2025-37909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37910/">CVE-2025-37910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37910">CVE-2025-37910 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37911/">CVE-2025-37911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37911">CVE-2025-37911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37912/">CVE-2025-37912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37912">CVE-2025-37912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37913/">CVE-2025-37913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37913">CVE-2025-37913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37914/">CVE-2025-37914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37915/">CVE-2025-37915 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37915">CVE-2025-37915 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37917/">CVE-2025-37917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37917">CVE-2025-37917 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37918/">CVE-2025-37918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37918">CVE-2025-37918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37919/">CVE-2025-37919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37919">CVE-2025-37919 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37920/">CVE-2025-37920 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37920">CVE-2025-37920 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37921/">CVE-2025-37921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37921">CVE-2025-37921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37922/">CVE-2025-37922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37922">CVE-2025-37922 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37923/">CVE-2025-37923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37923">CVE-2025-37923 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37927/">CVE-2025-37927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37927">CVE-2025-37927 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37928/">CVE-2025-37928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37928">CVE-2025-37928 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37929/">CVE-2025-37929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37929">CVE-2025-37929 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37930/">CVE-2025-37930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37930">CVE-2025-37930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37931/">CVE-2025-37931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37931">CVE-2025-37931 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37932/">CVE-2025-37932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37933/">CVE-2025-37933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37933">CVE-2025-37933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37934/">CVE-2025-37934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37934">CVE-2025-37934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37935/">CVE-2025-37935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37935">CVE-2025-37935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37936/">CVE-2025-37936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37936">CVE-2025-37936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37937/">CVE-2025-37937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37937">CVE-2025-37937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37938/">CVE-2025-37938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37938">CVE-2025-37938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37941/">CVE-2025-37941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37941">CVE-2025-37941 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37942/">CVE-2025-37942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37942">CVE-2025-37942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37943/">CVE-2025-37943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37943">CVE-2025-37943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37944/">CVE-2025-37944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37944">CVE-2025-37944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37945/">CVE-2025-37945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37945">CVE-2025-37945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37946/">CVE-2025-37946 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37946">CVE-2025-37946 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37948/">CVE-2025-37948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37949/">CVE-2025-37949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37949">CVE-2025-37949 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37951/">CVE-2025-37951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37951">CVE-2025-37951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37953/">CVE-2025-37953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37954/">CVE-2025-37954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37954">CVE-2025-37954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37955/">CVE-2025-37955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37955">CVE-2025-37955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37957/">CVE-2025-37957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37957">CVE-2025-37957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37958/">CVE-2025-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37958">CVE-2025-37958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37959/">CVE-2025-37959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37959">CVE-2025-37959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37960/">CVE-2025-37960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37960">CVE-2025-37960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37961/">CVE-2025-37961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37961">CVE-2025-37961 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37963/">CVE-2025-37963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37965/">CVE-2025-37965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37965">CVE-2025-37965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37967/">CVE-2025-37967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37967">CVE-2025-37967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37968/">CVE-2025-37968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37968">CVE-2025-37968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37969/">CVE-2025-37969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37969">CVE-2025-37969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37970/">CVE-2025-37970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37970">CVE-2025-37970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37971/">CVE-2025-37971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37971">CVE-2025-37971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37972/">CVE-2025-37972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37972">CVE-2025-37972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37973/">CVE-2025-37973 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37973">CVE-2025-37973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37974/">CVE-2025-37974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37974">CVE-2025-37974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37978/">CVE-2025-37978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37978">CVE-2025-37978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37979/">CVE-2025-37979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37979">CVE-2025-37979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37980/">CVE-2025-37980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37980">CVE-2025-37980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37981/">CVE-2025-37981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37981">CVE-2025-37981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37982/">CVE-2025-37982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37982">CVE-2025-37982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37983/">CVE-2025-37983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37983">CVE-2025-37983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37984/">CVE-2025-37984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37984">CVE-2025-37984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37985/">CVE-2025-37985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37985">CVE-2025-37985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37986/">CVE-2025-37986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37986">CVE-2025-37986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37987/">CVE-2025-37987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37987">CVE-2025-37987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37988/">CVE-2025-37988 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37988">CVE-2025-37988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37989/">CVE-2025-37989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37989">CVE-2025-37989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37990/">CVE-2025-37990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37990">CVE-2025-37990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37992/">CVE-2025-37992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37992">CVE-2025-37992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37993/">CVE-2025-37993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37993">CVE-2025-37993 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37994/">CVE-2025-37994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37995/">CVE-2025-37995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37995">CVE-2025-37995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37996/">CVE-2025-37996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37996">CVE-2025-37996 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37997/">CVE-2025-37997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37998/">CVE-2025-37998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37998">CVE-2025-37998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37999/">CVE-2025-37999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37999">CVE-2025-37999 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38000/">CVE-2025-38000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38001/">CVE-2025-38001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38003/">CVE-2025-38003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38004/">CVE-2025-38004 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38005/">CVE-2025-38005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38005">CVE-2025-38005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38007/">CVE-2025-38007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38007">CVE-2025-38007 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38009/">CVE-2025-38009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38009">CVE-2025-38009 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38010/">CVE-2025-38010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38010">CVE-2025-38010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38011/">CVE-2025-38011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38011">CVE-2025-38011 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38013/">CVE-2025-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38014/">CVE-2025-38014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38015/">CVE-2025-38015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38015">CVE-2025-38015 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38016/">CVE-2025-38016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38016">CVE-2025-38016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38018/">CVE-2025-38018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38018">CVE-2025-38018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38020/">CVE-2025-38020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38020">CVE-2025-38020 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38022/">CVE-2025-38022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38022">CVE-2025-38022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38023/">CVE-2025-38023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38023">CVE-2025-38023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38024/">CVE-2025-38024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38027/">CVE-2025-38027 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38027">CVE-2025-38027 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38031/">CVE-2025-38031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38035/">CVE-2025-38035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38040/">CVE-2025-38040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38040">CVE-2025-38040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38043/">CVE-2025-38043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38044/">CVE-2025-38044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38045/">CVE-2025-38045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38045">CVE-2025-38045 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38047/">CVE-2025-38047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38047">CVE-2025-38047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38050/">CVE-2025-38050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38050">CVE-2025-38050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38051/">CVE-2025-38051 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38053/">CVE-2025-38053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38053">CVE-2025-38053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38054/">CVE-2025-38054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38054">CVE-2025-38054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38055/">CVE-2025-38055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38055">CVE-2025-38055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38056/">CVE-2025-38056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38056">CVE-2025-38056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38057/">CVE-2025-38057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38057">CVE-2025-38057 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38059/">CVE-2025-38059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38059">CVE-2025-38059 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38060/">CVE-2025-38060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38060">CVE-2025-38060 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38061/">CVE-2025-38061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38063/">CVE-2025-38063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38063">CVE-2025-38063 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38064/">CVE-2025-38064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38064">CVE-2025-38064 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38066/">CVE-2025-38066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38068/">CVE-2025-38068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38069/">CVE-2025-38069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38069">CVE-2025-38069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38072/">CVE-2025-38072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38073/">CVE-2025-38073 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38073">CVE-2025-38073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38074/">CVE-2025-38074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38074">CVE-2025-38074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38077/">CVE-2025-38077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38078/">CVE-2025-38078 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38080/">CVE-2025-38080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38080">CVE-2025-38080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38081/">CVE-2025-38081 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38081">CVE-2025-38081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38082/">CVE-2025-38082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38082">CVE-2025-38082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38083/">CVE-2025-38083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38094/">CVE-2025-38094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38094">CVE-2025-38094 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38097/">CVE-2025-38097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38097">CVE-2025-38097 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38100/">CVE-2025-38100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38100">CVE-2025-38100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38104/">CVE-2025-38104 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38104">CVE-2025-38104 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38105/">CVE-2025-38105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38105">CVE-2025-38105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38115/">CVE-2025-38115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38115">CVE-2025-38115 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38126/">CVE-2025-38126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38126">CVE-2025-38126 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38131/">CVE-2025-38131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38131">CVE-2025-38131 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38132/">CVE-2025-38132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38132">CVE-2025-38132 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38139/">CVE-2025-38139 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38139">CVE-2025-38139 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38140/">CVE-2025-38140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38140">CVE-2025-38140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38147/">CVE-2025-38147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38147">CVE-2025-38147 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38152/">CVE-2025-38152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38152">CVE-2025-38152 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38154/">CVE-2025-38154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38158/">CVE-2025-38158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38158">CVE-2025-38158 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38162/">CVE-2025-38162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38162">CVE-2025-38162 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38166/">CVE-2025-38166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38166">CVE-2025-38166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38183/">CVE-2025-38183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38183">CVE-2025-38183 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38187/">CVE-2025-38187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38187">CVE-2025-38187 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38192/">CVE-2025-38192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38192">CVE-2025-38192 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38202/">CVE-2025-38202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38202">CVE-2025-38202 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38206/">CVE-2025-38206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38206">CVE-2025-38206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38207/">CVE-2025-38207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38207">CVE-2025-38207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38210/">CVE-2025-38210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38210">CVE-2025-38210 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38212/">CVE-2025-38212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38236/">CVE-2025-38236 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38236">CVE-2025-38236 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38239/">CVE-2025-38239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38239">CVE-2025-38239 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38240/">CVE-2025-38240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38240">CVE-2025-38240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38248/">CVE-2025-38248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38248">CVE-2025-38248 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38250/">CVE-2025-38250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38250">CVE-2025-38250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38279/">CVE-2025-38279 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38279">CVE-2025-38279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38283/">CVE-2025-38283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38283">CVE-2025-38283 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38310/">CVE-2025-38310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38310">CVE-2025-38310 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38334/">CVE-2025-38334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38334">CVE-2025-38334 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38479/">CVE-2025-38479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38479">CVE-2025-38479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38637/">CVE-2025-38637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38637">CVE-2025-38637 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39688/">CVE-2025-39688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39688">CVE-2025-39688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39728/">CVE-2025-39728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39728">CVE-2025-39728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39778/">CVE-2025-39778 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39778">CVE-2025-39778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39989/">CVE-2025-39989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39989">CVE-2025-39989 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40014/">CVE-2025-40014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40014">CVE-2025-40014 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40114/">CVE-2025-40114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40114">CVE-2025-40114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40325/">CVE-2025-40325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40325">CVE-2025-40325 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40364/">CVE-2025-40364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40364">CVE-2025-40364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027385" comment="kernel-azure-6.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027387" comment="kernel-azure-extra-6.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027388" comment="kernel-azure-vdso-6.12.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027390" comment="kernel-source-azure-6.12.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93912" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-all-20250206-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26312" ref_url="https://www.suse.com/security/cve/CVE-2021-26312/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26342" ref_url="https://www.suse.com/security/cve/CVE-2021-26342/" source="CVE"/>
		<reference ref_id="CVE-2021-26345" ref_url="https://www.suse.com/security/cve/CVE-2021-26345/" source="CVE"/>
		<reference ref_id="CVE-2021-26347" ref_url="https://www.suse.com/security/cve/CVE-2021-26347/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26349" ref_url="https://www.suse.com/security/cve/CVE-2021-26349/" source="CVE"/>
		<reference ref_id="CVE-2021-26350" ref_url="https://www.suse.com/security/cve/CVE-2021-26350/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26372" ref_url="https://www.suse.com/security/cve/CVE-2021-26372/" source="CVE"/>
		<reference ref_id="CVE-2021-26373" ref_url="https://www.suse.com/security/cve/CVE-2021-26373/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-26376" ref_url="https://www.suse.com/security/cve/CVE-2021-26376/" source="CVE"/>
		<reference ref_id="CVE-2021-26378" ref_url="https://www.suse.com/security/cve/CVE-2021-26378/" source="CVE"/>
		<reference ref_id="CVE-2021-26388" ref_url="https://www.suse.com/security/cve/CVE-2021-26388/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="CVE-2021-46766" ref_url="https://www.suse.com/security/cve/CVE-2021-46766/" source="CVE"/>
		<reference ref_id="CVE-2021-46774" ref_url="https://www.suse.com/security/cve/CVE-2021-46774/" source="CVE"/>
		<reference ref_id="CVE-2022-23820" ref_url="https://www.suse.com/security/cve/CVE-2022-23820/" source="CVE"/>
		<reference ref_id="CVE-2022-23830" ref_url="https://www.suse.com/security/cve/CVE-2022-23830/" source="CVE"/>
		<reference ref_id="CVE-2023-20519" ref_url="https://www.suse.com/security/cve/CVE-2023-20519/" source="CVE"/>
		<reference ref_id="CVE-2023-20521" ref_url="https://www.suse.com/security/cve/CVE-2023-20521/" source="CVE"/>
		<reference ref_id="CVE-2023-20526" ref_url="https://www.suse.com/security/cve/CVE-2023-20526/" source="CVE"/>
		<reference ref_id="CVE-2023-20533" ref_url="https://www.suse.com/security/cve/CVE-2023-20533/" source="CVE"/>
		<reference ref_id="CVE-2023-20566" ref_url="https://www.suse.com/security/cve/CVE-2023-20566/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315/" source="CVE"/>
		<reference ref_id="CVE-2023-38417" ref_url="https://www.suse.com/security/cve/CVE-2023-38417/" source="CVE"/>
		<reference ref_id="CVE-2023-47210" ref_url="https://www.suse.com/security/cve/CVE-2023-47210/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-all-20250206-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26312/">CVE-2021-26312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26312">CVE-2021-26312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-26342/">CVE-2021-26342 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26342">CVE-2021-26342 at NVD</cve>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26345/">CVE-2021-26345 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26345">CVE-2021-26345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26347/">CVE-2021-26347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26347">CVE-2021-26347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26349/">CVE-2021-26349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26349">CVE-2021-26349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26350/">CVE-2021-26350 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26350">CVE-2021-26350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26372/">CVE-2021-26372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26372">CVE-2021-26372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26373/">CVE-2021-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26373">CVE-2021-26373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26376/">CVE-2021-26376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26376">CVE-2021-26376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26378/">CVE-2021-26378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26378">CVE-2021-26378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26388/">CVE-2021-26388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26388">CVE-2021-26388 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33155">CVE-2021-33155 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46766/">CVE-2021-46766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46766">CVE-2021-46766 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46774/">CVE-2021-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46774">CVE-2021-46774 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23820/">CVE-2022-23820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23820">CVE-2022-23820 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23830/">CVE-2022-23830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23830">CVE-2022-23830 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20519/">CVE-2023-20519 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20519">CVE-2023-20519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20521/">CVE-2023-20521 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20521">CVE-2023-20521 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20526/">CVE-2023-20526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20526">CVE-2023-20526 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-20533/">CVE-2023-20533 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20533">CVE-2023-20533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20566/">CVE-2023-20566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20566">CVE-2023-20566 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38417/">CVE-2023-38417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38417">CVE-2023-38417 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47210/">CVE-2023-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47210">CVE-2023-47210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027391" comment="kernel-firmware-all-20250206-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027392" comment="kernel-firmware-amdgpu-20250718-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027393" comment="kernel-firmware-ath10k-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027394" comment="kernel-firmware-ath11k-20250424-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027395" comment="kernel-firmware-ath12k-20250523-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027396" comment="kernel-firmware-atheros-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027397" comment="kernel-firmware-bluetooth-20250714-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027398" comment="kernel-firmware-bnx2-20250627-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027399" comment="kernel-firmware-brcm-20250623-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027400" comment="kernel-firmware-chelsio-20250627-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027401" comment="kernel-firmware-dpaa2-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027402" comment="kernel-firmware-i915-20250708-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027403" comment="kernel-firmware-intel-20250718-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027404" comment="kernel-firmware-iwlwifi-20250609-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027405" comment="kernel-firmware-liquidio-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027406" comment="kernel-firmware-marvell-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027407" comment="kernel-firmware-media-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027408" comment="kernel-firmware-mediatek-20250708-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027409" comment="kernel-firmware-mellanox-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027410" comment="kernel-firmware-mwifiex-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027411" comment="kernel-firmware-network-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027412" comment="kernel-firmware-nfp-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027413" comment="kernel-firmware-nvidia-20250516-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027414" comment="kernel-firmware-platform-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027415" comment="kernel-firmware-prestera-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027416" comment="kernel-firmware-qcom-20250714-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027417" comment="kernel-firmware-qlogic-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027418" comment="kernel-firmware-radeon-20250627-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027419" comment="kernel-firmware-realtek-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027420" comment="kernel-firmware-serial-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027421" comment="kernel-firmware-sound-20250721-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027422" comment="kernel-firmware-ti-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027423" comment="kernel-firmware-ueagle-20250206-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027424" comment="kernel-firmware-usb-network-20250717-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027425" comment="ucode-amd-20250708-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93913" version="1" class="patch">
	<metadata>
		<title>keylime-config-7.11.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-43310" ref_url="https://www.suse.com/security/cve/CVE-2021-43310/" source="CVE"/>
		<reference ref_id="CVE-2022-1053" ref_url="https://www.suse.com/security/cve/CVE-2022-1053/" source="CVE"/>
		<reference ref_id="CVE-2022-23948" ref_url="https://www.suse.com/security/cve/CVE-2022-23948/" source="CVE"/>
		<reference ref_id="CVE-2022-23949" ref_url="https://www.suse.com/security/cve/CVE-2022-23949/" source="CVE"/>
		<reference ref_id="CVE-2022-23950" ref_url="https://www.suse.com/security/cve/CVE-2022-23950/" source="CVE"/>
		<reference ref_id="CVE-2022-23951" ref_url="https://www.suse.com/security/cve/CVE-2022-23951/" source="CVE"/>
		<reference ref_id="CVE-2022-23952" ref_url="https://www.suse.com/security/cve/CVE-2022-23952/" source="CVE"/>
		<reference ref_id="CVE-2022-31250" ref_url="https://www.suse.com/security/cve/CVE-2022-31250/" source="CVE"/>
		<reference ref_id="CVE-2023-3674" ref_url="https://www.suse.com/security/cve/CVE-2023-3674/" source="CVE"/>
		<reference ref_id="CVE-2023-38200" ref_url="https://www.suse.com/security/cve/CVE-2023-38200/" source="CVE"/>
		<reference ref_id="CVE-2023-38201" ref_url="https://www.suse.com/security/cve/CVE-2023-38201/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-config-7.11.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43310/">CVE-2021-43310 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43310">CVE-2021-43310 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1053/">CVE-2022-1053 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1053">CVE-2022-1053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23948/">CVE-2022-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23948">CVE-2022-23948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23949/">CVE-2022-23949 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23949">CVE-2022-23949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23950/">CVE-2022-23950 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23950">CVE-2022-23950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23951/">CVE-2022-23951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23951">CVE-2022-23951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23952/">CVE-2022-23952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23952">CVE-2022-23952 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31250/">CVE-2022-31250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31250">CVE-2022-31250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3674/">CVE-2023-3674 at SUSE</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3674">CVE-2023-3674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38200/">CVE-2023-38200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38200">CVE-2023-38200 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-38201/">CVE-2023-38201 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38201">CVE-2023-38201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027426" comment="keylime-config-7.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027427" comment="keylime-firewalld-7.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027428" comment="keylime-logrotate-7.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027429" comment="keylime-registrar-7.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027430" comment="keylime-tenant-7.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027431" comment="keylime-tpm_cert_store-7.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027432" comment="keylime-verifier-7.11.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027433" comment="python313-keylime-7.11.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93914" version="1" class="patch">
	<metadata>
		<title>keylime-ima-policy-0.2.7+117-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the keylime-ima-policy-0.2.7+117-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027434" comment="keylime-ima-policy-0.2.7+117-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027435" comment="rust-keylime-0.2.7+117-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93915" version="1" class="patch">
	<metadata>
		<title>kpartx-0.11.0+183+suse.3973293-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973/" source="CVE"/>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<description>
These are all security issues fixed in the kpartx-0.11.0+183+suse.3973293-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027436" comment="kpartx-0.11.0+183+suse.3973293-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027437" comment="libdmmp-devel-0.11.0+183+suse.3973293-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027438" comment="libdmmp0_2_0-0.11.0+183+suse.3973293-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027439" comment="libmpath0-0.11.0+183+suse.3973293-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027440" comment="multipath-tools-0.11.0+183+suse.3973293-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027441" comment="multipath-tools-devel-0.11.0+183+suse.3973293-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93916" version="1" class="patch">
	<metadata>
		<title>krb5-1.21.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<reference ref_id="CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054/" source="CVE"/>
		<reference ref_id="CVE-2023-39975" ref_url="https://www.suse.com/security/cve/CVE-2023-39975/" source="CVE"/>
		<reference ref_id="CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458/" source="CVE"/>
		<reference ref_id="CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461/" source="CVE"/>
		<reference ref_id="CVE-2024-26462" ref_url="https://www.suse.com/security/cve/CVE-2024-26462/" source="CVE"/>
		<reference ref_id="CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<reference ref_id="CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.21.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6143">CVE-2006-6143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6144">CVE-2006-6144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0956">CVE-2007-0956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0957">CVE-2007-0957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1216">CVE-2007-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2442">CVE-2007-2442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2443">CVE-2007-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2798">CVE-2007-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4000">CVE-2007-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4743">CVE-2007-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5894">CVE-2007-5894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5902">CVE-2007-5902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5971">CVE-2007-5971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5972">CVE-2007-5972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0062">CVE-2008-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-0063">CVE-2008-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0947">CVE-2008-0947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0948">CVE-2008-0948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3295">CVE-2009-3295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0283">CVE-2010-0283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0628">CVE-2010-0628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1320">CVE-2010-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1322">CVE-2010-1322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1324">CVE-2010-1324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4020">CVE-2010-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4021">CVE-2010-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4022">CVE-2010-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0284">CVE-2011-0284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0285">CVE-2011-0285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1527">CVE-2011-1527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1528">CVE-2011-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1529">CVE-2011-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1530">CVE-2011-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1012">CVE-2012-1012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1013">CVE-2012-1013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1016">CVE-2012-1016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1417">CVE-2013-1417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4342">CVE-2014-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4343">CVE-2014-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2694">CVE-2015-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2696">CVE-2015-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2697">CVE-2015-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2698">CVE-2015-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8630">CVE-2015-8630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3120">CVE-2016-3120 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20217">CVE-2018-20217 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39975/">CVE-2023-39975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39975">CVE-2023-39975 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26462/">CVE-2024-26462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027442" comment="krb5-1.21.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027443" comment="krb5-client-1.21.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027444" comment="krb5-devel-1.21.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027445" comment="krb5-plugin-kdb-ldap-1.21.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027446" comment="krb5-plugin-preauth-otp-1.21.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027447" comment="krb5-plugin-preauth-pkinit-1.21.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027448" comment="krb5-plugin-preauth-spake-1.21.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027449" comment="krb5-server-1.21.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93917" version="1" class="patch">
	<metadata>
		<title>kubevirt-virtctl-1.5.2-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="CVE-2022-1798" ref_url="https://www.suse.com/security/cve/CVE-2022-1798/" source="CVE"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<reference ref_id="CVE-2023-26484" ref_url="https://www.suse.com/security/cve/CVE-2023-26484/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2024-33394" ref_url="https://www.suse.com/security/cve/CVE-2024-33394/" source="CVE"/>
		<reference ref_id="CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<description>
These are all security issues fixed in the kubevirt-virtctl-1.5.2-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1798/">CVE-2022-1798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1798">CVE-2022-1798 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26484/">CVE-2023-26484 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26484">CVE-2023-26484 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-33394/">CVE-2024-33394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33394">CVE-2024-33394 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027450" comment="kubevirt-virtctl-1.5.2-160000.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93918" version="1" class="patch">
	<metadata>
		<title>lame-3.100-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-9410" ref_url="https://www.suse.com/security/cve/CVE-2017-9410/" source="CVE"/>
		<reference ref_id="CVE-2017-9411" ref_url="https://www.suse.com/security/cve/CVE-2017-9411/" source="CVE"/>
		<reference ref_id="CVE-2017-9412" ref_url="https://www.suse.com/security/cve/CVE-2017-9412/" source="CVE"/>
		<description>
These are all security issues fixed in the lame-3.100-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9410/">CVE-2017-9410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9410">CVE-2017-9410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9411/">CVE-2017-9411 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9411">CVE-2017-9411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9412/">CVE-2017-9412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9412">CVE-2017-9412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027451" comment="lame-3.100-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027452" comment="lame-doc-3.100-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027453" comment="lame-mp3rtp-3.100-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027454" comment="libmp3lame0-3.100-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027455" comment="libmp3lame0-x86-64-v3-3.100-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93919" version="1" class="patch">
	<metadata>
		<title>lastlog2-2.41.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="CVE-2021-3995" ref_url="https://www.suse.com/security/cve/CVE-2021-3995/" source="CVE"/>
		<reference ref_id="CVE-2021-3996" ref_url="https://www.suse.com/security/cve/CVE-2021-3996/" source="CVE"/>
		<reference ref_id="CVE-2022-0563" ref_url="https://www.suse.com/security/cve/CVE-2022-0563/" source="CVE"/>
		<reference ref_id="CVE-2024-28085" ref_url="https://www.suse.com/security/cve/CVE-2024-28085/" source="CVE"/>
		<description>
These are all security issues fixed in the lastlog2-2.41.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0157">CVE-2013-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5218">CVE-2015-5218 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2779">CVE-2016-2779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5011">CVE-2016-5011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3995/">CVE-2021-3995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3995">CVE-2021-3995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3996/">CVE-2021-3996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3996">CVE-2021-3996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0563/">CVE-2022-0563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">CVE-2022-0563 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-28085/">CVE-2024-28085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28085">CVE-2024-28085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027456" comment="lastlog2-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027457" comment="libblkid-devel-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027458" comment="libblkid-devel-static-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027459" comment="libblkid1-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027460" comment="libfdisk-devel-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027461" comment="libfdisk-devel-static-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027462" comment="libfdisk1-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027463" comment="liblastlog2-2-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027464" comment="liblastlog2-devel-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027465" comment="libmount-devel-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027466" comment="libmount-devel-static-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027467" comment="libmount1-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027468" comment="libsmartcols-devel-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027469" comment="libsmartcols-devel-static-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027470" comment="libsmartcols1-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027471" comment="libuuid-devel-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027472" comment="libuuid-devel-static-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027473" comment="libuuid1-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027474" comment="python313-libmount-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027475" comment="util-linux-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027476" comment="util-linux-lang-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027477" comment="util-linux-systemd-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027478" comment="util-linux-tty-tools-2.41.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027479" comment="uuidd-2.41.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93920" version="1" class="patch">
	<metadata>
		<title>lcms2-2.16-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms2-2.16-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027480" comment="lcms2-2.16-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027481" comment="liblcms2-2-2.16-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027482" comment="liblcms2-devel-2.16-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027483" comment="liblcms2-doc-2.16-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93921" version="1" class="patch">
	<metadata>
		<title>ldns-1.8.4-160000.2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-3581" ref_url="https://www.suse.com/security/cve/CVE-2011-3581/" source="CVE"/>
		<reference ref_id="CVE-2017-1000231" ref_url="https://www.suse.com/security/cve/CVE-2017-1000231/" source="CVE"/>
		<reference ref_id="CVE-2017-1000232" ref_url="https://www.suse.com/security/cve/CVE-2017-1000232/" source="CVE"/>
		<reference ref_id="CVE-2020-19860" ref_url="https://www.suse.com/security/cve/CVE-2020-19860/" source="CVE"/>
		<reference ref_id="CVE-2020-19861" ref_url="https://www.suse.com/security/cve/CVE-2020-19861/" source="CVE"/>
		<description>
These are all security issues fixed in the ldns-1.8.4-160000.2.3 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3581/">CVE-2011-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3581">CVE-2011-3581 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000231/">CVE-2017-1000231 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000231">CVE-2017-1000231 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000232/">CVE-2017-1000232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000232">CVE-2017-1000232 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19860/">CVE-2020-19860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19860">CVE-2020-19860 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-19861/">CVE-2020-19861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19861">CVE-2020-19861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027484" comment="ldns-1.8.4-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027485" comment="ldns-devel-1.8.4-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027486" comment="libldns3-1.8.4-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027487" comment="perl-DNS-LDNS-1.8.4-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027488" comment="python3-ldns-1.8.4-160000.2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93922" version="1" class="patch">
	<metadata>
		<title>less-668-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<reference ref_id="CVE-2022-46663" ref_url="https://www.suse.com/security/cve/CVE-2022-46663/" source="CVE"/>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<description>
These are all security issues fixed in the less-668-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9488">CVE-2014-9488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46663/">CVE-2022-46663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027489" comment="less-668-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93923" version="1" class="patch">
	<metadata>
		<title>lftp-4.9.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<description>
These are all security issues fixed in the lftp-4.9.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10916">CVE-2018-10916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027490" comment="lftp-4.9.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93924" version="1" class="patch">
	<metadata>
		<title>libEMF-devel-1.0.13-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-11863" ref_url="https://www.suse.com/security/cve/CVE-2020-11863/" source="CVE"/>
		<reference ref_id="CVE-2020-11864" ref_url="https://www.suse.com/security/cve/CVE-2020-11864/" source="CVE"/>
		<reference ref_id="CVE-2020-11865" ref_url="https://www.suse.com/security/cve/CVE-2020-11865/" source="CVE"/>
		<reference ref_id="CVE-2020-11866" ref_url="https://www.suse.com/security/cve/CVE-2020-11866/" source="CVE"/>
		<reference ref_id="CVE-2020-13999" ref_url="https://www.suse.com/security/cve/CVE-2020-13999/" source="CVE"/>
		<description>
These are all security issues fixed in the libEMF-devel-1.0.13-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11863/">CVE-2020-11863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11863">CVE-2020-11863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11864/">CVE-2020-11864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11864">CVE-2020-11864 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11865/">CVE-2020-11865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11865">CVE-2020-11865 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-11866/">CVE-2020-11866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11866">CVE-2020-11866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13999/">CVE-2020-13999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13999">CVE-2020-13999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027491" comment="libEMF-devel-1.0.13-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027492" comment="libEMF-utils-1.0.13-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027493" comment="libEMF1-1.0.13-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93925" version="1" class="patch">
	<metadata>
		<title>libHX-devel-4.27-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX-devel-4.27-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2947">CVE-2010-2947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027494" comment="libHX-devel-4.27-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027495" comment="libHX32-4.27-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93926" version="1" class="patch">
	<metadata>
		<title>libICE-devel-1.1.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
These are all security issues fixed in the libICE-devel-1.1.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027496" comment="libICE-devel-1.1.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027497" comment="libICE6-1.1.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93927" version="1" class="patch">
	<metadata>
		<title>libIex-3_2-31-3.2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<reference ref_id="CVE-2017-9116" ref_url="https://www.suse.com/security/cve/CVE-2017-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-18443" ref_url="https://www.suse.com/security/cve/CVE-2018-18443/" source="CVE"/>
		<reference ref_id="CVE-2018-18444" ref_url="https://www.suse.com/security/cve/CVE-2018-18444/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="CVE-2021-45942" ref_url="https://www.suse.com/security/cve/CVE-2021-45942/" source="CVE"/>
		<reference ref_id="CVE-2023-5841" ref_url="https://www.suse.com/security/cve/CVE-2023-5841/" source="CVE"/>
		<description>
These are all security issues fixed in the libIex-3_2-31-3.2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12596">CVE-2017-12596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14988">CVE-2017-14988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9111">CVE-2017-9111 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9112">CVE-2017-9112 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9113">CVE-2017-9113 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9114">CVE-2017-9114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9115">CVE-2017-9115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9116/">CVE-2017-9116 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9116">CVE-2017-9116 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18443/">CVE-2018-18443 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18443">CVE-2018-18443 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18444/">CVE-2018-18444 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18444">CVE-2018-18444 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45942/">CVE-2021-45942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45942">CVE-2021-45942 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-5841/">CVE-2023-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5841">CVE-2023-5841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027498" comment="libIex-3_2-31-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027499" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027500" comment="libIlmThread-3_2-31-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027501" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027502" comment="libOpenEXR-3_2-31-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027503" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027504" comment="libOpenEXRCore-3_2-31-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027505" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027506" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027507" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027508" comment="openexr-3.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027509" comment="openexr-doc-3.2.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93928" version="1" class="patch">
	<metadata>
		<title>libQt6Bluetooth6-6.9.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-23050" ref_url="https://www.suse.com/security/cve/CVE-2025-23050/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Bluetooth6-6.9.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23050/">CVE-2025-23050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23050">CVE-2025-23050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027510" comment="libQt6Bluetooth6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027511" comment="libQt6Nfc6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027512" comment="qt6-connectivity-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027513" comment="qt6-connectivity-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027514" comment="qt6-connectivity-docs-html-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027515" comment="qt6-connectivity-docs-qch-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027516" comment="qt6-connectivity-examples-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027517" comment="qt6-connectivity-private-devel-6.9.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93929" version="1" class="patch">
	<metadata>
		<title>libQt6Concurrent6-6.9.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="CVE-2023-24607" ref_url="https://www.suse.com/security/cve/CVE-2023-24607/" source="CVE"/>
		<reference ref_id="CVE-2023-32762" ref_url="https://www.suse.com/security/cve/CVE-2023-32762/" source="CVE"/>
		<reference ref_id="CVE-2023-32763" ref_url="https://www.suse.com/security/cve/CVE-2023-32763/" source="CVE"/>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<reference ref_id="CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369/" source="CVE"/>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<reference ref_id="CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714/" source="CVE"/>
		<reference ref_id="CVE-2024-25580" ref_url="https://www.suse.com/security/cve/CVE-2024-25580/" source="CVE"/>
		<reference ref_id="CVE-2024-30161" ref_url="https://www.suse.com/security/cve/CVE-2024-30161/" source="CVE"/>
		<reference ref_id="CVE-2024-33861" ref_url="https://www.suse.com/security/cve/CVE-2024-33861/" source="CVE"/>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<reference ref_id="CVE-2025-5992" ref_url="https://www.suse.com/security/cve/CVE-2025-5992/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Concurrent6-6.9.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25255">CVE-2022-25255 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24607/">CVE-2023-24607 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24607">CVE-2023-24607 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32762/">CVE-2023-32762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32762">CVE-2023-32762 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32763/">CVE-2023-32763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32763">CVE-2023-32763 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25580/">CVE-2024-25580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25580">CVE-2024-25580 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-30161/">CVE-2024-30161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30161">CVE-2024-30161 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33861/">CVE-2024-33861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33861">CVE-2024-33861 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-5992/">CVE-2025-5992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5992">CVE-2025-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027518" comment="libQt6Concurrent6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027519" comment="libQt6Core6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027520" comment="libQt6DBus6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027521" comment="libQt6Gui6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027522" comment="libQt6Network6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027523" comment="libQt6OpenGL6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027524" comment="libQt6OpenGLWidgets6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027525" comment="libQt6PrintSupport6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027526" comment="libQt6Sql6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027527" comment="libQt6Test6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027528" comment="libQt6Widgets6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027529" comment="libQt6Xml6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027530" comment="qt6-base-common-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027531" comment="qt6-base-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027532" comment="qt6-base-docs-html-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027533" comment="qt6-base-docs-qch-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027534" comment="qt6-base-examples-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027535" comment="qt6-base-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027536" comment="qt6-concurrent-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027537" comment="qt6-core-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027538" comment="qt6-core-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027539" comment="qt6-dbus-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027540" comment="qt6-dbus-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027541" comment="qt6-docs-common-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027542" comment="qt6-exampleicons-devel-static-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027543" comment="qt6-gui-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027544" comment="qt6-gui-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027545" comment="qt6-kmssupport-devel-static-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027546" comment="qt6-kmssupport-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027547" comment="qt6-network-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027548" comment="qt6-network-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027549" comment="qt6-network-tls-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027550" comment="qt6-networkinformation-glib-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027551" comment="qt6-networkinformation-nm-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027552" comment="qt6-opengl-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027553" comment="qt6-opengl-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027554" comment="qt6-openglwidgets-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027555" comment="qt6-platformsupport-devel-static-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027556" comment="qt6-platformsupport-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027557" comment="qt6-platformtheme-gtk3-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027558" comment="qt6-platformtheme-xdgdesktopportal-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027559" comment="qt6-printsupport-cups-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027560" comment="qt6-printsupport-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027561" comment="qt6-printsupport-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027562" comment="qt6-sql-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027563" comment="qt6-sql-mysql-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027564" comment="qt6-sql-postgresql-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027565" comment="qt6-sql-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027566" comment="qt6-sql-sqlite-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027567" comment="qt6-sql-unixODBC-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027568" comment="qt6-test-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027569" comment="qt6-test-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027570" comment="qt6-widgets-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027571" comment="qt6-widgets-private-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027572" comment="qt6-xml-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027573" comment="qt6-xml-private-devel-6.9.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93930" version="1" class="patch">
	<metadata>
		<title>libQt6NetworkAuth6-6.9.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-36048" ref_url="https://www.suse.com/security/cve/CVE-2024-36048/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6NetworkAuth6-6.9.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36048/">CVE-2024-36048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36048">CVE-2024-36048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027574" comment="libQt6NetworkAuth6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027575" comment="qt6-networkauth-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027576" comment="qt6-networkauth-docs-html-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027577" comment="qt6-networkauth-docs-qch-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027578" comment="qt6-networkauth-examples-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027579" comment="qt6-networkauth-private-devel-6.9.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93931" version="1" class="patch">
	<metadata>
		<title>libQt6Svg6-6.9.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt6Svg6-6.9.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027580" comment="libQt6Svg6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027581" comment="libQt6SvgWidgets6-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027582" comment="qt6-svg-devel-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027583" comment="qt6-svg-docs-html-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027584" comment="qt6-svg-docs-qch-6.9.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027585" comment="qt6-svg-private-devel-6.9.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93932" version="1" class="patch">
	<metadata>
		<title>libSDL2-2_0-0-2.30.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-2888" ref_url="https://www.suse.com/security/cve/CVE-2017-2888/" source="CVE"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-13626" ref_url="https://www.suse.com/security/cve/CVE-2019-13626/" source="CVE"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="CVE-2022-4743" ref_url="https://www.suse.com/security/cve/CVE-2022-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL2-2_0-0-2.30.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2888/">CVE-2017-2888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2888">CVE-2017-2888 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13626/">CVE-2019-13626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13626">CVE-2019-13626 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4743/">CVE-2022-4743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4743">CVE-2022-4743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027586" comment="libSDL2-2_0-0-2.30.7-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93933" version="1" class="patch">
	<metadata>
		<title>libSDL2_ttf-2_0-0-2.24.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-27470" ref_url="https://www.suse.com/security/cve/CVE-2022-27470/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL2_ttf-2_0-0-2.24.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27470/">CVE-2022-27470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27470">CVE-2022-27470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027587" comment="libSDL2_ttf-2_0-0-2.24.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93934" version="1" class="patch">
	<metadata>
		<title>libSoundTouch1-2.3.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<description>
These are all security issues fixed in the libSoundTouch1-2.3.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000223">CVE-2018-1000223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17096">CVE-2018-17096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17097">CVE-2018-17097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17098">CVE-2018-17098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027588" comment="libSoundTouch1-2.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027589" comment="libSoundTouchDll1-2.3.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027590" comment="soundtouch-2.3.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93935" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.8.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="CVE-2022-3554" ref_url="https://www.suse.com/security/cve/CVE-2022-3554/" source="CVE"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<reference ref_id="CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138/" source="CVE"/>
		<reference ref_id="CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785/" source="CVE"/>
		<reference ref_id="CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786/" source="CVE"/>
		<reference ref_id="CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.8.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1981">CVE-2013-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2004">CVE-2013-2004 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3554/">CVE-2022-3554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3554">CVE-2022-3554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027591" comment="libX11-6-1.8.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027592" comment="libX11-data-1.8.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027593" comment="libX11-devel-1.8.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027594" comment="libX11-devel-doc-1.8.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027595" comment="libX11-xcb1-1.8.10-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93936" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.2.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.2.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1988">CVE-2013-1988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027596" comment="libXRes1-1.2.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027597" comment="libXres-devel-1.2.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93937" version="1" class="patch">
	<metadata>
		<title>libXcursor-devel-1.2.3-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor-devel-1.2.3-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16612">CVE-2017-16612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027598" comment="libXcursor-devel-1.2.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027599" comment="libXcursor1-1.2.3-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93938" version="1" class="patch">
	<metadata>
		<title>libXdmcp-devel-1.1.5-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the libXdmcp-devel-1.1.5-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027600" comment="libXdmcp-devel-1.1.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027601" comment="libXdmcp6-1.1.5-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93939" version="1" class="patch">
	<metadata>
		<title>libXext-devel-1.3.6-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext-devel-1.3.6-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027602" comment="libXext-devel-1.3.6-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027603" comment="libXext6-1.3.6-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93940" version="1" class="patch">
	<metadata>
		<title>libXfixes-devel-6.0.1-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes-devel-6.0.1-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027604" comment="libXfixes-devel-6.0.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027605" comment="libXfixes3-6.0.1-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93941" version="1" class="patch">
	<metadata>
		<title>libXfont2-2-2.0.7-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont2-2-2.0.7-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16611">CVE-2017-16611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027606" comment="libXfont2-2-2.0.7-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027607" comment="libXfont2-devel-2.0.7-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93942" version="1" class="patch">
	<metadata>
		<title>libXi-devel-1.8.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi-devel-1.8.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027608" comment="libXi-devel-1.8.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027609" comment="libXi6-1.8.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93943" version="1" class="patch">
	<metadata>
		<title>libXinerama-devel-1.1.5-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama-devel-1.1.5-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027610" comment="libXinerama-devel-1.1.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027611" comment="libXinerama1-1.1.5-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93944" version="1" class="patch">
	<metadata>
		<title>libXpm-devel-3.5.17-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-44617" ref_url="https://www.suse.com/security/cve/CVE-2022-44617/" source="CVE"/>
		<reference ref_id="CVE-2022-46285" ref_url="https://www.suse.com/security/cve/CVE-2022-46285/" source="CVE"/>
		<reference ref_id="CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883/" source="CVE"/>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<description>
These are all security issues fixed in the libXpm-devel-3.5.17-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44617/">CVE-2022-44617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44617">CVE-2022-44617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46285/">CVE-2022-46285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46285">CVE-2022-46285 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027612" comment="libXpm-devel-3.5.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027613" comment="libXpm-tools-3.5.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027614" comment="libXpm4-3.5.17-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93945" version="1" class="patch">
	<metadata>
		<title>libXrandr-devel-1.5.4-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr-devel-1.5.4-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7947">CVE-2016-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7948">CVE-2016-7948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027615" comment="libXrandr-devel-1.5.4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027616" comment="libXrandr2-1.5.4-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93946" version="1" class="patch">
	<metadata>
		<title>libXrender-devel-0.9.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender-devel-0.9.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027617" comment="libXrender-devel-0.9.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027618" comment="libXrender1-0.9.11-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93947" version="1" class="patch">
	<metadata>
		<title>libXt-devel-1.3.1-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt-devel-1.3.1-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2002">CVE-2013-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2005">CVE-2013-2005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027619" comment="libXt-devel-1.3.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027620" comment="libXt6-1.3.1-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93948" version="1" class="patch">
	<metadata>
		<title>libXtst-devel-1.2.5-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst-devel-1.2.5-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027621" comment="libXtst-devel-1.2.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027622" comment="libXtst6-1.2.5-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93949" version="1" class="patch">
	<metadata>
		<title>libXv-devel-1.0.12-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv-devel-1.0.12-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027623" comment="libXv-devel-1.0.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027624" comment="libXv1-1.0.12-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93950" version="1" class="patch">
	<metadata>
		<title>libXvMC-devel-1.0.14-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC-devel-1.0.14-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1990">CVE-2013-1990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1999">CVE-2013-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027625" comment="libXvMC-devel-1.0.14-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027626" comment="libXvMC1-1.0.14-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93951" version="1" class="patch">
	<metadata>
		<title>libXxf86dga-devel-1.1.6-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga-devel-1.1.6-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1991">CVE-2013-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2000">CVE-2013-2000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027627" comment="libXxf86dga-devel-1.1.6-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027628" comment="libXxf86dga1-1.1.6-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93952" version="1" class="patch">
	<metadata>
		<title>libXxf86vm-devel-1.1.6-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm-devel-1.1.6-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2001">CVE-2013-2001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027629" comment="libXxf86vm-devel-1.1.6-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027630" comment="libXxf86vm1-1.1.6-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93953" version="1" class="patch">
	<metadata>
		<title>libZXing3-2.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-28021" ref_url="https://www.suse.com/security/cve/CVE-2021-28021/" source="CVE"/>
		<reference ref_id="CVE-2021-42715" ref_url="https://www.suse.com/security/cve/CVE-2021-42715/" source="CVE"/>
		<reference ref_id="CVE-2021-42716" ref_url="https://www.suse.com/security/cve/CVE-2021-42716/" source="CVE"/>
		<description>
These are all security issues fixed in the libZXing3-2.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-28021/">CVE-2021-28021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28021">CVE-2021-28021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42715/">CVE-2021-42715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42715">CVE-2021-42715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42716/">CVE-2021-42716 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42716">CVE-2021-42716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027631" comment="libZXing3-2.3.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93954" version="1" class="patch">
	<metadata>
		<title>libass9-0.17.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<description>
These are all security issues fixed in the libass9-0.17.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7969">CVE-2016-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7970">CVE-2016-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7972">CVE-2016-7972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027632" comment="libass9-0.17.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93955" version="1" class="patch">
	<metadata>
		<title>libassimp5-5.4.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-38528" ref_url="https://www.suse.com/security/cve/CVE-2022-38528/" source="CVE"/>
		<reference ref_id="CVE-2022-45748" ref_url="https://www.suse.com/security/cve/CVE-2022-45748/" source="CVE"/>
		<reference ref_id="CVE-2024-40724" ref_url="https://www.suse.com/security/cve/CVE-2024-40724/" source="CVE"/>
		<reference ref_id="CVE-2024-45679" ref_url="https://www.suse.com/security/cve/CVE-2024-45679/" source="CVE"/>
		<description>
These are all security issues fixed in the libassimp5-5.4.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38528/">CVE-2022-38528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38528">CVE-2022-38528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45748/">CVE-2022-45748 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45748">CVE-2022-45748 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40724/">CVE-2024-40724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40724">CVE-2024-40724 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45679/">CVE-2024-45679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45679">CVE-2024-45679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027633" comment="libassimp5-5.4.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93956" version="1" class="patch">
	<metadata>
		<title>libbd_btrfs-devel-3.1.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019/" source="CVE"/>
		<description>
These are all security issues fixed in the libbd_btrfs-devel-3.1.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027634" comment="libbd_btrfs-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027635" comment="libbd_btrfs3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027636" comment="libbd_crypto-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027637" comment="libbd_crypto3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027638" comment="libbd_dm-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027639" comment="libbd_dm3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027640" comment="libbd_fs-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027641" comment="libbd_fs3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027642" comment="libbd_loop-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027643" comment="libbd_loop3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027644" comment="libbd_lvm-dbus-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027645" comment="libbd_lvm-dbus3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027646" comment="libbd_lvm-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027647" comment="libbd_lvm3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027648" comment="libbd_mdraid-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027649" comment="libbd_mdraid3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027650" comment="libbd_mpath-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027651" comment="libbd_mpath3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027652" comment="libbd_nvme3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027653" comment="libbd_part-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027654" comment="libbd_part3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027655" comment="libbd_swap-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027656" comment="libbd_swap3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027657" comment="libbd_utils-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027658" comment="libbd_utils3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027659" comment="libblockdev-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027660" comment="libblockdev-devel-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027661" comment="libblockdev3-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027662" comment="python3-libblockdev-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027663" comment="typelib-1_0-BlockDev-3_0-3.1.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93957" version="1" class="patch">
	<metadata>
		<title>libbpf-devel-1.6.1-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-45940" ref_url="https://www.suse.com/security/cve/CVE-2021-45940/" source="CVE"/>
		<reference ref_id="CVE-2021-45941" ref_url="https://www.suse.com/security/cve/CVE-2021-45941/" source="CVE"/>
		<reference ref_id="CVE-2022-3533" ref_url="https://www.suse.com/security/cve/CVE-2022-3533/" source="CVE"/>
		<reference ref_id="CVE-2022-3534" ref_url="https://www.suse.com/security/cve/CVE-2022-3534/" source="CVE"/>
		<reference ref_id="CVE-2022-3606" ref_url="https://www.suse.com/security/cve/CVE-2022-3606/" source="CVE"/>
		<description>
These are all security issues fixed in the libbpf-devel-1.6.1-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-45940/">CVE-2021-45940 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45940">CVE-2021-45940 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-45941/">CVE-2021-45941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45941">CVE-2021-45941 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3533/">CVE-2022-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3533">CVE-2022-3533 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3534/">CVE-2022-3534 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3606/">CVE-2022-3606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3606">CVE-2022-3606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027664" comment="libbpf-devel-1.6.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027665" comment="libbpf-devel-static-1.6.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027666" comment="libbpf1-1.6.1-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93958" version="1" class="patch">
	<metadata>
		<title>libcaca0-0.99.beta20-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-20544" ref_url="https://www.suse.com/security/cve/CVE-2018-20544/" source="CVE"/>
		<reference ref_id="CVE-2018-20545" ref_url="https://www.suse.com/security/cve/CVE-2018-20545/" source="CVE"/>
		<reference ref_id="CVE-2018-20546" ref_url="https://www.suse.com/security/cve/CVE-2018-20546/" source="CVE"/>
		<reference ref_id="CVE-2018-20547" ref_url="https://www.suse.com/security/cve/CVE-2018-20547/" source="CVE"/>
		<reference ref_id="CVE-2018-20548" ref_url="https://www.suse.com/security/cve/CVE-2018-20548/" source="CVE"/>
		<reference ref_id="CVE-2018-20549" ref_url="https://www.suse.com/security/cve/CVE-2018-20549/" source="CVE"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="CVE-2021-3410" ref_url="https://www.suse.com/security/cve/CVE-2021-3410/" source="CVE"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
These are all security issues fixed in the libcaca0-0.99.beta20-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20544/">CVE-2018-20544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20544">CVE-2018-20544 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20545/">CVE-2018-20545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20545">CVE-2018-20545 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20546/">CVE-2018-20546 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20546">CVE-2018-20546 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20547/">CVE-2018-20547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20547">CVE-2018-20547 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20548/">CVE-2018-20548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20548">CVE-2018-20548 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20549/">CVE-2018-20549 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20549">CVE-2018-20549 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3410/">CVE-2021-3410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3410">CVE-2021-3410 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0856">CVE-2022-0856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027667" comment="libcaca0-0.99.beta20-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027668" comment="libcaca0-plugins-0.99.beta20-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027669" comment="python3-caca-0.99.beta20-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93959" version="1" class="patch">
	<metadata>
		<title>libcacard-devel-2.8.1-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<description>
These are all security issues fixed in the libcacard-devel-2.8.1-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6414">CVE-2017-6414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027670" comment="libcacard-devel-2.8.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027671" comment="libcacard0-2.8.1-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93960" version="1" class="patch">
	<metadata>
		<title>libcap-devel-2.73-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602/" source="CVE"/>
		<reference ref_id="CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-devel-2.73-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027672" comment="libcap-devel-2.73-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027673" comment="libcap-progs-2.73-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027674" comment="libcap2-2.73-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027675" comment="libpsx2-2.73-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93961" version="1" class="patch">
	<metadata>
		<title>libcdio++1-2.1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-18198" ref_url="https://www.suse.com/security/cve/CVE-2017-18198/" source="CVE"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<description>
These are all security issues fixed in the libcdio++1-2.1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18198/">CVE-2017-18198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18198">CVE-2017-18198 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18199">CVE-2017-18199 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18201">CVE-2017-18201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027676" comment="libcdio++1-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027677" comment="libcdio-devel-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027678" comment="libcdio19-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027679" comment="libiso9660++0-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027680" comment="libiso9660-11-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027681" comment="libudf0-2.1.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93962" version="1" class="patch">
	<metadata>
		<title>libcdt5-2.49.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<reference ref_id="CVE-2023-46045" ref_url="https://www.suse.com/security/cve/CVE-2023-46045/" source="CVE"/>
		<description>
These are all security issues fixed in the libcdt5-2.49.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10196">CVE-2018-10196 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11023">CVE-2019-11023 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46045/">CVE-2023-46045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46045">CVE-2023-46045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027682" comment="libcdt5-2.49.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027683" comment="libcgraph6-2.49.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027684" comment="libgvc6-2.49.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027685" comment="libgvpr2-2.49.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027686" comment="libpathplan4-2.49.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93963" version="1" class="patch">
	<metadata>
		<title>libcjose-devel-0.6.2.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-37464" ref_url="https://www.suse.com/security/cve/CVE-2023-37464/" source="CVE"/>
		<description>
These are all security issues fixed in the libcjose-devel-0.6.2.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37464/">CVE-2023-37464 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37464">CVE-2023-37464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027687" comment="libcjose-devel-0.6.2.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027688" comment="libcjose0-0.6.2.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93964" version="1" class="patch">
	<metadata>
		<title>libcjson1-1.7.18-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-50471" ref_url="https://www.suse.com/security/cve/CVE-2023-50471/" source="CVE"/>
		<reference ref_id="CVE-2023-50472" ref_url="https://www.suse.com/security/cve/CVE-2023-50472/" source="CVE"/>
		<reference ref_id="CVE-2024-31755" ref_url="https://www.suse.com/security/cve/CVE-2024-31755/" source="CVE"/>
		<description>
These are all security issues fixed in the libcjson1-1.7.18-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50471/">CVE-2023-50471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50471">CVE-2023-50471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50472/">CVE-2023-50472 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50472">CVE-2023-50472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31755/">CVE-2024-31755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31755">CVE-2024-31755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027689" comment="libcjson1-1.7.18-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93965" version="1" class="patch">
	<metadata>
		<title>libconfuse-devel-3.3-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-14447" ref_url="https://www.suse.com/security/cve/CVE-2018-14447/" source="CVE"/>
		<reference ref_id="CVE-2022-40320" ref_url="https://www.suse.com/security/cve/CVE-2022-40320/" source="CVE"/>
		<description>
These are all security issues fixed in the libconfuse-devel-3.3-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14447/">CVE-2018-14447 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14447">CVE-2018-14447 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40320/">CVE-2022-40320 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40320">CVE-2022-40320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027690" comment="libconfuse-devel-3.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027691" comment="libconfuse-lang-3.3-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027692" comment="libconfuse2-3.3-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93966" version="1" class="patch">
	<metadata>
		<title>libcontainers-common-20250409-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-3602" ref_url="https://www.suse.com/security/cve/CVE-2021-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the libcontainers-common-20250409-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10152">CVE-2019-10152 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15157">CVE-2020-15157 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3602/">CVE-2021-3602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3602">CVE-2021-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027693" comment="libcontainers-common-20250409-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027694" comment="libcontainers-default-policy-20250409-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027695" comment="libcontainers-openSUSE-policy-20250409-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027696" comment="registries-conf-default-20250409-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027697" comment="registries-conf-suse-20250409-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93967" version="1" class="patch">
	<metadata>
		<title>libcpp-httplib0_22-0.22.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-46728" ref_url="https://www.suse.com/security/cve/CVE-2025-46728/" source="CVE"/>
		<description>
These are all security issues fixed in the libcpp-httplib0_22-0.22.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46728/">CVE-2025-46728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46728">CVE-2025-46728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027698" comment="libcpp-httplib0_22-0.22.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93968" version="1" class="patch">
	<metadata>
		<title>libcue2-2.3.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-43641" ref_url="https://www.suse.com/security/cve/CVE-2023-43641/" source="CVE"/>
		<description>
These are all security issues fixed in the libcue2-2.3.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43641/">CVE-2023-43641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43641">CVE-2023-43641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027699" comment="libcue2-2.3.0-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93969" version="1" class="patch">
	<metadata>
		<title>libdmx-devel-1.1.5-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx-devel-1.1.5-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1992">CVE-2013-1992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027700" comment="libdmx-devel-1.1.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027701" comment="libdmx1-1.1.5-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93970" version="1" class="patch">
	<metadata>
		<title>libdrm-devel-2.4.124-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-devel-2.4.124-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027702" comment="libdrm-devel-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027703" comment="libdrm-tools-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027704" comment="libdrm2-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027705" comment="libdrm_amdgpu1-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027706" comment="libdrm_etnaviv1-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027707" comment="libdrm_exynos1-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027708" comment="libdrm_freedreno1-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027709" comment="libdrm_intel1-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027710" comment="libdrm_nouveau2-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027711" comment="libdrm_radeon1-2.4.124-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027712" comment="libdrm_tegra0-2.4.124-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93971" version="1" class="patch">
	<metadata>
		<title>libeconf-devel-0.7.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-22652" ref_url="https://www.suse.com/security/cve/CVE-2023-22652/" source="CVE"/>
		<reference ref_id="CVE-2023-30078" ref_url="https://www.suse.com/security/cve/CVE-2023-30078/" source="CVE"/>
		<reference ref_id="CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079/" source="CVE"/>
		<reference ref_id="CVE-2023-32181" ref_url="https://www.suse.com/security/cve/CVE-2023-32181/" source="CVE"/>
		<description>
These are all security issues fixed in the libeconf-devel-0.7.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22652/">CVE-2023-22652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22652">CVE-2023-22652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30078/">CVE-2023-30078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30078">CVE-2023-30078 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32181/">CVE-2023-32181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32181">CVE-2023-32181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027713" comment="libeconf-devel-0.7.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027714" comment="libeconf-devel-static-0.7.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027715" comment="libeconf-utils-0.7.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027716" comment="libeconf0-0.7.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93972" version="1" class="patch">
	<metadata>
		<title>libecpg6-17.6-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-17.6-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027717" comment="libecpg6-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027718" comment="libpq5-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027719" comment="postgresql17-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027720" comment="postgresql17-contrib-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027721" comment="postgresql17-devel-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027722" comment="postgresql17-docs-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027723" comment="postgresql17-llvmjit-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027724" comment="postgresql17-plperl-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027725" comment="postgresql17-plpython-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027726" comment="postgresql17-pltcl-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027727" comment="postgresql17-server-17.6-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027728" comment="postgresql17-server-devel-17.6-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93973" version="1" class="patch">
	<metadata>
		<title>libekmfweb1-2.38.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-25316" ref_url="https://www.suse.com/security/cve/CVE-2021-25316/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the libekmfweb1-2.38.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25316/">CVE-2021-25316 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25316">CVE-2021-25316 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027729" comment="libekmfweb1-2.38.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027730" comment="libkmipclient1-2.38.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027731" comment="osasnmpd-2.38.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027732" comment="s390-tools-2.38.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027733" comment="s390-tools-chreipl-fcp-mpath-2.38.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027734" comment="s390-tools-genprotimg-data-2.38.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027735" comment="s390-tools-hmcdrvfs-2.38.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027736" comment="s390-tools-zdsfs-2.38.0-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93974" version="1" class="patch">
	<metadata>
		<title>libesmtp-devel-1.1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
These are all security issues fixed in the libesmtp-devel-1.1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027737" comment="libesmtp-devel-1.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027738" comment="libesmtp6_2_0-1.1.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93975" version="1" class="patch">
	<metadata>
		<title>libevent-2_1-7-2.1.12-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_1-7-2.1.12-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027739" comment="libevent-2_1-7-2.1.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027740" comment="libevent-devel-2.1.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027741" comment="libevent-devel-static-2.1.12-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93976" version="1" class="patch">
	<metadata>
		<title>libexempi8-2.6.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-12648" ref_url="https://www.suse.com/security/cve/CVE-2018-12648/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7729" ref_url="https://www.suse.com/security/cve/CVE-2018-7729/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="CVE-2018-7731" ref_url="https://www.suse.com/security/cve/CVE-2018-7731/" source="CVE"/>
		<description>
These are all security issues fixed in the libexempi8-2.6.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12648/">CVE-2018-12648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12648">CVE-2018-12648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7728">CVE-2018-7728 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7729/">CVE-2018-7729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7729">CVE-2018-7729 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7731/">CVE-2018-7731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7731">CVE-2018-7731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027742" comment="libexempi8-2.6.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93977" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.25-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.25-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6351">CVE-2007-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6352">CVE-2007-6352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2812">CVE-2012-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2813">CVE-2012-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2814">CVE-2012-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2836">CVE-2012-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2837">CVE-2012-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2840">CVE-2012-2840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2841">CVE-2012-2841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027743" comment="libexif12-0.6.25-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93978" version="1" class="patch">
	<metadata>
		<title>libexiv2-28-0.28.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<reference ref_id="CVE-2014-9449" ref_url="https://www.suse.com/security/cve/CVE-2014-9449/" source="CVE"/>
		<reference ref_id="CVE-2017-1000126" ref_url="https://www.suse.com/security/cve/CVE-2017-1000126/" source="CVE"/>
		<reference ref_id="CVE-2017-1000128" ref_url="https://www.suse.com/security/cve/CVE-2017-1000128/" source="CVE"/>
		<reference ref_id="CVE-2017-11337" ref_url="https://www.suse.com/security/cve/CVE-2017-11337/" source="CVE"/>
		<reference ref_id="CVE-2017-11338" ref_url="https://www.suse.com/security/cve/CVE-2017-11338/" source="CVE"/>
		<reference ref_id="CVE-2017-11339" ref_url="https://www.suse.com/security/cve/CVE-2017-11339/" source="CVE"/>
		<reference ref_id="CVE-2017-11340" ref_url="https://www.suse.com/security/cve/CVE-2017-11340/" source="CVE"/>
		<reference ref_id="CVE-2017-11553" ref_url="https://www.suse.com/security/cve/CVE-2017-11553/" source="CVE"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-11592" ref_url="https://www.suse.com/security/cve/CVE-2017-11592/" source="CVE"/>
		<reference ref_id="CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683/" source="CVE"/>
		<reference ref_id="CVE-2017-12955" ref_url="https://www.suse.com/security/cve/CVE-2017-12955/" source="CVE"/>
		<reference ref_id="CVE-2017-12956" ref_url="https://www.suse.com/security/cve/CVE-2017-12956/" source="CVE"/>
		<reference ref_id="CVE-2017-12957" ref_url="https://www.suse.com/security/cve/CVE-2017-12957/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14860" ref_url="https://www.suse.com/security/cve/CVE-2017-14860/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2017-17725" ref_url="https://www.suse.com/security/cve/CVE-2017-17725/" source="CVE"/>
		<reference ref_id="CVE-2017-9239" ref_url="https://www.suse.com/security/cve/CVE-2017-9239/" source="CVE"/>
		<reference ref_id="CVE-2018-12264" ref_url="https://www.suse.com/security/cve/CVE-2018-12264/" source="CVE"/>
		<reference ref_id="CVE-2018-12265" ref_url="https://www.suse.com/security/cve/CVE-2018-12265/" source="CVE"/>
		<reference ref_id="CVE-2018-17229" ref_url="https://www.suse.com/security/cve/CVE-2018-17229/" source="CVE"/>
		<reference ref_id="CVE-2018-17230" ref_url="https://www.suse.com/security/cve/CVE-2018-17230/" source="CVE"/>
		<reference ref_id="CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282/" source="CVE"/>
		<reference ref_id="CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108/" source="CVE"/>
		<reference ref_id="CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607/" source="CVE"/>
		<reference ref_id="CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305/" source="CVE"/>
		<reference ref_id="CVE-2019-13108" ref_url="https://www.suse.com/security/cve/CVE-2019-13108/" source="CVE"/>
		<reference ref_id="CVE-2019-13114" ref_url="https://www.suse.com/security/cve/CVE-2019-13114/" source="CVE"/>
		<reference ref_id="CVE-2020-18831" ref_url="https://www.suse.com/security/cve/CVE-2020-18831/" source="CVE"/>
		<reference ref_id="CVE-2020-19716" ref_url="https://www.suse.com/security/cve/CVE-2020-19716/" source="CVE"/>
		<reference ref_id="CVE-2021-29457" ref_url="https://www.suse.com/security/cve/CVE-2021-29457/" source="CVE"/>
		<reference ref_id="CVE-2021-29458" ref_url="https://www.suse.com/security/cve/CVE-2021-29458/" source="CVE"/>
		<reference ref_id="CVE-2021-29463" ref_url="https://www.suse.com/security/cve/CVE-2021-29463/" source="CVE"/>
		<reference ref_id="CVE-2021-29470" ref_url="https://www.suse.com/security/cve/CVE-2021-29470/" source="CVE"/>
		<reference ref_id="CVE-2021-29623" ref_url="https://www.suse.com/security/cve/CVE-2021-29623/" source="CVE"/>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<reference ref_id="CVE-2021-32617" ref_url="https://www.suse.com/security/cve/CVE-2021-32617/" source="CVE"/>
		<reference ref_id="CVE-2021-32815" ref_url="https://www.suse.com/security/cve/CVE-2021-32815/" source="CVE"/>
		<reference ref_id="CVE-2021-34334" ref_url="https://www.suse.com/security/cve/CVE-2021-34334/" source="CVE"/>
		<reference ref_id="CVE-2021-34335" ref_url="https://www.suse.com/security/cve/CVE-2021-34335/" source="CVE"/>
		<reference ref_id="CVE-2021-37615" ref_url="https://www.suse.com/security/cve/CVE-2021-37615/" source="CVE"/>
		<reference ref_id="CVE-2021-37620" ref_url="https://www.suse.com/security/cve/CVE-2021-37620/" source="CVE"/>
		<reference ref_id="CVE-2021-37621" ref_url="https://www.suse.com/security/cve/CVE-2021-37621/" source="CVE"/>
		<reference ref_id="CVE-2021-37622" ref_url="https://www.suse.com/security/cve/CVE-2021-37622/" source="CVE"/>
		<reference ref_id="CVE-2021-37623" ref_url="https://www.suse.com/security/cve/CVE-2021-37623/" source="CVE"/>
		<reference ref_id="CVE-2022-3953" ref_url="https://www.suse.com/security/cve/CVE-2022-3953/" source="CVE"/>
		<reference ref_id="CVE-2023-44398" ref_url="https://www.suse.com/security/cve/CVE-2023-44398/" source="CVE"/>
		<reference ref_id="CVE-2024-24826" ref_url="https://www.suse.com/security/cve/CVE-2024-24826/" source="CVE"/>
		<reference ref_id="CVE-2024-25112" ref_url="https://www.suse.com/security/cve/CVE-2024-25112/" source="CVE"/>
		<reference ref_id="CVE-2024-39695" ref_url="https://www.suse.com/security/cve/CVE-2024-39695/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-28-0.28.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6353">CVE-2007-6353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9449/">CVE-2014-9449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9449">CVE-2014-9449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000126/">CVE-2017-1000126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000126">CVE-2017-1000126 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000128/">CVE-2017-1000128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000128">CVE-2017-1000128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11337/">CVE-2017-11337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11337">CVE-2017-11337 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11338/">CVE-2017-11338 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11338">CVE-2017-11338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11339/">CVE-2017-11339 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11339">CVE-2017-11339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11340/">CVE-2017-11340 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11340">CVE-2017-11340 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11553/">CVE-2017-11553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11553">CVE-2017-11553 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11591">CVE-2017-11591 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11592/">CVE-2017-11592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11592">CVE-2017-11592 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11683">CVE-2017-11683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12955/">CVE-2017-12955 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12955">CVE-2017-12955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12956/">CVE-2017-12956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12956">CVE-2017-12956 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12957/">CVE-2017-12957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12957">CVE-2017-12957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14859">CVE-2017-14859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14860/">CVE-2017-14860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14860">CVE-2017-14860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14862">CVE-2017-14862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14864">CVE-2017-14864 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17725/">CVE-2017-17725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17725">CVE-2017-17725 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9239/">CVE-2017-9239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9239">CVE-2017-9239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12264/">CVE-2018-12264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12264">CVE-2018-12264 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12265/">CVE-2018-12265 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12265">CVE-2018-12265 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17229/">CVE-2018-17229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17229">CVE-2018-17229 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17230/">CVE-2018-17230 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17230">CVE-2018-17230 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17282">CVE-2018-17282 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19108">CVE-2018-19108 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19607">CVE-2018-19607 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9305">CVE-2018-9305 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13108/">CVE-2019-13108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13108">CVE-2019-13108 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13114/">CVE-2019-13114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13114">CVE-2019-13114 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18831/">CVE-2020-18831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18831">CVE-2020-18831 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19716/">CVE-2020-19716 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19716">CVE-2020-19716 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29457/">CVE-2021-29457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29457">CVE-2021-29457 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29458/">CVE-2021-29458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29458">CVE-2021-29458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29463/">CVE-2021-29463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29463">CVE-2021-29463 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29470/">CVE-2021-29470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29470">CVE-2021-29470 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29623/">CVE-2021-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29623">CVE-2021-29623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32617/">CVE-2021-32617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32617">CVE-2021-32617 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32815/">CVE-2021-32815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32815">CVE-2021-32815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34334/">CVE-2021-34334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34334">CVE-2021-34334 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-34335/">CVE-2021-34335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34335">CVE-2021-34335 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37615/">CVE-2021-37615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37615">CVE-2021-37615 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37620/">CVE-2021-37620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37620">CVE-2021-37620 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37621/">CVE-2021-37621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37621">CVE-2021-37621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37622/">CVE-2021-37622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37622">CVE-2021-37622 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37623/">CVE-2021-37623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37623">CVE-2021-37623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3953/">CVE-2022-3953 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3953">CVE-2022-3953 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44398/">CVE-2023-44398 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44398">CVE-2023-44398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24826/">CVE-2024-24826 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24826">CVE-2024-24826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25112/">CVE-2024-25112 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25112">CVE-2024-25112 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39695/">CVE-2024-39695 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39695">CVE-2024-39695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027744" comment="libexiv2-28-0.28.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027745" comment="libexiv2-28-x86-64-v3-0.28.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93979" version="1" class="patch">
	<metadata>
		<title>libexslt0-1.1.43-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<reference ref_id="CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855/" source="CVE"/>
		<reference ref_id="CVE-2025-7424" ref_url="https://www.suse.com/security/cve/CVE-2025-7424/" source="CVE"/>
		<description>
These are all security issues fixed in the libexslt0-1.1.43-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1767">CVE-2008-1767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13118">CVE-2019-13118 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-7424/">CVE-2025-7424 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7424">CVE-2025-7424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027746" comment="libexslt0-1.1.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027747" comment="libxslt-devel-1.1.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027748" comment="libxslt-tools-1.1.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027749" comment="libxslt1-1.1.43-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93980" version="1" class="patch">
	<metadata>
		<title>libfastjson4-1.2304.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
These are all security issues fixed in the libfastjson4-1.2304.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027750" comment="libfastjson4-1.2304.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93981" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.112-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491/" source="CVE"/>
		<reference ref_id="CVE-2022-3479" ref_url="https://www.suse.com/security/cve/CVE-2022-3479/" source="CVE"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.112-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3640">CVE-2011-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0791">CVE-2013-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1620">CVE-2013-1620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1740">CVE-2013-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5605">CVE-2013-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18508">CVE-2018-18508 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23491">CVE-2022-23491 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3479/">CVE-2022-3479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3479">CVE-2022-3479 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027751" comment="libfreebl3-3.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027752" comment="libsoftokn3-3.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027753" comment="mozilla-nss-3.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027754" comment="mozilla-nss-certs-3.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027755" comment="mozilla-nss-devel-3.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027756" comment="mozilla-nss-sysinit-3.112-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027757" comment="mozilla-nss-tools-3.112-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93982" version="1" class="patch">
	<metadata>
		<title>libgcrypt-devel-1.11.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-5738" ref_url="https://www.suse.com/security/cve/CVE-2015-5738/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379/" source="CVE"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904/" source="CVE"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="CVE-2021-3345" ref_url="https://www.suse.com/security/cve/CVE-2021-3345/" source="CVE"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="CVE-2021-40528" ref_url="https://www.suse.com/security/cve/CVE-2021-40528/" source="CVE"/>
		<reference ref_id="CVE-2024-2236" ref_url="https://www.suse.com/security/cve/CVE-2024-2236/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt-devel-1.11.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4242">CVE-2013-4242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5738/">CVE-2015-5738 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5738">CVE-2015-5738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511 at SUSE</cve>
	<cve impact="low" cvss3="2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7511">CVE-2015-7511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0379">CVE-2017-0379 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7526">CVE-2017-7526 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12904">CVE-2019-12904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3345/">CVE-2021-3345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3345">CVE-2021-3345 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40528/">CVE-2021-40528 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40528">CVE-2021-40528 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2236/">CVE-2024-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2236">CVE-2024-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027758" comment="libgcrypt-devel-1.11.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027759" comment="libgcrypt-devel-x86-64-v3-1.11.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027760" comment="libgcrypt20-1.11.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027761" comment="libgcrypt20-x86-64-v3-1.11.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93983" version="1" class="patch">
	<metadata>
		<title>libgit2-1_9-1.9.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2016-10128" ref_url="https://www.suse.com/security/cve/CVE-2016-10128/" source="CVE"/>
		<reference ref_id="CVE-2016-10129" ref_url="https://www.suse.com/security/cve/CVE-2016-10129/" source="CVE"/>
		<reference ref_id="CVE-2016-10130" ref_url="https://www.suse.com/security/cve/CVE-2016-10130/" source="CVE"/>
		<reference ref_id="CVE-2016-8568" ref_url="https://www.suse.com/security/cve/CVE-2016-8568/" source="CVE"/>
		<reference ref_id="CVE-2016-8569" ref_url="https://www.suse.com/security/cve/CVE-2016-8569/" source="CVE"/>
		<reference ref_id="CVE-2017-5338" ref_url="https://www.suse.com/security/cve/CVE-2017-5338/" source="CVE"/>
		<reference ref_id="CVE-2017-5339" ref_url="https://www.suse.com/security/cve/CVE-2017-5339/" source="CVE"/>
		<reference ref_id="CVE-2018-10887" ref_url="https://www.suse.com/security/cve/CVE-2018-10887/" source="CVE"/>
		<reference ref_id="CVE-2018-10888" ref_url="https://www.suse.com/security/cve/CVE-2018-10888/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-8098" ref_url="https://www.suse.com/security/cve/CVE-2018-8098/" source="CVE"/>
		<reference ref_id="CVE-2018-8099" ref_url="https://www.suse.com/security/cve/CVE-2018-8099/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="CVE-2023-22742" ref_url="https://www.suse.com/security/cve/CVE-2023-22742/" source="CVE"/>
		<reference ref_id="CVE-2024-24575" ref_url="https://www.suse.com/security/cve/CVE-2024-24575/" source="CVE"/>
		<reference ref_id="CVE-2024-24577" ref_url="https://www.suse.com/security/cve/CVE-2024-24577/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-1_9-1.9.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2005-4900">CVE-2005-4900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10128/">CVE-2016-10128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10128">CVE-2016-10128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10129/">CVE-2016-10129 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10129">CVE-2016-10129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10130/">CVE-2016-10130 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10130">CVE-2016-10130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8568/">CVE-2016-8568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8568">CVE-2016-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8569/">CVE-2016-8569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8569">CVE-2016-8569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5338/">CVE-2017-5338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5338">CVE-2017-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5339/">CVE-2017-5339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5339">CVE-2017-5339 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10887/">CVE-2018-10887 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10887">CVE-2018-10887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10888/">CVE-2018-10888 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10888">CVE-2018-10888 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8098/">CVE-2018-8098 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8098">CVE-2018-8098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8099/">CVE-2018-8099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8099">CVE-2018-8099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22742/">CVE-2023-22742 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22742">CVE-2023-22742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24575/">CVE-2024-24575 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24575">CVE-2024-24575 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24577/">CVE-2024-24577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24577">CVE-2024-24577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027762" comment="libgit2-1_9-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027763" comment="libgit2-tools-1.9.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93984" version="1" class="patch">
	<metadata>
		<title>libgme0-0.6.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<description>
These are all security issues fixed in the libgme0-0.6.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9957">CVE-2016-9957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9958">CVE-2016-9958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9959">CVE-2016-9959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9960">CVE-2016-9960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9961">CVE-2016-9961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027764" comment="libgme0-0.6.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93985" version="1" class="patch">
	<metadata>
		<title>libgoa-1_0-0-3.54.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the libgoa-1_0-0-3.54.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0240">CVE-2013-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1799">CVE-2013-1799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027765" comment="libgoa-1_0-0-3.54.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027766" comment="libgoa-backend-1_0-2-3.54.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027767" comment="typelib-1_0-Goa-1_0-3.54.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93986" version="1" class="patch">
	<metadata>
		<title>libgstrtspserver-1_0-0-1.26.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-6095" ref_url="https://www.suse.com/security/cve/CVE-2020-6095/" source="CVE"/>
		<description>
These are all security issues fixed in the libgstrtspserver-1_0-0-1.26.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6095/">CVE-2020-6095 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6095">CVE-2020-6095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027768" comment="libgstrtspserver-1_0-0-1.26.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027769" comment="typelib-1_0-GstRtspServer-1_0-1.26.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93987" version="1" class="patch">
	<metadata>
		<title>libgtk-vnc-2_0-0-1.5.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtk-vnc-2_0-0-1.5.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027770" comment="libgtk-vnc-2_0-0-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027771" comment="libgvnc-1_0-0-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027772" comment="typelib-1_0-GVnc-1_0-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027773" comment="typelib-1_0-GtkVnc-2_0-1.5.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93988" version="1" class="patch">
	<metadata>
		<title>libgtop-2.41.3+4-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.41.3+4-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0235">CVE-2007-0235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027774" comment="libgtop-2.41.3+4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027775" comment="libgtop-2_0-11-2.41.3+4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027776" comment="libgtop-doc-2.41.3+4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027777" comment="libgtop-lang-2.41.3+4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027778" comment="typelib-1_0-GTop-2_0-2.41.3+4-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93989" version="1" class="patch">
	<metadata>
		<title>libguestfs-1.56.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
These are all security issues fixed in the libguestfs-1.56.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2124">CVE-2013-2124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4419">CVE-2013-4419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027779" comment="libguestfs-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027780" comment="libguestfs-appliance-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027781" comment="libguestfs-bash-completion-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027782" comment="libguestfs-devel-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027783" comment="libguestfs-gobject-1_0-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027784" comment="libguestfs-gobject-devel-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027785" comment="libguestfs-man-pages-ja-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027786" comment="libguestfs-man-pages-uk-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027787" comment="libguestfs-rescue-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027788" comment="libguestfs-rsync-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027789" comment="libguestfs-typelib-Guestfs-1_0-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027790" comment="libguestfs-winsupport-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027791" comment="libguestfs-xfs-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027792" comment="libguestfs0-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027793" comment="libguestfsd-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027794" comment="perl-Sys-Guestfs-1.56.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027795" comment="python3-libguestfs-1.56.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93990" version="1" class="patch">
	<metadata>
		<title>libhogweed6-3.10.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<reference ref_id="CVE-2018-16869" ref_url="https://www.suse.com/security/cve/CVE-2018-16869/" source="CVE"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="CVE-2023-36660" ref_url="https://www.suse.com/security/cve/CVE-2023-36660/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed6-3.10.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8803">CVE-2015-8803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8804">CVE-2015-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8805">CVE-2015-8805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6489">CVE-2016-6489 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16869/">CVE-2018-16869 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16869">CVE-2018-16869 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-36660/">CVE-2023-36660 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36660">CVE-2023-36660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027796" comment="libhogweed6-3.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027797" comment="libhogweed6-x86-64-v3-3.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027798" comment="libnettle-devel-3.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027799" comment="libnettle8-3.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027800" comment="libnettle8-x86-64-v3-3.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027801" comment="nettle-3.10.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93991" version="1" class="patch">
	<metadata>
		<title>libical-devel-3.0.18-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
These are all security issues fixed in the libical-devel-3.0.18-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5827">CVE-2016-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9584">CVE-2016-9584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027802" comment="libical-devel-3.0.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027803" comment="libical-doc-3.0.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027804" comment="libical3-3.0.18-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93992" version="1" class="patch">
	<metadata>
		<title>libid3tag0-0.16.3-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779/" source="CVE"/>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<reference ref_id="CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550/" source="CVE"/>
		<reference ref_id="CVE-2017-11551" ref_url="https://www.suse.com/security/cve/CVE-2017-11551/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag0-0.16.3-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2779">CVE-2004-2779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2109">CVE-2008-2109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11550">CVE-2017-11550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11551/">CVE-2017-11551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11551">CVE-2017-11551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027805" comment="libid3tag0-0.16.3-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93993" version="1" class="patch">
	<metadata>
		<title>libidn-devel-1.43-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn-devel-1.43-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027806" comment="libidn-devel-1.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027807" comment="libidn-tools-1.43-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027808" comment="libidn12-1.43-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93994" version="1" class="patch">
	<metadata>
		<title>libidn2-0-2.3.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2019-12290" ref_url="https://www.suse.com/security/cve/CVE-2019-12290/" source="CVE"/>
		<reference ref_id="CVE-2019-18224" ref_url="https://www.suse.com/security/cve/CVE-2019-18224/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn2-0-2.3.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12290/">CVE-2019-12290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-12290">CVE-2019-12290 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18224/">CVE-2019-18224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18224">CVE-2019-18224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027809" comment="libidn2-0-2.3.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027810" comment="libidn2-devel-2.3.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027811" comment="libidn2-lang-2.3.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027812" comment="libidn2-tools-2.3.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93995" version="1" class="patch">
	<metadata>
		<title>libimobiledevice-1_0-6-1.3.0+190git.20230705-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142/" source="CVE"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libimobiledevice-1_0-6-1.3.0+190git.20230705-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2142">CVE-2013-2142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5104">CVE-2016-5104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027813" comment="libimobiledevice-1_0-6-1.3.0+190git.20230705-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93996" version="1" class="patch">
	<metadata>
		<title>libiniparser-devel-4.2.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-33461" ref_url="https://www.suse.com/security/cve/CVE-2023-33461/" source="CVE"/>
		<reference ref_id="CVE-2025-0633" ref_url="https://www.suse.com/security/cve/CVE-2025-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the libiniparser-devel-4.2.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33461/">CVE-2023-33461 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33461">CVE-2023-33461 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0633/">CVE-2025-0633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0633">CVE-2025-0633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027814" comment="libiniparser-devel-4.2.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027815" comment="libiniparser4-4.2.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93997" version="1" class="patch">
	<metadata>
		<title>libinput-devel-1.28.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<description>
These are all security issues fixed in the libinput-devel-1.28.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1215">CVE-2022-1215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027816" comment="libinput-devel-1.28.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027817" comment="libinput-tools-1.28.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027818" comment="libinput-udev-1.28.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027819" comment="libinput10-1.28.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93998" version="1" class="patch">
	<metadata>
		<title>libipa_hbac-devel-2.9.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<reference ref_id="CVE-2014-0249" ref_url="https://www.suse.com/security/cve/CVE-2014-0249/" source="CVE"/>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<reference ref_id="CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac-devel-2.9.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4341">CVE-2010-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1758">CVE-2011-1758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0219">CVE-2013-0219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0220">CVE-2013-0220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0287">CVE-2013-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0249/">CVE-2014-0249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0249">CVE-2014-0249 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12173">CVE-2017-12173 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10852">CVE-2018-10852 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027820" comment="libipa_hbac-devel-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027821" comment="libipa_hbac0-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027822" comment="libnfsidmap-sss-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027823" comment="libsss_certmap-devel-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027824" comment="libsss_certmap0-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027825" comment="libsss_idmap-devel-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027826" comment="libsss_idmap0-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027827" comment="libsss_nss_idmap-devel-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027828" comment="libsss_nss_idmap0-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027829" comment="python3-ipa_hbac-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027830" comment="python3-sss-murmur-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027831" comment="python3-sss_nss_idmap-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027832" comment="python3-sssd-config-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027833" comment="sssd-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027834" comment="sssd-ad-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027835" comment="sssd-dbus-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027836" comment="sssd-ipa-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027837" comment="sssd-kcm-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027838" comment="sssd-krb5-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027839" comment="sssd-krb5-common-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027840" comment="sssd-ldap-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027841" comment="sssd-proxy-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027842" comment="sssd-tools-2.9.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027843" comment="sssd-winbind-idmap-2.9.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93999" version="1" class="patch">
	<metadata>
		<title>libjansson-devel-2.14-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401/" source="CVE"/>
		<description>
These are all security issues fixed in the libjansson-devel-2.14-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6401">CVE-2013-6401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027844" comment="libjansson-devel-2.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027845" comment="libjansson4-2.14-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94000" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-3.0.4-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="CVE-2018-19644" ref_url="https://www.suse.com/security/cve/CVE-2018-19644/" source="CVE"/>
		<reference ref_id="CVE-2018-19664" ref_url="https://www.suse.com/security/cve/CVE-2018-19664/" source="CVE"/>
		<reference ref_id="CVE-2018-20330" ref_url="https://www.suse.com/security/cve/CVE-2018-20330/" source="CVE"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<reference ref_id="CVE-2023-2804" ref_url="https://www.suse.com/security/cve/CVE-2023-2804/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-3.0.4-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9092">CVE-2014-9092 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19644/">CVE-2018-19644 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19644">CVE-2018-19644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19664/">CVE-2018-19664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19664">CVE-2018-19664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20330/">CVE-2018-20330 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20330">CVE-2018-20330 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">CVE-2020-17541 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2804/">CVE-2023-2804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2804">CVE-2023-2804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027846" comment="libjpeg-turbo-3.0.4-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027847" comment="libjpeg62-62.4.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027848" comment="libjpeg62-devel-62.4.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027849" comment="libjpeg8-8.3.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027850" comment="libjpeg8-devel-8.3.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027851" comment="libjpeg8-x86-64-v3-8.3.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027852" comment="libturbojpeg0-8.3.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027853" comment="libturbojpeg0-x86-64-v3-8.3.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94001" version="1" class="patch">
	<metadata>
		<title>libjson-c-devel-0.17-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c-devel-0.17-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027854" comment="libjson-c-devel-0.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027855" comment="libjson-c-doc-0.17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027856" comment="libjson-c5-0.17-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94002" version="1" class="patch">
	<metadata>
		<title>libjxl-devel-0.11.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-11403" ref_url="https://www.suse.com/security/cve/CVE-2024-11403/" source="CVE"/>
		<reference ref_id="CVE-2024-11498" ref_url="https://www.suse.com/security/cve/CVE-2024-11498/" source="CVE"/>
		<description>
These are all security issues fixed in the libjxl-devel-0.11.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-11403/">CVE-2024-11403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11403">CVE-2024-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11498/">CVE-2024-11498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11498">CVE-2024-11498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027857" comment="libjxl-devel-0.11.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027858" comment="libjxl0_11-0.11.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027859" comment="libjxl0_11-x86-64-v3-0.11.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94003" version="1" class="patch">
	<metadata>
		<title>libksba-devel-1.6.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-devel-1.6.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027860" comment="libksba-devel-1.6.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027861" comment="libksba8-1.6.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94004" version="1" class="patch">
	<metadata>
		<title>liblasso-devel-2.8.2-160000.2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-28091" ref_url="https://www.suse.com/security/cve/CVE-2021-28091/" source="CVE"/>
		<description>
These are all security issues fixed in the liblasso-devel-2.8.2-160000.2.3 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28091/">CVE-2021-28091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28091">CVE-2021-28091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027862" comment="liblasso-devel-2.8.2-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027863" comment="liblasso3-2.8.2-160000.2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94005" version="1" class="patch">
	<metadata>
		<title>liblouis-data-3.34.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13742" ref_url="https://www.suse.com/security/cve/CVE-2017-13742/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="CVE-2018-11410" ref_url="https://www.suse.com/security/cve/CVE-2018-11410/" source="CVE"/>
		<reference ref_id="CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<reference ref_id="CVE-2022-26981" ref_url="https://www.suse.com/security/cve/CVE-2022-26981/" source="CVE"/>
		<reference ref_id="CVE-2022-31783" ref_url="https://www.suse.com/security/cve/CVE-2022-31783/" source="CVE"/>
		<reference ref_id="CVE-2023-26767" ref_url="https://www.suse.com/security/cve/CVE-2023-26767/" source="CVE"/>
		<reference ref_id="CVE-2023-26768" ref_url="https://www.suse.com/security/cve/CVE-2023-26768/" source="CVE"/>
		<reference ref_id="CVE-2023-26769" ref_url="https://www.suse.com/security/cve/CVE-2023-26769/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-3.34.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13738">CVE-2017-13738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13739">CVE-2017-13739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13740">CVE-2017-13740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13742/">CVE-2017-13742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13742">CVE-2017-13742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13744">CVE-2017-13744 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11410/">CVE-2018-11410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11410">CVE-2018-11410 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11440">CVE-2018-11440 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11683">CVE-2018-11683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11684">CVE-2018-11684 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12085">CVE-2018-12085 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26981/">CVE-2022-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26981">CVE-2022-26981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-31783/">CVE-2022-31783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31783">CVE-2022-31783 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26767/">CVE-2023-26767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26767">CVE-2023-26767 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26768/">CVE-2023-26768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26768">CVE-2023-26768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26769/">CVE-2023-26769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26769">CVE-2023-26769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027864" comment="liblouis-data-3.34.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027865" comment="liblouis20-3.34.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027866" comment="python3-louis-3.34.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94006" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027867" comment="libltdl7-2.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027868" comment="libtool-2.4.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94007" version="1" class="patch">
	<metadata>
		<title>liblua5_3-5-5.3.6-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_3-5-5.3.6-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24371">CVE-2020-24371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027869" comment="liblua5_3-5-5.3.6-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027870" comment="lua53-5.3.6-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027871" comment="lua53-devel-5.3.6-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027872" comment="lua53-doc-5.3.6-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94008" version="1" class="patch">
	<metadata>
		<title>liblua5_4-5-5.4.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-15888" ref_url="https://www.suse.com/security/cve/CVE-2020-15888/" source="CVE"/>
		<reference ref_id="CVE-2020-15945" ref_url="https://www.suse.com/security/cve/CVE-2020-15945/" source="CVE"/>
		<reference ref_id="CVE-2020-24342" ref_url="https://www.suse.com/security/cve/CVE-2020-24342/" source="CVE"/>
		<reference ref_id="CVE-2020-24369" ref_url="https://www.suse.com/security/cve/CVE-2020-24369/" source="CVE"/>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<reference ref_id="CVE-2021-43519" ref_url="https://www.suse.com/security/cve/CVE-2021-43519/" source="CVE"/>
		<reference ref_id="CVE-2021-44647" ref_url="https://www.suse.com/security/cve/CVE-2021-44647/" source="CVE"/>
		<reference ref_id="CVE-2022-33099" ref_url="https://www.suse.com/security/cve/CVE-2022-33099/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_4-5-5.4.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15888/">CVE-2020-15888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15888">CVE-2020-15888 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15945/">CVE-2020-15945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15945">CVE-2020-15945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24342/">CVE-2020-24342 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24342">CVE-2020-24342 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24369/">CVE-2020-24369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24369">CVE-2020-24369 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24371">CVE-2020-24371 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43519/">CVE-2021-43519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43519">CVE-2021-43519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44647/">CVE-2021-44647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44647">CVE-2021-44647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33099/">CVE-2022-33099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027873" comment="liblua5_4-5-5.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027874" comment="lua54-5.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027875" comment="lua54-devel-5.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027876" comment="lua54-doc-5.4.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94009" version="1" class="patch">
	<metadata>
		<title>liblz4-1-1.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543/" source="CVE"/>
		<reference ref_id="CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520/" source="CVE"/>
		<description>
These are all security issues fixed in the liblz4-1-1.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17543">CVE-2019-17543 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027877" comment="liblz4-1-1.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027878" comment="liblz4-1-x86-64-v3-1.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027879" comment="liblz4-devel-1.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027880" comment="lz4-1.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94010" version="1" class="patch">
	<metadata>
		<title>liblzma5-5.8.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="CVE-2024-3094" ref_url="https://www.suse.com/security/cve/CVE-2024-3094/" source="CVE"/>
		<reference ref_id="CVE-2025-31115" ref_url="https://www.suse.com/security/cve/CVE-2025-31115/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzma5-5.8.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3094/">CVE-2024-3094 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094">CVE-2024-3094 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31115/">CVE-2025-31115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31115">CVE-2025-31115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027881" comment="liblzma5-5.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027882" comment="liblzma5-x86-64-v3-5.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027883" comment="xz-5.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027884" comment="xz-devel-5.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027885" comment="xz-lang-5.8.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94011" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.10-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.10-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027886" comment="liblzo2-2-2.10-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027887" comment="liblzo2-2-x86-64-v3-2.10-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027888" comment="lzo-devel-2.10-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027889" comment="lzo-devel-static-2.10-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94012" version="1" class="patch">
	<metadata>
		<title>libmailutils9-3.16-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-18862" ref_url="https://www.suse.com/security/cve/CVE-2019-18862/" source="CVE"/>
		<description>
These are all security issues fixed in the libmailutils9-3.16-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18862/">CVE-2019-18862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18862">CVE-2019-18862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027890" comment="libmailutils9-3.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027891" comment="mailutils-3.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027892" comment="mailutils-delivery-3.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027893" comment="mailutils-devel-3.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027894" comment="mailutils-imap4d-3.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027895" comment="mailutils-mh-3.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027896" comment="mailutils-notify-3.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027897" comment="mailutils-pop3d-3.16-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94013" version="1" class="patch">
	<metadata>
		<title>libmariadb-devel-3.4.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadb-devel-3.4.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13249">CVE-2020-13249 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027898" comment="libmariadb-devel-3.4.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027899" comment="libmariadb3-3.4.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027900" comment="libmariadb_plugins-3.4.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027901" comment="libmariadbprivate-3.4.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94014" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-11.8.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2012-4414" ref_url="https://www.suse.com/security/cve/CVE-2012-4414/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2012-5627" ref_url="https://www.suse.com/security/cve/CVE-2012-5627/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0610" ref_url="https://www.suse.com/security/cve/CVE-2016-0610/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10286" ref_url="https://www.suse.com/security/cve/CVE-2017-10286/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2503" ref_url="https://www.suse.com/security/cve/CVE-2019-2503/" source="CVE"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814/" source="CVE"/>
		<reference ref_id="CVE-2020-7221" ref_url="https://www.suse.com/security/cve/CVE-2020-7221/" source="CVE"/>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="CVE-2021-27928" ref_url="https://www.suse.com/security/cve/CVE-2021-27928/" source="CVE"/>
		<reference ref_id="CVE-2021-35604" ref_url="https://www.suse.com/security/cve/CVE-2021-35604/" source="CVE"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2021-46669" ref_url="https://www.suse.com/security/cve/CVE-2021-46669/" source="CVE"/>
		<reference ref_id="CVE-2022-21427" ref_url="https://www.suse.com/security/cve/CVE-2022-21427/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="CVE-2022-27376" ref_url="https://www.suse.com/security/cve/CVE-2022-27376/" source="CVE"/>
		<reference ref_id="CVE-2022-27377" ref_url="https://www.suse.com/security/cve/CVE-2022-27377/" source="CVE"/>
		<reference ref_id="CVE-2022-27378" ref_url="https://www.suse.com/security/cve/CVE-2022-27378/" source="CVE"/>
		<reference ref_id="CVE-2022-27379" ref_url="https://www.suse.com/security/cve/CVE-2022-27379/" source="CVE"/>
		<reference ref_id="CVE-2022-27380" ref_url="https://www.suse.com/security/cve/CVE-2022-27380/" source="CVE"/>
		<reference ref_id="CVE-2022-27381" ref_url="https://www.suse.com/security/cve/CVE-2022-27381/" source="CVE"/>
		<reference ref_id="CVE-2022-27382" ref_url="https://www.suse.com/security/cve/CVE-2022-27382/" source="CVE"/>
		<reference ref_id="CVE-2022-27383" ref_url="https://www.suse.com/security/cve/CVE-2022-27383/" source="CVE"/>
		<reference ref_id="CVE-2022-27384" ref_url="https://www.suse.com/security/cve/CVE-2022-27384/" source="CVE"/>
		<reference ref_id="CVE-2022-27386" ref_url="https://www.suse.com/security/cve/CVE-2022-27386/" source="CVE"/>
		<reference ref_id="CVE-2022-27387" ref_url="https://www.suse.com/security/cve/CVE-2022-27387/" source="CVE"/>
		<reference ref_id="CVE-2022-27444" ref_url="https://www.suse.com/security/cve/CVE-2022-27444/" source="CVE"/>
		<reference ref_id="CVE-2022-27445" ref_url="https://www.suse.com/security/cve/CVE-2022-27445/" source="CVE"/>
		<reference ref_id="CVE-2022-27446" ref_url="https://www.suse.com/security/cve/CVE-2022-27446/" source="CVE"/>
		<reference ref_id="CVE-2022-27447" ref_url="https://www.suse.com/security/cve/CVE-2022-27447/" source="CVE"/>
		<reference ref_id="CVE-2022-27448" ref_url="https://www.suse.com/security/cve/CVE-2022-27448/" source="CVE"/>
		<reference ref_id="CVE-2022-27449" ref_url="https://www.suse.com/security/cve/CVE-2022-27449/" source="CVE"/>
		<reference ref_id="CVE-2022-27451" ref_url="https://www.suse.com/security/cve/CVE-2022-27451/" source="CVE"/>
		<reference ref_id="CVE-2022-27452" ref_url="https://www.suse.com/security/cve/CVE-2022-27452/" source="CVE"/>
		<reference ref_id="CVE-2022-27455" ref_url="https://www.suse.com/security/cve/CVE-2022-27455/" source="CVE"/>
		<reference ref_id="CVE-2022-27456" ref_url="https://www.suse.com/security/cve/CVE-2022-27456/" source="CVE"/>
		<reference ref_id="CVE-2022-27457" ref_url="https://www.suse.com/security/cve/CVE-2022-27457/" source="CVE"/>
		<reference ref_id="CVE-2022-27458" ref_url="https://www.suse.com/security/cve/CVE-2022-27458/" source="CVE"/>
		<reference ref_id="CVE-2022-32081" ref_url="https://www.suse.com/security/cve/CVE-2022-32081/" source="CVE"/>
		<reference ref_id="CVE-2022-32082" ref_url="https://www.suse.com/security/cve/CVE-2022-32082/" source="CVE"/>
		<reference ref_id="CVE-2022-32083" ref_url="https://www.suse.com/security/cve/CVE-2022-32083/" source="CVE"/>
		<reference ref_id="CVE-2022-32084" ref_url="https://www.suse.com/security/cve/CVE-2022-32084/" source="CVE"/>
		<reference ref_id="CVE-2022-32085" ref_url="https://www.suse.com/security/cve/CVE-2022-32085/" source="CVE"/>
		<reference ref_id="CVE-2022-32086" ref_url="https://www.suse.com/security/cve/CVE-2022-32086/" source="CVE"/>
		<reference ref_id="CVE-2022-32087" ref_url="https://www.suse.com/security/cve/CVE-2022-32087/" source="CVE"/>
		<reference ref_id="CVE-2022-32088" ref_url="https://www.suse.com/security/cve/CVE-2022-32088/" source="CVE"/>
		<reference ref_id="CVE-2022-32089" ref_url="https://www.suse.com/security/cve/CVE-2022-32089/" source="CVE"/>
		<reference ref_id="CVE-2022-32091" ref_url="https://www.suse.com/security/cve/CVE-2022-32091/" source="CVE"/>
		<reference ref_id="CVE-2022-38791" ref_url="https://www.suse.com/security/cve/CVE-2022-38791/" source="CVE"/>
		<reference ref_id="CVE-2022-47015" ref_url="https://www.suse.com/security/cve/CVE-2022-47015/" source="CVE"/>
		<reference ref_id="CVE-2023-22084" ref_url="https://www.suse.com/security/cve/CVE-2023-22084/" source="CVE"/>
		<reference ref_id="CVE-2024-21096" ref_url="https://www.suse.com/security/cve/CVE-2024-21096/" source="CVE"/>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-11.8.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0903">CVE-2006-0903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4226">CVE-2006-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4227">CVE-2006-4227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5969">CVE-2007-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5970">CVE-2007-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6303">CVE-2007-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6304">CVE-2007-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2079">CVE-2008-2079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4414/">CVE-2012-4414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4414">CVE-2012-4414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5611">CVE-2012-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5612">CVE-2012-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5615">CVE-2012-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5627/">CVE-2012-5627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5627">CVE-2012-5627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4807">CVE-2015-4807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4816">CVE-2015-4816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4819">CVE-2015-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4864">CVE-2015-4864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4866">CVE-2015-4866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4879">CVE-2015-4879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4895">CVE-2015-4895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5969">CVE-2015-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7744">CVE-2015-7744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0546">CVE-2016-0546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0596">CVE-2016-0596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0597">CVE-2016-0597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0600">CVE-2016-0600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0606">CVE-2016-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0608">CVE-2016-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0610/">CVE-2016-0610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0610">CVE-2016-0610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0616">CVE-2016-0616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0640">CVE-2016-0640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0642">CVE-2016-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0644">CVE-2016-0644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0646">CVE-2016-0646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0650">CVE-2016-0650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0651">CVE-2016-0651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0668">CVE-2016-0668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3477">CVE-2016-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3492">CVE-2016-3492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3521">CVE-2016-3521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3615">CVE-2016-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5584">CVE-2016-5584 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5624">CVE-2016-5624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5626">CVE-2016-5626 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5629">CVE-2016-5629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6663">CVE-2016-6663 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6664">CVE-2016-6664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7440">CVE-2016-7440 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8283">CVE-2016-8283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10268">CVE-2017-10268 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10286/">CVE-2017-10286 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10286">CVE-2017-10286 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10320">CVE-2017-10320 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10365">CVE-2017-10365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10378">CVE-2017-10378 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10379">CVE-2017-10379 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10384">CVE-2017-10384 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15365">CVE-2017-15365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3238">CVE-2017-3238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3243">CVE-2017-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3244">CVE-2017-3244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3257">CVE-2017-3257 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3258">CVE-2017-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3265">CVE-2017-3265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3291">CVE-2017-3291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3302">CVE-2017-3302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3308">CVE-2017-3308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3309">CVE-2017-3309 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3312">CVE-2017-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3313">CVE-2017-3313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3317">CVE-2017-3317 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3318">CVE-2017-3318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3453">CVE-2017-3453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3456">CVE-2017-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3464">CVE-2017-3464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3636">CVE-2017-3636 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3641">CVE-2017-3641 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3653">CVE-2017-3653 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2562">CVE-2018-2562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2612">CVE-2018-2612 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2622">CVE-2018-2622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2640">CVE-2018-2640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2665">CVE-2018-2665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2668">CVE-2018-2668 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2759">CVE-2018-2759 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2766">CVE-2018-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2767">CVE-2018-2767 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2777">CVE-2018-2777 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2782">CVE-2018-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2784">CVE-2018-2784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2786">CVE-2018-2786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2787">CVE-2018-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2810">CVE-2018-2810 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3060">CVE-2018-3060 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3064">CVE-2018-3064 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3143">CVE-2018-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3156">CVE-2018-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3162">CVE-2018-3162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3173">CVE-2018-3173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3185">CVE-2018-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3200">CVE-2018-3200 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3251">CVE-2018-3251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3277">CVE-2018-3277 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3284">CVE-2018-3284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18901">CVE-2019-18901 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2503/">CVE-2019-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2503">CVE-2019-2503 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2510">CVE-2019-2510 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2628">CVE-2019-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2758">CVE-2019-2758 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2938">CVE-2019-2938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13249">CVE-2020-13249 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14765">CVE-2020-14765 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14776">CVE-2020-14776 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14789">CVE-2020-14789 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14812">CVE-2020-14812 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15180">CVE-2020-15180 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2760">CVE-2020-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2814">CVE-2020-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7221/">CVE-2020-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7221">CVE-2020-7221 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2154">CVE-2021-2154 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2166">CVE-2021-2166 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2372">CVE-2021-2372 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2389">CVE-2021-2389 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27928/">CVE-2021-27928 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">CVE-2021-27928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-35604/">CVE-2021-35604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35604">CVE-2021-35604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46657">CVE-2021-46657 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46658">CVE-2021-46658 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46659">CVE-2021-46659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46661">CVE-2021-46661 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46663">CVE-2021-46663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46664">CVE-2021-46664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46665">CVE-2021-46665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46668">CVE-2021-46668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46669/">CVE-2021-46669 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">CVE-2021-46669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21427/">CVE-2022-21427 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21427">CVE-2022-21427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24048">CVE-2022-24048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24050">CVE-2022-24050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24051">CVE-2022-24051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24052">CVE-2022-24052 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27376/">CVE-2022-27376 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27376">CVE-2022-27376 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27377/">CVE-2022-27377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27377">CVE-2022-27377 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27378/">CVE-2022-27378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27378">CVE-2022-27378 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27379/">CVE-2022-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27379">CVE-2022-27379 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27380/">CVE-2022-27380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27380">CVE-2022-27380 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27381/">CVE-2022-27381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27381">CVE-2022-27381 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27382/">CVE-2022-27382 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27382">CVE-2022-27382 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27383/">CVE-2022-27383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27383">CVE-2022-27383 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27384/">CVE-2022-27384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27384">CVE-2022-27384 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27386/">CVE-2022-27386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27386">CVE-2022-27386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27387/">CVE-2022-27387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27387">CVE-2022-27387 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27444/">CVE-2022-27444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27444">CVE-2022-27444 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27445/">CVE-2022-27445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27445">CVE-2022-27445 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27446/">CVE-2022-27446 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27446">CVE-2022-27446 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27447/">CVE-2022-27447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27447">CVE-2022-27447 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27448/">CVE-2022-27448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27448">CVE-2022-27448 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27449/">CVE-2022-27449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27449">CVE-2022-27449 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27451/">CVE-2022-27451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27451">CVE-2022-27451 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27452/">CVE-2022-27452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27452">CVE-2022-27452 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27455/">CVE-2022-27455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27455">CVE-2022-27455 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27456/">CVE-2022-27456 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27456">CVE-2022-27456 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27457/">CVE-2022-27457 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27457">CVE-2022-27457 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27458/">CVE-2022-27458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27458">CVE-2022-27458 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32081/">CVE-2022-32081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32081">CVE-2022-32081 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32082/">CVE-2022-32082 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32082">CVE-2022-32082 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32083/">CVE-2022-32083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32083">CVE-2022-32083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32084/">CVE-2022-32084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32084">CVE-2022-32084 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32085/">CVE-2022-32085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32085">CVE-2022-32085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32086/">CVE-2022-32086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32086">CVE-2022-32086 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32087/">CVE-2022-32087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32087">CVE-2022-32087 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32088/">CVE-2022-32088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32088">CVE-2022-32088 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32089/">CVE-2022-32089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32089">CVE-2022-32089 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32091/">CVE-2022-32091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32091">CVE-2022-32091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38791/">CVE-2022-38791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38791">CVE-2022-38791 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47015/">CVE-2022-47015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47015">CVE-2022-47015 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22084/">CVE-2023-22084 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22084">CVE-2023-22084 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-21096/">CVE-2024-21096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21096">CVE-2024-21096 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027902" comment="libmariadbd-devel-11.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027903" comment="libmariadbd19-11.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027904" comment="mariadb-11.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027905" comment="mariadb-bench-11.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027906" comment="mariadb-client-11.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027907" comment="mariadb-errormessages-11.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027908" comment="mariadb-tools-11.8.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94015" version="1" class="patch">
	<metadata>
		<title>libmicrohttpd-devel-1.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038/" source="CVE"/>
		<reference ref_id="CVE-2013-7039" ref_url="https://www.suse.com/security/cve/CVE-2013-7039/" source="CVE"/>
		<reference ref_id="CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371/" source="CVE"/>
		<description>
These are all security issues fixed in the libmicrohttpd-devel-1.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7038">CVE-2013-7038 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2013-7039/">CVE-2013-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7039">CVE-2013-7039 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027909" comment="libmicrohttpd-devel-1.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027910" comment="libmicrohttpd12-1.0.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94016" version="1" class="patch">
	<metadata>
		<title>libmilter1_0-8.18.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-51765" ref_url="https://www.suse.com/security/cve/CVE-2023-51765/" source="CVE"/>
		<description>
These are all security issues fixed in the libmilter1_0-8.18.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51765/">CVE-2023-51765 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51765">CVE-2023-51765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027911" comment="libmilter1_0-8.18.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94017" version="1" class="patch">
	<metadata>
		<title>libminizip1-1.2.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
These are all security issues fixed in the libminizip1-1.2.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027912" comment="libminizip1-1.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027913" comment="libminizip1-x86-64-v3-1.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027914" comment="libz1-1.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027915" comment="libz1-x86-64-v3-1.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027916" comment="minizip-devel-1.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027917" comment="zlib-devel-1.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027918" comment="zlib-devel-static-1.2.13-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94018" version="1" class="patch">
	<metadata>
		<title>libmozjs-128-0-128.10.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="CVE-2024-11403" ref_url="https://www.suse.com/security/cve/CVE-2024-11403/" source="CVE"/>
		<reference ref_id="CVE-2024-11498" ref_url="https://www.suse.com/security/cve/CVE-2024-11498/" source="CVE"/>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11704" ref_url="https://www.suse.com/security/cve/CVE-2024-11704/" source="CVE"/>
		<reference ref_id="CVE-2024-43097" ref_url="https://www.suse.com/security/cve/CVE-2024-43097/" source="CVE"/>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<reference ref_id="CVE-2024-56431" ref_url="https://www.suse.com/security/cve/CVE-2024-56431/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<reference ref_id="CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932/" source="CVE"/>
		<reference ref_id="CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933/" source="CVE"/>
		<reference ref_id="CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936/" source="CVE"/>
		<reference ref_id="CVE-2025-2857" ref_url="https://www.suse.com/security/cve/CVE-2025-2857/" source="CVE"/>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<reference ref_id="CVE-2025-4920" ref_url="https://www.suse.com/security/cve/CVE-2025-4920/" source="CVE"/>
		<reference ref_id="CVE-2025-4921" ref_url="https://www.suse.com/security/cve/CVE-2025-4921/" source="CVE"/>
		<description>
These are all security issues fixed in the libmozjs-128-0-128.10.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-11403/">CVE-2024-11403 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11403">CVE-2024-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11498/">CVE-2024-11498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11498">CVE-2024-11498 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11704/">CVE-2024-11704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11704">CVE-2024-11704 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43097/">CVE-2024-43097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43097">CVE-2024-43097 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56431/">CVE-2024-56431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56431">CVE-2024-56431 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2857/">CVE-2025-2857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2857">CVE-2025-2857 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4920/">CVE-2025-4920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4920">CVE-2025-4920 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4921/">CVE-2025-4921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4921">CVE-2025-4921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027919" comment="libmozjs-128-0-128.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027920" comment="mozjs128-128.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027921" comment="mozjs128-devel-128.10.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94019" version="1" class="patch">
	<metadata>
		<title>libmpfr6-4.2.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr6-4.2.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027922" comment="libmpfr6-4.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027923" comment="mpfr-devel-4.2.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94020" version="1" class="patch">
	<metadata>
		<title>libmpg123-0-1.32.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-10683" ref_url="https://www.suse.com/security/cve/CVE-2017-10683/" source="CVE"/>
		<reference ref_id="CVE-2017-11126" ref_url="https://www.suse.com/security/cve/CVE-2017-11126/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpg123-0-1.32.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10683/">CVE-2017-10683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10683">CVE-2017-10683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11126/">CVE-2017-11126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11126">CVE-2017-11126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027924" comment="libmpg123-0-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027925" comment="libout123-0-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027926" comment="libsyn123-0-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027927" comment="mpg123-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027928" comment="mpg123-jack-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027929" comment="mpg123-openal-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027930" comment="mpg123-portaudio-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027931" comment="mpg123-pulse-1.32.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027932" comment="mpg123-sdl-1.32.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94021" version="1" class="patch">
	<metadata>
		<title>libmspack-devel-0.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack-devel-0.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2800">CVE-2010-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2801">CVE-2010-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027933" comment="libmspack-devel-0.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027934" comment="libmspack0-0.11-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027935" comment="mspack-examples-0.11-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94022" version="1" class="patch">
	<metadata>
		<title>libmysofa1-1.3.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-10672" ref_url="https://www.suse.com/security/cve/CVE-2019-10672/" source="CVE"/>
		<reference ref_id="CVE-2019-16091" ref_url="https://www.suse.com/security/cve/CVE-2019-16091/" source="CVE"/>
		<reference ref_id="CVE-2019-16092" ref_url="https://www.suse.com/security/cve/CVE-2019-16092/" source="CVE"/>
		<reference ref_id="CVE-2019-16093" ref_url="https://www.suse.com/security/cve/CVE-2019-16093/" source="CVE"/>
		<reference ref_id="CVE-2019-16094" ref_url="https://www.suse.com/security/cve/CVE-2019-16094/" source="CVE"/>
		<reference ref_id="CVE-2019-16095" ref_url="https://www.suse.com/security/cve/CVE-2019-16095/" source="CVE"/>
		<reference ref_id="CVE-2019-20016" ref_url="https://www.suse.com/security/cve/CVE-2019-20016/" source="CVE"/>
		<reference ref_id="CVE-2019-20063" ref_url="https://www.suse.com/security/cve/CVE-2019-20063/" source="CVE"/>
		<reference ref_id="CVE-2020-36148" ref_url="https://www.suse.com/security/cve/CVE-2020-36148/" source="CVE"/>
		<reference ref_id="CVE-2020-36149" ref_url="https://www.suse.com/security/cve/CVE-2020-36149/" source="CVE"/>
		<reference ref_id="CVE-2020-36150" ref_url="https://www.suse.com/security/cve/CVE-2020-36150/" source="CVE"/>
		<reference ref_id="CVE-2020-36151" ref_url="https://www.suse.com/security/cve/CVE-2020-36151/" source="CVE"/>
		<reference ref_id="CVE-2020-36152" ref_url="https://www.suse.com/security/cve/CVE-2020-36152/" source="CVE"/>
		<reference ref_id="CVE-2020-6860" ref_url="https://www.suse.com/security/cve/CVE-2020-6860/" source="CVE"/>
		<reference ref_id="CVE-2021-3756" ref_url="https://www.suse.com/security/cve/CVE-2021-3756/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysofa1-1.3.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10672/">CVE-2019-10672 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10672">CVE-2019-10672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16091/">CVE-2019-16091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16091">CVE-2019-16091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16092/">CVE-2019-16092 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16092">CVE-2019-16092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16093/">CVE-2019-16093 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16093">CVE-2019-16093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16094/">CVE-2019-16094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16094">CVE-2019-16094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16095/">CVE-2019-16095 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16095">CVE-2019-16095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20016/">CVE-2019-20016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20016">CVE-2019-20016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20063/">CVE-2019-20063 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20063">CVE-2019-20063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36148/">CVE-2020-36148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36148">CVE-2020-36148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36149/">CVE-2020-36149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36149">CVE-2020-36149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36150/">CVE-2020-36150 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36150">CVE-2020-36150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36151/">CVE-2020-36151 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36151">CVE-2020-36151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36152/">CVE-2020-36152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36152">CVE-2020-36152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6860/">CVE-2020-6860 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6860">CVE-2020-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3756/">CVE-2021-3756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3756">CVE-2021-3756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027936" comment="libmysofa1-1.3.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94023" version="1" class="patch">
	<metadata>
		<title>libnautilus-extension4-48.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-11461" ref_url="https://www.suse.com/security/cve/CVE-2019-11461/" source="CVE"/>
		<reference ref_id="CVE-2022-37290" ref_url="https://www.suse.com/security/cve/CVE-2022-37290/" source="CVE"/>
		<description>
These are all security issues fixed in the libnautilus-extension4-48.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11461/">CVE-2019-11461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11461">CVE-2019-11461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37290/">CVE-2022-37290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37290">CVE-2022-37290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027937" comment="libnautilus-extension4-48.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027938" comment="nautilus-48.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027939" comment="nautilus-lang-48.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94024" version="1" class="patch">
	<metadata>
		<title>libnbd-1.22.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-20286" ref_url="https://www.suse.com/security/cve/CVE-2021-20286/" source="CVE"/>
		<reference ref_id="CVE-2022-0485" ref_url="https://www.suse.com/security/cve/CVE-2022-0485/" source="CVE"/>
		<reference ref_id="CVE-2023-5215" ref_url="https://www.suse.com/security/cve/CVE-2023-5215/" source="CVE"/>
		<reference ref_id="CVE-2023-5871" ref_url="https://www.suse.com/security/cve/CVE-2023-5871/" source="CVE"/>
		<reference ref_id="CVE-2024-7383" ref_url="https://www.suse.com/security/cve/CVE-2024-7383/" source="CVE"/>
		<description>
These are all security issues fixed in the libnbd-1.22.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20286/">CVE-2021-20286 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20286">CVE-2021-20286 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0485/">CVE-2022-0485 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0485">CVE-2022-0485 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5215/">CVE-2023-5215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5215">CVE-2023-5215 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5871/">CVE-2023-5871 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5871">CVE-2023-5871 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7383/">CVE-2024-7383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7383">CVE-2024-7383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027940" comment="libnbd-1.22.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027941" comment="libnbd-bash-completion-1.22.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027942" comment="libnbd0-1.22.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027943" comment="nbdfuse-1.22.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027944" comment="python3-libnbd-1.22.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94025" version="1" class="patch">
	<metadata>
		<title>libncurses5-6.5.20250531-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458/" source="CVE"/>
		<description>
These are all security issues fixed in the libncurses5-6.5.20250531-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027945" comment="libncurses5-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027946" comment="libncurses6-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027947" comment="ncurses-devel-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027948" comment="ncurses-devel-static-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027949" comment="ncurses-examples-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027950" comment="ncurses-utils-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027951" comment="tack-1.11.20250503-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027952" comment="terminfo-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027953" comment="terminfo-base-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027954" comment="terminfo-iterm-6.5.20250531-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027955" comment="terminfo-screen-6.5.20250531-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94026" version="1" class="patch">
	<metadata>
		<title>libndp-1.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<reference ref_id="CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp-1.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3698">CVE-2016-3698 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027956" comment="libndp-1.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027957" comment="libndp-devel-1.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027958" comment="libndp0-1.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94027" version="1" class="patch">
	<metadata>
		<title>libneon-devel-0.34.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon-devel-0.34.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0157">CVE-2007-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3746">CVE-2008-3746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2474">CVE-2009-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027959" comment="libneon-devel-0.34.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027960" comment="libneon27-0.34.0-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94028" version="1" class="patch">
	<metadata>
		<title>libnetpbm-devel-11.9.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5849" ref_url="https://www.suse.com/security/cve/CVE-2017-5849/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<reference ref_id="CVE-2024-38526" ref_url="https://www.suse.com/security/cve/CVE-2024-38526/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm-devel-11.9.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5849/">CVE-2017-5849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5849">CVE-2017-5849 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8975">CVE-2018-8975 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38526/">CVE-2024-38526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38526">CVE-2024-38526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027961" comment="libnetpbm-devel-11.9.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027962" comment="libnetpbm11-11.9.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027963" comment="netpbm-11.9.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94029" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.24-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.24-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2905">CVE-2009-2905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027964" comment="libnewt0_52-0.52.24-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027965" comment="newt-0.52.24-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027966" comment="newt-devel-0.52.24-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027967" comment="newt-static-0.52.24-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027968" comment="python3-newt-0.52.24-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94030" version="1" class="patch">
	<metadata>
		<title>libnfsidmap1-1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
These are all security issues fixed in the libnfsidmap1-1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027969" comment="libnfsidmap1-1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027970" comment="nfs-client-2.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027971" comment="nfs-kernel-server-2.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027972" comment="nfsidmap-devel-1.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94031" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.64.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="CVE-2023-35945" ref_url="https://www.suse.com/security/cve/CVE-2023-35945/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.64.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18802">CVE-2019-18802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35945/">CVE-2023-35945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35945">CVE-2023-35945 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027973" comment="libnghttp2-14-1.64.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027974" comment="libnghttp2-devel-1.64.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027975" comment="nghttp2-1.64.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94032" version="1" class="patch">
	<metadata>
		<title>libntfs-3g-devel-2022.10.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<reference ref_id="CVE-2021-33285" ref_url="https://www.suse.com/security/cve/CVE-2021-33285/" source="CVE"/>
		<reference ref_id="CVE-2021-33286" ref_url="https://www.suse.com/security/cve/CVE-2021-33286/" source="CVE"/>
		<reference ref_id="CVE-2021-33287" ref_url="https://www.suse.com/security/cve/CVE-2021-33287/" source="CVE"/>
		<reference ref_id="CVE-2021-33289" ref_url="https://www.suse.com/security/cve/CVE-2021-33289/" source="CVE"/>
		<reference ref_id="CVE-2021-35266" ref_url="https://www.suse.com/security/cve/CVE-2021-35266/" source="CVE"/>
		<reference ref_id="CVE-2021-35267" ref_url="https://www.suse.com/security/cve/CVE-2021-35267/" source="CVE"/>
		<reference ref_id="CVE-2021-35268" ref_url="https://www.suse.com/security/cve/CVE-2021-35268/" source="CVE"/>
		<reference ref_id="CVE-2021-35269" ref_url="https://www.suse.com/security/cve/CVE-2021-35269/" source="CVE"/>
		<reference ref_id="CVE-2021-39251" ref_url="https://www.suse.com/security/cve/CVE-2021-39251/" source="CVE"/>
		<reference ref_id="CVE-2021-39252" ref_url="https://www.suse.com/security/cve/CVE-2021-39252/" source="CVE"/>
		<reference ref_id="CVE-2021-39253" ref_url="https://www.suse.com/security/cve/CVE-2021-39253/" source="CVE"/>
		<reference ref_id="CVE-2021-39255" ref_url="https://www.suse.com/security/cve/CVE-2021-39255/" source="CVE"/>
		<reference ref_id="CVE-2021-39256" ref_url="https://www.suse.com/security/cve/CVE-2021-39256/" source="CVE"/>
		<reference ref_id="CVE-2021-39257" ref_url="https://www.suse.com/security/cve/CVE-2021-39257/" source="CVE"/>
		<reference ref_id="CVE-2021-39258" ref_url="https://www.suse.com/security/cve/CVE-2021-39258/" source="CVE"/>
		<reference ref_id="CVE-2021-39259" ref_url="https://www.suse.com/security/cve/CVE-2021-39259/" source="CVE"/>
		<reference ref_id="CVE-2021-39260" ref_url="https://www.suse.com/security/cve/CVE-2021-39260/" source="CVE"/>
		<reference ref_id="CVE-2021-39261" ref_url="https://www.suse.com/security/cve/CVE-2021-39261/" source="CVE"/>
		<reference ref_id="CVE-2021-39262" ref_url="https://www.suse.com/security/cve/CVE-2021-39262/" source="CVE"/>
		<reference ref_id="CVE-2021-39263" ref_url="https://www.suse.com/security/cve/CVE-2021-39263/" source="CVE"/>
		<reference ref_id="CVE-2021-46790" ref_url="https://www.suse.com/security/cve/CVE-2021-46790/" source="CVE"/>
		<reference ref_id="CVE-2022-30783" ref_url="https://www.suse.com/security/cve/CVE-2022-30783/" source="CVE"/>
		<reference ref_id="CVE-2022-30784" ref_url="https://www.suse.com/security/cve/CVE-2022-30784/" source="CVE"/>
		<reference ref_id="CVE-2022-30785" ref_url="https://www.suse.com/security/cve/CVE-2022-30785/" source="CVE"/>
		<reference ref_id="CVE-2022-30786" ref_url="https://www.suse.com/security/cve/CVE-2022-30786/" source="CVE"/>
		<reference ref_id="CVE-2022-30787" ref_url="https://www.suse.com/security/cve/CVE-2022-30787/" source="CVE"/>
		<reference ref_id="CVE-2022-30788" ref_url="https://www.suse.com/security/cve/CVE-2022-30788/" source="CVE"/>
		<reference ref_id="CVE-2022-30789" ref_url="https://www.suse.com/security/cve/CVE-2022-30789/" source="CVE"/>
		<reference ref_id="CVE-2022-40284" ref_url="https://www.suse.com/security/cve/CVE-2022-40284/" source="CVE"/>
		<reference ref_id="CVE-2023-52890" ref_url="https://www.suse.com/security/cve/CVE-2023-52890/" source="CVE"/>
		<description>
These are all security issues fixed in the libntfs-3g-devel-2022.10.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9755">CVE-2019-9755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33285/">CVE-2021-33285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33285">CVE-2021-33285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33286/">CVE-2021-33286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33286">CVE-2021-33286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33287/">CVE-2021-33287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33287">CVE-2021-33287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33289/">CVE-2021-33289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33289">CVE-2021-33289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35266/">CVE-2021-35266 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35266">CVE-2021-35266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35267/">CVE-2021-35267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35267">CVE-2021-35267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35268/">CVE-2021-35268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35268">CVE-2021-35268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35269/">CVE-2021-35269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35269">CVE-2021-35269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39251/">CVE-2021-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39251">CVE-2021-39251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39252/">CVE-2021-39252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39252">CVE-2021-39252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39253/">CVE-2021-39253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39253">CVE-2021-39253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39255/">CVE-2021-39255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39255">CVE-2021-39255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39256/">CVE-2021-39256 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39256">CVE-2021-39256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39257/">CVE-2021-39257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39257">CVE-2021-39257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39258/">CVE-2021-39258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39258">CVE-2021-39258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39259/">CVE-2021-39259 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39259">CVE-2021-39259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39260/">CVE-2021-39260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39260">CVE-2021-39260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39261/">CVE-2021-39261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39261">CVE-2021-39261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39262/">CVE-2021-39262 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39262">CVE-2021-39262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39263/">CVE-2021-39263 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39263">CVE-2021-39263 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46790/">CVE-2021-46790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46790">CVE-2021-46790 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30783/">CVE-2022-30783 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30783">CVE-2022-30783 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30784/">CVE-2022-30784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30784">CVE-2022-30784 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30785/">CVE-2022-30785 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30785">CVE-2022-30785 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30786/">CVE-2022-30786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30786">CVE-2022-30786 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30787/">CVE-2022-30787 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30787">CVE-2022-30787 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30788/">CVE-2022-30788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30788">CVE-2022-30788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30789/">CVE-2022-30789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30789">CVE-2022-30789 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40284/">CVE-2022-40284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40284">CVE-2022-40284 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52890/">CVE-2023-52890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52890">CVE-2023-52890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027976" comment="libntfs-3g-devel-2022.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027977" comment="libntfs-3g89-2022.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027978" comment="ntfs-3g-2022.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027979" comment="ntfsprogs-2022.10.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027980" comment="ntfsprogs-extra-2022.10.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94033" version="1" class="patch">
	<metadata>
		<title>libnutclient2-2.8.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libnutclient2-2.8.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2944">CVE-2012-2944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027981" comment="libnutclient2-2.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027982" comment="libnutclientstub1-2.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027983" comment="libnutscan2-2.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027984" comment="libupsclient6-2.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027985" comment="nut-2.8.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027986" comment="nut-drivers-net-2.8.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94034" version="1" class="patch">
	<metadata>
		<title>liboath-devel-2.6.11.12-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-7322" ref_url="https://www.suse.com/security/cve/CVE-2013-7322/" source="CVE"/>
		<reference ref_id="CVE-2024-47191" ref_url="https://www.suse.com/security/cve/CVE-2024-47191/" source="CVE"/>
		<description>
These are all security issues fixed in the liboath-devel-2.6.11.12-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7322/">CVE-2013-7322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7322">CVE-2013-7322 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47191/">CVE-2024-47191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47191">CVE-2024-47191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027987" comment="liboath-devel-2.6.11.12-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027988" comment="liboath0-2.6.11.12-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027989" comment="libpskc-devel-2.6.11.12-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027990" comment="libpskc0-2.6.11.12-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027991" comment="oath-toolkit-2.6.11.12-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027992" comment="oath-toolkit-xml-2.6.11.12-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027993" comment="pam_oath-2.6.11.12-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94035" version="1" class="patch">
	<metadata>
		<title>libodbc2-2.3.12-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<description>
These are all security issues fixed in the libodbc2-2.3.12-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1145">CVE-2011-1145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7409">CVE-2018-7409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7485">CVE-2018-7485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027994" comment="libodbc2-2.3.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027995" comment="unixODBC-2.3.12-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027996" comment="unixODBC-devel-2.3.12-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94036" version="1" class="patch">
	<metadata>
		<title>libonig5-6.9.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-13224" ref_url="https://www.suse.com/security/cve/CVE-2019-13224/" source="CVE"/>
		<reference ref_id="CVE-2019-13225" ref_url="https://www.suse.com/security/cve/CVE-2019-13225/" source="CVE"/>
		<reference ref_id="CVE-2019-19012" ref_url="https://www.suse.com/security/cve/CVE-2019-19012/" source="CVE"/>
		<reference ref_id="CVE-2019-19203" ref_url="https://www.suse.com/security/cve/CVE-2019-19203/" source="CVE"/>
		<reference ref_id="CVE-2019-19204" ref_url="https://www.suse.com/security/cve/CVE-2019-19204/" source="CVE"/>
		<reference ref_id="CVE-2019-19246" ref_url="https://www.suse.com/security/cve/CVE-2019-19246/" source="CVE"/>
		<reference ref_id="CVE-2020-26159" ref_url="https://www.suse.com/security/cve/CVE-2020-26159/" source="CVE"/>
		<description>
These are all security issues fixed in the libonig5-6.9.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13224/">CVE-2019-13224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13224">CVE-2019-13224 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13225/">CVE-2019-13225 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13225">CVE-2019-13225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19012/">CVE-2019-19012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-19012">CVE-2019-19012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19203/">CVE-2019-19203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19203">CVE-2019-19203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19204/">CVE-2019-19204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19204">CVE-2019-19204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19246/">CVE-2019-19246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19246">CVE-2019-19246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26159/">CVE-2020-26159 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26159">CVE-2020-26159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027997" comment="libonig5-6.9.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010027998" comment="oniguruma-devel-6.9.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94037" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.5.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-10504" ref_url="https://www.suse.com/security/cve/CVE-2016-10504/" source="CVE"/>
		<reference ref_id="CVE-2016-10505" ref_url="https://www.suse.com/security/cve/CVE-2016-10505/" source="CVE"/>
		<reference ref_id="CVE-2016-10506" ref_url="https://www.suse.com/security/cve/CVE-2016-10506/" source="CVE"/>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5152" ref_url="https://www.suse.com/security/cve/CVE-2016-5152/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2017-12982" ref_url="https://www.suse.com/security/cve/CVE-2017-12982/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14151" ref_url="https://www.suse.com/security/cve/CVE-2017-14151/" source="CVE"/>
		<reference ref_id="CVE-2017-14152" ref_url="https://www.suse.com/security/cve/CVE-2017-14152/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-18088" ref_url="https://www.suse.com/security/cve/CVE-2018-18088/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2018-7648" ref_url="https://www.suse.com/security/cve/CVE-2018-7648/" source="CVE"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27814" ref_url="https://www.suse.com/security/cve/CVE-2020-27814/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-27824" ref_url="https://www.suse.com/security/cve/CVE-2020-27824/" source="CVE"/>
		<reference ref_id="CVE-2020-27841" ref_url="https://www.suse.com/security/cve/CVE-2020-27841/" source="CVE"/>
		<reference ref_id="CVE-2020-27842" ref_url="https://www.suse.com/security/cve/CVE-2020-27842/" source="CVE"/>
		<reference ref_id="CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843/" source="CVE"/>
		<reference ref_id="CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2021-3575" ref_url="https://www.suse.com/security/cve/CVE-2021-3575/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="CVE-2024-56826" ref_url="https://www.suse.com/security/cve/CVE-2024-56826/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.5.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10504/">CVE-2016-10504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10504">CVE-2016-10504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10505/">CVE-2016-10505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10505">CVE-2016-10505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10506/">CVE-2016-10506 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10506">CVE-2016-10506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5139">CVE-2016-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5152/">CVE-2016-5152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5152">CVE-2016-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5158">CVE-2016-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5159">CVE-2016-5159 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7163">CVE-2016-7163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8332">CVE-2016-8332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12982/">CVE-2017-12982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12982">CVE-2017-12982 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14039">CVE-2017-14039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14040">CVE-2017-14040 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14041">CVE-2017-14041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14151/">CVE-2017-14151 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14151">CVE-2017-14151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14152/">CVE-2017-14152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14152">CVE-2017-14152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14164">CVE-2017-14164 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18088/">CVE-2018-18088 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18088">CVE-2018-18088 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21010">CVE-2018-21010 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5727">CVE-2018-5727 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5785">CVE-2018-5785 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6616">CVE-2018-6616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7648/">CVE-2018-7648 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7648">CVE-2018-7648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27814/">CVE-2020-27814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27814">CVE-2020-27814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27824/">CVE-2020-27824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27824">CVE-2020-27824 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27841/">CVE-2020-27841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27841">CVE-2020-27841 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27842/">CVE-2020-27842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27842">CVE-2020-27842 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27843">CVE-2020-27843 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27845">CVE-2020-27845 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6851">CVE-2020-6851 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3575/">CVE-2021-3575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3575">CVE-2021-3575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56826/">CVE-2024-56826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56826">CVE-2024-56826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010027999" comment="libopenjp2-7-2.5.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028000" comment="libopenjp2-7-x86-64-v3-2.5.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028001" comment="openjpeg2-2.5.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028002" comment="openjpeg2-devel-2.5.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028003" comment="openjpeg2-devel-doc-2.5.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94038" version="1" class="patch">
	<metadata>
		<title>libopenmpt0-0.7.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-11311" ref_url="https://www.suse.com/security/cve/CVE-2017-11311/" source="CVE"/>
		<reference ref_id="CVE-2018-10017" ref_url="https://www.suse.com/security/cve/CVE-2018-10017/" source="CVE"/>
		<reference ref_id="CVE-2018-11710" ref_url="https://www.suse.com/security/cve/CVE-2018-11710/" source="CVE"/>
		<reference ref_id="CVE-2018-20860" ref_url="https://www.suse.com/security/cve/CVE-2018-20860/" source="CVE"/>
		<reference ref_id="CVE-2018-20861" ref_url="https://www.suse.com/security/cve/CVE-2018-20861/" source="CVE"/>
		<reference ref_id="CVE-2019-14382" ref_url="https://www.suse.com/security/cve/CVE-2019-14382/" source="CVE"/>
		<reference ref_id="CVE-2019-14383" ref_url="https://www.suse.com/security/cve/CVE-2019-14383/" source="CVE"/>
		<reference ref_id="CVE-2019-17113" ref_url="https://www.suse.com/security/cve/CVE-2019-17113/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenmpt0-0.7.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11311/">CVE-2017-11311 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11311">CVE-2017-11311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10017/">CVE-2018-10017 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10017">CVE-2018-10017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11710/">CVE-2018-11710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11710">CVE-2018-11710 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20860/">CVE-2018-20860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20860">CVE-2018-20860 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20861/">CVE-2018-20861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20861">CVE-2018-20861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14382/">CVE-2019-14382 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14382">CVE-2019-14382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14383/">CVE-2019-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14383">CVE-2019-14383 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17113/">CVE-2019-17113 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17113">CVE-2019-17113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028004" comment="libopenmpt0-0.7.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028005" comment="openmpt123-0.7.13-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94039" version="1" class="patch">
	<metadata>
		<title>libopenssl-3-devel-3.5.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2021-4044" ref_url="https://www.suse.com/security/cve/CVE-2021-4044/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-1343" ref_url="https://www.suse.com/security/cve/CVE-2022-1343/" source="CVE"/>
		<reference ref_id="CVE-2022-1434" ref_url="https://www.suse.com/security/cve/CVE-2022-1434/" source="CVE"/>
		<reference ref_id="CVE-2022-1473" ref_url="https://www.suse.com/security/cve/CVE-2022-1473/" source="CVE"/>
		<reference ref_id="CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097/" source="CVE"/>
		<reference ref_id="CVE-2022-2274" ref_url="https://www.suse.com/security/cve/CVE-2022-2274/" source="CVE"/>
		<reference ref_id="CVE-2022-3358" ref_url="https://www.suse.com/security/cve/CVE-2022-3358/" source="CVE"/>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<reference ref_id="CVE-2022-3996" ref_url="https://www.suse.com/security/cve/CVE-2022-3996/" source="CVE"/>
		<reference ref_id="CVE-2022-4203" ref_url="https://www.suse.com/security/cve/CVE-2022-4203/" source="CVE"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0216" ref_url="https://www.suse.com/security/cve/CVE-2023-0216/" source="CVE"/>
		<reference ref_id="CVE-2023-0217" ref_url="https://www.suse.com/security/cve/CVE-2023-0217/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-0401" ref_url="https://www.suse.com/security/cve/CVE-2023-0401/" source="CVE"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<reference ref_id="CVE-2023-1255" ref_url="https://www.suse.com/security/cve/CVE-2023-1255/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="CVE-2023-2975" ref_url="https://www.suse.com/security/cve/CVE-2023-2975/" source="CVE"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="CVE-2023-4807" ref_url="https://www.suse.com/security/cve/CVE-2023-4807/" source="CVE"/>
		<reference ref_id="CVE-2023-50782" ref_url="https://www.suse.com/security/cve/CVE-2023-50782/" source="CVE"/>
		<reference ref_id="CVE-2023-5363" ref_url="https://www.suse.com/security/cve/CVE-2023-5363/" source="CVE"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129/" source="CVE"/>
		<reference ref_id="CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237/" source="CVE"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="CVE-2024-12797" ref_url="https://www.suse.com/security/cve/CVE-2024-12797/" source="CVE"/>
		<reference ref_id="CVE-2024-13176" ref_url="https://www.suse.com/security/cve/CVE-2024-13176/" source="CVE"/>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<reference ref_id="CVE-2024-41996" ref_url="https://www.suse.com/security/cve/CVE-2024-41996/" source="CVE"/>
		<reference ref_id="CVE-2024-4603" ref_url="https://www.suse.com/security/cve/CVE-2024-4603/" source="CVE"/>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="CVE-2024-6119" ref_url="https://www.suse.com/security/cve/CVE-2024-6119/" source="CVE"/>
		<reference ref_id="CVE-2024-9143" ref_url="https://www.suse.com/security/cve/CVE-2024-9143/" source="CVE"/>
		<reference ref_id="CVE-2025-27587" ref_url="https://www.suse.com/security/cve/CVE-2025-27587/" source="CVE"/>
		<reference ref_id="CVE-2025-4575" ref_url="https://www.suse.com/security/cve/CVE-2025-4575/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-3-devel-3.5.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4044/">CVE-2021-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1343/">CVE-2022-1343 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1434/">CVE-2022-1434 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1434">CVE-2022-1434 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1473/">CVE-2022-1473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2274/">CVE-2022-2274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2274">CVE-2022-2274 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3358/">CVE-2022-3358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3358">CVE-2022-3358 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3996/">CVE-2022-3996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3996">CVE-2022-3996 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4203/">CVE-2022-4203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0216/">CVE-2023-0216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0217/">CVE-2023-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0401/">CVE-2023-0401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1255/">CVE-2023-1255 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2975/">CVE-2023-2975 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4807/">CVE-2023-4807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4807">CVE-2023-4807 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50782/">CVE-2023-50782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5363/">CVE-2023-5363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12797/">CVE-2024-12797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12797">CVE-2024-12797 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13176/">CVE-2024-13176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41996/">CVE-2024-41996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996">CVE-2024-41996 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4603/">CVE-2024-4603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6119/">CVE-2024-6119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9143/">CVE-2024-9143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9143">CVE-2024-9143 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27587/">CVE-2025-27587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27587">CVE-2025-27587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4575/">CVE-2025-4575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4575">CVE-2025-4575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028006" comment="libopenssl-3-devel-3.5.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028007" comment="libopenssl-3-fips-provider-3.5.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028008" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028009" comment="libopenssl3-3.5.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028010" comment="libopenssl3-x86-64-v3-3.5.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028011" comment="openssl-3-3.5.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028012" comment="openssl-3-doc-3.5.0-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94040" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-3.5.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-3.5.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2937">CVE-2006-2937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2940">CVE-2006-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3738">CVE-2006-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4343">CVE-2006-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3108">CVE-2007-3108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4995">CVE-2007-4995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5135">CVE-2007-5135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0891">CVE-2008-0891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1672">CVE-2008-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0742">CVE-2010-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1633">CVE-2010-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3207">CVE-2011-3207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0027">CVE-2012-0027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2686">CVE-2012-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4353">CVE-2013-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6449">CVE-2013-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6450">CVE-2013-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">CVE-2014-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3511">CVE-2014-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3512">CVE-2014-3512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5139">CVE-2014-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1794">CVE-2015-1794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0701">CVE-2016-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028013" comment="libopenssl-devel-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028014" comment="libopenssl-fips-provider-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028015" comment="openssl-3.5.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94041" version="1" class="patch">
	<metadata>
		<title>libopenvswitch-3_5-0-3.5.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-3449" ref_url="https://www.suse.com/security/cve/CVE-2012-3449/" source="CVE"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="CVE-2021-36980" ref_url="https://www.suse.com/security/cve/CVE-2021-36980/" source="CVE"/>
		<reference ref_id="CVE-2022-4337" ref_url="https://www.suse.com/security/cve/CVE-2022-4337/" source="CVE"/>
		<reference ref_id="CVE-2022-4338" ref_url="https://www.suse.com/security/cve/CVE-2022-4338/" source="CVE"/>
		<reference ref_id="CVE-2023-1668" ref_url="https://www.suse.com/security/cve/CVE-2023-1668/" source="CVE"/>
		<reference ref_id="CVE-2023-3152" ref_url="https://www.suse.com/security/cve/CVE-2023-3152/" source="CVE"/>
		<reference ref_id="CVE-2023-3153" ref_url="https://www.suse.com/security/cve/CVE-2023-3153/" source="CVE"/>
		<reference ref_id="CVE-2023-3966" ref_url="https://www.suse.com/security/cve/CVE-2023-3966/" source="CVE"/>
		<reference ref_id="CVE-2023-5366" ref_url="https://www.suse.com/security/cve/CVE-2023-5366/" source="CVE"/>
		<reference ref_id="CVE-2025-0650" ref_url="https://www.suse.com/security/cve/CVE-2025-0650/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenvswitch-3_5-0-3.5.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3449/">CVE-2012-3449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3449">CVE-2012-3449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35498">CVE-2020-35498 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36980/">CVE-2021-36980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36980">CVE-2021-36980 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4337/">CVE-2022-4337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4337">CVE-2022-4337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4338/">CVE-2022-4338 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4338">CVE-2022-4338 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1668/">CVE-2023-1668 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1668">CVE-2023-1668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3152/">CVE-2023-3152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3152">CVE-2023-3152 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3153/">CVE-2023-3153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3153">CVE-2023-3153 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3966/">CVE-2023-3966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3966">CVE-2023-3966 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5366/">CVE-2023-5366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5366">CVE-2023-5366 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0650/">CVE-2025-0650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0650">CVE-2025-0650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028016" comment="libopenvswitch-3_5-0-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028017" comment="libovn-25_03-0-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028018" comment="openvswitch-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028019" comment="openvswitch-devel-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028020" comment="openvswitch-doc-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028021" comment="openvswitch-ipsec-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028022" comment="openvswitch-pki-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028023" comment="openvswitch-vtep-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028024" comment="ovn-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028025" comment="ovn-central-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028026" comment="ovn-devel-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028027" comment="ovn-doc-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028028" comment="ovn-docker-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028029" comment="ovn-host-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028030" comment="ovn-vtep-25.03.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028031" comment="python3-openvswitch-3.5.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94042" version="1" class="patch">
	<metadata>
		<title>libopus0-1.5.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus0-1.5.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0381">CVE-2017-0381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028032" comment="libopus0-1.5.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94043" version="1" class="patch">
	<metadata>
		<title>liboqs-devel-0.13.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-36405" ref_url="https://www.suse.com/security/cve/CVE-2024-36405/" source="CVE"/>
		<reference ref_id="CVE-2024-54137" ref_url="https://www.suse.com/security/cve/CVE-2024-54137/" source="CVE"/>
		<description>
These are all security issues fixed in the liboqs-devel-0.13.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36405/">CVE-2024-36405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36405">CVE-2024-36405 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-54137/">CVE-2024-54137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54137">CVE-2024-54137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028033" comment="liboqs-devel-0.13.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028034" comment="liboqs7-0.13.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94044" version="1" class="patch">
	<metadata>
		<title>liborc-0_4-0-0.4.41-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897/" source="CVE"/>
		<description>
These are all security issues fixed in the liborc-0_4-0-0.4.41-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028035" comment="liborc-0_4-0-0.4.41-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028036" comment="orc-0.4.41-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028037" comment="orc-doc-0.4.41-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94045" version="1" class="patch">
	<metadata>
		<title>libosinfo-1.12.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
These are all security issues fixed in the libosinfo-1.12.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13313">CVE-2019-13313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028038" comment="libosinfo-1.12.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028039" comment="libosinfo-1_0-0-1.12.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028040" comment="typelib-1_0-Libosinfo-1_0-1.12.0-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94046" version="1" class="patch">
	<metadata>
		<title>libostree-1-1-2025.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-9862" ref_url="https://www.suse.com/security/cve/CVE-2014-9862/" source="CVE"/>
		<description>
These are all security issues fixed in the libostree-1-1-2025.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9862/">CVE-2014-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9862">CVE-2014-9862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028041" comment="libostree-2025.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028042" comment="libostree-1-1-2025.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028043" comment="libostree-devel-2025.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028044" comment="libostree-grub2-2025.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028045" comment="typelib-1_0-OSTree-1_0-2025.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94047" version="1" class="patch">
	<metadata>
		<title>libp11-kit0-0.25.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="CVE-2020-29362" ref_url="https://www.suse.com/security/cve/CVE-2020-29362/" source="CVE"/>
		<reference ref_id="CVE-2020-29363" ref_url="https://www.suse.com/security/cve/CVE-2020-29363/" source="CVE"/>
		<description>
These are all security issues fixed in the libp11-kit0-0.25.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29361">CVE-2020-29361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29362/">CVE-2020-29362 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29362">CVE-2020-29362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29363/">CVE-2020-29363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29363">CVE-2020-29363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028046" comment="libp11-kit0-0.25.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028047" comment="p11-kit-0.25.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028048" comment="p11-kit-devel-0.25.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028049" comment="p11-kit-nss-trust-0.25.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028050" comment="p11-kit-server-0.25.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028051" comment="p11-kit-tools-0.25.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94048" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.56.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<reference ref_id="CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.56.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0020">CVE-2011-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0064">CVE-2011-0064 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15120">CVE-2018-15120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028052" comment="libpango-1_0-0-1.56.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028053" comment="pango-devel-1.56.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028054" comment="pango-tools-1.56.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028055" comment="typelib-1_0-Pango-1_0-1.56.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94049" version="1" class="patch">
	<metadata>
		<title>libpcap-devel-1.10.5-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15161" ref_url="https://www.suse.com/security/cve/CVE-2019-15161/" source="CVE"/>
		<reference ref_id="CVE-2019-15162" ref_url="https://www.suse.com/security/cve/CVE-2019-15162/" source="CVE"/>
		<reference ref_id="CVE-2019-15163" ref_url="https://www.suse.com/security/cve/CVE-2019-15163/" source="CVE"/>
		<reference ref_id="CVE-2019-15164" ref_url="https://www.suse.com/security/cve/CVE-2019-15164/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="CVE-2023-7256" ref_url="https://www.suse.com/security/cve/CVE-2023-7256/" source="CVE"/>
		<reference ref_id="CVE-2024-8006" ref_url="https://www.suse.com/security/cve/CVE-2024-8006/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcap-devel-1.10.5-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15161/">CVE-2019-15161 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15161">CVE-2019-15161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15162/">CVE-2019-15162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15162">CVE-2019-15162 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15163/">CVE-2019-15163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15163">CVE-2019-15163 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15164/">CVE-2019-15164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15164">CVE-2019-15164 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7256/">CVE-2023-7256 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7256">CVE-2023-7256 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8006/">CVE-2024-8006 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8006">CVE-2024-8006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028056" comment="libpcap-devel-1.10.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028057" comment="libpcap1-1.10.5-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94050" version="1" class="patch">
	<metadata>
		<title>libpcp-devel-6.2.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<reference ref_id="CVE-2012-5530" ref_url="https://www.suse.com/security/cve/CVE-2012-5530/" source="CVE"/>
		<reference ref_id="CVE-2019-3695" ref_url="https://www.suse.com/security/cve/CVE-2019-3695/" source="CVE"/>
		<reference ref_id="CVE-2019-3696" ref_url="https://www.suse.com/security/cve/CVE-2019-3696/" source="CVE"/>
		<reference ref_id="CVE-2023-6917" ref_url="https://www.suse.com/security/cve/CVE-2023-6917/" source="CVE"/>
		<reference ref_id="CVE-2024-3019" ref_url="https://www.suse.com/security/cve/CVE-2024-3019/" source="CVE"/>
		<reference ref_id="CVE-2024-45769" ref_url="https://www.suse.com/security/cve/CVE-2024-45769/" source="CVE"/>
		<reference ref_id="CVE-2024-45770" ref_url="https://www.suse.com/security/cve/CVE-2024-45770/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcp-devel-6.2.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3418">CVE-2012-3418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3419">CVE-2012-3419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3420">CVE-2012-3420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3421">CVE-2012-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5530/">CVE-2012-5530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5530">CVE-2012-5530 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3695/">CVE-2019-3695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3695">CVE-2019-3695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3696/">CVE-2019-3696 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3696">CVE-2019-3696 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6917/">CVE-2023-6917 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6917">CVE-2023-6917 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3019/">CVE-2024-3019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3019">CVE-2024-3019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45769/">CVE-2024-45769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45769">CVE-2024-45769 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45770/">CVE-2024-45770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45770">CVE-2024-45770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028058" comment="libpcp-devel-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028059" comment="libpcp3-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028060" comment="libpcp_gui2-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028061" comment="libpcp_import1-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028062" comment="libpcp_mmv1-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028063" comment="libpcp_trace2-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028064" comment="libpcp_web1-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028065" comment="pcp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028066" comment="pcp-conf-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028067" comment="pcp-devel-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028068" comment="pcp-doc-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028069" comment="pcp-export-pcp2elasticsearch-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028070" comment="pcp-export-pcp2graphite-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028071" comment="pcp-export-pcp2influxdb-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028072" comment="pcp-export-pcp2json-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028073" comment="pcp-export-pcp2spark-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028074" comment="pcp-export-pcp2xml-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028075" comment="pcp-export-pcp2zabbix-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028076" comment="pcp-import-collectl2pcp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028077" comment="pcp-import-ganglia2pcp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028078" comment="pcp-import-iostat2pcp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028079" comment="pcp-import-mrtg2pcp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028080" comment="pcp-import-sar2pcp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028081" comment="pcp-pmda-activemq-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028082" comment="pcp-pmda-apache-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028083" comment="pcp-pmda-bash-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028084" comment="pcp-pmda-bonding-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028085" comment="pcp-pmda-cifs-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028086" comment="pcp-pmda-cisco-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028087" comment="pcp-pmda-dbping-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028088" comment="pcp-pmda-dm-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028089" comment="pcp-pmda-docker-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028090" comment="pcp-pmda-ds389-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028091" comment="pcp-pmda-ds389log-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028092" comment="pcp-pmda-elasticsearch-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028093" comment="pcp-pmda-gfs2-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028094" comment="pcp-pmda-gpfs-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028095" comment="pcp-pmda-gpsd-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028096" comment="pcp-pmda-hacluster-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028097" comment="pcp-pmda-haproxy-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028098" comment="pcp-pmda-infiniband-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028099" comment="pcp-pmda-json-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028100" comment="pcp-pmda-lio-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028101" comment="pcp-pmda-lmsensors-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028102" comment="pcp-pmda-logger-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028103" comment="pcp-pmda-lustre-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028104" comment="pcp-pmda-lustrecomm-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028105" comment="pcp-pmda-mailq-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028106" comment="pcp-pmda-memcache-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028107" comment="pcp-pmda-mic-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028108" comment="pcp-pmda-mounts-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028109" comment="pcp-pmda-mysql-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028110" comment="pcp-pmda-named-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028111" comment="pcp-pmda-netcheck-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028112" comment="pcp-pmda-netfilter-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028113" comment="pcp-pmda-news-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028114" comment="pcp-pmda-nfsclient-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028115" comment="pcp-pmda-nginx-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028116" comment="pcp-pmda-nutcracker-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028117" comment="pcp-pmda-nvidia-gpu-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028118" comment="pcp-pmda-openmetrics-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028119" comment="pcp-pmda-openvswitch-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028120" comment="pcp-pmda-oracle-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028121" comment="pcp-pmda-pdns-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028122" comment="pcp-pmda-perfevent-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028123" comment="pcp-pmda-postfix-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028124" comment="pcp-pmda-rabbitmq-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028125" comment="pcp-pmda-redis-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028126" comment="pcp-pmda-resctrl-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028127" comment="pcp-pmda-roomtemp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028128" comment="pcp-pmda-rsyslog-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028129" comment="pcp-pmda-samba-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028130" comment="pcp-pmda-sendmail-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028131" comment="pcp-pmda-shping-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028132" comment="pcp-pmda-slurm-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028133" comment="pcp-pmda-smart-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028134" comment="pcp-pmda-snmp-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028135" comment="pcp-pmda-sockets-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028136" comment="pcp-pmda-summary-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028137" comment="pcp-pmda-systemd-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028138" comment="pcp-pmda-trace-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028139" comment="pcp-pmda-unbound-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028140" comment="pcp-pmda-weblog-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028141" comment="pcp-pmda-zimbra-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028142" comment="pcp-pmda-zswap-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028143" comment="pcp-selinux-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028144" comment="pcp-system-tools-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028145" comment="pcp-zeroconf-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028146" comment="perl-PCP-LogImport-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028147" comment="perl-PCP-LogSummary-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028148" comment="perl-PCP-MMV-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028149" comment="perl-PCP-PMDA-6.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028150" comment="python3-pcp-6.2.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94051" version="1" class="patch">
	<metadata>
		<title>libpcre1-8.45-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-8.45-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3217">CVE-2015-3217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1283">CVE-2016-1283 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028151" comment="libpcre1-8.45-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94052" version="1" class="patch">
	<metadata>
		<title>libpcre2-16-0-10.45-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-8786" ref_url="https://www.suse.com/security/cve/CVE-2017-8786/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre2-16-0-10.45-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8786/">CVE-2017-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8786">CVE-2017-8786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028152" comment="libpcre2-16-0-10.45-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028153" comment="libpcre2-32-0-10.45-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028154" comment="libpcre2-8-0-10.45-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028155" comment="libpcre2-posix3-10.45-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028156" comment="pcre2-devel-10.45-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028157" comment="pcre2-devel-static-10.45-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028158" comment="pcre2-doc-10.45-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028159" comment="pcre2-tools-10.45-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94053" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-2.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-2.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4531">CVE-2010-4531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10109">CVE-2016-10109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028160" comment="libpcsclite1-2.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028161" comment="libpcscspy0-2.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028162" comment="pcsc-lite-2.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028163" comment="pcsc-lite-devel-2.0.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94054" version="1" class="patch">
	<metadata>
		<title>libpixman-1-0-0.43.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
These are all security issues fixed in the libpixman-1-0-0.43.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028164" comment="libpixman-1-0-0.43.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028165" comment="libpixman-1-0-devel-0.43.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94055" version="1" class="patch">
	<metadata>
		<title>libpkgconf-devel-2.2.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000221" ref_url="https://www.suse.com/security/cve/CVE-2018-1000221/" source="CVE"/>
		<reference ref_id="CVE-2023-24056" ref_url="https://www.suse.com/security/cve/CVE-2023-24056/" source="CVE"/>
		<description>
These are all security issues fixed in the libpkgconf-devel-2.2.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000221/">CVE-2018-1000221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000221">CVE-2018-1000221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24056/">CVE-2023-24056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24056">CVE-2023-24056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028166" comment="libpkgconf-devel-2.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028167" comment="libpkgconf5-2.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028168" comment="pkgconf-2.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028169" comment="pkgconf-m4-2.2.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028170" comment="pkgconf-pkg-config-2.2.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94056" version="1" class="patch">
	<metadata>
		<title>libplist++-2_0-4-2.6.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<description>
These are all security issues fixed in the libplist++-2_0-4-2.6.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5209">CVE-2017-5209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5545">CVE-2017-5545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5834">CVE-2017-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5835">CVE-2017-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5836">CVE-2017-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6435">CVE-2017-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6436">CVE-2017-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6437">CVE-2017-6437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6438">CVE-2017-6438 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6439">CVE-2017-6439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6440">CVE-2017-6440 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7982">CVE-2017-7982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028171" comment="libplist++-2_0-4-2.6.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028172" comment="libplist-2_0-4-2.6.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94057" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.44-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="CVE-2016-5735" ref_url="https://www.suse.com/security/cve/CVE-2016-5735/" source="CVE"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-14048" ref_url="https://www.suse.com/security/cve/CVE-2018-14048/" source="CVE"/>
		<reference ref_id="CVE-2018-14550" ref_url="https://www.suse.com/security/cve/CVE-2018-14550/" source="CVE"/>
		<reference ref_id="CVE-2019-6129" ref_url="https://www.suse.com/security/cve/CVE-2019-6129/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.44-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5793">CVE-2006-5793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3964">CVE-2008-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3328">CVE-2011-3328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0333">CVE-2014-0333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5735/">CVE-2016-5735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5735">CVE-2016-5735 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14048/">CVE-2018-14048 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14048">CVE-2018-14048 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14550/">CVE-2018-14550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14550">CVE-2018-14550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6129/">CVE-2019-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6129">CVE-2019-6129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028173" comment="libpng16-16-1.6.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028174" comment="libpng16-16-x86-64-v3-1.6.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028175" comment="libpng16-compat-devel-1.6.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028176" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028177" comment="libpng16-devel-1.6.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028178" comment="libpng16-devel-x86-64-v3-1.6.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028179" comment="libpng16-tools-1.6.44-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94058" version="1" class="patch">
	<metadata>
		<title>libpolkit-agent-1-0-123-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115/" source="CVE"/>
		<reference ref_id="CVE-2025-7519" ref_url="https://www.suse.com/security/cve/CVE-2025-7519/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit-agent-1-0-123-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0750">CVE-2010-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1485">CVE-2011-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3218">CVE-2015-3218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3255">CVE-2015-3255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3256">CVE-2015-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4625">CVE-2015-4625 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7519/">CVE-2025-7519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7519">CVE-2025-7519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028180" comment="libpolkit-agent-1-0-123-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028181" comment="libpolkit-gobject-1-0-123-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028182" comment="pkexec-123-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028183" comment="polkit-123-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028184" comment="polkit-devel-123-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028185" comment="polkit-doc-123-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028186" comment="typelib-1_0-Polkit-1_0-123-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94059" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp2-25.04.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-0301" ref_url="https://www.suse.com/security/cve/CVE-2006-0301/" source="CVE"/>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<reference ref_id="CVE-2022-38784" ref_url="https://www.suse.com/security/cve/CVE-2022-38784/" source="CVE"/>
		<reference ref_id="CVE-2024-56378" ref_url="https://www.suse.com/security/cve/CVE-2024-56378/" source="CVE"/>
		<reference ref_id="CVE-2024-6239" ref_url="https://www.suse.com/security/cve/CVE-2024-6239/" source="CVE"/>
		<reference ref_id="CVE-2025-32364" ref_url="https://www.suse.com/security/cve/CVE-2025-32364/" source="CVE"/>
		<reference ref_id="CVE-2025-32365" ref_url="https://www.suse.com/security/cve/CVE-2025-32365/" source="CVE"/>
		<reference ref_id="CVE-2025-52886" ref_url="https://www.suse.com/security/cve/CVE-2025-52886/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp2-25.04.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0301/">CVE-2006-0301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0301">CVE-2006-0301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0104">CVE-2007-0104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4352">CVE-2007-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5392">CVE-2007-5392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5393">CVE-2007-5393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2950">CVE-2008-2950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1187">CVE-2009-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1188">CVE-2009-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1788">CVE-2013-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1789">CVE-2013-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1790">CVE-2013-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4473">CVE-2013-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4474">CVE-2013-4474 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14517">CVE-2017-14517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14518">CVE-2017-14518 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7511">CVE-2017-7511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7515">CVE-2017-7515 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38784/">CVE-2022-38784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38784">CVE-2022-38784 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56378/">CVE-2024-56378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56378">CVE-2024-56378 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6239/">CVE-2024-6239 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6239">CVE-2024-6239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32364/">CVE-2025-32364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32364">CVE-2025-32364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32365/">CVE-2025-32365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32365">CVE-2025-32365 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52886/">CVE-2025-52886 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52886">CVE-2025-52886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028187" comment="libpoppler-cpp2-25.04.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028188" comment="libpoppler-devel-25.04.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028189" comment="libpoppler-glib8-25.04.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028190" comment="libpoppler-qt6-3-25.04.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028191" comment="libpoppler-qt6-devel-25.04.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028192" comment="libpoppler148-25.04.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028193" comment="poppler-tools-25.04.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028194" comment="typelib-1_0-Poppler-0_18-25.04.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94060" version="1" class="patch">
	<metadata>
		<title>libproc2-1-4.0.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<description>
These are all security issues fixed in the libproc2-1-4.0.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028195" comment="libproc2-1-4.0.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028196" comment="procps-4.0.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028197" comment="procps-devel-4.0.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028198" comment="procps-lang-4.0.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94061" version="1" class="patch">
	<metadata>
		<title>libprotobuf-c1-1.5.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-33070" ref_url="https://www.suse.com/security/cve/CVE-2022-33070/" source="CVE"/>
		<reference ref_id="CVE-2022-48468" ref_url="https://www.suse.com/security/cve/CVE-2022-48468/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-c1-1.5.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-33070/">CVE-2022-33070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33070">CVE-2022-33070 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48468/">CVE-2022-48468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48468">CVE-2022-48468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028199" comment="libprotobuf-c1-1.5.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94062" version="1" class="patch">
	<metadata>
		<title>libproxy-devel-0.5.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy-devel-0.5.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4504">CVE-2012-4504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028200" comment="libproxy-devel-0.5.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028201" comment="libproxy-tools-0.5.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028202" comment="libproxy1-0.5.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028203" comment="libpxbackend-1_0-0.5.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94063" version="1" class="patch">
	<metadata>
		<title>libpulse-devel-17.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-devel-17.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0008">CVE-2008-0008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3970">CVE-2014-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028204" comment="libpulse-devel-17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028205" comment="libpulse-mainloop-glib0-17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028206" comment="libpulse0-17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028207" comment="pulseaudio-bash-completion-17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028208" comment="pulseaudio-setup-17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028209" comment="pulseaudio-utils-17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028210" comment="pulseaudio-zsh-completion-17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028211" comment="system-user-pulse-17.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94064" version="1" class="patch">
	<metadata>
		<title>libpython3_13-1_0-3.13.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523/" source="CVE"/>
		<reference ref_id="CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<reference ref_id="CVE-2022-4303" ref_url="https://www.suse.com/security/cve/CVE-2022-4303/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254/" source="CVE"/>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2024-4030" ref_url="https://www.suse.com/security/cve/CVE-2024-4030/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<reference ref_id="CVE-2025-1795" ref_url="https://www.suse.com/security/cve/CVE-2025-1795/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_13-1_0-3.13.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15523">CVE-2020-15523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15801">CVE-2020-15801 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4303/">CVE-2022-4303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4303">CVE-2022-4303 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4030/">CVE-2024-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4030">CVE-2024-4030 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-1795/">CVE-2025-1795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1795">CVE-2025-1795 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028212" comment="libpython3_13-1_0-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028213" comment="libpython3_13-1_0-x86-64-v3-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028214" comment="python313-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028215" comment="python313-base-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028216" comment="python313-base-x86-64-v3-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028217" comment="python313-curses-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028218" comment="python313-dbm-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028219" comment="python313-devel-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028220" comment="python313-doc-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028221" comment="python313-doc-devhelp-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028222" comment="python313-idle-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028223" comment="python313-tk-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028224" comment="python313-tools-3.13.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028225" comment="python313-x86-64-v3-3.13.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94065" version="1" class="patch">
	<metadata>
		<title>libqb-devel-2.0.8+20230721.002171b-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-12779" ref_url="https://www.suse.com/security/cve/CVE-2019-12779/" source="CVE"/>
		<reference ref_id="CVE-2023-39976" ref_url="https://www.suse.com/security/cve/CVE-2023-39976/" source="CVE"/>
		<description>
These are all security issues fixed in the libqb-devel-2.0.8+20230721.002171b-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12779/">CVE-2019-12779 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12779">CVE-2019-12779 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39976/">CVE-2023-39976 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39976">CVE-2023-39976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028226" comment="libqb-devel-2.0.8+20230721.002171b-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028227" comment="libqb-tools-2.0.8+20230721.002171b-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028228" comment="libqb100-2.0.8+20230721.002171b-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94066" version="1" class="patch">
	<metadata>
		<title>libqpdf29-11.10.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<description>
These are all security issues fixed in the libqpdf29-11.10.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11624">CVE-2017-11624 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11625">CVE-2017-11625 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11626">CVE-2017-11626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11627">CVE-2017-11627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12595">CVE-2017-12595 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9208">CVE-2017-9208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9209">CVE-2017-9209 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9210">CVE-2017-9210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028229" comment="libqpdf29-11.10.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94067" version="1" class="patch">
	<metadata>
		<title>libquicktime0-1.2.4+git20180804.fff99cd-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<description>
These are all security issues fixed in the libquicktime0-1.2.4+git20180804.fff99cd-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2399">CVE-2016-2399 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9122">CVE-2017-9122 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9123">CVE-2017-9123 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9124">CVE-2017-9124 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9125">CVE-2017-9125 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9126">CVE-2017-9126 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9127">CVE-2017-9127 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9128">CVE-2017-9128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028230" comment="libquicktime0-1.2.4+git20180804.fff99cd-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94068" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.16-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="CVE-2024-57822" ref_url="https://www.suse.com/security/cve/CVE-2024-57822/" source="CVE"/>
		<reference ref_id="CVE-2024-57823" ref_url="https://www.suse.com/security/cve/CVE-2024-57823/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.16-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0037">CVE-2012-0037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57822/">CVE-2024-57822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57822">CVE-2024-57822 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57823/">CVE-2024-57823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57823">CVE-2024-57823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028231" comment="libraptor2-0-2.0.16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028232" comment="raptor-2.0.16-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94069" version="1" class="patch">
	<metadata>
		<title>librav1e0_8-0.8.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-25023" ref_url="https://www.suse.com/security/cve/CVE-2018-25023/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the librav1e0_8-0.8.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-25023/">CVE-2018-25023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25023">CVE-2018-25023 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028233" comment="librav1e0_8-0.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028234" comment="rav1e-0.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028235" comment="zram-generator-1.2.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94070" version="1" class="patch">
	<metadata>
		<title>libraw-tools-0.21.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<reference ref_id="CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367/" source="CVE"/>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14265" ref_url="https://www.suse.com/security/cve/CVE-2017-14265/" source="CVE"/>
		<reference ref_id="CVE-2017-14348" ref_url="https://www.suse.com/security/cve/CVE-2017-14348/" source="CVE"/>
		<reference ref_id="CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886/" source="CVE"/>
		<reference ref_id="CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887/" source="CVE"/>
		<reference ref_id="CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890/" source="CVE"/>
		<reference ref_id="CVE-2017-6899" ref_url="https://www.suse.com/security/cve/CVE-2017-6899/" source="CVE"/>
		<reference ref_id="CVE-2018-10528" ref_url="https://www.suse.com/security/cve/CVE-2018-10528/" source="CVE"/>
		<reference ref_id="CVE-2018-10529" ref_url="https://www.suse.com/security/cve/CVE-2018-10529/" source="CVE"/>
		<reference ref_id="CVE-2018-20337" ref_url="https://www.suse.com/security/cve/CVE-2018-20337/" source="CVE"/>
		<reference ref_id="CVE-2018-20363" ref_url="https://www.suse.com/security/cve/CVE-2018-20363/" source="CVE"/>
		<reference ref_id="CVE-2018-20364" ref_url="https://www.suse.com/security/cve/CVE-2018-20364/" source="CVE"/>
		<reference ref_id="CVE-2018-20365" ref_url="https://www.suse.com/security/cve/CVE-2018-20365/" source="CVE"/>
		<reference ref_id="CVE-2018-5813" ref_url="https://www.suse.com/security/cve/CVE-2018-5813/" source="CVE"/>
		<reference ref_id="CVE-2018-5815" ref_url="https://www.suse.com/security/cve/CVE-2018-5815/" source="CVE"/>
		<reference ref_id="CVE-2018-5816" ref_url="https://www.suse.com/security/cve/CVE-2018-5816/" source="CVE"/>
		<reference ref_id="CVE-2018-5817" ref_url="https://www.suse.com/security/cve/CVE-2018-5817/" source="CVE"/>
		<reference ref_id="CVE-2018-5818" ref_url="https://www.suse.com/security/cve/CVE-2018-5818/" source="CVE"/>
		<reference ref_id="CVE-2018-5819" ref_url="https://www.suse.com/security/cve/CVE-2018-5819/" source="CVE"/>
		<reference ref_id="CVE-2020-15503" ref_url="https://www.suse.com/security/cve/CVE-2020-15503/" source="CVE"/>
		<reference ref_id="CVE-2020-22628" ref_url="https://www.suse.com/security/cve/CVE-2020-22628/" source="CVE"/>
		<reference ref_id="CVE-2021-32142" ref_url="https://www.suse.com/security/cve/CVE-2021-32142/" source="CVE"/>
		<reference ref_id="CVE-2023-1729" ref_url="https://www.suse.com/security/cve/CVE-2023-1729/" source="CVE"/>
		<reference ref_id="CVE-2025-43961" ref_url="https://www.suse.com/security/cve/CVE-2025-43961/" source="CVE"/>
		<reference ref_id="CVE-2025-43962" ref_url="https://www.suse.com/security/cve/CVE-2025-43962/" source="CVE"/>
		<reference ref_id="CVE-2025-43963" ref_url="https://www.suse.com/security/cve/CVE-2025-43963/" source="CVE"/>
		<reference ref_id="CVE-2025-43964" ref_url="https://www.suse.com/security/cve/CVE-2025-43964/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw-tools-0.21.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2126">CVE-2013-2126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2127">CVE-2013-2127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8367">CVE-2015-8367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13735">CVE-2017-13735 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14265/">CVE-2017-14265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14265">CVE-2017-14265 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14348/">CVE-2017-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14348">CVE-2017-14348 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6886">CVE-2017-6886 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6887">CVE-2017-6887 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6890">CVE-2017-6890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6899/">CVE-2017-6899 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6899">CVE-2017-6899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10528/">CVE-2018-10528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10528">CVE-2018-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10529/">CVE-2018-10529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10529">CVE-2018-10529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20337/">CVE-2018-20337 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20337">CVE-2018-20337 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20363/">CVE-2018-20363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20363">CVE-2018-20363 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20364/">CVE-2018-20364 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20364">CVE-2018-20364 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20365/">CVE-2018-20365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20365">CVE-2018-20365 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5813/">CVE-2018-5813 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5813">CVE-2018-5813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5815/">CVE-2018-5815 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5815">CVE-2018-5815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5816/">CVE-2018-5816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5816">CVE-2018-5816 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5817/">CVE-2018-5817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5817">CVE-2018-5817 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5818/">CVE-2018-5818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5818">CVE-2018-5818 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5819/">CVE-2018-5819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5819">CVE-2018-5819 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15503/">CVE-2020-15503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15503">CVE-2020-15503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22628/">CVE-2020-22628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22628">CVE-2020-22628 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-32142/">CVE-2021-32142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32142">CVE-2021-32142 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1729/">CVE-2023-1729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1729">CVE-2023-1729 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43961/">CVE-2025-43961 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43961">CVE-2025-43961 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43962/">CVE-2025-43962 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43962">CVE-2025-43962 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43963/">CVE-2025-43963 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43963">CVE-2025-43963 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43964/">CVE-2025-43964 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-43964">CVE-2025-43964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028236" comment="libraw-tools-0.21.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028237" comment="libraw23-0.21.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94071" version="1" class="patch">
	<metadata>
		<title>librelp0-1.11.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<description>
These are all security issues fixed in the librelp0-1.11.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028238" comment="librelp0-1.11.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94072" version="1" class="patch">
	<metadata>
		<title>librepo-devel-1.19.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-14352" ref_url="https://www.suse.com/security/cve/CVE-2020-14352/" source="CVE"/>
		<description>
These are all security issues fixed in the librepo-devel-1.19.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14352/">CVE-2020-14352 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14352">CVE-2020-14352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028239" comment="librepo-devel-1.19.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028240" comment="librepo0-1.19.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028241" comment="python3-librepo-1.19.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94073" version="1" class="patch">
	<metadata>
		<title>librpmbuild10-4.20.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<reference ref_id="CVE-2021-3521" ref_url="https://www.suse.com/security/cve/CVE-2021-3521/" source="CVE"/>
		<reference ref_id="CVE-2021-35938" ref_url="https://www.suse.com/security/cve/CVE-2021-35938/" source="CVE"/>
		<reference ref_id="CVE-2021-35939" ref_url="https://www.suse.com/security/cve/CVE-2021-35939/" source="CVE"/>
		<description>
These are all security issues fixed in the librpmbuild10-4.20.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3521/">CVE-2021-3521 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35938/">CVE-2021-35938 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35938">CVE-2021-35938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35939/">CVE-2021-35939 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35939">CVE-2021-35939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028242" comment="librpmbuild10-4.20.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028243" comment="rpm-4.20.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028244" comment="rpm-build-4.20.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028245" comment="rpm-devel-4.20.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94074" version="1" class="patch">
	<metadata>
		<title>librrd8-1.9.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<description>
These are all security issues fixed in the librrd8-1.9.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2131">CVE-2013-2131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028246" comment="librrd8-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028247" comment="lua-rrdtool-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028248" comment="perl-rrdtool-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028249" comment="python3-rrdtool-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028250" comment="rrdtool-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028251" comment="rrdtool-cached-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028252" comment="rrdtool-devel-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028253" comment="rrdtool-doc-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028254" comment="ruby-rrdtool-1.9.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028255" comment="tcl-rrdtool-1.9.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94075" version="1" class="patch">
	<metadata>
		<title>libruby3_4-3_4-3.4.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby3_4-3_4-3.4.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028256" comment="libruby3_4-3_4-3.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028257" comment="ruby3.4-3.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028258" comment="ruby3.4-devel-3.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028259" comment="ruby3.4-devel-extra-3.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028260" comment="ruby3.4-doc-3.4.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028261" comment="ruby3.4-doc-ri-3.4.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94076" version="1" class="patch">
	<metadata>
		<title>libsaml13-3.3.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-16853" ref_url="https://www.suse.com/security/cve/CVE-2017-16853/" source="CVE"/>
		<reference ref_id="CVE-2025-31335" ref_url="https://www.suse.com/security/cve/CVE-2025-31335/" source="CVE"/>
		<description>
These are all security issues fixed in the libsaml13-3.3.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16853/">CVE-2017-16853 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16853">CVE-2017-16853 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-31335/">CVE-2025-31335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31335">CVE-2025-31335 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028262" comment="libsaml13-3.3.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028263" comment="opensaml-schemas-3.3.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94077" version="1" class="patch">
	<metadata>
		<title>libsamplerate-devel-0.2.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-devel-0.2.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5008">CVE-2008-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028264" comment="libsamplerate-devel-0.2.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028265" comment="libsamplerate0-0.2.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94078" version="1" class="patch">
	<metadata>
		<title>libseccomp-devel-2.6.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
These are all security issues fixed in the libseccomp-devel-2.6.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028266" comment="libseccomp-devel-2.6.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028267" comment="libseccomp-tools-2.6.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028268" comment="libseccomp2-2.6.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028269" comment="python3-seccomp-2.6.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94079" version="1" class="patch">
	<metadata>
		<title>libsepol-devel-3.8.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-36085" ref_url="https://www.suse.com/security/cve/CVE-2021-36085/" source="CVE"/>
		<reference ref_id="CVE-2021-36086" ref_url="https://www.suse.com/security/cve/CVE-2021-36086/" source="CVE"/>
		<reference ref_id="CVE-2021-36087" ref_url="https://www.suse.com/security/cve/CVE-2021-36087/" source="CVE"/>
		<description>
These are all security issues fixed in the libsepol-devel-3.8.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36085/">CVE-2021-36085 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36085">CVE-2021-36085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36086/">CVE-2021-36086 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36086">CVE-2021-36086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36087/">CVE-2021-36087 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36087">CVE-2021-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028270" comment="libsepol-devel-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028271" comment="libsepol-devel-static-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028272" comment="libsepol-utils-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028273" comment="libsepol2-3.8.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94080" version="1" class="patch">
	<metadata>
		<title>libsha1detectcoll-devel-1.0.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<description>
These are all security issues fixed in the libsha1detectcoll-devel-1.0.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2005-4900">CVE-2005-4900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028274" comment="libsha1detectcoll-devel-1.0.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028275" comment="libsha1detectcoll1-1.0.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028276" comment="sha1collisiondetection-1.0.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94081" version="1" class="patch">
	<metadata>
		<title>libsharpyuv0-1.5.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-8888" ref_url="https://www.suse.com/security/cve/CVE-2016-8888/" source="CVE"/>
		<reference ref_id="CVE-2016-9085" ref_url="https://www.suse.com/security/cve/CVE-2016-9085/" source="CVE"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
These are all security issues fixed in the libsharpyuv0-1.5.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8888/">CVE-2016-8888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8888">CVE-2016-8888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9085/">CVE-2016-9085 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9085">CVE-2016-9085 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028277" comment="libsharpyuv0-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028278" comment="libwebp-devel-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028279" comment="libwebp7-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028280" comment="libwebpdecoder3-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028281" comment="libwebpdemux2-1.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028282" comment="libwebpmux3-1.5.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94082" version="1" class="patch">
	<metadata>
		<title>libshibsp-lite12-3.5.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-16852" ref_url="https://www.suse.com/security/cve/CVE-2017-16852/" source="CVE"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<description>
These are all security issues fixed in the libshibsp-lite12-3.5.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16852/">CVE-2017-16852 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16852">CVE-2017-16852 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028283" comment="libshibsp-lite12-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028284" comment="libshibsp12-3.5.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028285" comment="shibboleth-sp-3.5.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94083" version="1" class="patch">
	<metadata>
		<title>libslirp-devel-4.8.0+2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<description>
These are all security issues fixed in the libslirp-devel-4.8.0+2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028286" comment="libslirp-devel-4.8.0+2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028287" comment="libslirp0-4.8.0+2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94084" version="1" class="patch">
	<metadata>
		<title>libslp1-2.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<description>
These are all security issues fixed in the libslp1-2.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4912">CVE-2016-4912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7567">CVE-2016-7567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028288" comment="libslp1-2.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028289" comment="openslp-2.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028290" comment="openslp-devel-2.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028291" comment="openslp-server-2.0.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94085" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2891">CVE-2010-2891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028292" comment="libsmi-0.4.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028293" comment="libsmi-devel-0.4.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028294" comment="libsmi2-0.4.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94086" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.2.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="CVE-2017-12562" ref_url="https://www.suse.com/security/cve/CVE-2017-12562/" source="CVE"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19661" ref_url="https://www.suse.com/security/cve/CVE-2018-19661/" source="CVE"/>
		<reference ref_id="CVE-2018-19662" ref_url="https://www.suse.com/security/cve/CVE-2018-19662/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2019-3832" ref_url="https://www.suse.com/security/cve/CVE-2019-3832/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="CVE-2022-33065" ref_url="https://www.suse.com/security/cve/CVE-2022-33065/" source="CVE"/>
		<reference ref_id="CVE-2024-50612" ref_url="https://www.suse.com/security/cve/CVE-2024-50612/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.2.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4974">CVE-2007-4974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9496">CVE-2014-9496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9756">CVE-2014-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7805">CVE-2015-7805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8075">CVE-2015-8075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12562/">CVE-2017-12562 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12562">CVE-2017-12562 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14245">CVE-2017-14245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14246">CVE-2017-14246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14634">CVE-2017-14634 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17456">CVE-2017-17456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17457">CVE-2017-17457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6892">CVE-2017-6892 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7586">CVE-2017-7586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8361">CVE-2017-8361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8362">CVE-2017-8362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8363">CVE-2017-8363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8365">CVE-2017-8365 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19432">CVE-2018-19432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19661/">CVE-2018-19661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19661">CVE-2018-19661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19662/">CVE-2018-19662 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19662">CVE-2018-19662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3832/">CVE-2019-3832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3832">CVE-2019-3832 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33065/">CVE-2022-33065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33065">CVE-2022-33065 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50612/">CVE-2024-50612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50612">CVE-2024-50612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028295" comment="libsndfile1-1.2.2-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94087" version="1" class="patch">
	<metadata>
		<title>libsnmp40-5.9.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2022-24805" ref_url="https://www.suse.com/security/cve/CVE-2022-24805/" source="CVE"/>
		<reference ref_id="CVE-2022-24806" ref_url="https://www.suse.com/security/cve/CVE-2022-24806/" source="CVE"/>
		<reference ref_id="CVE-2022-24807" ref_url="https://www.suse.com/security/cve/CVE-2022-24807/" source="CVE"/>
		<reference ref_id="CVE-2022-24808" ref_url="https://www.suse.com/security/cve/CVE-2022-24808/" source="CVE"/>
		<reference ref_id="CVE-2022-24809" ref_url="https://www.suse.com/security/cve/CVE-2022-24809/" source="CVE"/>
		<reference ref_id="CVE-2022-24810" ref_url="https://www.suse.com/security/cve/CVE-2022-24810/" source="CVE"/>
		<reference ref_id="CVE-2022-44792" ref_url="https://www.suse.com/security/cve/CVE-2022-44792/" source="CVE"/>
		<reference ref_id="CVE-2022-44793" ref_url="https://www.suse.com/security/cve/CVE-2022-44793/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp40-5.9.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4309">CVE-2008-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2141">CVE-2012-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2284">CVE-2014-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2285">CVE-2014-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18065">CVE-2018-18065 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24805/">CVE-2022-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24805">CVE-2022-24805 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24806/">CVE-2022-24806 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24806">CVE-2022-24806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24807/">CVE-2022-24807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24807">CVE-2022-24807 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24808/">CVE-2022-24808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24808">CVE-2022-24808 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24809/">CVE-2022-24809 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24809">CVE-2022-24809 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24810/">CVE-2022-24810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24810">CVE-2022-24810 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44792/">CVE-2022-44792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44792">CVE-2022-44792 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44793/">CVE-2022-44793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44793">CVE-2022-44793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028296" comment="libsnmp40-5.9.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028297" comment="net-snmp-5.9.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028298" comment="net-snmp-devel-5.9.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028299" comment="perl-SNMP-5.9.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028300" comment="python313-net-snmp-5.9.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028301" comment="snmp-mibs-5.9.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94088" version="1" class="patch">
	<metadata>
		<title>libsolv-demo-0.7.34-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
These are all security issues fixed in the libsolv-demo-0.7.34-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028302" comment="libsolv-demo-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028303" comment="libsolv-devel-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028304" comment="libsolv-devel-static-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028305" comment="libsolv-tools-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028306" comment="libsolv-tools-base-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028307" comment="libsolv1-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028308" comment="perl-solv-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028309" comment="python313-solv-0.7.34-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028310" comment="ruby-solv-0.7.34-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94089" version="1" class="patch">
	<metadata>
		<title>libsoup-3_0-0-3.6.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<reference ref_id="CVE-2025-32907" ref_url="https://www.suse.com/security/cve/CVE-2025-32907/" source="CVE"/>
		<reference ref_id="CVE-2025-32908" ref_url="https://www.suse.com/security/cve/CVE-2025-32908/" source="CVE"/>
		<reference ref_id="CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914/" source="CVE"/>
		<reference ref_id="CVE-2025-4476" ref_url="https://www.suse.com/security/cve/CVE-2025-4476/" source="CVE"/>
		<reference ref_id="CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945/" source="CVE"/>
		<reference ref_id="CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948/" source="CVE"/>
		<reference ref_id="CVE-2025-4969" ref_url="https://www.suse.com/security/cve/CVE-2025-4969/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-3_0-0-3.6.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5876">CVE-2006-5876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2054">CVE-2011-2054 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32907/">CVE-2025-32907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32907">CVE-2025-32907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32908/">CVE-2025-32908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32908">CVE-2025-32908 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4476/">CVE-2025-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4476">CVE-2025-4476 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4969/">CVE-2025-4969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4969">CVE-2025-4969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028311" comment="libsoup-3_0-0-3.6.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028312" comment="libsoup-devel-3.6.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028313" comment="libsoup-lang-3.6.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028314" comment="typelib-1_0-Soup-3_0-3.6.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94090" version="1" class="patch">
	<metadata>
		<title>libspeex1-1.2.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
These are all security issues fixed in the libspeex1-1.2.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23903">CVE-2020-23903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028315" comment="libspeex1-1.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028316" comment="speex-1.2.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94091" version="1" class="patch">
	<metadata>
		<title>libspiro-devel-20240903-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-19847" ref_url="https://www.suse.com/security/cve/CVE-2019-19847/" source="CVE"/>
		<description>
These are all security issues fixed in the libspiro-devel-20240903-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19847/">CVE-2019-19847 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19847">CVE-2019-19847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028317" comment="libspiro-devel-20240903-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028318" comment="libspiro1-20240903-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94092" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.50.4-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936/" source="CVE"/>
		<reference ref_id="CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-13871" ref_url="https://www.suse.com/security/cve/CVE-2020-13871/" source="CVE"/>
		<reference ref_id="CVE-2021-36690" ref_url="https://www.suse.com/security/cve/CVE-2021-36690/" source="CVE"/>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<reference ref_id="CVE-2022-46908" ref_url="https://www.suse.com/security/cve/CVE-2022-46908/" source="CVE"/>
		<reference ref_id="CVE-2025-29087" ref_url="https://www.suse.com/security/cve/CVE-2025-29087/" source="CVE"/>
		<reference ref_id="CVE-2025-29088" ref_url="https://www.suse.com/security/cve/CVE-2025-29088/" source="CVE"/>
		<reference ref_id="CVE-2025-3277" ref_url="https://www.suse.com/security/cve/CVE-2025-3277/" source="CVE"/>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.50.4-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9936">CVE-2019-9936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9937">CVE-2019-9937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13871/">CVE-2020-13871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13871">CVE-2020-13871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36690/">CVE-2021-36690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36690">CVE-2021-36690 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-46908/">CVE-2022-46908 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46908">CVE-2022-46908 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29087/">CVE-2025-29087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29087">CVE-2025-29087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29088/">CVE-2025-29088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29088">CVE-2025-29088 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3277/">CVE-2025-3277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3277">CVE-2025-3277 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028319" comment="libsqlite3-0-3.50.4-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028320" comment="libsqlite3-0-x86-64-v3-3.50.4-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028321" comment="sqlite3-3.50.4-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028322" comment="sqlite3-devel-3.50.4-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028323" comment="sqlite3-doc-3.50.4-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028324" comment="sqlite3-tcl-3.50.4-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94093" version="1" class="patch">
	<metadata>
		<title>libsrt1_5-1.5.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-15784" ref_url="https://www.suse.com/security/cve/CVE-2019-15784/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrt1_5-1.5.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15784/">CVE-2019-15784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15784">CVE-2019-15784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028325" comment="libsrt1_5-1.5.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028326" comment="srt-1.5.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94094" version="1" class="patch">
	<metadata>
		<title>libsrtp2-1-2.7.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<reference ref_id="CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp2-1-2.7.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2139">CVE-2013-2139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6360">CVE-2015-6360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028327" comment="libsrtp2-1-2.7.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94095" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.11.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559/" source="CVE"/>
		<reference ref_id="CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560/" source="CVE"/>
		<reference ref_id="CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561/" source="CVE"/>
		<reference ref_id="CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933/" source="CVE"/>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="CVE-2020-16135" ref_url="https://www.suse.com/security/cve/CVE-2020-16135/" source="CVE"/>
		<reference ref_id="CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730/" source="CVE"/>
		<reference ref_id="CVE-2021-3634" ref_url="https://www.suse.com/security/cve/CVE-2021-3634/" source="CVE"/>
		<reference ref_id="CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667/" source="CVE"/>
		<reference ref_id="CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004/" source="CVE"/>
		<reference ref_id="CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918/" source="CVE"/>
		<reference ref_id="CVE-2025-4877" ref_url="https://www.suse.com/security/cve/CVE-2025-4877/" source="CVE"/>
		<reference ref_id="CVE-2025-4878" ref_url="https://www.suse.com/security/cve/CVE-2025-4878/" source="CVE"/>
		<reference ref_id="CVE-2025-5318" ref_url="https://www.suse.com/security/cve/CVE-2025-5318/" source="CVE"/>
		<reference ref_id="CVE-2025-5351" ref_url="https://www.suse.com/security/cve/CVE-2025-5351/" source="CVE"/>
		<reference ref_id="CVE-2025-5372" ref_url="https://www.suse.com/security/cve/CVE-2025-5372/" source="CVE"/>
		<reference ref_id="CVE-2025-5449" ref_url="https://www.suse.com/security/cve/CVE-2025-5449/" source="CVE"/>
		<reference ref_id="CVE-2025-5987" ref_url="https://www.suse.com/security/cve/CVE-2025-5987/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.11.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4559">CVE-2012-4559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4560">CVE-2012-4560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4561">CVE-2012-4561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0176">CVE-2013-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0017">CVE-2014-0017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8132">CVE-2014-8132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3146">CVE-2015-3146 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10933">CVE-2018-10933 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14889">CVE-2019-14889 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16135/">CVE-2020-16135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16135">CVE-2020-16135 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1730">CVE-2020-1730 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3634/">CVE-2021-3634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3634">CVE-2021-3634 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4877/">CVE-2025-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4877">CVE-2025-4877 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4878/">CVE-2025-4878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4878">CVE-2025-4878 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5318/">CVE-2025-5318 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5318">CVE-2025-5318 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5351/">CVE-2025-5351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5351">CVE-2025-5351 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5372/">CVE-2025-5372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5372">CVE-2025-5372 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5449/">CVE-2025-5449 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5449">CVE-2025-5449 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5987/">CVE-2025-5987 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5987">CVE-2025-5987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028328" comment="libssh-config-0.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028329" comment="libssh-devel-0.11.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028330" comment="libssh4-0.11.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94096" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.11.1-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.11.1-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028331" comment="libssh2-1-1.11.1-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028332" comment="libssh2-devel-1.11.1-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94097" version="1" class="patch">
	<metadata>
		<title>libsubid-devel-4.17.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-4235" ref_url="https://www.suse.com/security/cve/CVE-2013-4235/" source="CVE"/>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<reference ref_id="CVE-2023-29383" ref_url="https://www.suse.com/security/cve/CVE-2023-29383/" source="CVE"/>
		<description>
These are all security issues fixed in the libsubid-devel-4.17.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-4235/">CVE-2013-4235 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7169">CVE-2018-7169 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29383/">CVE-2023-29383 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028333" comment="libsubid-devel-4.17.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028334" comment="libsubid5-4.17.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028335" comment="login_defs-4.17.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028336" comment="shadow-4.17.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94098" version="1" class="patch">
	<metadata>
		<title>libsystemd0-257.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-7510" ref_url="https://www.suse.com/security/cve/CVE-2015-7510/" source="CVE"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15687" ref_url="https://www.suse.com/security/cve/CVE-2018-15687/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-21029" ref_url="https://www.suse.com/security/cve/CVE-2018-21029/" source="CVE"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843/" source="CVE"/>
		<reference ref_id="CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="CVE-2021-3997" ref_url="https://www.suse.com/security/cve/CVE-2021-3997/" source="CVE"/>
		<reference ref_id="CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821/" source="CVE"/>
		<reference ref_id="CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415/" source="CVE"/>
		<reference ref_id="CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008/" source="CVE"/>
		<reference ref_id="CVE-2025-4598" ref_url="https://www.suse.com/security/cve/CVE-2025-4598/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-257.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1174">CVE-2012-1174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7510/">CVE-2015-7510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7510">CVE-2015-7510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10156">CVE-2016-10156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15908">CVE-2017-15908 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18078">CVE-2017-18078 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9445">CVE-2017-9445 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15687/">CVE-2018-15687 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15687">CVE-2018-15687 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-21029/">CVE-2018-21029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21029">CVE-2018-21029 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6954">CVE-2018-6954 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3842">CVE-2019-3842 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">CVE-2019-3843 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">CVE-2019-3844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3997/">CVE-2021-3997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4598/">CVE-2025-4598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4598">CVE-2025-4598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028337" comment="libsystemd0-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028338" comment="libudev1-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028339" comment="systemd-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028340" comment="systemd-container-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028341" comment="systemd-devel-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028342" comment="systemd-doc-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028343" comment="systemd-experimental-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028344" comment="systemd-homed-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028345" comment="systemd-journal-remote-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028346" comment="systemd-lang-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028347" comment="systemd-portable-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028348" comment="systemd-resolved-257.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028349" comment="udev-257.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94099" version="1" class="patch">
	<metadata>
		<title>libtag2-2.0.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<reference ref_id="CVE-2017-12678" ref_url="https://www.suse.com/security/cve/CVE-2017-12678/" source="CVE"/>
		<reference ref_id="CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag2-2.0.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2396">CVE-2012-2396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12678/">CVE-2017-12678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12678">CVE-2017-12678 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11439">CVE-2018-11439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028350" comment="libtag2-2.0.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028351" comment="libtag_c2-2.0.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028352" comment="taglib-2.0.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94100" version="1" class="patch">
	<metadata>
		<title>libtasn1-6-4.20.0-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<reference ref_id="CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-6-4.20.0-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6003">CVE-2018-6003 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028353" comment="libtasn1-6-4.20.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028354" comment="libtasn1-devel-4.20.0-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028355" comment="libtasn1-tools-4.20.0-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94101" version="1" class="patch">
	<metadata>
		<title>libtcmu-devel-1.6.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<description>
These are all security issues fixed in the libtcmu-devel-1.6.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028356" comment="libtcmu-devel-1.6.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028357" comment="libtcmu2-1.6.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028358" comment="tcmu-runner-1.6.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94102" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.29-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.29-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4012">CVE-2009-4012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028359" comment="libthai-data-0.1.29-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028360" comment="libthai-devel-0.1.29-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028361" comment="libthai0-0.1.29-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94103" version="1" class="patch">
	<metadata>
		<title>libtidy-devel-5.8.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="CVE-2016-6583" ref_url="https://www.suse.com/security/cve/CVE-2016-6583/" source="CVE"/>
		<description>
These are all security issues fixed in the libtidy-devel-5.8.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5522">CVE-2015-5522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5523">CVE-2015-5523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6583/">CVE-2016-6583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-6583">CVE-2016-6583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028362" comment="libtidy-devel-5.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028363" comment="libtidy58-5.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028364" comment="tidy-5.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028365" comment="tidy-doc-5.8.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94104" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-4.7.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-0405" ref_url="https://www.suse.com/security/cve/CVE-2006-0405/" source="CVE"/>
		<reference ref_id="CVE-2006-2656" ref_url="https://www.suse.com/security/cve/CVE-2006-2656/" source="CVE"/>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562/" source="CVE"/>
		<reference ref_id="CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865/" source="CVE"/>
		<reference ref_id="CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891/" source="CVE"/>
		<reference ref_id="CVE-2022-0907" ref_url="https://www.suse.com/security/cve/CVE-2022-0907/" source="CVE"/>
		<reference ref_id="CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908/" source="CVE"/>
		<reference ref_id="CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<reference ref_id="CVE-2022-1056" ref_url="https://www.suse.com/security/cve/CVE-2022-1056/" source="CVE"/>
		<reference ref_id="CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056/" source="CVE"/>
		<reference ref_id="CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057/" source="CVE"/>
		<reference ref_id="CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<reference ref_id="CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867/" source="CVE"/>
		<reference ref_id="CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868/" source="CVE"/>
		<reference ref_id="CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869/" source="CVE"/>
		<reference ref_id="CVE-2022-34266" ref_url="https://www.suse.com/security/cve/CVE-2022-34266/" source="CVE"/>
		<reference ref_id="CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526/" source="CVE"/>
		<reference ref_id="CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570/" source="CVE"/>
		<reference ref_id="CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597/" source="CVE"/>
		<reference ref_id="CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598/" source="CVE"/>
		<reference ref_id="CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599/" source="CVE"/>
		<reference ref_id="CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626/" source="CVE"/>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<reference ref_id="CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281/" source="CVE"/>
		<reference ref_id="CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795/" source="CVE"/>
		<reference ref_id="CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796/" source="CVE"/>
		<reference ref_id="CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797/" source="CVE"/>
		<reference ref_id="CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798/" source="CVE"/>
		<reference ref_id="CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799/" source="CVE"/>
		<reference ref_id="CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800/" source="CVE"/>
		<reference ref_id="CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801/" source="CVE"/>
		<reference ref_id="CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802/" source="CVE"/>
		<reference ref_id="CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803/" source="CVE"/>
		<reference ref_id="CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804/" source="CVE"/>
		<reference ref_id="CVE-2023-25435" ref_url="https://www.suse.com/security/cve/CVE-2023-25435/" source="CVE"/>
		<reference ref_id="CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356/" source="CVE"/>
		<reference ref_id="CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-4.7.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0405/">CVE-2006-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0405">CVE-2006-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2656/">CVE-2006-2656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2656">CVE-2006-2656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1586">CVE-2008-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2327">CVE-2008-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2065">CVE-2010-2065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2067">CVE-2010-2067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2233">CVE-2010-2233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4665">CVE-2010-4665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0192">CVE-2011-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1167">CVE-2011-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1173">CVE-2012-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2113">CVE-2012-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3401">CVE-2012-3401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1547">CVE-2015-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10093">CVE-2016-10093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10094">CVE-2016-10094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10266">CVE-2016-10266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10267">CVE-2016-10267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10268">CVE-2016-10268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10269">CVE-2016-10269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10270">CVE-2016-10270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10271">CVE-2016-10271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10272">CVE-2016-10272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10371">CVE-2016-10371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3622">CVE-2016-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3623">CVE-2016-3623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3658">CVE-2016-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3991">CVE-2016-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5316">CVE-2016-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5317">CVE-2016-5317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5321">CVE-2016-5321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5323">CVE-2016-5323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5875">CVE-2016-5875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6223">CVE-2016-6223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9273">CVE-2016-9273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9297">CVE-2016-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9448">CVE-2016-9448 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9453">CVE-2016-9453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9538">CVE-2016-9538 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12944">CVE-2017-12944 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16232">CVE-2017-16232 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18013">CVE-2017-18013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">CVE-2017-5225 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7592">CVE-2017-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">CVE-2017-7593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7594">CVE-2017-7594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">CVE-2017-7595 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">CVE-2017-7596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7597">CVE-2017-7597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7598">CVE-2017-7598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">CVE-2017-7599 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7600">CVE-2017-7600 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">CVE-2017-7601 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">CVE-2017-7602 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9403">CVE-2017-9403 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9404">CVE-2017-9404 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9936">CVE-2017-9936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10963">CVE-2018-10963 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17000">CVE-2018-17000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18557">CVE-2018-18557 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19210">CVE-2018-19210 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5784">CVE-2018-5784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14973">CVE-2019-14973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6128">CVE-2019-6128 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7663">CVE-2019-7663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">CVE-2022-0562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">CVE-2022-0865 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">CVE-2022-0891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0907/">CVE-2022-0907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0907">CVE-2022-0907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">CVE-2022-0908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">CVE-2022-0909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1056/">CVE-2022-1056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1056">CVE-2022-1056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2056">CVE-2022-2056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2057">CVE-2022-2057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2058">CVE-2022-2058 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2867">CVE-2022-2867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2868">CVE-2022-2868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2869">CVE-2022-2869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34266/">CVE-2022-34266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34266">CVE-2022-34266 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34526">CVE-2022-34526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3570">CVE-2022-3570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3597">CVE-2022-3597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3598">CVE-2022-3598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3599">CVE-2022-3599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3626">CVE-2022-3626 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48281">CVE-2022-48281 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25435/">CVE-2023-25435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25435">CVE-2023-25435 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028366" comment="libtiff-devel-4.7.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028367" comment="libtiff6-4.7.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028368" comment="tiff-4.7.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94105" version="1" class="patch">
	<metadata>
		<title>libtirpc-devel-1.3.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-devel-1.3.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3999">CVE-2007-3999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028369" comment="libtirpc-devel-1.3.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028370" comment="libtirpc-netconfig-1.3.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028371" comment="libtirpc3-1.3.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94106" version="1" class="patch">
	<metadata>
		<title>libtpms0-0.10.0-160000.4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-3446" ref_url="https://www.suse.com/security/cve/CVE-2021-3446/" source="CVE"/>
		<reference ref_id="CVE-2021-3505" ref_url="https://www.suse.com/security/cve/CVE-2021-3505/" source="CVE"/>
		<reference ref_id="CVE-2021-3623" ref_url="https://www.suse.com/security/cve/CVE-2021-3623/" source="CVE"/>
		<reference ref_id="CVE-2021-3746" ref_url="https://www.suse.com/security/cve/CVE-2021-3746/" source="CVE"/>
		<reference ref_id="CVE-2023-1017" ref_url="https://www.suse.com/security/cve/CVE-2023-1017/" source="CVE"/>
		<reference ref_id="CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms0-0.10.0-160000.4.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3446/">CVE-2021-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3446">CVE-2021-3446 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3505/">CVE-2021-3505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3505">CVE-2021-3505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3623/">CVE-2021-3623 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3623">CVE-2021-3623 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3746/">CVE-2021-3746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3746">CVE-2021-3746 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1017/">CVE-2023-1017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1017">CVE-2023-1017 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1018">CVE-2023-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028372" comment="libtpms0-0.10.0-160000.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94107" version="1" class="patch">
	<metadata>
		<title>libtree-sitter0_25-0.25.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-45299" ref_url="https://www.suse.com/security/cve/CVE-2022-45299/" source="CVE"/>
		<description>
These are all security issues fixed in the libtree-sitter0_25-0.25.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45299/">CVE-2022-45299 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45299">CVE-2022-45299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028373" comment="libtree-sitter0_25-0.25.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028374" comment="libtree-sitter0_25-x86-64-v3-0.25.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028375" comment="tree-sitter-devel-0.25.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94108" version="1" class="patch">
	<metadata>
		<title>libtspi1-0.3.15-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-18898" ref_url="https://www.suse.com/security/cve/CVE-2019-18898/" source="CVE"/>
		<reference ref_id="CVE-2020-24330" ref_url="https://www.suse.com/security/cve/CVE-2020-24330/" source="CVE"/>
		<reference ref_id="CVE-2020-24331" ref_url="https://www.suse.com/security/cve/CVE-2020-24331/" source="CVE"/>
		<reference ref_id="CVE-2020-24332" ref_url="https://www.suse.com/security/cve/CVE-2020-24332/" source="CVE"/>
		<description>
These are all security issues fixed in the libtspi1-0.3.15-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18898/">CVE-2019-18898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18898">CVE-2019-18898 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24330/">CVE-2020-24330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24330">CVE-2020-24330 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24331/">CVE-2020-24331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24331">CVE-2020-24331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24332/">CVE-2020-24332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24332">CVE-2020-24332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028376" comment="libtspi1-0.3.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028377" comment="trousers-0.3.15-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028378" comment="trousers-devel-0.3.15-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94109" version="1" class="patch">
	<metadata>
		<title>libtss2-esys0-4.1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-24455" ref_url="https://www.suse.com/security/cve/CVE-2020-24455/" source="CVE"/>
		<reference ref_id="CVE-2023-22745" ref_url="https://www.suse.com/security/cve/CVE-2023-22745/" source="CVE"/>
		<reference ref_id="CVE-2024-29040" ref_url="https://www.suse.com/security/cve/CVE-2024-29040/" source="CVE"/>
		<description>
These are all security issues fixed in the libtss2-esys0-4.1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24455/">CVE-2020-24455 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24455">CVE-2020-24455 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22745/">CVE-2023-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22745">CVE-2023-22745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29040/">CVE-2024-29040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028379" comment="libtss2-esys0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028380" comment="libtss2-fapi-common-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028381" comment="libtss2-fapi1-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028382" comment="libtss2-mu0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028383" comment="libtss2-policy0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028384" comment="libtss2-rc0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028385" comment="libtss2-sys1-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028386" comment="libtss2-tcti-cmd0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028387" comment="libtss2-tcti-device0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028388" comment="libtss2-tcti-i2c-helper0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028389" comment="libtss2-tcti-mssim0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028390" comment="libtss2-tcti-pcap0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028391" comment="libtss2-tcti-spi-helper0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028392" comment="libtss2-tcti-spidev0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028393" comment="libtss2-tcti-swtpm0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028394" comment="libtss2-tctildr0-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028395" comment="tpm2-0-tss-4.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028396" comment="tpm2-0-tss-devel-4.1.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94110" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.10.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<reference ref_id="CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.10.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0004">CVE-2014-0004 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17336">CVE-2018-17336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028397" comment="libudisks2-0-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028398" comment="libudisks2-0-devel-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028399" comment="libudisks2-0_btrfs-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028400" comment="libudisks2-0_lsm-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028401" comment="libudisks2-0_lvm2-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028402" comment="typelib-1_0-UDisks-2_0-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028403" comment="udisks2-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028404" comment="udisks2-docs-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028405" comment="udisks2-lang-2.10.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028406" comment="udisks2-zsh-completion-2.10.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94111" version="1" class="patch">
	<metadata>
		<title>libunbound8-1.23.1-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-8602" ref_url="https://www.suse.com/security/cve/CVE-2014-8602/" source="CVE"/>
		<reference ref_id="CVE-2017-15105" ref_url="https://www.suse.com/security/cve/CVE-2017-15105/" source="CVE"/>
		<reference ref_id="CVE-2019-16866" ref_url="https://www.suse.com/security/cve/CVE-2019-16866/" source="CVE"/>
		<reference ref_id="CVE-2019-18934" ref_url="https://www.suse.com/security/cve/CVE-2019-18934/" source="CVE"/>
		<reference ref_id="CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662/" source="CVE"/>
		<reference ref_id="CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="CVE-2022-30698" ref_url="https://www.suse.com/security/cve/CVE-2022-30698/" source="CVE"/>
		<reference ref_id="CVE-2022-30699" ref_url="https://www.suse.com/security/cve/CVE-2022-30699/" source="CVE"/>
		<reference ref_id="CVE-2022-3204" ref_url="https://www.suse.com/security/cve/CVE-2022-3204/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="CVE-2024-1931" ref_url="https://www.suse.com/security/cve/CVE-2024-1931/" source="CVE"/>
		<reference ref_id="CVE-2024-33655" ref_url="https://www.suse.com/security/cve/CVE-2024-33655/" source="CVE"/>
		<reference ref_id="CVE-2024-43167" ref_url="https://www.suse.com/security/cve/CVE-2024-43167/" source="CVE"/>
		<reference ref_id="CVE-2024-8508" ref_url="https://www.suse.com/security/cve/CVE-2024-8508/" source="CVE"/>
		<reference ref_id="CVE-2025-5994" ref_url="https://www.suse.com/security/cve/CVE-2025-5994/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound8-1.23.1-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8602/">CVE-2014-8602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8602">CVE-2014-8602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15105/">CVE-2017-15105 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15105">CVE-2017-15105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16866/">CVE-2019-16866 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16866">CVE-2019-16866 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18934/">CVE-2019-18934 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18934">CVE-2019-18934 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12662">CVE-2020-12662 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12663">CVE-2020-12663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28935">CVE-2020-28935 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30698/">CVE-2022-30698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30698">CVE-2022-30698 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30699/">CVE-2022-30699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30699">CVE-2022-30699 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3204/">CVE-2022-3204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3204">CVE-2022-3204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1931/">CVE-2024-1931 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1931">CVE-2024-1931 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33655/">CVE-2024-33655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33655">CVE-2024-33655 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43167/">CVE-2024-43167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43167">CVE-2024-43167 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-8508/">CVE-2024-8508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508">CVE-2024-8508 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-5994/">CVE-2025-5994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5994">CVE-2025-5994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028407" comment="libunbound8-1.23.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028408" comment="python3-unbound-1.23.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028409" comment="unbound-1.23.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028410" comment="unbound-anchor-1.23.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028411" comment="unbound-devel-1.23.1-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94112" version="1" class="patch">
	<metadata>
		<title>libunwind-coredump0-1.8.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
These are all security issues fixed in the libunwind-coredump0-1.8.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028412" comment="libunwind-coredump0-1.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028413" comment="libunwind-devel-1.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028414" comment="libunwind-ptrace0-1.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028415" comment="libunwind-setjmp0-1.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028416" comment="libunwind8-1.8.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94113" version="1" class="patch">
	<metadata>
		<title>liburiparser1-0.9.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-19198" ref_url="https://www.suse.com/security/cve/CVE-2018-19198/" source="CVE"/>
		<reference ref_id="CVE-2018-19199" ref_url="https://www.suse.com/security/cve/CVE-2018-19199/" source="CVE"/>
		<reference ref_id="CVE-2018-19200" ref_url="https://www.suse.com/security/cve/CVE-2018-19200/" source="CVE"/>
		<reference ref_id="CVE-2018-20721" ref_url="https://www.suse.com/security/cve/CVE-2018-20721/" source="CVE"/>
		<reference ref_id="CVE-2021-46141" ref_url="https://www.suse.com/security/cve/CVE-2021-46141/" source="CVE"/>
		<reference ref_id="CVE-2021-46142" ref_url="https://www.suse.com/security/cve/CVE-2021-46142/" source="CVE"/>
		<reference ref_id="CVE-2024-34402" ref_url="https://www.suse.com/security/cve/CVE-2024-34402/" source="CVE"/>
		<reference ref_id="CVE-2024-34403" ref_url="https://www.suse.com/security/cve/CVE-2024-34403/" source="CVE"/>
		<description>
These are all security issues fixed in the liburiparser1-0.9.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19198/">CVE-2018-19198 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19198">CVE-2018-19198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19199/">CVE-2018-19199 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19199">CVE-2018-19199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19200/">CVE-2018-19200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19200">CVE-2018-19200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20721/">CVE-2018-20721 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20721">CVE-2018-20721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46141/">CVE-2021-46141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46141">CVE-2021-46141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46142/">CVE-2021-46142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46142">CVE-2021-46142 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-34402/">CVE-2024-34402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34402">CVE-2024-34402 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-34403/">CVE-2024-34403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34403">CVE-2024-34403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028417" comment="liburiparser1-0.9.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028418" comment="uriparser-0.9.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028419" comment="uriparser-devel-0.9.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028420" comment="uriparser-doc-0.9.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94114" version="1" class="patch">
	<metadata>
		<title>libusbguard1-1.1.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-25058" ref_url="https://www.suse.com/security/cve/CVE-2019-25058/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbguard1-1.1.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25058/">CVE-2019-25058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25058">CVE-2019-25058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028421" comment="libusbguard1-1.1.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028422" comment="usbguard-1.1.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028423" comment="usbguard-devel-1.1.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028424" comment="usbguard-tools-1.1.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94115" version="1" class="patch">
	<metadata>
		<title>libusbmuxd-2_0-6-2.0.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbmuxd-2_0-6-2.0.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5104">CVE-2016-5104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028425" comment="libusbmuxd-2_0-6-2.0.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028426" comment="libusbmuxd-tools-2.0.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94116" version="1" class="patch">
	<metadata>
		<title>libusbredirparser1-0.14.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-3700" ref_url="https://www.suse.com/security/cve/CVE-2021-3700/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbredirparser1-0.14.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3700/">CVE-2021-3700 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3700">CVE-2021-3700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028427" comment="libusbredirparser1-0.14.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94117" version="1" class="patch">
	<metadata>
		<title>libuv-devel-1.50.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<description>
These are all security issues fixed in the libuv-devel-1.50.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028428" comment="libuv-devel-1.50.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028429" comment="libuv1-1.50.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94118" version="1" class="patch">
	<metadata>
		<title>libvdpau-devel-1.5-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau-devel-1.5-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5198">CVE-2015-5198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5199">CVE-2015-5199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5200">CVE-2015-5200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028430" comment="libvdpau-devel-1.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028431" comment="libvdpau1-1.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028432" comment="libvdpau_trace1-1.5-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94119" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer1-1.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="CVE-2019-18392" ref_url="https://www.suse.com/security/cve/CVE-2019-18392/" source="CVE"/>
		<reference ref_id="CVE-2020-8002" ref_url="https://www.suse.com/security/cve/CVE-2020-8002/" source="CVE"/>
		<reference ref_id="CVE-2020-8003" ref_url="https://www.suse.com/security/cve/CVE-2020-8003/" source="CVE"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="CVE-2022-0175" ref_url="https://www.suse.com/security/cve/CVE-2022-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer1-1.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10214">CVE-2016-10214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5937">CVE-2017-5937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5957">CVE-2017-5957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5993">CVE-2017-5993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5994">CVE-2017-5994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6386">CVE-2017-6386 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18392/">CVE-2019-18392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18392">CVE-2019-18392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8002/">CVE-2020-8002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8002">CVE-2020-8002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8003/">CVE-2020-8003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8003">CVE-2020-8003 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0175/">CVE-2022-0175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0175">CVE-2022-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028433" comment="libvirglrenderer1-1.0.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94120" version="1" class="patch">
	<metadata>
		<title>libvirt-client-11.4.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="CVE-2020-10701" ref_url="https://www.suse.com/security/cve/CVE-2020-10701/" source="CVE"/>
		<reference ref_id="CVE-2020-12430" ref_url="https://www.suse.com/security/cve/CVE-2020-12430/" source="CVE"/>
		<reference ref_id="CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339/" source="CVE"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631/" source="CVE"/>
		<reference ref_id="CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<reference ref_id="CVE-2023-2700" ref_url="https://www.suse.com/security/cve/CVE-2023-2700/" source="CVE"/>
		<reference ref_id="CVE-2023-3750" ref_url="https://www.suse.com/security/cve/CVE-2023-3750/" source="CVE"/>
		<reference ref_id="CVE-2024-1441" ref_url="https://www.suse.com/security/cve/CVE-2024-1441/" source="CVE"/>
		<reference ref_id="CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494/" source="CVE"/>
		<reference ref_id="CVE-2024-4418" ref_url="https://www.suse.com/security/cve/CVE-2024-4418/" source="CVE"/>
		<reference ref_id="CVE-2024-8235" ref_url="https://www.suse.com/security/cve/CVE-2024-8235/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-client-11.4.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5086">CVE-2008-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1146">CVE-2011-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2511">CVE-2011-2511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4600">CVE-2011-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3445">CVE-2012-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0170">CVE-2013-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1962">CVE-2013-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2218">CVE-2013-2218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2230">CVE-2013-2230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4153">CVE-2013-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4154">CVE-2013-4154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4239">CVE-2013-4239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4296">CVE-2013-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4297">CVE-2013-4297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4311">CVE-2013-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4399">CVE-2013-4399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4400">CVE-2013-4400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4401">CVE-2013-4401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6436">CVE-2013-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6456">CVE-2013-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6457">CVE-2013-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6458">CVE-2013-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0028">CVE-2014-0028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0179">CVE-2014-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1447">CVE-2014-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3633">CVE-2014-3633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3657">CVE-2014-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8131">CVE-2014-8131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5247">CVE-2015-5247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000256">CVE-2017-1000256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2635">CVE-2017-2635 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10132">CVE-2019-10132 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10166">CVE-2019-10166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10168">CVE-2019-10168 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10701/">CVE-2020-10701 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10701">CVE-2020-10701 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12430/">CVE-2020-12430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12430">CVE-2020-12430 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14339">CVE-2020-14339 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3631">CVE-2021-3631 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3667">CVE-2021-3667 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2700/">CVE-2023-2700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2700">CVE-2023-2700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3750/">CVE-2023-3750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3750">CVE-2023-3750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1441/">CVE-2024-1441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1441">CVE-2024-1441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4418/">CVE-2024-4418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4418">CVE-2024-4418 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8235/">CVE-2024-8235 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8235">CVE-2024-8235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028434" comment="libvirt-client-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028435" comment="libvirt-client-qemu-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028436" comment="libvirt-daemon-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028437" comment="libvirt-daemon-common-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028438" comment="libvirt-daemon-config-network-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028439" comment="libvirt-daemon-config-nwfilter-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028440" comment="libvirt-daemon-driver-network-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028441" comment="libvirt-daemon-driver-nodedev-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028442" comment="libvirt-daemon-driver-nwfilter-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028443" comment="libvirt-daemon-driver-qemu-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028444" comment="libvirt-daemon-driver-secret-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028445" comment="libvirt-daemon-driver-storage-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028446" comment="libvirt-daemon-driver-storage-core-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028447" comment="libvirt-daemon-driver-storage-disk-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028448" comment="libvirt-daemon-driver-storage-iscsi-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028449" comment="libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028450" comment="libvirt-daemon-driver-storage-logical-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028451" comment="libvirt-daemon-driver-storage-mpath-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028452" comment="libvirt-daemon-driver-storage-scsi-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028453" comment="libvirt-daemon-hooks-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028454" comment="libvirt-daemon-lock-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028455" comment="libvirt-daemon-log-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028456" comment="libvirt-daemon-plugin-lockd-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028457" comment="libvirt-daemon-proxy-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028458" comment="libvirt-daemon-qemu-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028459" comment="libvirt-devel-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028460" comment="libvirt-doc-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028461" comment="libvirt-libs-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028462" comment="libvirt-nss-11.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028463" comment="libvirt-ssh-proxy-11.4.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94121" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-13.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<reference ref_id="CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058/" source="CVE"/>
		<reference ref_id="CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059/" source="CVE"/>
		<reference ref_id="CVE-2025-22247" ref_url="https://www.suse.com/security/cve/CVE-2025-22247/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-13.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5191">CVE-2015-5191 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22247/">CVE-2025-22247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22247">CVE-2025-22247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028464" comment="libvmtools-devel-13.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028465" comment="libvmtools0-13.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028466" comment="open-vm-tools-13.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028467" comment="open-vm-tools-containerinfo-13.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028468" comment="open-vm-tools-desktop-13.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028469" comment="open-vm-tools-sdmp-13.0.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94122" version="1" class="patch">
	<metadata>
		<title>libvncclient1-0.9.14-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="CVE-2020-29260" ref_url="https://www.suse.com/security/cve/CVE-2020-29260/" source="CVE"/>
		<description>
These are all security issues fixed in the libvncclient1-0.9.14-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2450">CVE-2006-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15126">CVE-2018-15126 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20019">CVE-2018-20019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20020">CVE-2018-20020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20021">CVE-2018-20021 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20022">CVE-2018-20022 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20023">CVE-2018-20023 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20024">CVE-2018-20024 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20748">CVE-2018-20748 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20749">CVE-2018-20749 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20750">CVE-2018-20750 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6307">CVE-2018-6307 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29260/">CVE-2020-29260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29260">CVE-2020-29260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028470" comment="libvncclient1-0.9.14-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028471" comment="libvncserver1-0.9.14-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94123" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.7-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.7-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3106">CVE-2007-3106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1419">CVE-2008-1419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1423">CVE-2008-1423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028472" comment="libvorbis0-1.3.7-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028473" comment="libvorbis0-x86-64-v3-1.3.7-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028474" comment="libvorbisenc2-1.3.7-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028475" comment="libvorbisenc2-x86-64-v3-1.3.7-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028476" comment="libvorbisfile3-1.3.7-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028477" comment="libvorbisfile3-x86-64-v3-1.3.7-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94124" version="1" class="patch">
	<metadata>
		<title>libvpx9-1.14.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-1621" ref_url="https://www.suse.com/security/cve/CVE-2016-1621/" source="CVE"/>
		<reference ref_id="CVE-2016-2464" ref_url="https://www.suse.com/security/cve/CVE-2016-2464/" source="CVE"/>
		<reference ref_id="CVE-2017-0641" ref_url="https://www.suse.com/security/cve/CVE-2017-0641/" source="CVE"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126/" source="CVE"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9325" ref_url="https://www.suse.com/security/cve/CVE-2019-9325/" source="CVE"/>
		<reference ref_id="CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="CVE-2024-5197" ref_url="https://www.suse.com/security/cve/CVE-2024-5197/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx9-1.14.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1621/">CVE-2016-1621 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1621">CVE-2016-1621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2464/">CVE-2016-2464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2464">CVE-2016-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0641/">CVE-2017-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0641">CVE-2017-0641 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13194">CVE-2017-13194 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2126">CVE-2019-2126 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9232">CVE-2019-9232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9325/">CVE-2019-9325 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9325">CVE-2019-9325 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9371">CVE-2019-9371 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9433">CVE-2019-9433 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0034">CVE-2020-0034 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5197/">CVE-2024-5197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5197">CVE-2024-5197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028478" comment="libvpx9-1.14.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028479" comment="vpx-tools-1.14.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94125" version="1" class="patch">
	<metadata>
		<title>libvte-2_91-0-0.80.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-37535" ref_url="https://www.suse.com/security/cve/CVE-2024-37535/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte-2_91-0-0.80.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37535/">CVE-2024-37535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37535">CVE-2024-37535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028480" comment="libvte-2_91-0-0.80.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028481" comment="typelib-1_0-Vte-2_91-0.80.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028482" comment="typelib-1_0-Vte-3_91-0.80.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028483" comment="vte-devel-0.80.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028484" comment="vte-lang-0.80.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028485" comment="vte-tools-0.80.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028486" comment="vte-tools-gtk4-0.80.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94126" version="1" class="patch">
	<metadata>
		<title>libwavpack1-5.7.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767/" source="CVE"/>
		<reference ref_id="CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253/" source="CVE"/>
		<reference ref_id="CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254/" source="CVE"/>
		<reference ref_id="CVE-2019-1010315" ref_url="https://www.suse.com/security/cve/CVE-2019-1010315/" source="CVE"/>
		<reference ref_id="CVE-2019-1010317" ref_url="https://www.suse.com/security/cve/CVE-2019-1010317/" source="CVE"/>
		<reference ref_id="CVE-2019-1010318" ref_url="https://www.suse.com/security/cve/CVE-2019-1010318/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="CVE-2021-44269" ref_url="https://www.suse.com/security/cve/CVE-2021-44269/" source="CVE"/>
		<description>
These are all security issues fixed in the libwavpack1-5.7.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19840">CVE-2018-19840 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19841">CVE-2018-19841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6767">CVE-2018-6767 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7253">CVE-2018-7253 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7254">CVE-2018-7254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010315/">CVE-2019-1010315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010315">CVE-2019-1010315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1010317/">CVE-2019-1010317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010317">CVE-2019-1010317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1010318/">CVE-2019-1010318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010318">CVE-2019-1010318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010319">CVE-2019-1010319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11498">CVE-2019-11498 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44269/">CVE-2021-44269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44269">CVE-2021-44269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028487" comment="libwavpack1-5.7.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028488" comment="libwavpack1-x86-64-v3-5.7.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028489" comment="wavpack-5.7.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028490" comment="wavpack-doc-5.7.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94127" version="1" class="patch">
	<metadata>
		<title>libwireshark18-4.4.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-1940" ref_url="https://www.suse.com/security/cve/CVE-2006-1940/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6425" ref_url="https://www.suse.com/security/cve/CVE-2014-6425/" source="CVE"/>
		<reference ref_id="CVE-2014-6426" ref_url="https://www.suse.com/security/cve/CVE-2014-6426/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2187" ref_url="https://www.suse.com/security/cve/CVE-2015-2187/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2190" ref_url="https://www.suse.com/security/cve/CVE-2015-2190/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-2192" ref_url="https://www.suse.com/security/cve/CVE-2015-2192/" source="CVE"/>
		<reference ref_id="CVE-2015-3808" ref_url="https://www.suse.com/security/cve/CVE-2015-3808/" source="CVE"/>
		<reference ref_id="CVE-2015-3809" ref_url="https://www.suse.com/security/cve/CVE-2015-3809/" source="CVE"/>
		<reference ref_id="CVE-2015-3810" ref_url="https://www.suse.com/security/cve/CVE-2015-3810/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-3815" ref_url="https://www.suse.com/security/cve/CVE-2015-3815/" source="CVE"/>
		<reference ref_id="CVE-2015-4651" ref_url="https://www.suse.com/security/cve/CVE-2015-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2015-8734" ref_url="https://www.suse.com/security/cve/CVE-2015-8734/" source="CVE"/>
		<reference ref_id="CVE-2015-8735" ref_url="https://www.suse.com/security/cve/CVE-2015-8735/" source="CVE"/>
		<reference ref_id="CVE-2015-8736" ref_url="https://www.suse.com/security/cve/CVE-2015-8736/" source="CVE"/>
		<reference ref_id="CVE-2015-8737" ref_url="https://www.suse.com/security/cve/CVE-2015-8737/" source="CVE"/>
		<reference ref_id="CVE-2015-8738" ref_url="https://www.suse.com/security/cve/CVE-2015-8738/" source="CVE"/>
		<reference ref_id="CVE-2015-8739" ref_url="https://www.suse.com/security/cve/CVE-2015-8739/" source="CVE"/>
		<reference ref_id="CVE-2015-8740" ref_url="https://www.suse.com/security/cve/CVE-2015-8740/" source="CVE"/>
		<reference ref_id="CVE-2015-8741" ref_url="https://www.suse.com/security/cve/CVE-2015-8741/" source="CVE"/>
		<reference ref_id="CVE-2015-8742" ref_url="https://www.suse.com/security/cve/CVE-2015-8742/" source="CVE"/>
		<reference ref_id="CVE-2016-2522" ref_url="https://www.suse.com/security/cve/CVE-2016-2522/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2524" ref_url="https://www.suse.com/security/cve/CVE-2016-2524/" source="CVE"/>
		<reference ref_id="CVE-2016-2525" ref_url="https://www.suse.com/security/cve/CVE-2016-2525/" source="CVE"/>
		<reference ref_id="CVE-2016-2526" ref_url="https://www.suse.com/security/cve/CVE-2016-2526/" source="CVE"/>
		<reference ref_id="CVE-2016-2527" ref_url="https://www.suse.com/security/cve/CVE-2016-2527/" source="CVE"/>
		<reference ref_id="CVE-2016-2528" ref_url="https://www.suse.com/security/cve/CVE-2016-2528/" source="CVE"/>
		<reference ref_id="CVE-2016-2529" ref_url="https://www.suse.com/security/cve/CVE-2016-2529/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-6512" ref_url="https://www.suse.com/security/cve/CVE-2016-6512/" source="CVE"/>
		<reference ref_id="CVE-2016-6513" ref_url="https://www.suse.com/security/cve/CVE-2016-6513/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9372" ref_url="https://www.suse.com/security/cve/CVE-2016-9372/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="CVE-2017-13764" ref_url="https://www.suse.com/security/cve/CVE-2017-13764/" source="CVE"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15189" ref_url="https://www.suse.com/security/cve/CVE-2017-15189/" source="CVE"/>
		<reference ref_id="CVE-2017-15190" ref_url="https://www.suse.com/security/cve/CVE-2017-15190/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-6467" ref_url="https://www.suse.com/security/cve/CVE-2017-6467/" source="CVE"/>
		<reference ref_id="CVE-2017-6468" ref_url="https://www.suse.com/security/cve/CVE-2017-6468/" source="CVE"/>
		<reference ref_id="CVE-2017-6469" ref_url="https://www.suse.com/security/cve/CVE-2017-6469/" source="CVE"/>
		<reference ref_id="CVE-2017-6470" ref_url="https://www.suse.com/security/cve/CVE-2017-6470/" source="CVE"/>
		<reference ref_id="CVE-2017-6471" ref_url="https://www.suse.com/security/cve/CVE-2017-6471/" source="CVE"/>
		<reference ref_id="CVE-2017-6472" ref_url="https://www.suse.com/security/cve/CVE-2017-6472/" source="CVE"/>
		<reference ref_id="CVE-2017-6473" ref_url="https://www.suse.com/security/cve/CVE-2017-6473/" source="CVE"/>
		<reference ref_id="CVE-2017-6474" ref_url="https://www.suse.com/security/cve/CVE-2017-6474/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="CVE-2018-18225" ref_url="https://www.suse.com/security/cve/CVE-2018-18225/" source="CVE"/>
		<reference ref_id="CVE-2018-18226" ref_url="https://www.suse.com/security/cve/CVE-2018-18226/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="CVE-2018-19628" ref_url="https://www.suse.com/security/cve/CVE-2018-19628/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9257" ref_url="https://www.suse.com/security/cve/CVE-2018-9257/" source="CVE"/>
		<reference ref_id="CVE-2018-9258" ref_url="https://www.suse.com/security/cve/CVE-2018-9258/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10897" ref_url="https://www.suse.com/security/cve/CVE-2019-10897/" source="CVE"/>
		<reference ref_id="CVE-2019-10898" ref_url="https://www.suse.com/security/cve/CVE-2019-10898/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10900" ref_url="https://www.suse.com/security/cve/CVE-2019-10900/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10902" ref_url="https://www.suse.com/security/cve/CVE-2019-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619/" source="CVE"/>
		<reference ref_id="CVE-2019-16319" ref_url="https://www.suse.com/security/cve/CVE-2019-16319/" source="CVE"/>
		<reference ref_id="CVE-2019-19553" ref_url="https://www.suse.com/security/cve/CVE-2019-19553/" source="CVE"/>
		<reference ref_id="CVE-2019-5716" ref_url="https://www.suse.com/security/cve/CVE-2019-5716/" source="CVE"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<reference ref_id="CVE-2020-11647" ref_url="https://www.suse.com/security/cve/CVE-2020-11647/" source="CVE"/>
		<reference ref_id="CVE-2020-13164" ref_url="https://www.suse.com/security/cve/CVE-2020-13164/" source="CVE"/>
		<reference ref_id="CVE-2020-15466" ref_url="https://www.suse.com/security/cve/CVE-2020-15466/" source="CVE"/>
		<reference ref_id="CVE-2020-17498" ref_url="https://www.suse.com/security/cve/CVE-2020-17498/" source="CVE"/>
		<reference ref_id="CVE-2020-25862" ref_url="https://www.suse.com/security/cve/CVE-2020-25862/" source="CVE"/>
		<reference ref_id="CVE-2020-25863" ref_url="https://www.suse.com/security/cve/CVE-2020-25863/" source="CVE"/>
		<reference ref_id="CVE-2020-25866" ref_url="https://www.suse.com/security/cve/CVE-2020-25866/" source="CVE"/>
		<reference ref_id="CVE-2020-26418" ref_url="https://www.suse.com/security/cve/CVE-2020-26418/" source="CVE"/>
		<reference ref_id="CVE-2020-26419" ref_url="https://www.suse.com/security/cve/CVE-2020-26419/" source="CVE"/>
		<reference ref_id="CVE-2020-26420" ref_url="https://www.suse.com/security/cve/CVE-2020-26420/" source="CVE"/>
		<reference ref_id="CVE-2020-26421" ref_url="https://www.suse.com/security/cve/CVE-2020-26421/" source="CVE"/>
		<reference ref_id="CVE-2020-26422" ref_url="https://www.suse.com/security/cve/CVE-2020-26422/" source="CVE"/>
		<reference ref_id="CVE-2020-26575" ref_url="https://www.suse.com/security/cve/CVE-2020-26575/" source="CVE"/>
		<reference ref_id="CVE-2020-28030" ref_url="https://www.suse.com/security/cve/CVE-2020-28030/" source="CVE"/>
		<reference ref_id="CVE-2020-7044" ref_url="https://www.suse.com/security/cve/CVE-2020-7044/" source="CVE"/>
		<reference ref_id="CVE-2020-9428" ref_url="https://www.suse.com/security/cve/CVE-2020-9428/" source="CVE"/>
		<reference ref_id="CVE-2020-9429" ref_url="https://www.suse.com/security/cve/CVE-2020-9429/" source="CVE"/>
		<reference ref_id="CVE-2020-9430" ref_url="https://www.suse.com/security/cve/CVE-2020-9430/" source="CVE"/>
		<reference ref_id="CVE-2020-9431" ref_url="https://www.suse.com/security/cve/CVE-2020-9431/" source="CVE"/>
		<reference ref_id="CVE-2021-22173" ref_url="https://www.suse.com/security/cve/CVE-2021-22173/" source="CVE"/>
		<reference ref_id="CVE-2021-22174" ref_url="https://www.suse.com/security/cve/CVE-2021-22174/" source="CVE"/>
		<reference ref_id="CVE-2021-22191" ref_url="https://www.suse.com/security/cve/CVE-2021-22191/" source="CVE"/>
		<reference ref_id="CVE-2021-22207" ref_url="https://www.suse.com/security/cve/CVE-2021-22207/" source="CVE"/>
		<reference ref_id="CVE-2021-22235" ref_url="https://www.suse.com/security/cve/CVE-2021-22235/" source="CVE"/>
		<reference ref_id="CVE-2021-39920" ref_url="https://www.suse.com/security/cve/CVE-2021-39920/" source="CVE"/>
		<reference ref_id="CVE-2021-39921" ref_url="https://www.suse.com/security/cve/CVE-2021-39921/" source="CVE"/>
		<reference ref_id="CVE-2021-39922" ref_url="https://www.suse.com/security/cve/CVE-2021-39922/" source="CVE"/>
		<reference ref_id="CVE-2021-39924" ref_url="https://www.suse.com/security/cve/CVE-2021-39924/" source="CVE"/>
		<reference ref_id="CVE-2021-39925" ref_url="https://www.suse.com/security/cve/CVE-2021-39925/" source="CVE"/>
		<reference ref_id="CVE-2021-39926" ref_url="https://www.suse.com/security/cve/CVE-2021-39926/" source="CVE"/>
		<reference ref_id="CVE-2021-39928" ref_url="https://www.suse.com/security/cve/CVE-2021-39928/" source="CVE"/>
		<reference ref_id="CVE-2021-39929" ref_url="https://www.suse.com/security/cve/CVE-2021-39929/" source="CVE"/>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<reference ref_id="CVE-2021-4186" ref_url="https://www.suse.com/security/cve/CVE-2021-4186/" source="CVE"/>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="CVE-2022-3190" ref_url="https://www.suse.com/security/cve/CVE-2022-3190/" source="CVE"/>
		<reference ref_id="CVE-2022-3725" ref_url="https://www.suse.com/security/cve/CVE-2022-3725/" source="CVE"/>
		<reference ref_id="CVE-2022-4345" ref_url="https://www.suse.com/security/cve/CVE-2022-4345/" source="CVE"/>
		<reference ref_id="CVE-2023-0411" ref_url="https://www.suse.com/security/cve/CVE-2023-0411/" source="CVE"/>
		<reference ref_id="CVE-2023-0412" ref_url="https://www.suse.com/security/cve/CVE-2023-0412/" source="CVE"/>
		<reference ref_id="CVE-2023-0413" ref_url="https://www.suse.com/security/cve/CVE-2023-0413/" source="CVE"/>
		<reference ref_id="CVE-2023-0414" ref_url="https://www.suse.com/security/cve/CVE-2023-0414/" source="CVE"/>
		<reference ref_id="CVE-2023-0415" ref_url="https://www.suse.com/security/cve/CVE-2023-0415/" source="CVE"/>
		<reference ref_id="CVE-2023-0416" ref_url="https://www.suse.com/security/cve/CVE-2023-0416/" source="CVE"/>
		<reference ref_id="CVE-2023-0417" ref_url="https://www.suse.com/security/cve/CVE-2023-0417/" source="CVE"/>
		<reference ref_id="CVE-2023-0666" ref_url="https://www.suse.com/security/cve/CVE-2023-0666/" source="CVE"/>
		<reference ref_id="CVE-2023-0667" ref_url="https://www.suse.com/security/cve/CVE-2023-0667/" source="CVE"/>
		<reference ref_id="CVE-2023-0668" ref_url="https://www.suse.com/security/cve/CVE-2023-0668/" source="CVE"/>
		<reference ref_id="CVE-2023-1161" ref_url="https://www.suse.com/security/cve/CVE-2023-1161/" source="CVE"/>
		<reference ref_id="CVE-2023-1992" ref_url="https://www.suse.com/security/cve/CVE-2023-1992/" source="CVE"/>
		<reference ref_id="CVE-2023-1993" ref_url="https://www.suse.com/security/cve/CVE-2023-1993/" source="CVE"/>
		<reference ref_id="CVE-2023-1994" ref_url="https://www.suse.com/security/cve/CVE-2023-1994/" source="CVE"/>
		<reference ref_id="CVE-2023-2854" ref_url="https://www.suse.com/security/cve/CVE-2023-2854/" source="CVE"/>
		<reference ref_id="CVE-2023-2855" ref_url="https://www.suse.com/security/cve/CVE-2023-2855/" source="CVE"/>
		<reference ref_id="CVE-2023-2856" ref_url="https://www.suse.com/security/cve/CVE-2023-2856/" source="CVE"/>
		<reference ref_id="CVE-2023-2857" ref_url="https://www.suse.com/security/cve/CVE-2023-2857/" source="CVE"/>
		<reference ref_id="CVE-2023-2858" ref_url="https://www.suse.com/security/cve/CVE-2023-2858/" source="CVE"/>
		<reference ref_id="CVE-2023-2879" ref_url="https://www.suse.com/security/cve/CVE-2023-2879/" source="CVE"/>
		<reference ref_id="CVE-2023-2906" ref_url="https://www.suse.com/security/cve/CVE-2023-2906/" source="CVE"/>
		<reference ref_id="CVE-2023-2952" ref_url="https://www.suse.com/security/cve/CVE-2023-2952/" source="CVE"/>
		<reference ref_id="CVE-2023-3648" ref_url="https://www.suse.com/security/cve/CVE-2023-3648/" source="CVE"/>
		<reference ref_id="CVE-2023-3649" ref_url="https://www.suse.com/security/cve/CVE-2023-3649/" source="CVE"/>
		<reference ref_id="CVE-2023-4511" ref_url="https://www.suse.com/security/cve/CVE-2023-4511/" source="CVE"/>
		<reference ref_id="CVE-2023-4512" ref_url="https://www.suse.com/security/cve/CVE-2023-4512/" source="CVE"/>
		<reference ref_id="CVE-2023-4513" ref_url="https://www.suse.com/security/cve/CVE-2023-4513/" source="CVE"/>
		<reference ref_id="CVE-2023-5371" ref_url="https://www.suse.com/security/cve/CVE-2023-5371/" source="CVE"/>
		<reference ref_id="CVE-2023-6174" ref_url="https://www.suse.com/security/cve/CVE-2023-6174/" source="CVE"/>
		<reference ref_id="CVE-2023-6175" ref_url="https://www.suse.com/security/cve/CVE-2023-6175/" source="CVE"/>
		<reference ref_id="CVE-2024-0207" ref_url="https://www.suse.com/security/cve/CVE-2024-0207/" source="CVE"/>
		<reference ref_id="CVE-2024-0208" ref_url="https://www.suse.com/security/cve/CVE-2024-0208/" source="CVE"/>
		<reference ref_id="CVE-2024-0209" ref_url="https://www.suse.com/security/cve/CVE-2024-0209/" source="CVE"/>
		<reference ref_id="CVE-2024-0210" ref_url="https://www.suse.com/security/cve/CVE-2024-0210/" source="CVE"/>
		<reference ref_id="CVE-2024-0211" ref_url="https://www.suse.com/security/cve/CVE-2024-0211/" source="CVE"/>
		<reference ref_id="CVE-2024-11595" ref_url="https://www.suse.com/security/cve/CVE-2024-11595/" source="CVE"/>
		<reference ref_id="CVE-2024-11596" ref_url="https://www.suse.com/security/cve/CVE-2024-11596/" source="CVE"/>
		<reference ref_id="CVE-2024-24476" ref_url="https://www.suse.com/security/cve/CVE-2024-24476/" source="CVE"/>
		<reference ref_id="CVE-2024-2955" ref_url="https://www.suse.com/security/cve/CVE-2024-2955/" source="CVE"/>
		<reference ref_id="CVE-2024-4853" ref_url="https://www.suse.com/security/cve/CVE-2024-4853/" source="CVE"/>
		<reference ref_id="CVE-2024-4854" ref_url="https://www.suse.com/security/cve/CVE-2024-4854/" source="CVE"/>
		<reference ref_id="CVE-2024-4855" ref_url="https://www.suse.com/security/cve/CVE-2024-4855/" source="CVE"/>
		<reference ref_id="CVE-2024-8250" ref_url="https://www.suse.com/security/cve/CVE-2024-8250/" source="CVE"/>
		<reference ref_id="CVE-2024-8645" ref_url="https://www.suse.com/security/cve/CVE-2024-8645/" source="CVE"/>
		<reference ref_id="CVE-2024-9780" ref_url="https://www.suse.com/security/cve/CVE-2024-9780/" source="CVE"/>
		<reference ref_id="CVE-2024-9781" ref_url="https://www.suse.com/security/cve/CVE-2024-9781/" source="CVE"/>
		<reference ref_id="CVE-2025-1492" ref_url="https://www.suse.com/security/cve/CVE-2025-1492/" source="CVE"/>
		<reference ref_id="CVE-2025-5601" ref_url="https://www.suse.com/security/cve/CVE-2025-5601/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark18-4.4.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1932">CVE-2006-1932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1940/">CVE-2006-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1940">CVE-2006-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-4574">CVE-2006-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4805">CVE-2006-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5468">CVE-2006-5468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5469">CVE-2006-5469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5740">CVE-2006-5740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0456">CVE-2007-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0457">CVE-2007-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0458">CVE-2007-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0459">CVE-2007-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3241">CVE-2009-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3242">CVE-2009-3242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3243">CVE-2009-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1455">CVE-2010-1455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2993">CVE-2010-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3445">CVE-2010-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4300">CVE-2010-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4301">CVE-2010-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4538">CVE-2010-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0024">CVE-2011-0024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0538">CVE-2011-0538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0713">CVE-2011-0713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1138">CVE-2011-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1139">CVE-2011-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1140">CVE-2011-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1143">CVE-2011-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1590">CVE-2011-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1591">CVE-2011-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1592">CVE-2011-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1957">CVE-2011-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1958">CVE-2011-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1959">CVE-2011-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2174">CVE-2011-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2175">CVE-2011-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2597">CVE-2011-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2698">CVE-2011-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3266">CVE-2011-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3360">CVE-2011-3360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3483">CVE-2011-3483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2392">CVE-2012-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2393">CVE-2012-2393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2394">CVE-2012-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3548">CVE-2012-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4048">CVE-2012-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4049">CVE-2012-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4285">CVE-2012-4285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4286">CVE-2012-4286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4287">CVE-2012-4287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4288">CVE-2012-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4289">CVE-2012-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4290">CVE-2012-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4291">CVE-2012-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4292">CVE-2012-4292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4293">CVE-2012-4293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4294">CVE-2012-4294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4295">CVE-2012-4295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4296">CVE-2012-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4297">CVE-2012-4297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4298">CVE-2012-4298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5237">CVE-2012-5237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5238">CVE-2012-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5239">CVE-2012-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5240">CVE-2012-5240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5592">CVE-2012-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5593">CVE-2012-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5594">CVE-2012-5594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5595">CVE-2012-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5596">CVE-2012-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5597">CVE-2012-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5598">CVE-2012-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5599">CVE-2012-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5600">CVE-2012-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5601">CVE-2012-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5602">CVE-2012-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1572">CVE-2013-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1573">CVE-2013-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1574">CVE-2013-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1575">CVE-2013-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1576">CVE-2013-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1577">CVE-2013-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1578">CVE-2013-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1579">CVE-2013-1579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1580">CVE-2013-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1581">CVE-2013-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1582">CVE-2013-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1583">CVE-2013-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1584">CVE-2013-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1585">CVE-2013-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1586">CVE-2013-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1587">CVE-2013-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1588">CVE-2013-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1589">CVE-2013-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1590">CVE-2013-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2475">CVE-2013-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2476">CVE-2013-2476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2477">CVE-2013-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2478">CVE-2013-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2479">CVE-2013-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2480">CVE-2013-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2481">CVE-2013-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2482">CVE-2013-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2483">CVE-2013-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2484">CVE-2013-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2485">CVE-2013-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2488">CVE-2013-2488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3555">CVE-2013-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3556">CVE-2013-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3557">CVE-2013-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3558">CVE-2013-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3559">CVE-2013-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3560">CVE-2013-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3561">CVE-2013-3561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3562">CVE-2013-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4083">CVE-2013-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4920">CVE-2013-4920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4921">CVE-2013-4921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4922">CVE-2013-4922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4923">CVE-2013-4923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4924">CVE-2013-4924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4925">CVE-2013-4925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4926">CVE-2013-4926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4927">CVE-2013-4927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4928">CVE-2013-4928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4929">CVE-2013-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4930">CVE-2013-4930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4931">CVE-2013-4931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4932">CVE-2013-4932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4933">CVE-2013-4933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4934">CVE-2013-4934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4935">CVE-2013-4935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4936">CVE-2013-4936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5717">CVE-2013-5717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5718">CVE-2013-5718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5719">CVE-2013-5719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5720">CVE-2013-5720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5721">CVE-2013-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5722">CVE-2013-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6336">CVE-2013-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6337">CVE-2013-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6338">CVE-2013-6338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6339">CVE-2013-6339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6340">CVE-2013-6340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7112">CVE-2013-7112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7113">CVE-2013-7113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7114">CVE-2013-7114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2281">CVE-2014-2281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2282">CVE-2014-2282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2283">CVE-2014-2283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2299">CVE-2014-2299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2907">CVE-2014-2907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4020">CVE-2014-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5161">CVE-2014-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5162">CVE-2014-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5163">CVE-2014-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5164">CVE-2014-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5165">CVE-2014-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6423">CVE-2014-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6424">CVE-2014-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6425/">CVE-2014-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6425">CVE-2014-6425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6426/">CVE-2014-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6426">CVE-2014-6426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6427">CVE-2014-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6428">CVE-2014-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6429">CVE-2014-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6430">CVE-2014-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6431">CVE-2014-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6432">CVE-2014-6432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8710">CVE-2014-8710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8711">CVE-2014-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8712">CVE-2014-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8713">CVE-2014-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8714">CVE-2014-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0559">CVE-2015-0559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0560">CVE-2015-0560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0561">CVE-2015-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2187/">CVE-2015-2187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2187">CVE-2015-2187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2190/">CVE-2015-2190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2190">CVE-2015-2190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2192/">CVE-2015-2192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2192">CVE-2015-2192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3808/">CVE-2015-3808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3808">CVE-2015-3808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3809/">CVE-2015-3809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3809">CVE-2015-3809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3810/">CVE-2015-3810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3810">CVE-2015-3810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3811">CVE-2015-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3812">CVE-2015-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3814">CVE-2015-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3815/">CVE-2015-3815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3815">CVE-2015-3815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4651/">CVE-2015-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4651">CVE-2015-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4652">CVE-2015-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6241">CVE-2015-6241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6242">CVE-2015-6242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6243">CVE-2015-6243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6244">CVE-2015-6244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6245">CVE-2015-6245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6246">CVE-2015-6246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6247">CVE-2015-6247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6248">CVE-2015-6248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6249">CVE-2015-6249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7830">CVE-2015-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8711">CVE-2015-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8718">CVE-2015-8718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8720">CVE-2015-8720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8721">CVE-2015-8721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8722">CVE-2015-8722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8723">CVE-2015-8723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8724">CVE-2015-8724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8725">CVE-2015-8725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8726">CVE-2015-8726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8727">CVE-2015-8727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8728">CVE-2015-8728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8729">CVE-2015-8729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8730">CVE-2015-8730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8731">CVE-2015-8731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8732">CVE-2015-8732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8733">CVE-2015-8733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8734/">CVE-2015-8734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8734">CVE-2015-8734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8735/">CVE-2015-8735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8735">CVE-2015-8735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8736/">CVE-2015-8736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8736">CVE-2015-8736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8737/">CVE-2015-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8737">CVE-2015-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8738/">CVE-2015-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8738">CVE-2015-8738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8739/">CVE-2015-8739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8739">CVE-2015-8739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8740/">CVE-2015-8740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8740">CVE-2015-8740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8741/">CVE-2015-8741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8741">CVE-2015-8741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8742/">CVE-2015-8742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8742">CVE-2015-8742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2522/">CVE-2016-2522 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2522">CVE-2016-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2523">CVE-2016-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2524/">CVE-2016-2524 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2524">CVE-2016-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2525/">CVE-2016-2525 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2525">CVE-2016-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2526/">CVE-2016-2526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2526">CVE-2016-2526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2527/">CVE-2016-2527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2527">CVE-2016-2527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2528/">CVE-2016-2528 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2528">CVE-2016-2528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2529/">CVE-2016-2529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2529">CVE-2016-2529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2530">CVE-2016-2530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2531">CVE-2016-2531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2532">CVE-2016-2532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5350">CVE-2016-5350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5351">CVE-2016-5351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5352">CVE-2016-5352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5353">CVE-2016-5353 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5354">CVE-2016-5354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5355">CVE-2016-5355 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5356">CVE-2016-5356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5357">CVE-2016-5357 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5358">CVE-2016-5358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6505">CVE-2016-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6508">CVE-2016-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6509">CVE-2016-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6510">CVE-2016-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6511">CVE-2016-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6512/">CVE-2016-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6512">CVE-2016-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6513/">CVE-2016-6513 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6513">CVE-2016-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7175">CVE-2016-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7176">CVE-2016-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7177">CVE-2016-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7178">CVE-2016-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7179">CVE-2016-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7180">CVE-2016-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9372/">CVE-2016-9372 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9372">CVE-2016-9372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9373">CVE-2016-9373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9374">CVE-2016-9374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9375">CVE-2016-9375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9376">CVE-2016-9376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11406">CVE-2017-11406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11407">CVE-2017-11407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11408">CVE-2017-11408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11410">CVE-2017-11410 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11411">CVE-2017-11411 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13764/">CVE-2017-13764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13764">CVE-2017-13764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13765">CVE-2017-13765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13766">CVE-2017-13766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13767">CVE-2017-13767 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15189/">CVE-2017-15189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15189">CVE-2017-15189 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15190/">CVE-2017-15190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15190">CVE-2017-15190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15191">CVE-2017-15191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15192">CVE-2017-15192 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15193">CVE-2017-15193 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17083">CVE-2017-17083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17084">CVE-2017-17084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17085">CVE-2017-17085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5596">CVE-2017-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5597">CVE-2017-5597 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6467/">CVE-2017-6467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6467">CVE-2017-6467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6468/">CVE-2017-6468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6468">CVE-2017-6468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6469/">CVE-2017-6469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6469">CVE-2017-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6470/">CVE-2017-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6470">CVE-2017-6470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6471/">CVE-2017-6471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6471">CVE-2017-6471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6472/">CVE-2017-6472 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6472">CVE-2017-6472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6473/">CVE-2017-6473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6473">CVE-2017-6473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6474/">CVE-2017-6474 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6474">CVE-2017-6474 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7700">CVE-2017-7700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7701">CVE-2017-7701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7702">CVE-2017-7702 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7703">CVE-2017-7703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7704">CVE-2017-7704 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7705">CVE-2017-7705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7745">CVE-2017-7745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7746">CVE-2017-7746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7747">CVE-2017-7747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7748">CVE-2017-7748 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9343">CVE-2017-9343 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9344">CVE-2017-9344 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9345">CVE-2017-9345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9346">CVE-2017-9346 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9347">CVE-2017-9347 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9348">CVE-2017-9348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9349">CVE-2017-9349 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9350">CVE-2017-9350 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9351">CVE-2017-9351 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9352">CVE-2017-9352 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9353">CVE-2017-9353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9354">CVE-2017-9354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11354">CVE-2018-11354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11355">CVE-2018-11355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11356">CVE-2018-11356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11357">CVE-2018-11357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11358">CVE-2018-11358 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11359">CVE-2018-11359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11360">CVE-2018-11360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11361">CVE-2018-11361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12086">CVE-2018-12086 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14339">CVE-2018-14339 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14342">CVE-2018-14342 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14343">CVE-2018-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14344">CVE-2018-14344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14367">CVE-2018-14367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14369">CVE-2018-14369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14370">CVE-2018-14370 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16056">CVE-2018-16056 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16058">CVE-2018-16058 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18225/">CVE-2018-18225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18225">CVE-2018-18225 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18226/">CVE-2018-18226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18226">CVE-2018-18226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18227">CVE-2018-18227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19622">CVE-2018-19622 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19623">CVE-2018-19623 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19624">CVE-2018-19624 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19625">CVE-2018-19625 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19626">CVE-2018-19626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19627">CVE-2018-19627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19628/">CVE-2018-19628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19628">CVE-2018-19628 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5334">CVE-2018-5334 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5335">CVE-2018-5335 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5336">CVE-2018-5336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7320">CVE-2018-7320 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7321">CVE-2018-7321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7322">CVE-2018-7322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7323">CVE-2018-7323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7324">CVE-2018-7324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7325">CVE-2018-7325 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7326">CVE-2018-7326 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7327">CVE-2018-7327 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7328">CVE-2018-7328 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7329">CVE-2018-7329 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7330">CVE-2018-7330 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7331">CVE-2018-7331 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7332">CVE-2018-7332 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7333">CVE-2018-7333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7334">CVE-2018-7334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7335">CVE-2018-7335 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7336">CVE-2018-7336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7337">CVE-2018-7337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7417">CVE-2018-7417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7419">CVE-2018-7419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7420">CVE-2018-7420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7421">CVE-2018-7421 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9256">CVE-2018-9256 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9257/">CVE-2018-9257 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9257">CVE-2018-9257 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9258/">CVE-2018-9258 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9258">CVE-2018-9258 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9260">CVE-2018-9260 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9261">CVE-2018-9261 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9262">CVE-2018-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9263">CVE-2018-9263 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9264">CVE-2018-9264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9265">CVE-2018-9265 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9266">CVE-2018-9266 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9267">CVE-2018-9267 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9268">CVE-2018-9268 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9269">CVE-2018-9269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9270">CVE-2018-9270 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9271">CVE-2018-9271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9272">CVE-2018-9272 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9273">CVE-2018-9273 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9274">CVE-2018-9274 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10894">CVE-2019-10894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10895">CVE-2019-10895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10896">CVE-2019-10896 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10897/">CVE-2019-10897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10897">CVE-2019-10897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10898/">CVE-2019-10898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10898">CVE-2019-10898 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10899">CVE-2019-10899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10900/">CVE-2019-10900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10900">CVE-2019-10900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10901">CVE-2019-10901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10902/">CVE-2019-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10902">CVE-2019-10902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10903">CVE-2019-10903 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13619">CVE-2019-13619 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16319/">CVE-2019-16319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16319">CVE-2019-16319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19553/">CVE-2019-19553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19553">CVE-2019-19553 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5716/">CVE-2019-5716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5716">CVE-2019-5716 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5717">CVE-2019-5717 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5718">CVE-2019-5718 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5719">CVE-2019-5719 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5721">CVE-2019-5721 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9208">CVE-2019-9208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9209">CVE-2019-9209 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9214">CVE-2019-9214 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11647/">CVE-2020-11647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11647">CVE-2020-11647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13164/">CVE-2020-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13164">CVE-2020-13164 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15466/">CVE-2020-15466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15466">CVE-2020-15466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17498/">CVE-2020-17498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17498">CVE-2020-17498 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25862/">CVE-2020-25862 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25862">CVE-2020-25862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25863/">CVE-2020-25863 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25863">CVE-2020-25863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25866/">CVE-2020-25866 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25866">CVE-2020-25866 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26418/">CVE-2020-26418 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26418">CVE-2020-26418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26419/">CVE-2020-26419 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26419">CVE-2020-26419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26420/">CVE-2020-26420 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26420">CVE-2020-26420 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26421/">CVE-2020-26421 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26421">CVE-2020-26421 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26422/">CVE-2020-26422 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26422">CVE-2020-26422 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26575/">CVE-2020-26575 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26575">CVE-2020-26575 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28030/">CVE-2020-28030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28030">CVE-2020-28030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7044/">CVE-2020-7044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7044">CVE-2020-7044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9428/">CVE-2020-9428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9428">CVE-2020-9428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9429/">CVE-2020-9429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9429">CVE-2020-9429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9430/">CVE-2020-9430 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9430">CVE-2020-9430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9431/">CVE-2020-9431 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9431">CVE-2020-9431 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22173/">CVE-2021-22173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22173">CVE-2021-22173 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22174/">CVE-2021-22174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22174">CVE-2021-22174 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22191/">CVE-2021-22191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22191">CVE-2021-22191 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22207/">CVE-2021-22207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22207">CVE-2021-22207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22235/">CVE-2021-22235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22235">CVE-2021-22235 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39920/">CVE-2021-39920 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39920">CVE-2021-39920 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39921/">CVE-2021-39921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39921">CVE-2021-39921 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39922/">CVE-2021-39922 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39922">CVE-2021-39922 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39924/">CVE-2021-39924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39924">CVE-2021-39924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39925/">CVE-2021-39925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39925">CVE-2021-39925 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39926/">CVE-2021-39926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39926">CVE-2021-39926 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39928/">CVE-2021-39928 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39928">CVE-2021-39928 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39929/">CVE-2021-39929 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39929">CVE-2021-39929 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4181">CVE-2021-4181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4182">CVE-2021-4182 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4183">CVE-2021-4183 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4184">CVE-2021-4184 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4185">CVE-2021-4185 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4186/">CVE-2021-4186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4186">CVE-2021-4186 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4190">CVE-2021-4190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0581">CVE-2022-0581 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0582">CVE-2022-0582 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0583">CVE-2022-0583 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0585">CVE-2022-0585 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0586">CVE-2022-0586 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3190/">CVE-2022-3190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3190">CVE-2022-3190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3725/">CVE-2022-3725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3725">CVE-2022-3725 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4345/">CVE-2022-4345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4345">CVE-2022-4345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0411/">CVE-2023-0411 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0411">CVE-2023-0411 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0412/">CVE-2023-0412 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0412">CVE-2023-0412 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0413/">CVE-2023-0413 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0413">CVE-2023-0413 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0414/">CVE-2023-0414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0414">CVE-2023-0414 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0415/">CVE-2023-0415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0415">CVE-2023-0415 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0416/">CVE-2023-0416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0416">CVE-2023-0416 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0417/">CVE-2023-0417 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0417">CVE-2023-0417 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0666/">CVE-2023-0666 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0666">CVE-2023-0666 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0667/">CVE-2023-0667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0667">CVE-2023-0667 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0668/">CVE-2023-0668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0668">CVE-2023-0668 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1161/">CVE-2023-1161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1161">CVE-2023-1161 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1992/">CVE-2023-1992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1992">CVE-2023-1992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1993/">CVE-2023-1993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1993">CVE-2023-1993 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1994/">CVE-2023-1994 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1994">CVE-2023-1994 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2854/">CVE-2023-2854 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2854">CVE-2023-2854 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2855/">CVE-2023-2855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2855">CVE-2023-2855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2856/">CVE-2023-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2856">CVE-2023-2856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2857/">CVE-2023-2857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2857">CVE-2023-2857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2858/">CVE-2023-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2858">CVE-2023-2858 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2879/">CVE-2023-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2879">CVE-2023-2879 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2906/">CVE-2023-2906 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2906">CVE-2023-2906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2952/">CVE-2023-2952 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2952">CVE-2023-2952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3648/">CVE-2023-3648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3648">CVE-2023-3648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3649/">CVE-2023-3649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3649">CVE-2023-3649 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4511/">CVE-2023-4511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4511">CVE-2023-4511 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4512/">CVE-2023-4512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4512">CVE-2023-4512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4513/">CVE-2023-4513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4513">CVE-2023-4513 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5371/">CVE-2023-5371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5371">CVE-2023-5371 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6174/">CVE-2023-6174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6174">CVE-2023-6174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6175/">CVE-2023-6175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6175">CVE-2023-6175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0207/">CVE-2024-0207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0207">CVE-2024-0207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0208/">CVE-2024-0208 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0208">CVE-2024-0208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0209/">CVE-2024-0209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0209">CVE-2024-0209 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0210/">CVE-2024-0210 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0210">CVE-2024-0210 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0211/">CVE-2024-0211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0211">CVE-2024-0211 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11595/">CVE-2024-11595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11595">CVE-2024-11595 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11596/">CVE-2024-11596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11596">CVE-2024-11596 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24476/">CVE-2024-24476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24476">CVE-2024-24476 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2955/">CVE-2024-2955 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2955">CVE-2024-2955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4853/">CVE-2024-4853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4853">CVE-2024-4853 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4854/">CVE-2024-4854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4854">CVE-2024-4854 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-4855/">CVE-2024-4855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4855">CVE-2024-4855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8250/">CVE-2024-8250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8250">CVE-2024-8250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-8645/">CVE-2024-8645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8645">CVE-2024-8645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-9780/">CVE-2024-9780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9780">CVE-2024-9780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-9781/">CVE-2024-9781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9781">CVE-2024-9781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1492/">CVE-2025-1492 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1492">CVE-2025-1492 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-5601/">CVE-2025-5601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5601">CVE-2025-5601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028491" comment="libwireshark18-4.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028492" comment="libwiretap15-4.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028493" comment="libwsutil16-4.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028494" comment="wireshark-4.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028495" comment="wireshark-devel-4.4.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028496" comment="wireshark-ui-qt-4.4.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94128" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.13-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-3376" ref_url="https://www.suse.com/security/cve/CVE-2006-3376/" source="CVE"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.13-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3376/">CVE-2006-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3376">CVE-2006-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0848">CVE-2015-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4588">CVE-2015-4588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4695">CVE-2015-4695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4696">CVE-2015-4696 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028497" comment="libwmf-0_2-7-0.2.13-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028498" comment="libwmf-tools-0.2.13-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94129" version="1" class="patch">
	<metadata>
		<title>libxcb-composite0-1.17.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-composite0-1.17.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2064">CVE-2013-2064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028499" comment="libxcb-composite0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028500" comment="libxcb-damage0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028501" comment="libxcb-dbe0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028502" comment="libxcb-devel-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028503" comment="libxcb-devel-doc-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028504" comment="libxcb-dpms0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028505" comment="libxcb-dri2-0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028506" comment="libxcb-dri3-0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028507" comment="libxcb-glx0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028508" comment="libxcb-present0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028509" comment="libxcb-randr0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028510" comment="libxcb-record0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028511" comment="libxcb-render0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028512" comment="libxcb-res0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028513" comment="libxcb-screensaver0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028514" comment="libxcb-shape0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028515" comment="libxcb-shm0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028516" comment="libxcb-sync1-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028517" comment="libxcb-xf86dri0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028518" comment="libxcb-xfixes0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028519" comment="libxcb-xinerama0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028520" comment="libxcb-xinput0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028521" comment="libxcb-xkb1-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028522" comment="libxcb-xtest0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028523" comment="libxcb-xv0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028524" comment="libxcb-xvmc0-1.17.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028525" comment="libxcb1-1.17.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94130" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_3-3.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_3-3.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1885">CVE-2009-1885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0729">CVE-2016-0729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2099">CVE-2016-2099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4463">CVE-2016-4463 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12627">CVE-2017-12627 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1311">CVE-2018-1311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028526" comment="libxerces-c-3_3-3.3.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94131" version="1" class="patch">
	<metadata>
		<title>libxkbcommon-devel-1.8.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854/" source="CVE"/>
		<reference ref_id="CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855/" source="CVE"/>
		<reference ref_id="CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856/" source="CVE"/>
		<reference ref_id="CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857/" source="CVE"/>
		<reference ref_id="CVE-2018-15858" ref_url="https://www.suse.com/security/cve/CVE-2018-15858/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<reference ref_id="CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864/" source="CVE"/>
		<description>
These are all security issues fixed in the libxkbcommon-devel-1.8.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15854">CVE-2018-15854 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15855">CVE-2018-15855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15856">CVE-2018-15856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15857">CVE-2018-15857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15858/">CVE-2018-15858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15858">CVE-2018-15858 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15862">CVE-2018-15862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15864">CVE-2018-15864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028527" comment="libxkbcommon-devel-1.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028528" comment="libxkbcommon-tools-1.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028529" comment="libxkbcommon-x11-0-1.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028530" comment="libxkbcommon-x11-devel-1.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028531" comment="libxkbcommon0-1.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028532" comment="libxkbregistry-devel-1.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028533" comment="libxkbregistry0-1.8.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94132" version="1" class="patch">
	<metadata>
		<title>libxkbfile-devel-1.1.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<description>
These are all security issues fixed in the libxkbfile-devel-1.1.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028534" comment="libxkbfile-devel-1.1.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028535" comment="libxkbfile1-1.1.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94133" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.13.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309/" source="CVE"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<reference ref_id="CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322/" source="CVE"/>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<reference ref_id="CVE-2024-34459" ref_url="https://www.suse.com/security/cve/CVE-2024-34459/" source="CVE"/>
		<reference ref_id="CVE-2024-40896" ref_url="https://www.suse.com/security/cve/CVE-2024-40896/" source="CVE"/>
		<reference ref_id="CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171/" source="CVE"/>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<reference ref_id="CVE-2025-27113" ref_url="https://www.suse.com/security/cve/CVE-2025-27113/" source="CVE"/>
		<reference ref_id="CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414/" source="CVE"/>
		<reference ref_id="CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415/" source="CVE"/>
		<reference ref_id="CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794/" source="CVE"/>
		<reference ref_id="CVE-2025-49795" ref_url="https://www.suse.com/security/cve/CVE-2025-49795/" source="CVE"/>
		<reference ref_id="CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796/" source="CVE"/>
		<reference ref_id="CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021/" source="CVE"/>
		<reference ref_id="CVE-2025-6170" ref_url="https://www.suse.com/security/cve/CVE-2025-6170/" source="CVE"/>
		<reference ref_id="CVE-2025-7425" ref_url="https://www.suse.com/security/cve/CVE-2025-7425/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.13.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6284">CVE-2007-6284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4494">CVE-2010-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1944">CVE-2011-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0338">CVE-2013-0338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1969">CVE-2013-1969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14567">CVE-2018-14567 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9251">CVE-2018-9251 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-34459/">CVE-2024-34459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40896/">CVE-2024-40896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40896">CVE-2024-40896 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27113/">CVE-2025-27113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27113">CVE-2025-27113 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49795/">CVE-2025-49795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49795">CVE-2025-49795 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6170/">CVE-2025-6170 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6170">CVE-2025-6170 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-7425/">CVE-2025-7425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7425">CVE-2025-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028536" comment="libxml2-2-2.13.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028537" comment="libxml2-devel-2.13.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028538" comment="libxml2-doc-2.13.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028539" comment="libxml2-tools-2.13.8-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028540" comment="python313-libxml2-2.13.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94134" version="1" class="patch">
	<metadata>
		<title>libxmltooling-lite11-3.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486/" source="CVE"/>
		<reference ref_id="CVE-2018-0489" ref_url="https://www.suse.com/security/cve/CVE-2018-0489/" source="CVE"/>
		<reference ref_id="CVE-2019-9628" ref_url="https://www.suse.com/security/cve/CVE-2019-9628/" source="CVE"/>
		<description>
These are all security issues fixed in the libxmltooling-lite11-3.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0486">CVE-2018-0486 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0489/">CVE-2018-0489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0489">CVE-2018-0489 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9628/">CVE-2019-9628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9628">CVE-2019-9628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028541" comment="libxmltooling-lite11-3.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028542" comment="libxmltooling11-3.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028543" comment="xmltooling-schemas-3.3.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94135" version="1" class="patch">
	<metadata>
		<title>libyajl-devel-2.1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<reference ref_id="CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460/" source="CVE"/>
		<description>
These are all security issues fixed in the libyajl-devel-2.1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028544" comment="libyajl-devel-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028545" comment="libyajl-devel-static-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028546" comment="libyajl2-2.1.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028547" comment="yajl-2.1.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94136" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.2.5-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.2.5-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6393">CVE-2013-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2525">CVE-2014-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028548" comment="libyaml-0-2-0.2.5-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028549" comment="libyaml-devel-0.2.5-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94137" version="1" class="patch">
	<metadata>
		<title>libyaml-cpp0_8-0.8.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-cpp0_8-0.8.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5950">CVE-2017-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028550" comment="libyaml-cpp0_8-0.8.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028551" comment="yaml-cpp-devel-0.8.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94138" version="1" class="patch">
	<metadata>
		<title>libyang2-2.1.148-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-26916" ref_url="https://www.suse.com/security/cve/CVE-2023-26916/" source="CVE"/>
		<description>
These are all security issues fixed in the libyang2-2.1.148-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26916/">CVE-2023-26916 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26916">CVE-2023-26916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028552" comment="libyang2-2.1.148-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94139" version="1" class="patch">
	<metadata>
		<title>libyelp0-42.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-3155" ref_url="https://www.suse.com/security/cve/CVE-2025-3155/" source="CVE"/>
		<description>
These are all security issues fixed in the libyelp0-42.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3155/">CVE-2025-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3155">CVE-2025-3155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028553" comment="libyelp0-42.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028554" comment="yelp-42.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028555" comment="yelp-lang-42.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028556" comment="yelp-xsl-42.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94140" version="1" class="patch">
	<metadata>
		<title>libzbar0-0.23.93-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-40889" ref_url="https://www.suse.com/security/cve/CVE-2023-40889/" source="CVE"/>
		<reference ref_id="CVE-2023-40890" ref_url="https://www.suse.com/security/cve/CVE-2023-40890/" source="CVE"/>
		<description>
These are all security issues fixed in the libzbar0-0.23.93-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40889/">CVE-2023-40889 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40889">CVE-2023-40889 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40890/">CVE-2023-40890 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40890">CVE-2023-40890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028557" comment="libzbar0-0.23.93-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028558" comment="python3-zbar-0.23.93-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94141" version="1" class="patch">
	<metadata>
		<title>libzip-devel-1.11.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2017-12858" ref_url="https://www.suse.com/security/cve/CVE-2017-12858/" source="CVE"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip-devel-1.11.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1162">CVE-2012-1162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1163">CVE-2012-1163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2331">CVE-2015-2331 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12858/">CVE-2017-12858 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12858">CVE-2017-12858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14107">CVE-2017-14107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028559" comment="libzip-devel-1.11.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028560" comment="libzip-tools-1.11.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028561" comment="libzip5-1.11.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94142" version="1" class="patch">
	<metadata>
		<title>libzmq5-4.3.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250/" source="CVE"/>
		<reference ref_id="CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq5-4.3.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7202">CVE-2014-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7203">CVE-2014-7203 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9721">CVE-2014-9721 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13132">CVE-2019-13132 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15166">CVE-2020-15166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028562" comment="libzmq5-4.3.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028563" comment="zeromq-devel-4.3.5-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028564" comment="zeromq-tools-4.3.5-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94143" version="1" class="patch">
	<metadata>
		<title>libzstd-devel-1.5.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-11922" ref_url="https://www.suse.com/security/cve/CVE-2019-11922/" source="CVE"/>
		<description>
These are all security issues fixed in the libzstd-devel-1.5.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11922/">CVE-2019-11922 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11922">CVE-2019-11922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028565" comment="libzstd-devel-1.5.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028566" comment="libzstd-devel-static-1.5.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028567" comment="libzstd1-1.5.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028568" comment="libzstd1-x86-64-v3-1.5.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028569" comment="zstd-1.5.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028570" comment="zstd-gzip-1.5.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94144" version="1" class="patch">
	<metadata>
		<title>libzvbi-chains0-0.2.44-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-2173" ref_url="https://www.suse.com/security/cve/CVE-2025-2173/" source="CVE"/>
		<reference ref_id="CVE-2025-2174" ref_url="https://www.suse.com/security/cve/CVE-2025-2174/" source="CVE"/>
		<reference ref_id="CVE-2025-2175" ref_url="https://www.suse.com/security/cve/CVE-2025-2175/" source="CVE"/>
		<reference ref_id="CVE-2025-2176" ref_url="https://www.suse.com/security/cve/CVE-2025-2176/" source="CVE"/>
		<reference ref_id="CVE-2025-2177" ref_url="https://www.suse.com/security/cve/CVE-2025-2177/" source="CVE"/>
		<description>
These are all security issues fixed in the libzvbi-chains0-0.2.44-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2173/">CVE-2025-2173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2173">CVE-2025-2173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-2174/">CVE-2025-2174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2174">CVE-2025-2174 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-2175/">CVE-2025-2175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2175">CVE-2025-2175 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2176/">CVE-2025-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2176">CVE-2025-2176 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2177/">CVE-2025-2177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2177">CVE-2025-2177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028571" comment="libzvbi-chains0-0.2.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028572" comment="libzvbi0-0.2.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028573" comment="zvbi-0.2.44-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028574" comment="zvbi-lang-0.2.44-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94145" version="1" class="patch">
	<metadata>
		<title>libzypp-17.37.17-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-17.37.17-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7435">CVE-2017-7435 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9271">CVE-2017-9271 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7685">CVE-2018-7685 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028575" comment="libzypp-17.37.17-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028576" comment="libzypp-devel-17.37.17-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028577" comment="libzypp-devel-doc-17.37.17-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94146" version="1" class="patch">
	<metadata>
		<title>libzypp-plugin-appdata-1.0.1+git.20240209-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-22643" ref_url="https://www.suse.com/security/cve/CVE-2023-22643/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-plugin-appdata-1.0.1+git.20240209-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22643/">CVE-2023-22643 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22643">CVE-2023-22643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028578" comment="libzypp-plugin-appdata-1.0.1+git.20240209-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94147" version="1" class="patch">
	<metadata>
		<title>logrotate-3.22.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<reference ref_id="CVE-2022-1348" ref_url="https://www.suse.com/security/cve/CVE-2022-1348/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.22.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1348/">CVE-2022-1348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028579" comment="logrotate-3.22.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94148" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028580" comment="mailx-12.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94149" version="1" class="patch">
	<metadata>
		<title>man-2.13.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.13.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4250">CVE-2006-4250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028581" comment="man-2.13.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94150" version="1" class="patch">
	<metadata>
		<title>maven-3.9.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956/" source="CVE"/>
		<reference ref_id="CVE-2021-26291" ref_url="https://www.suse.com/security/cve/CVE-2021-26291/" source="CVE"/>
		<reference ref_id="CVE-2021-42550" ref_url="https://www.suse.com/security/cve/CVE-2021-42550/" source="CVE"/>
		<description>
These are all security issues fixed in the maven-3.9.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13956">CVE-2020-13956 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-26291/">CVE-2021-26291 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26291">CVE-2021-26291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42550/">CVE-2021-42550 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42550">CVE-2021-42550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028582" comment="maven-3.9.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028583" comment="maven-javadoc-3.9.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028584" comment="maven-lib-3.9.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94151" version="1" class="patch">
	<metadata>
		<title>maven-shared-utils-3.4.2-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-29599" ref_url="https://www.suse.com/security/cve/CVE-2022-29599/" source="CVE"/>
		<description>
These are all security issues fixed in the maven-shared-utils-3.4.2-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29599/">CVE-2022-29599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29599">CVE-2022-29599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028585" comment="maven-shared-utils-3.4.2-160000.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028586" comment="maven-shared-utils-javadoc-3.4.2-160000.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94152" version="1" class="patch">
	<metadata>
		<title>memcached-1.6.38-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-1494" ref_url="https://www.suse.com/security/cve/CVE-2009-1494/" source="CVE"/>
		<reference ref_id="CVE-2011-4971" ref_url="https://www.suse.com/security/cve/CVE-2011-4971/" source="CVE"/>
		<reference ref_id="CVE-2013-0179" ref_url="https://www.suse.com/security/cve/CVE-2013-0179/" source="CVE"/>
		<reference ref_id="CVE-2013-7239" ref_url="https://www.suse.com/security/cve/CVE-2013-7239/" source="CVE"/>
		<reference ref_id="CVE-2013-7290" ref_url="https://www.suse.com/security/cve/CVE-2013-7290/" source="CVE"/>
		<reference ref_id="CVE-2013-7291" ref_url="https://www.suse.com/security/cve/CVE-2013-7291/" source="CVE"/>
		<reference ref_id="CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706/" source="CVE"/>
		<reference ref_id="CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951/" source="CVE"/>
		<reference ref_id="CVE-2018-1000115" ref_url="https://www.suse.com/security/cve/CVE-2018-1000115/" source="CVE"/>
		<reference ref_id="CVE-2018-1000127" ref_url="https://www.suse.com/security/cve/CVE-2018-1000127/" source="CVE"/>
		<reference ref_id="CVE-2020-10931" ref_url="https://www.suse.com/security/cve/CVE-2020-10931/" source="CVE"/>
		<reference ref_id="CVE-2023-46852" ref_url="https://www.suse.com/security/cve/CVE-2023-46852/" source="CVE"/>
		<reference ref_id="CVE-2023-46853" ref_url="https://www.suse.com/security/cve/CVE-2023-46853/" source="CVE"/>
		<description>
These are all security issues fixed in the memcached-1.6.38-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1494/">CVE-2009-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1494">CVE-2009-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4971/">CVE-2011-4971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4971">CVE-2011-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0179/">CVE-2013-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0179">CVE-2013-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7239/">CVE-2013-7239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7239">CVE-2013-7239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7290/">CVE-2013-7290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7290">CVE-2013-7290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7291/">CVE-2013-7291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7291">CVE-2013-7291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8704">CVE-2016-8704 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8705">CVE-2016-8705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8706">CVE-2016-8706 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9951">CVE-2017-9951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000115/">CVE-2018-1000115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000115">CVE-2018-1000115 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000127/">CVE-2018-1000127 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000127">CVE-2018-1000127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10931/">CVE-2020-10931 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10931">CVE-2020-10931 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46852/">CVE-2023-46852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46852">CVE-2023-46852 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46853/">CVE-2023-46853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46853">CVE-2023-46853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028587" comment="memcached-1.6.38-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028588" comment="memcached-devel-1.6.38-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94153" version="1" class="patch">
	<metadata>
		<title>mercurial-7.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-2942" ref_url="https://www.suse.com/security/cve/CVE-2008-2942/" source="CVE"/>
		<reference ref_id="CVE-2015-7545" ref_url="https://www.suse.com/security/cve/CVE-2015-7545/" source="CVE"/>
		<reference ref_id="CVE-2016-3068" ref_url="https://www.suse.com/security/cve/CVE-2016-3068/" source="CVE"/>
		<reference ref_id="CVE-2016-3069" ref_url="https://www.suse.com/security/cve/CVE-2016-3069/" source="CVE"/>
		<reference ref_id="CVE-2016-3105" ref_url="https://www.suse.com/security/cve/CVE-2016-3105/" source="CVE"/>
		<reference ref_id="CVE-2016-3630" ref_url="https://www.suse.com/security/cve/CVE-2016-3630/" source="CVE"/>
		<reference ref_id="CVE-2017-1000115" ref_url="https://www.suse.com/security/cve/CVE-2017-1000115/" source="CVE"/>
		<reference ref_id="CVE-2017-1000116" ref_url="https://www.suse.com/security/cve/CVE-2017-1000116/" source="CVE"/>
		<reference ref_id="CVE-2017-17458" ref_url="https://www.suse.com/security/cve/CVE-2017-17458/" source="CVE"/>
		<reference ref_id="CVE-2018-1000132" ref_url="https://www.suse.com/security/cve/CVE-2018-1000132/" source="CVE"/>
		<reference ref_id="CVE-2018-13346" ref_url="https://www.suse.com/security/cve/CVE-2018-13346/" source="CVE"/>
		<reference ref_id="CVE-2018-13347" ref_url="https://www.suse.com/security/cve/CVE-2018-13347/" source="CVE"/>
		<reference ref_id="CVE-2018-13348" ref_url="https://www.suse.com/security/cve/CVE-2018-13348/" source="CVE"/>
		<reference ref_id="CVE-2018-17983" ref_url="https://www.suse.com/security/cve/CVE-2018-17983/" source="CVE"/>
		<reference ref_id="CVE-2019-3902" ref_url="https://www.suse.com/security/cve/CVE-2019-3902/" source="CVE"/>
		<reference ref_id="CVE-2025-2361" ref_url="https://www.suse.com/security/cve/CVE-2025-2361/" source="CVE"/>
		<description>
These are all security issues fixed in the mercurial-7.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2942/">CVE-2008-2942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2942">CVE-2008-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7545/">CVE-2015-7545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7545">CVE-2015-7545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3068/">CVE-2016-3068 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3068">CVE-2016-3068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3069/">CVE-2016-3069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3069">CVE-2016-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3105/">CVE-2016-3105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3105">CVE-2016-3105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3630/">CVE-2016-3630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3630">CVE-2016-3630 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000115/">CVE-2017-1000115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000115">CVE-2017-1000115 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000116/">CVE-2017-1000116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000116">CVE-2017-1000116 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17458/">CVE-2017-17458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17458">CVE-2017-17458 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000132/">CVE-2018-1000132 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000132">CVE-2018-1000132 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13346/">CVE-2018-13346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13346">CVE-2018-13346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13347/">CVE-2018-13347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13347">CVE-2018-13347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13348/">CVE-2018-13348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13348">CVE-2018-13348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17983/">CVE-2018-17983 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17983">CVE-2018-17983 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3902/">CVE-2019-3902 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3902">CVE-2019-3902 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-2361/">CVE-2025-2361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2361">CVE-2025-2361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028589" comment="mercurial-7.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028590" comment="mercurial-lang-7.0.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94154" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-4.36-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-4.36-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028591" comment="mozilla-nspr-4.36-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028592" comment="mozilla-nspr-devel-4.36-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94155" version="1" class="patch">
	<metadata>
		<title>mutt-2.2.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<reference ref_id="CVE-2021-32055" ref_url="https://www.suse.com/security/cve/CVE-2021-32055/" source="CVE"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<reference ref_id="CVE-2023-4874" ref_url="https://www.suse.com/security/cve/CVE-2023-4874/" source="CVE"/>
		<reference ref_id="CVE-2023-4875" ref_url="https://www.suse.com/security/cve/CVE-2023-4875/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-2.2.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1558">CVE-2007-1558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0467">CVE-2014-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14351">CVE-2018-14351 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14360">CVE-2018-14360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14361">CVE-2018-14361 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14363">CVE-2018-14363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3181">CVE-2021-3181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32055/">CVE-2021-32055 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32055">CVE-2021-32055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4874/">CVE-2023-4874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4874">CVE-2023-4874 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4875/">CVE-2023-4875 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4875">CVE-2023-4875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028593" comment="mutt-2.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028594" comment="mutt-doc-2.2.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028595" comment="mutt-lang-2.2.13-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94156" version="1" class="patch">
	<metadata>
		<title>mysql-connector-java-9.2.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-2575" ref_url="https://www.suse.com/security/cve/CVE-2015-2575/" source="CVE"/>
		<reference ref_id="CVE-2017-3523" ref_url="https://www.suse.com/security/cve/CVE-2017-3523/" source="CVE"/>
		<reference ref_id="CVE-2017-3586" ref_url="https://www.suse.com/security/cve/CVE-2017-3586/" source="CVE"/>
		<reference ref_id="CVE-2017-3589" ref_url="https://www.suse.com/security/cve/CVE-2017-3589/" source="CVE"/>
		<reference ref_id="CVE-2020-2875" ref_url="https://www.suse.com/security/cve/CVE-2020-2875/" source="CVE"/>
		<reference ref_id="CVE-2020-2933" ref_url="https://www.suse.com/security/cve/CVE-2020-2933/" source="CVE"/>
		<reference ref_id="CVE-2020-2934" ref_url="https://www.suse.com/security/cve/CVE-2020-2934/" source="CVE"/>
		<reference ref_id="CVE-2021-2471" ref_url="https://www.suse.com/security/cve/CVE-2021-2471/" source="CVE"/>
		<reference ref_id="CVE-2023-21971" ref_url="https://www.suse.com/security/cve/CVE-2023-21971/" source="CVE"/>
		<description>
These are all security issues fixed in the mysql-connector-java-9.2.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2575/">CVE-2015-2575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2575">CVE-2015-2575 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3523/">CVE-2017-3523 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3523">CVE-2017-3523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3586/">CVE-2017-3586 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3586">CVE-2017-3586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3589/">CVE-2017-3589 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3589">CVE-2017-3589 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2875/">CVE-2020-2875 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2875">CVE-2020-2875 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2933/">CVE-2020-2933 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2933">CVE-2020-2933 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-2934/">CVE-2020-2934 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2934">CVE-2020-2934 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2471/">CVE-2021-2471 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2471">CVE-2021-2471 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-21971/">CVE-2023-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21971">CVE-2023-21971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028596" comment="mysql-connector-java-9.2.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94157" version="1" class="patch">
	<metadata>
		<title>nbd-3.25-160000.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-3534" ref_url="https://www.suse.com/security/cve/CVE-2005-3534/" source="CVE"/>
		<reference ref_id="CVE-2015-0847" ref_url="https://www.suse.com/security/cve/CVE-2015-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-26495" ref_url="https://www.suse.com/security/cve/CVE-2022-26495/" source="CVE"/>
		<reference ref_id="CVE-2022-26496" ref_url="https://www.suse.com/security/cve/CVE-2022-26496/" source="CVE"/>
		<description>
These are all security issues fixed in the nbd-3.25-160000.3.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3534/">CVE-2005-3534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3534">CVE-2005-3534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0847/">CVE-2015-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0847">CVE-2015-0847 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26495/">CVE-2022-26495 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26495">CVE-2022-26495 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26496/">CVE-2022-26496 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26496">CVE-2022-26496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028597" comment="nbd-3.25-160000.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94158" version="1" class="patch">
	<metadata>
		<title>nbdkit-1.44.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-3716" ref_url="https://www.suse.com/security/cve/CVE-2021-3716/" source="CVE"/>
		<reference ref_id="CVE-2025-47711" ref_url="https://www.suse.com/security/cve/CVE-2025-47711/" source="CVE"/>
		<reference ref_id="CVE-2025-47712" ref_url="https://www.suse.com/security/cve/CVE-2025-47712/" source="CVE"/>
		<description>
These are all security issues fixed in the nbdkit-1.44.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3716/">CVE-2021-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3716">CVE-2021-3716 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47711/">CVE-2025-47711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47711">CVE-2025-47711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47712/">CVE-2025-47712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47712">CVE-2025-47712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028598" comment="nbdkit-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028599" comment="nbdkit-basic-filters-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028600" comment="nbdkit-basic-plugins-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028601" comment="nbdkit-curl-plugin-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028602" comment="nbdkit-linuxdisk-plugin-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028603" comment="nbdkit-nbd-plugin-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028604" comment="nbdkit-python-plugin-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028605" comment="nbdkit-server-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028606" comment="nbdkit-ssh-plugin-1.44.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028607" comment="nbdkit-vddk-plugin-1.44.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94159" version="1" class="patch">
	<metadata>
		<title>ncat-7.92-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-18594" ref_url="https://www.suse.com/security/cve/CVE-2017-18594/" source="CVE"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
These are all security issues fixed in the ncat-7.92-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18594/">CVE-2017-18594 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18594">CVE-2017-18594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15173">CVE-2018-15173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028608" comment="ncat-7.92-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028609" comment="nmap-7.92-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94160" version="1" class="patch">
	<metadata>
		<title>net-tools-2.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-46836" ref_url="https://www.suse.com/security/cve/CVE-2025-46836/" source="CVE"/>
		<description>
These are all security issues fixed in the net-tools-2.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46836/">CVE-2025-46836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46836">CVE-2025-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028610" comment="net-tools-2.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028611" comment="net-tools-deprecated-2.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028612" comment="net-tools-lang-2.10-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94161" version="1" class="patch">
	<metadata>
		<title>nginx-1.27.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-4315" ref_url="https://www.suse.com/security/cve/CVE-2011-4315/" source="CVE"/>
		<reference ref_id="CVE-2012-2089" ref_url="https://www.suse.com/security/cve/CVE-2012-2089/" source="CVE"/>
		<reference ref_id="CVE-2013-2070" ref_url="https://www.suse.com/security/cve/CVE-2013-2070/" source="CVE"/>
		<reference ref_id="CVE-2013-4547" ref_url="https://www.suse.com/security/cve/CVE-2013-4547/" source="CVE"/>
		<reference ref_id="CVE-2014-0133" ref_url="https://www.suse.com/security/cve/CVE-2014-0133/" source="CVE"/>
		<reference ref_id="CVE-2014-3556" ref_url="https://www.suse.com/security/cve/CVE-2014-3556/" source="CVE"/>
		<reference ref_id="CVE-2014-3616" ref_url="https://www.suse.com/security/cve/CVE-2014-3616/" source="CVE"/>
		<reference ref_id="CVE-2016-0742" ref_url="https://www.suse.com/security/cve/CVE-2016-0742/" source="CVE"/>
		<reference ref_id="CVE-2016-0746" ref_url="https://www.suse.com/security/cve/CVE-2016-0746/" source="CVE"/>
		<reference ref_id="CVE-2016-0747" ref_url="https://www.suse.com/security/cve/CVE-2016-0747/" source="CVE"/>
		<reference ref_id="CVE-2016-4450" ref_url="https://www.suse.com/security/cve/CVE-2016-4450/" source="CVE"/>
		<reference ref_id="CVE-2017-7529" ref_url="https://www.suse.com/security/cve/CVE-2017-7529/" source="CVE"/>
		<reference ref_id="CVE-2018-16843" ref_url="https://www.suse.com/security/cve/CVE-2018-16843/" source="CVE"/>
		<reference ref_id="CVE-2018-16844" ref_url="https://www.suse.com/security/cve/CVE-2018-16844/" source="CVE"/>
		<reference ref_id="CVE-2018-16845" ref_url="https://www.suse.com/security/cve/CVE-2018-16845/" source="CVE"/>
		<reference ref_id="CVE-2019-20372" ref_url="https://www.suse.com/security/cve/CVE-2019-20372/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017/" source="CVE"/>
		<reference ref_id="CVE-2022-41741" ref_url="https://www.suse.com/security/cve/CVE-2022-41741/" source="CVE"/>
		<reference ref_id="CVE-2022-41742" ref_url="https://www.suse.com/security/cve/CVE-2022-41742/" source="CVE"/>
		<reference ref_id="CVE-2024-24989" ref_url="https://www.suse.com/security/cve/CVE-2024-24989/" source="CVE"/>
		<reference ref_id="CVE-2024-24990" ref_url="https://www.suse.com/security/cve/CVE-2024-24990/" source="CVE"/>
		<reference ref_id="CVE-2024-7347" ref_url="https://www.suse.com/security/cve/CVE-2024-7347/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.27.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4315/">CVE-2011-4315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4315">CVE-2011-4315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2089/">CVE-2012-2089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2089">CVE-2012-2089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2070/">CVE-2013-2070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2070">CVE-2013-2070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4547/">CVE-2013-4547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4547">CVE-2013-4547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0133/">CVE-2014-0133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0133">CVE-2014-0133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3556/">CVE-2014-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3556">CVE-2014-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3616/">CVE-2014-3616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3616">CVE-2014-3616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0742/">CVE-2016-0742 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0742">CVE-2016-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0746/">CVE-2016-0746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0746">CVE-2016-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0747/">CVE-2016-0747 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0747">CVE-2016-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4450/">CVE-2016-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4450">CVE-2016-4450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7529/">CVE-2017-7529 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7529">CVE-2017-7529 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16843/">CVE-2018-16843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16843">CVE-2018-16843 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16844/">CVE-2018-16844 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16844">CVE-2018-16844 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16845/">CVE-2018-16845 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16845">CVE-2018-16845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20372/">CVE-2019-20372 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20372">CVE-2019-20372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9516">CVE-2019-9516 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23017">CVE-2021-23017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41741/">CVE-2022-41741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41741">CVE-2022-41741 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41742/">CVE-2022-41742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41742">CVE-2022-41742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24989/">CVE-2024-24989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24989">CVE-2024-24989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24990/">CVE-2024-24990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24990">CVE-2024-24990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7347/">CVE-2024-7347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7347">CVE-2024-7347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028613" comment="nginx-1.27.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028614" comment="nginx-source-1.27.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94162" version="1" class="patch">
	<metadata>
		<title>nv-prefer-signed-open-driver-580.65.06-160000.1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-0090" ref_url="https://www.suse.com/security/cve/CVE-2024-0090/" source="CVE"/>
		<reference ref_id="CVE-2024-0091" ref_url="https://www.suse.com/security/cve/CVE-2024-0091/" source="CVE"/>
		<reference ref_id="CVE-2024-0092" ref_url="https://www.suse.com/security/cve/CVE-2024-0092/" source="CVE"/>
		<reference ref_id="CVE-2024-0131" ref_url="https://www.suse.com/security/cve/CVE-2024-0131/" source="CVE"/>
		<reference ref_id="CVE-2024-0147" ref_url="https://www.suse.com/security/cve/CVE-2024-0147/" source="CVE"/>
		<reference ref_id="CVE-2024-0149" ref_url="https://www.suse.com/security/cve/CVE-2024-0149/" source="CVE"/>
		<reference ref_id="CVE-2024-0150" ref_url="https://www.suse.com/security/cve/CVE-2024-0150/" source="CVE"/>
		<reference ref_id="CVE-2024-53869" ref_url="https://www.suse.com/security/cve/CVE-2024-53869/" source="CVE"/>
		<reference ref_id="CVE-2025-23277" ref_url="https://www.suse.com/security/cve/CVE-2025-23277/" source="CVE"/>
		<reference ref_id="CVE-2025-23278" ref_url="https://www.suse.com/security/cve/CVE-2025-23278/" source="CVE"/>
		<reference ref_id="CVE-2025-23279" ref_url="https://www.suse.com/security/cve/CVE-2025-23279/" source="CVE"/>
		<reference ref_id="CVE-2025-23283" ref_url="https://www.suse.com/security/cve/CVE-2025-23283/" source="CVE"/>
		<reference ref_id="CVE-2025-23286" ref_url="https://www.suse.com/security/cve/CVE-2025-23286/" source="CVE"/>
		<description>
These are all security issues fixed in the nv-prefer-signed-open-driver-580.65.06-160000.1.3 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0090/">CVE-2024-0090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0090">CVE-2024-0090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0091/">CVE-2024-0091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0091">CVE-2024-0091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0092/">CVE-2024-0092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0092">CVE-2024-0092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0131/">CVE-2024-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0131">CVE-2024-0131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0147/">CVE-2024-0147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0147">CVE-2024-0147 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0149/">CVE-2024-0149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0149">CVE-2024-0149 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0150/">CVE-2024-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0150">CVE-2024-0150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53869/">CVE-2024-53869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53869">CVE-2024-53869 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23277/">CVE-2025-23277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23277">CVE-2025-23277 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23278/">CVE-2025-23278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23278">CVE-2025-23278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23279/">CVE-2025-23279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23279">CVE-2025-23279 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23283/">CVE-2025-23283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23283">CVE-2025-23283 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-23286/">CVE-2025-23286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23286">CVE-2025-23286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028615" comment="nv-prefer-signed-open-driver-580.65.06-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028616" comment="nvidia-open-driver-G06-signed-64kb-devel-580.76.05-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028617" comment="nvidia-open-driver-G06-signed-cuda-64kb-devel-580.65.06-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028618" comment="nvidia-open-driver-G06-signed-cuda-default-devel-580.65.06-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028619" comment="nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.65.06_k6.12.0_160000.5-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028620" comment="nvidia-open-driver-G06-signed-cuda-kmp-default-580.65.06_k6.12.0_160000.5-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028621" comment="nvidia-open-driver-G06-signed-default-devel-580.76.05-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028622" comment="nvidia-open-driver-G06-signed-kmp-64kb-580.76.05_k6.12.0_160000.5-160000.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028623" comment="nvidia-open-driver-G06-signed-kmp-default-580.76.05_k6.12.0_160000.5-160000.1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94163" version="1" class="patch">
	<metadata>
		<title>openCryptoki-3.25.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-0914" ref_url="https://www.suse.com/security/cve/CVE-2024-0914/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-3.25.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0914/">CVE-2024-0914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0914">CVE-2024-0914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028624" comment="openCryptoki-3.25.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028625" comment="openCryptoki-64bit-3.25.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028626" comment="openCryptoki-devel-3.25.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94164" version="1" class="patch">
	<metadata>
		<title>opensc-0.26.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16421" ref_url="https://www.suse.com/security/cve/CVE-2018-16421/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16424" ref_url="https://www.suse.com/security/cve/CVE-2018-16424/" source="CVE"/>
		<reference ref_id="CVE-2018-16425" ref_url="https://www.suse.com/security/cve/CVE-2018-16425/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2019-19480" ref_url="https://www.suse.com/security/cve/CVE-2019-19480/" source="CVE"/>
		<reference ref_id="CVE-2019-20792" ref_url="https://www.suse.com/security/cve/CVE-2019-20792/" source="CVE"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<reference ref_id="CVE-2020-26570" ref_url="https://www.suse.com/security/cve/CVE-2020-26570/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977/" source="CVE"/>
		<reference ref_id="CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660/" source="CVE"/>
		<reference ref_id="CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661/" source="CVE"/>
		<reference ref_id="CVE-2023-4535" ref_url="https://www.suse.com/security/cve/CVE-2023-4535/" source="CVE"/>
		<reference ref_id="CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992/" source="CVE"/>
		<reference ref_id="CVE-2024-1454" ref_url="https://www.suse.com/security/cve/CVE-2024-1454/" source="CVE"/>
		<reference ref_id="CVE-2024-45615" ref_url="https://www.suse.com/security/cve/CVE-2024-45615/" source="CVE"/>
		<reference ref_id="CVE-2024-45616" ref_url="https://www.suse.com/security/cve/CVE-2024-45616/" source="CVE"/>
		<reference ref_id="CVE-2024-45617" ref_url="https://www.suse.com/security/cve/CVE-2024-45617/" source="CVE"/>
		<reference ref_id="CVE-2024-45618" ref_url="https://www.suse.com/security/cve/CVE-2024-45618/" source="CVE"/>
		<reference ref_id="CVE-2024-45619" ref_url="https://www.suse.com/security/cve/CVE-2024-45619/" source="CVE"/>
		<reference ref_id="CVE-2024-45620" ref_url="https://www.suse.com/security/cve/CVE-2024-45620/" source="CVE"/>
		<reference ref_id="CVE-2024-8443" ref_url="https://www.suse.com/security/cve/CVE-2024-8443/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.26.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2235">CVE-2008-2235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4523">CVE-2010-4523 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16420">CVE-2018-16420 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16421/">CVE-2018-16421 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16421">CVE-2018-16421 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16424/">CVE-2018-16424 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16424">CVE-2018-16424 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16425/">CVE-2018-16425 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16425">CVE-2018-16425 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16426">CVE-2018-16426 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15945">CVE-2019-15945 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15946">CVE-2019-15946 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19479">CVE-2019-19479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19480/">CVE-2019-19480 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19480">CVE-2019-19480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20792/">CVE-2019-20792 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20792">CVE-2019-20792 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6502">CVE-2019-6502 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26570/">CVE-2020-26570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26570">CVE-2020-26570 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26571">CVE-2020-26571 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26572">CVE-2020-26572 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4535/">CVE-2023-4535 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4535">CVE-2023-4535 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-1454/">CVE-2024-1454 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1454">CVE-2024-1454 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45615/">CVE-2024-45615 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45615">CVE-2024-45615 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45616/">CVE-2024-45616 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45616">CVE-2024-45616 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45617/">CVE-2024-45617 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45617">CVE-2024-45617 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45618/">CVE-2024-45618 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45618">CVE-2024-45618 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45619/">CVE-2024-45619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45619">CVE-2024-45619 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45620/">CVE-2024-45620 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45620">CVE-2024-45620 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8443/">CVE-2024-8443 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8443">CVE-2024-8443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028627" comment="opensc-0.26.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94165" version="1" class="patch">
	<metadata>
		<title>openssh-10.0p2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="CVE-2021-28041" ref_url="https://www.suse.com/security/cve/CVE-2021-28041/" source="CVE"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="CVE-2022-2274" ref_url="https://www.suse.com/security/cve/CVE-2022-2274/" source="CVE"/>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385/" source="CVE"/>
		<reference ref_id="CVE-2024-39894" ref_url="https://www.suse.com/security/cve/CVE-2024-39894/" source="CVE"/>
		<reference ref_id="CVE-2024-6387" ref_url="https://www.suse.com/security/cve/CVE-2024-6387/" source="CVE"/>
		<reference ref_id="CVE-2025-26465" ref_url="https://www.suse.com/security/cve/CVE-2025-26465/" source="CVE"/>
		<reference ref_id="CVE-2025-26466" ref_url="https://www.suse.com/security/cve/CVE-2025-26466/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-10.0p2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0225">CVE-2006-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4752">CVE-2007-4752 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10010">CVE-2016-10010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28041/">CVE-2021-28041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28041">CVE-2021-28041 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2274/">CVE-2022-2274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2274">CVE-2022-2274 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39894/">CVE-2024-39894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39894">CVE-2024-39894 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6387/">CVE-2024-6387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-26465/">CVE-2025-26465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26466/">CVE-2025-26466 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028628" comment="openssh-10.0p2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028629" comment="openssh-cavs-10.0p2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028630" comment="openssh-clients-10.0p2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028631" comment="openssh-common-10.0p2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028632" comment="openssh-helpers-10.0p2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028633" comment="openssh-server-10.0p2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028634" comment="openssh-server-config-rootlogin-10.0p2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94166" version="1" class="patch">
	<metadata>
		<title>openvpn-2.6.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-3393" ref_url="https://www.suse.com/security/cve/CVE-2005-3393/" source="CVE"/>
		<reference ref_id="CVE-2005-3409" ref_url="https://www.suse.com/security/cve/CVE-2005-3409/" source="CVE"/>
		<reference ref_id="CVE-2006-1629" ref_url="https://www.suse.com/security/cve/CVE-2006-1629/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="CVE-2017-7522" ref_url="https://www.suse.com/security/cve/CVE-2017-7522/" source="CVE"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-9336" ref_url="https://www.suse.com/security/cve/CVE-2018-9336/" source="CVE"/>
		<reference ref_id="CVE-2020-11810" ref_url="https://www.suse.com/security/cve/CVE-2020-11810/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="CVE-2023-46849" ref_url="https://www.suse.com/security/cve/CVE-2023-46849/" source="CVE"/>
		<reference ref_id="CVE-2023-46850" ref_url="https://www.suse.com/security/cve/CVE-2023-46850/" source="CVE"/>
		<reference ref_id="CVE-2024-28882" ref_url="https://www.suse.com/security/cve/CVE-2024-28882/" source="CVE"/>
		<reference ref_id="CVE-2024-5594" ref_url="https://www.suse.com/security/cve/CVE-2024-5594/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.6.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3393/">CVE-2005-3393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3393">CVE-2005-3393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3409/">CVE-2005-3409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3409">CVE-2005-3409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-1629/">CVE-2006-1629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-1629">CVE-2006-1629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4339">CVE-2006-4339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8104">CVE-2014-8104 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7521">CVE-2017-7521 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7522/">CVE-2017-7522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7522">CVE-2017-7522 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7544">CVE-2018-7544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9336/">CVE-2018-9336 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9336">CVE-2018-9336 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11810/">CVE-2020-11810 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11810">CVE-2020-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15078">CVE-2020-15078 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46849/">CVE-2023-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46849">CVE-2023-46849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46850/">CVE-2023-46850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46850">CVE-2023-46850 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-28882/">CVE-2024-28882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28882">CVE-2024-28882 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-5594/">CVE-2024-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5594">CVE-2024-5594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028635" comment="openvpn-2.6.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028636" comment="openvpn-auth-pam-plugin-2.6.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028637" comment="openvpn-devel-2.6.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028638" comment="openvpn-down-root-plugin-2.6.10-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94167" version="1" class="patch">
	<metadata>
		<title>oqs-provider-0.9.0-160000.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-37305" ref_url="https://www.suse.com/security/cve/CVE-2024-37305/" source="CVE"/>
		<description>
These are all security issues fixed in the oqs-provider-0.9.0-160000.3.1 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37305/">CVE-2024-37305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37305">CVE-2024-37305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028639" comment="oqs-provider-0.9.0-160000.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94168" version="1" class="patch">
	<metadata>
		<title>ovmf-202502-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<reference ref_id="CVE-2019-14553" ref_url="https://www.suse.com/security/cve/CVE-2019-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-14558" ref_url="https://www.suse.com/security/cve/CVE-2019-14558/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<reference ref_id="CVE-2019-14586" ref_url="https://www.suse.com/security/cve/CVE-2019-14586/" source="CVE"/>
		<reference ref_id="CVE-2019-14587" ref_url="https://www.suse.com/security/cve/CVE-2019-14587/" source="CVE"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<reference ref_id="CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578/" source="CVE"/>
		<reference ref_id="CVE-2022-36763" ref_url="https://www.suse.com/security/cve/CVE-2022-36763/" source="CVE"/>
		<reference ref_id="CVE-2022-36764" ref_url="https://www.suse.com/security/cve/CVE-2022-36764/" source="CVE"/>
		<reference ref_id="CVE-2023-45229" ref_url="https://www.suse.com/security/cve/CVE-2023-45229/" source="CVE"/>
		<reference ref_id="CVE-2023-45230" ref_url="https://www.suse.com/security/cve/CVE-2023-45230/" source="CVE"/>
		<reference ref_id="CVE-2023-45231" ref_url="https://www.suse.com/security/cve/CVE-2023-45231/" source="CVE"/>
		<reference ref_id="CVE-2023-45232" ref_url="https://www.suse.com/security/cve/CVE-2023-45232/" source="CVE"/>
		<reference ref_id="CVE-2023-45234" ref_url="https://www.suse.com/security/cve/CVE-2023-45234/" source="CVE"/>
		<reference ref_id="CVE-2023-45235" ref_url="https://www.suse.com/security/cve/CVE-2023-45235/" source="CVE"/>
		<reference ref_id="CVE-2023-45236" ref_url="https://www.suse.com/security/cve/CVE-2023-45236/" source="CVE"/>
		<reference ref_id="CVE-2023-45237" ref_url="https://www.suse.com/security/cve/CVE-2023-45237/" source="CVE"/>
		<reference ref_id="CVE-2023-48733" ref_url="https://www.suse.com/security/cve/CVE-2023-48733/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202502-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5731">CVE-2017-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5732">CVE-2017-5732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5733">CVE-2017-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5734">CVE-2017-5734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5735">CVE-2017-5735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12178">CVE-2018-12178 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3613">CVE-2018-3613 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-3630">CVE-2018-3630 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0160">CVE-2019-0160 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14553/">CVE-2019-14553 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14553">CVE-2019-14553 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14558/">CVE-2019-14558 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14558">CVE-2019-14558 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14559">CVE-2019-14559 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14562">CVE-2019-14562 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14563">CVE-2019-14563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14575">CVE-2019-14575 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14586/">CVE-2019-14586 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14586">CVE-2019-14586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14587/">CVE-2019-14587 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14587">CVE-2019-14587 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38578">CVE-2021-38578 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36763/">CVE-2022-36763 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36763">CVE-2022-36763 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36764/">CVE-2022-36764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36764">CVE-2022-36764 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45229/">CVE-2023-45229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45229">CVE-2023-45229 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45230/">CVE-2023-45230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45230">CVE-2023-45230 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45231/">CVE-2023-45231 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45231">CVE-2023-45231 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45232/">CVE-2023-45232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45232">CVE-2023-45232 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45234/">CVE-2023-45234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45234">CVE-2023-45234 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45235/">CVE-2023-45235 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45235">CVE-2023-45235 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45236/">CVE-2023-45236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45236">CVE-2023-45236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45237/">CVE-2023-45237 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45237">CVE-2023-45237 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-48733/">CVE-2023-48733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-48733">CVE-2023-48733 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028640" comment="ovmf-202502-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028641" comment="ovmf-tools-202502-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028642" comment="qemu-ovmf-x86_64-202502-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028643" comment="qemu-uefi-aarch64-202502-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94169" version="1" class="patch">
	<metadata>
		<title>pam-1.7.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="CVE-2018-17953" ref_url="https://www.suse.com/security/cve/CVE-2018-17953/" source="CVE"/>
		<reference ref_id="CVE-2020-27780" ref_url="https://www.suse.com/security/cve/CVE-2020-27780/" source="CVE"/>
		<reference ref_id="CVE-2024-10963" ref_url="https://www.suse.com/security/cve/CVE-2024-10963/" source="CVE"/>
		<reference ref_id="CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365/" source="CVE"/>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.7.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3430">CVE-2010-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3431">CVE-2010-3431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3853">CVE-2010-3853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3148">CVE-2011-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3149">CVE-2011-3149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2583">CVE-2014-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17953/">CVE-2018-17953 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17953">CVE-2018-17953 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27780/">CVE-2020-27780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27780">CVE-2020-27780 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10963/">CVE-2024-10963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10963">CVE-2024-10963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028644" comment="pam-1.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028645" comment="pam-devel-1.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028646" comment="pam-doc-1.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028647" comment="pam-extra-1.7.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028648" comment="pam-manpages-1.7.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94170" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3825">CVE-2008-3825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1384">CVE-2009-1384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028649" comment="pam_krb5-2.4.13-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94171" version="1" class="patch">
	<metadata>
		<title>pam_pkcs11-0.6.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-24032" ref_url="https://www.suse.com/security/cve/CVE-2025-24032/" source="CVE"/>
		<reference ref_id="CVE-2025-24531" ref_url="https://www.suse.com/security/cve/CVE-2025-24531/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_pkcs11-0.6.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24032/">CVE-2025-24032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24032">CVE-2025-24032 at NVD</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-24531/">CVE-2025-24531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24531">CVE-2025-24531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028650" comment="pam_pkcs11-0.6.13-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028651" comment="pam_pkcs11-devel-doc-0.6.13-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94172" version="1" class="patch">
	<metadata>
		<title>pam_u2f-1.3.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-12209" ref_url="https://www.suse.com/security/cve/CVE-2019-12209/" source="CVE"/>
		<reference ref_id="CVE-2019-12210" ref_url="https://www.suse.com/security/cve/CVE-2019-12210/" source="CVE"/>
		<reference ref_id="CVE-2021-31924" ref_url="https://www.suse.com/security/cve/CVE-2021-31924/" source="CVE"/>
		<reference ref_id="CVE-2025-23013" ref_url="https://www.suse.com/security/cve/CVE-2025-23013/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_u2f-1.3.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12209/">CVE-2019-12209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12209">CVE-2019-12209 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12210/">CVE-2019-12210 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12210">CVE-2019-12210 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31924/">CVE-2021-31924 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31924">CVE-2021-31924 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-23013/">CVE-2025-23013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23013">CVE-2025-23013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028652" comment="pam_u2f-1.3.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94173" version="1" class="patch">
	<metadata>
		<title>patch-2.7.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="CVE-2018-6951" ref_url="https://www.suse.com/security/cve/CVE-2018-6951/" source="CVE"/>
		<reference ref_id="CVE-2018-6952" ref_url="https://www.suse.com/security/cve/CVE-2018-6952/" source="CVE"/>
		<reference ref_id="CVE-2019-13636" ref_url="https://www.suse.com/security/cve/CVE-2019-13636/" source="CVE"/>
		<reference ref_id="CVE-2019-20633" ref_url="https://www.suse.com/security/cve/CVE-2019-20633/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4651">CVE-2010-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1196">CVE-2015-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6951/">CVE-2018-6951 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6951">CVE-2018-6951 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6952/">CVE-2018-6952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6952">CVE-2018-6952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13636/">CVE-2019-13636 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13636">CVE-2019-13636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20633/">CVE-2019-20633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20633">CVE-2019-20633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028653" comment="patch-2.7.6-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94174" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.6.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.6.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4530">CVE-2010-4530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028654" comment="pcsc-ccid-1.6.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94175" version="1" class="patch">
	<metadata>
		<title>perl-5.42.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-3962" ref_url="https://www.suse.com/security/cve/CVE-2005-3962/" source="CVE"/>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2017-12814" ref_url="https://www.suse.com/security/cve/CVE-2017-12814/" source="CVE"/>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312/" source="CVE"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="CVE-2023-47038" ref_url="https://www.suse.com/security/cve/CVE-2023-47038/" source="CVE"/>
		<reference ref_id="CVE-2023-47039" ref_url="https://www.suse.com/security/cve/CVE-2023-47039/" source="CVE"/>
		<reference ref_id="CVE-2024-56406" ref_url="https://www.suse.com/security/cve/CVE-2024-56406/" source="CVE"/>
		<reference ref_id="CVE-2025-40909" ref_url="https://www.suse.com/security/cve/CVE-2025-40909/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-5.42.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3962/">CVE-2005-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3962">CVE-2005-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5116">CVE-2007-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4410">CVE-2010-4410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4411">CVE-2010-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4777">CVE-2010-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12814/">CVE-2017-12814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12814">CVE-2017-12814 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12837">CVE-2017-12837 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12883">CVE-2017-12883 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18312">CVE-2018-18312 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47038/">CVE-2023-47038 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47039/">CVE-2023-47039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47039">CVE-2023-47039 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56406/">CVE-2024-56406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56406">CVE-2024-56406 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-40909/">CVE-2025-40909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40909">CVE-2025-40909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028655" comment="perl-5.42.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028656" comment="perl-base-5.42.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028657" comment="perl-doc-5.42.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94176" version="1" class="patch">
	<metadata>
		<title>perl-Archive-Extract-0.88-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Archive-Extract-0.88-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028658" comment="perl-Archive-Extract-0.88-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028659" comment="perl-ExtUtils-MakeMaker-7.70-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028660" comment="perl-MIME-Charset-1.013.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028661" comment="perl-Test-File-1.993-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94177" version="1" class="patch">
	<metadata>
		<title>perl-CGI-4.670.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-2766" ref_url="https://www.suse.com/security/cve/CVE-2011-2766/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-CGI-4.670.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2766/">CVE-2011-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2766">CVE-2011-2766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028662" comment="perl-CGI-4.670.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94178" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-3.000003-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-3.000003-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2451">CVE-2012-2451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028663" comment="perl-Config-IniFiles-3.000003-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94179" version="1" class="patch">
	<metadata>
		<title>perl-Convert-ASN1-0.340.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Convert-ASN1-0.340.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7488">CVE-2013-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028664" comment="perl-Convert-ASN1-0.340.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94180" version="1" class="patch">
	<metadata>
		<title>perl-DBD-mysql-4.050-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBD-mysql-4.050-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1246">CVE-2016-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1249">CVE-2016-1249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1251">CVE-2016-1251 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10788">CVE-2017-10788 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10789">CVE-2017-10789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028665" comment="perl-DBD-mysql-4.050-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94181" version="1" class="patch">
	<metadata>
		<title>perl-DBI-1.647.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-10401" ref_url="https://www.suse.com/security/cve/CVE-2014-10401/" source="CVE"/>
		<reference ref_id="CVE-2014-10402" ref_url="https://www.suse.com/security/cve/CVE-2014-10402/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBI-1.647.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-10401/">CVE-2014-10401 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10401">CVE-2014-10401 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-10402/">CVE-2014-10402 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10402">CVE-2014-10402 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028666" comment="perl-DBI-1.647.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94182" version="1" class="patch">
	<metadata>
		<title>perl-File-Find-Rule-0.350.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-File-Find-Rule-0.350.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028667" comment="perl-File-Find-Rule-0.350.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94183" version="1" class="patch">
	<metadata>
		<title>perl-File-Path-2.180000-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-File-Path-2.180000-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6512">CVE-2017-6512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028668" comment="perl-File-Path-2.180000-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94184" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.830.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.830.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028669" comment="perl-HTML-Parser-3.830.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94185" version="1" class="patch">
	<metadata>
		<title>perl-HTTP-Daemon-6.16-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-31081" ref_url="https://www.suse.com/security/cve/CVE-2022-31081/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTTP-Daemon-6.16-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31081/">CVE-2022-31081 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31081">CVE-2022-31081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028670" comment="perl-HTTP-Daemon-6.16-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94186" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.140.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.140.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3230">CVE-2014-3230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028671" comment="perl-LWP-Protocol-https-6.140.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94187" version="1" class="patch">
	<metadata>
		<title>perl-Spreadsheet-ParseExcel-0.660.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-7101" ref_url="https://www.suse.com/security/cve/CVE-2023-7101/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Spreadsheet-ParseExcel-0.660.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7101/">CVE-2023-7101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7101">CVE-2023-7101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028672" comment="perl-Spreadsheet-ParseExcel-0.660.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94188" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0210-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0210-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3451">CVE-2015-3451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028673" comment="perl-XML-LibXML-2.0210-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94189" version="1" class="patch">
	<metadata>
		<title>perl-XML-Twig-3.530.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-Twig-3.530.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028674" comment="perl-XML-Twig-3.530.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94190" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.903.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.903.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1152">CVE-2012-1152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6393">CVE-2013-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2525">CVE-2014-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028675" comment="perl-YAML-LibYAML-0.903.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94191" version="1" class="patch">
	<metadata>
		<title>permctl-1699_20250120-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687/" source="CVE"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252/" source="CVE"/>
		<description>
These are all security issues fixed in the permctl-1699_20250120-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3687">CVE-2019-3687 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31252">CVE-2022-31252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028676" comment="permctl-1699_20250120-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028677" comment="permissions-1699_20250120-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028678" comment="permissions-config-1699_20250120-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028679" comment="permissions-zypp-plugin-1699_20250120-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94192" version="1" class="patch">
	<metadata>
		<title>pesign-116-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-3560" ref_url="https://www.suse.com/security/cve/CVE-2022-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the pesign-116-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3560/">CVE-2022-3560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3560">CVE-2022-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028680" comment="pesign-116-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94193" version="1" class="patch">
	<metadata>
		<title>php-composer2-2.8.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-41116" ref_url="https://www.suse.com/security/cve/CVE-2021-41116/" source="CVE"/>
		<reference ref_id="CVE-2022-24828" ref_url="https://www.suse.com/security/cve/CVE-2022-24828/" source="CVE"/>
		<reference ref_id="CVE-2023-43655" ref_url="https://www.suse.com/security/cve/CVE-2023-43655/" source="CVE"/>
		<reference ref_id="CVE-2024-24821" ref_url="https://www.suse.com/security/cve/CVE-2024-24821/" source="CVE"/>
		<reference ref_id="CVE-2024-35241" ref_url="https://www.suse.com/security/cve/CVE-2024-35241/" source="CVE"/>
		<reference ref_id="CVE-2024-35242" ref_url="https://www.suse.com/security/cve/CVE-2024-35242/" source="CVE"/>
		<description>
These are all security issues fixed in the php-composer2-2.8.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41116/">CVE-2021-41116 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41116">CVE-2021-41116 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24828/">CVE-2022-24828 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24828">CVE-2022-24828 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43655/">CVE-2023-43655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43655">CVE-2023-43655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24821/">CVE-2024-24821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24821">CVE-2024-24821 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35241/">CVE-2024-35241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35241">CVE-2024-35241 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35242/">CVE-2024-35242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35242">CVE-2024-35242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028681" comment="php-composer2-2.8.9-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94194" version="1" class="patch">
	<metadata>
		<title>php8-pear-1.10.24-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-32610" ref_url="https://www.suse.com/security/cve/CVE-2021-32610/" source="CVE"/>
		<description>
These are all security issues fixed in the php8-pear-1.10.24-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32610/">CVE-2021-32610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32610">CVE-2021-32610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028682" comment="php8-pear-1.10.24-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028683" comment="php8-pecl-1.10.24-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94195" version="1" class="patch">
	<metadata>
		<title>plexus-archiver-4.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-37460" ref_url="https://www.suse.com/security/cve/CVE-2023-37460/" source="CVE"/>
		<description>
These are all security issues fixed in the plexus-archiver-4.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37460/">CVE-2023-37460 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37460">CVE-2023-37460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028684" comment="plexus-archiver-4.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028685" comment="plexus-archiver-javadoc-4.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94196" version="1" class="patch">
	<metadata>
		<title>podman-5.4.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-10856" ref_url="https://www.suse.com/security/cve/CVE-2018-10856/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<reference ref_id="CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2022-1227" ref_url="https://www.suse.com/security/cve/CVE-2022-1227/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-27649" ref_url="https://www.suse.com/security/cve/CVE-2022-27649/" source="CVE"/>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<reference ref_id="CVE-2023-0778" ref_url="https://www.suse.com/security/cve/CVE-2023-0778/" source="CVE"/>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-5.4.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10856/">CVE-2018-10856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10856">CVE-2018-10856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10152">CVE-2019-10152 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1726">CVE-2020-1726 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4024">CVE-2021-4024 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1227/">CVE-2022-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1227">CVE-2022-1227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27649/">CVE-2022-27649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27649">CVE-2022-27649 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0778/">CVE-2023-0778 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0778">CVE-2023-0778 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028686" comment="podman-5.4.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028687" comment="podman-docker-5.4.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028688" comment="podman-remote-5.4.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028689" comment="podmansh-5.4.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94197" version="1" class="patch">
	<metadata>
		<title>policycoreutils-3.8.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
These are all security issues fixed in the policycoreutils-3.8.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028690" comment="policycoreutils-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028691" comment="policycoreutils-devel-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028692" comment="policycoreutils-lang-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028693" comment="policycoreutils-newrole-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028694" comment="policycoreutils-python-utils-3.8.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028695" comment="python313-policycoreutils-3.8.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94198" version="1" class="patch">
	<metadata>
		<title>postfix-3.10.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-32182" ref_url="https://www.suse.com/security/cve/CVE-2023-32182/" source="CVE"/>
		<reference ref_id="CVE-2023-51764" ref_url="https://www.suse.com/security/cve/CVE-2023-51764/" source="CVE"/>
		<description>
These are all security issues fixed in the postfix-3.10.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32182/">CVE-2023-32182 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32182">CVE-2023-32182 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51764/">CVE-2023-51764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51764">CVE-2023-51764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028696" comment="postfix-3.10.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028697" comment="postfix-doc-3.10.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028698" comment="postfix-ldap-3.10.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028699" comment="postfix-mysql-3.10.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028700" comment="postfix-postgresql-3.10.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94199" version="1" class="patch">
	<metadata>
		<title>postgresql-17-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-17-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14798">CVE-2017-14798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028701" comment="postgresql-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028702" comment="postgresql-contrib-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028703" comment="postgresql-devel-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028704" comment="postgresql-docs-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028705" comment="postgresql-llvmjit-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028706" comment="postgresql-plperl-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028707" comment="postgresql-plpython-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028708" comment="postgresql-pltcl-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028709" comment="postgresql-server-17-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028710" comment="postgresql-server-devel-17-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94200" version="1" class="patch">
	<metadata>
		<title>postgresql-jdbc-42.7.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-26520" ref_url="https://www.suse.com/security/cve/CVE-2022-26520/" source="CVE"/>
		<reference ref_id="CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197/" source="CVE"/>
		<reference ref_id="CVE-2022-41946" ref_url="https://www.suse.com/security/cve/CVE-2022-41946/" source="CVE"/>
		<reference ref_id="CVE-2024-1597" ref_url="https://www.suse.com/security/cve/CVE-2024-1597/" source="CVE"/>
		<reference ref_id="CVE-2025-49146" ref_url="https://www.suse.com/security/cve/CVE-2025-49146/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-jdbc-42.7.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-26520/">CVE-2022-26520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26520">CVE-2022-26520 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31197">CVE-2022-31197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41946/">CVE-2022-41946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41946">CVE-2022-41946 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1597/">CVE-2024-1597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1597">CVE-2024-1597 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49146/">CVE-2025-49146 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49146">CVE-2025-49146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028711" comment="postgresql-jdbc-42.7.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028712" comment="postgresql-jdbc-javadoc-42.7.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94201" version="1" class="patch">
	<metadata>
		<title>postgresql13-13.22-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql13-13.22-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3677">CVE-2021-3677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028713" comment="postgresql13-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028714" comment="postgresql13-contrib-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028715" comment="postgresql13-devel-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028716" comment="postgresql13-docs-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028717" comment="postgresql13-llvmjit-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028718" comment="postgresql13-plperl-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028719" comment="postgresql13-plpython-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028720" comment="postgresql13-pltcl-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028721" comment="postgresql13-server-13.22-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028722" comment="postgresql13-server-devel-13.22-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94202" version="1" class="patch">
	<metadata>
		<title>postgresql14-14.19-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql14-14.19-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028723" comment="postgresql14-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028724" comment="postgresql14-contrib-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028725" comment="postgresql14-devel-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028726" comment="postgresql14-docs-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028727" comment="postgresql14-llvmjit-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028728" comment="postgresql14-plperl-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028729" comment="postgresql14-plpython-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028730" comment="postgresql14-pltcl-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028731" comment="postgresql14-server-14.19-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028732" comment="postgresql14-server-devel-14.19-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94203" version="1" class="patch">
	<metadata>
		<title>postgresql15-15.14-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-39418" ref_url="https://www.suse.com/security/cve/CVE-2023-39418/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql15-15.14-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39418/">CVE-2023-39418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39418">CVE-2023-39418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028733" comment="postgresql15-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028734" comment="postgresql15-contrib-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028735" comment="postgresql15-devel-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028736" comment="postgresql15-docs-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028737" comment="postgresql15-llvmjit-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028738" comment="postgresql15-plperl-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028739" comment="postgresql15-plpython-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028740" comment="postgresql15-pltcl-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028741" comment="postgresql15-server-15.14-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028742" comment="postgresql15-server-devel-15.14-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94204" version="1" class="patch">
	<metadata>
		<title>postgresql16-16.10-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql16-16.10-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028743" comment="postgresql16-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028744" comment="postgresql16-contrib-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028745" comment="postgresql16-devel-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028746" comment="postgresql16-docs-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028747" comment="postgresql16-llvmjit-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028748" comment="postgresql16-plperl-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028749" comment="postgresql16-plpython-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028750" comment="postgresql16-pltcl-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028751" comment="postgresql16-server-16.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028752" comment="postgresql16-server-devel-16.10-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94205" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.3.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.3.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4040">CVE-2014-4040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028753" comment="powerpc-utils-1.3.13-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94206" version="1" class="patch">
	<metadata>
		<title>ppc64-diag-2.7.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the ppc64-diag-2.7.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4038">CVE-2014-4038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4039">CVE-2014-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028754" comment="ppc64-diag-2.7.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94207" version="1" class="patch">
	<metadata>
		<title>ppp-2.5.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="CVE-2022-4603" ref_url="https://www.suse.com/security/cve/CVE-2022-4603/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.5.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3158">CVE-2014-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3310">CVE-2015-3310 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4603/">CVE-2022-4603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4603">CVE-2022-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028755" comment="ppp-2.5.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028756" comment="ppp-devel-2.5.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028757" comment="ppp-modem-2.5.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94208" version="1" class="patch">
	<metadata>
		<title>procmail-3.24-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.24-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028758" comment="procmail-3.24-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94209" version="1" class="patch">
	<metadata>
		<title>python-M2Crypto-doc-0.45.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<description>
These are all security issues fixed in the python-M2Crypto-doc-0.45.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25657">CVE-2020-25657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028759" comment="python-M2Crypto-doc-0.45.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028760" comment="python313-M2Crypto-0.45.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94210" version="1" class="patch">
	<metadata>
		<title>python-SQLAlchemy-doc-2.0.40-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<reference ref_id="CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548/" source="CVE"/>
		<description>
These are all security issues fixed in the python-SQLAlchemy-doc-2.0.40-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7164">CVE-2019-7164 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7548">CVE-2019-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028761" comment="python-SQLAlchemy-doc-2.0.40-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028762" comment="python313-SQLAlchemy-2.0.40-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94211" version="1" class="patch">
	<metadata>
		<title>python-Twisted-doc-24.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<reference ref_id="CVE-2019-12855" ref_url="https://www.suse.com/security/cve/CVE-2019-12855/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="CVE-2022-21716" ref_url="https://www.suse.com/security/cve/CVE-2022-21716/" source="CVE"/>
		<reference ref_id="CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801/" source="CVE"/>
		<reference ref_id="CVE-2022-39348" ref_url="https://www.suse.com/security/cve/CVE-2022-39348/" source="CVE"/>
		<reference ref_id="CVE-2023-46137" ref_url="https://www.suse.com/security/cve/CVE-2023-46137/" source="CVE"/>
		<reference ref_id="CVE-2024-41671" ref_url="https://www.suse.com/security/cve/CVE-2024-41671/" source="CVE"/>
		<reference ref_id="CVE-2024-41810" ref_url="https://www.suse.com/security/cve/CVE-2024-41810/" source="CVE"/>
		<description>
These are all security issues fixed in the python-Twisted-doc-24.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12855/">CVE-2019-12855 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12855">CVE-2019-12855 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9515">CVE-2019-9515 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21712">CVE-2022-21712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21716/">CVE-2022-21716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21716">CVE-2022-21716 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24801">CVE-2022-24801 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39348/">CVE-2022-39348 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39348">CVE-2022-39348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46137/">CVE-2023-46137 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46137">CVE-2023-46137 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41671/">CVE-2024-41671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41671">CVE-2024-41671 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41810/">CVE-2024-41810 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41810">CVE-2024-41810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028763" comment="python-Twisted-doc-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028764" comment="python313-Twisted-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028765" comment="python313-Twisted-all_non_platform-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028766" comment="python313-Twisted-conch-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028767" comment="python313-Twisted-conch_nacl-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028768" comment="python313-Twisted-contextvars-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028769" comment="python313-Twisted-http2-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028770" comment="python313-Twisted-serial-24.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028771" comment="python313-Twisted-tls-24.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94212" version="1" class="patch">
	<metadata>
		<title>python-WebOb-doc-1.8.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-42353" ref_url="https://www.suse.com/security/cve/CVE-2024-42353/" source="CVE"/>
		<description>
These are all security issues fixed in the python-WebOb-doc-1.8.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-42353/">CVE-2024-42353 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42353">CVE-2024-42353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028772" comment="python-WebOb-doc-1.8.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028773" comment="python313-WebOb-1.8.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94213" version="1" class="patch">
	<metadata>
		<title>python-bottle-doc-0.13.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9964" ref_url="https://www.suse.com/security/cve/CVE-2016-9964/" source="CVE"/>
		<reference ref_id="CVE-2020-28473" ref_url="https://www.suse.com/security/cve/CVE-2020-28473/" source="CVE"/>
		<reference ref_id="CVE-2022-31799" ref_url="https://www.suse.com/security/cve/CVE-2022-31799/" source="CVE"/>
		<description>
These are all security issues fixed in the python-bottle-doc-0.13.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9964/">CVE-2016-9964 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9964">CVE-2016-9964 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28473/">CVE-2020-28473 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28473">CVE-2020-28473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31799/">CVE-2022-31799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31799">CVE-2022-31799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028774" comment="python-bottle-doc-0.13.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028775" comment="python313-bottle-0.13.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94214" version="1" class="patch">
	<metadata>
		<title>python-gevent-doc-25.4.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-41419" ref_url="https://www.suse.com/security/cve/CVE-2023-41419/" source="CVE"/>
		<description>
These are all security issues fixed in the python-gevent-doc-25.4.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41419/">CVE-2023-41419 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41419">CVE-2023-41419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028776" comment="python-gevent-doc-25.4.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028777" comment="python313-gevent-25.4.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94215" version="1" class="patch">
	<metadata>
		<title>python-gunicorn-doc-23.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-1135" ref_url="https://www.suse.com/security/cve/CVE-2024-1135/" source="CVE"/>
		<description>
These are all security issues fixed in the python-gunicorn-doc-23.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1135/">CVE-2024-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1135">CVE-2024-1135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028778" comment="python-gunicorn-doc-23.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028779" comment="python313-gunicorn-23.0.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94216" version="1" class="patch">
	<metadata>
		<title>python-lxml-doc-5.4.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309/" source="CVE"/>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-doc-5.4.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19787">CVE-2018-19787 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028780" comment="python-lxml-doc-5.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028781" comment="python313-lxml-5.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028782" comment="python313-lxml-devel-5.4.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94217" version="1" class="patch">
	<metadata>
		<title>python-marshmallow-doc-3.20.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-17175" ref_url="https://www.suse.com/security/cve/CVE-2018-17175/" source="CVE"/>
		<description>
These are all security issues fixed in the python-marshmallow-doc-3.20.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17175/">CVE-2018-17175 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17175">CVE-2018-17175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028783" comment="python-marshmallow-doc-3.20.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028784" comment="python313-marshmallow-3.20.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94218" version="1" class="patch">
	<metadata>
		<title>python-paramiko-doc-3.5.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<reference ref_id="CVE-2018-7750" ref_url="https://www.suse.com/security/cve/CVE-2018-7750/" source="CVE"/>
		<reference ref_id="CVE-2022-24302" ref_url="https://www.suse.com/security/cve/CVE-2022-24302/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
These are all security issues fixed in the python-paramiko-doc-3.5.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000805">CVE-2018-1000805 at NVD</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7750/">CVE-2018-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7750">CVE-2018-7750 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24302/">CVE-2022-24302 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24302">CVE-2022-24302 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028785" comment="python-paramiko-doc-3.5.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028786" comment="python313-paramiko-3.5.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94219" version="1" class="patch">
	<metadata>
		<title>python-rtslib-fb-common-2.2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019/" source="CVE"/>
		<description>
These are all security issues fixed in the python-rtslib-fb-common-2.2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14019">CVE-2020-14019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028787" comment="python-rtslib-fb-common-2.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028788" comment="python313-rtslib-fb-2.2.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94220" version="1" class="patch">
	<metadata>
		<title>python-tqdm-bash-completion-4.67.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-10075" ref_url="https://www.suse.com/security/cve/CVE-2016-10075/" source="CVE"/>
		<reference ref_id="CVE-2024-34062" ref_url="https://www.suse.com/security/cve/CVE-2024-34062/" source="CVE"/>
		<description>
These are all security issues fixed in the python-tqdm-bash-completion-4.67.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10075/">CVE-2016-10075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10075">CVE-2016-10075 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-34062/">CVE-2024-34062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34062">CVE-2024-34062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028789" comment="python-tqdm-bash-completion-4.67.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028790" comment="python313-tqdm-4.67.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94221" version="1" class="patch">
	<metadata>
		<title>python313-Babel-2.17.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-20095" ref_url="https://www.suse.com/security/cve/CVE-2021-20095/" source="CVE"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Babel-2.17.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20095/">CVE-2021-20095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20095">CVE-2021-20095 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028791" comment="python313-Babel-2.17.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94222" version="1" class="patch">
	<metadata>
		<title>python313-Brotli-1.1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Brotli-1.1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028792" comment="python313-Brotli-1.1.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94223" version="1" class="patch">
	<metadata>
		<title>python313-CairoSVG-2.7.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-21236" ref_url="https://www.suse.com/security/cve/CVE-2021-21236/" source="CVE"/>
		<reference ref_id="CVE-2023-27586" ref_url="https://www.suse.com/security/cve/CVE-2023-27586/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-CairoSVG-2.7.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21236/">CVE-2021-21236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21236">CVE-2021-21236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27586/">CVE-2023-27586 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27586">CVE-2023-27586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028793" comment="python313-CairoSVG-2.7.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94224" version="1" class="patch">
	<metadata>
		<title>python313-CherryPy-18.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-CherryPy-18.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028794" comment="python313-CherryPy-18.10.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94225" version="1" class="patch">
	<metadata>
		<title>python313-Flask-3.1.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-30861" ref_url="https://www.suse.com/security/cve/CVE-2023-30861/" source="CVE"/>
		<reference ref_id="CVE-2025-47278" ref_url="https://www.suse.com/security/cve/CVE-2025-47278/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Flask-3.1.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30861/">CVE-2023-30861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30861">CVE-2023-30861 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47278/">CVE-2025-47278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47278">CVE-2025-47278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028795" comment="python313-Flask-3.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028796" comment="python313-Flask-doc-3.1.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94226" version="1" class="patch">
	<metadata>
		<title>python313-FontTools-4.53.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-45139" ref_url="https://www.suse.com/security/cve/CVE-2023-45139/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-FontTools-4.53.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45139/">CVE-2023-45139 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45139">CVE-2023-45139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028797" comment="python313-FontTools-4.53.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94227" version="1" class="patch">
	<metadata>
		<title>python313-GitPython-3.1.44-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-24439" ref_url="https://www.suse.com/security/cve/CVE-2022-24439/" source="CVE"/>
		<reference ref_id="CVE-2023-40267" ref_url="https://www.suse.com/security/cve/CVE-2023-40267/" source="CVE"/>
		<reference ref_id="CVE-2023-40590" ref_url="https://www.suse.com/security/cve/CVE-2023-40590/" source="CVE"/>
		<reference ref_id="CVE-2023-41040" ref_url="https://www.suse.com/security/cve/CVE-2023-41040/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-GitPython-3.1.44-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24439/">CVE-2022-24439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24439">CVE-2022-24439 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40267/">CVE-2023-40267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40267">CVE-2023-40267 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40590/">CVE-2023-40590 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40590">CVE-2023-40590 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41040/">CVE-2023-41040 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41040">CVE-2023-41040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028798" comment="python313-GitPython-3.1.44-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94228" version="1" class="patch">
	<metadata>
		<title>python313-Jinja2-3.1.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0012" ref_url="https://www.suse.com/security/cve/CVE-2014-0012/" source="CVE"/>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341/" source="CVE"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Jinja2-3.1.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0012/">CVE-2014-0012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0012">CVE-2014-0012 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8341">CVE-2019-8341 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028799" comment="python313-Jinja2-3.1.6-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94229" version="1" class="patch">
	<metadata>
		<title>python313-Js2Py-0.74-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-28397" ref_url="https://www.suse.com/security/cve/CVE-2024-28397/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Js2Py-0.74-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-28397/">CVE-2024-28397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28397">CVE-2024-28397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028800" comment="python313-Js2Py-0.74-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94230" version="1" class="patch">
	<metadata>
		<title>python313-Mako-1.3.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Mako-1.3.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40023">CVE-2022-40023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028801" comment="python313-Mako-1.3.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94231" version="1" class="patch">
	<metadata>
		<title>python313-Pillow-11.3.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3589" ref_url="https://www.suse.com/security/cve/CVE-2014-3589/" source="CVE"/>
		<reference ref_id="CVE-2014-3598" ref_url="https://www.suse.com/security/cve/CVE-2014-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-0740" ref_url="https://www.suse.com/security/cve/CVE-2016-0740/" source="CVE"/>
		<reference ref_id="CVE-2016-0775" ref_url="https://www.suse.com/security/cve/CVE-2016-0775/" source="CVE"/>
		<reference ref_id="CVE-2016-3076" ref_url="https://www.suse.com/security/cve/CVE-2016-3076/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653/" source="CVE"/>
		<reference ref_id="CVE-2020-35654" ref_url="https://www.suse.com/security/cve/CVE-2020-35654/" source="CVE"/>
		<reference ref_id="CVE-2020-35655" ref_url="https://www.suse.com/security/cve/CVE-2020-35655/" source="CVE"/>
		<reference ref_id="CVE-2021-23437" ref_url="https://www.suse.com/security/cve/CVE-2021-23437/" source="CVE"/>
		<reference ref_id="CVE-2021-25289" ref_url="https://www.suse.com/security/cve/CVE-2021-25289/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-25291" ref_url="https://www.suse.com/security/cve/CVE-2021-25291/" source="CVE"/>
		<reference ref_id="CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292/" source="CVE"/>
		<reference ref_id="CVE-2021-25293" ref_url="https://www.suse.com/security/cve/CVE-2021-25293/" source="CVE"/>
		<reference ref_id="CVE-2021-27921" ref_url="https://www.suse.com/security/cve/CVE-2021-27921/" source="CVE"/>
		<reference ref_id="CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922/" source="CVE"/>
		<reference ref_id="CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923/" source="CVE"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<reference ref_id="CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817/" source="CVE"/>
		<reference ref_id="CVE-2022-24303" ref_url="https://www.suse.com/security/cve/CVE-2022-24303/" source="CVE"/>
		<reference ref_id="CVE-2022-30595" ref_url="https://www.suse.com/security/cve/CVE-2022-30595/" source="CVE"/>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<reference ref_id="CVE-2024-28219" ref_url="https://www.suse.com/security/cve/CVE-2024-28219/" source="CVE"/>
		<reference ref_id="CVE-2025-48379" ref_url="https://www.suse.com/security/cve/CVE-2025-48379/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Pillow-11.3.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3589/">CVE-2014-3589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3589">CVE-2014-3589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3598/">CVE-2014-3598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3598">CVE-2014-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0740/">CVE-2016-0740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0740">CVE-2016-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0775/">CVE-2016-0775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0775">CVE-2016-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3076/">CVE-2016-3076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3076">CVE-2016-3076 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35653">CVE-2020-35653 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35654/">CVE-2020-35654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35654">CVE-2020-35654 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35655/">CVE-2020-35655 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35655">CVE-2020-35655 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23437/">CVE-2021-23437 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23437">CVE-2021-23437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25289/">CVE-2021-25289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25289">CVE-2021-25289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25290">CVE-2021-25290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25291/">CVE-2021-25291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25291">CVE-2021-25291 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25292">CVE-2021-25292 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25293/">CVE-2021-25293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25293">CVE-2021-25293 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27921/">CVE-2021-27921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27921">CVE-2021-27921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27922">CVE-2021-27922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27923">CVE-2021-27923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34552">CVE-2021-34552 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24303/">CVE-2022-24303 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24303">CVE-2022-24303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30595/">CVE-2022-30595 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30595">CVE-2022-30595 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-28219/">CVE-2024-28219 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28219">CVE-2024-28219 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48379/">CVE-2025-48379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48379">CVE-2025-48379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028802" comment="python313-Pillow-11.3.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028803" comment="python313-Pillow-tk-11.3.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94232" version="1" class="patch">
	<metadata>
		<title>python313-PyJWT-2.10.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-29217" ref_url="https://www.suse.com/security/cve/CVE-2022-29217/" source="CVE"/>
		<reference ref_id="CVE-2024-53861" ref_url="https://www.suse.com/security/cve/CVE-2024-53861/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-PyJWT-2.10.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29217/">CVE-2022-29217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29217">CVE-2022-29217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53861/">CVE-2024-53861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53861">CVE-2024-53861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028804" comment="python313-PyJWT-2.10.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94233" version="1" class="patch">
	<metadata>
		<title>python313-PyMySQL-1.1.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-PyMySQL-1.1.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028805" comment="python313-PyMySQL-1.1.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94234" version="1" class="patch">
	<metadata>
		<title>python313-PyYAML-6.0.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-PyYAML-6.0.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028806" comment="python313-PyYAML-6.0.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94235" version="1" class="patch">
	<metadata>
		<title>python313-Pygments-2.19.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270/" source="CVE"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Pygments-2.19.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20270">CVE-2021-20270 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27291">CVE-2021-27291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028807" comment="python313-Pygments-2.19.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94236" version="1" class="patch">
	<metadata>
		<title>python313-Werkzeug-3.1.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-14806" ref_url="https://www.suse.com/security/cve/CVE-2019-14806/" source="CVE"/>
		<reference ref_id="CVE-2023-25577" ref_url="https://www.suse.com/security/cve/CVE-2023-25577/" source="CVE"/>
		<reference ref_id="CVE-2023-46136" ref_url="https://www.suse.com/security/cve/CVE-2023-46136/" source="CVE"/>
		<reference ref_id="CVE-2024-34069" ref_url="https://www.suse.com/security/cve/CVE-2024-34069/" source="CVE"/>
		<reference ref_id="CVE-2024-49767" ref_url="https://www.suse.com/security/cve/CVE-2024-49767/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-Werkzeug-3.1.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14806/">CVE-2019-14806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14806">CVE-2019-14806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25577/">CVE-2023-25577 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25577">CVE-2023-25577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46136/">CVE-2023-46136 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46136">CVE-2023-46136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-34069/">CVE-2024-34069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34069">CVE-2024-34069 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-49767/">CVE-2024-49767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49767">CVE-2024-49767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028808" comment="python313-Werkzeug-3.1.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94237" version="1" class="patch">
	<metadata>
		<title>python313-aiohttp-3.11.16-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-21330" ref_url="https://www.suse.com/security/cve/CVE-2021-21330/" source="CVE"/>
		<reference ref_id="CVE-2023-47627" ref_url="https://www.suse.com/security/cve/CVE-2023-47627/" source="CVE"/>
		<reference ref_id="CVE-2023-47641" ref_url="https://www.suse.com/security/cve/CVE-2023-47641/" source="CVE"/>
		<reference ref_id="CVE-2023-49081" ref_url="https://www.suse.com/security/cve/CVE-2023-49081/" source="CVE"/>
		<reference ref_id="CVE-2023-49082" ref_url="https://www.suse.com/security/cve/CVE-2023-49082/" source="CVE"/>
		<reference ref_id="CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254/" source="CVE"/>
		<reference ref_id="CVE-2024-23334" ref_url="https://www.suse.com/security/cve/CVE-2024-23334/" source="CVE"/>
		<reference ref_id="CVE-2024-23829" ref_url="https://www.suse.com/security/cve/CVE-2024-23829/" source="CVE"/>
		<reference ref_id="CVE-2024-27306" ref_url="https://www.suse.com/security/cve/CVE-2024-27306/" source="CVE"/>
		<reference ref_id="CVE-2024-42367" ref_url="https://www.suse.com/security/cve/CVE-2024-42367/" source="CVE"/>
		<reference ref_id="CVE-2024-52303" ref_url="https://www.suse.com/security/cve/CVE-2024-52303/" source="CVE"/>
		<reference ref_id="CVE-2024-52304" ref_url="https://www.suse.com/security/cve/CVE-2024-52304/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-aiohttp-3.11.16-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21330/">CVE-2021-21330 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21330">CVE-2021-21330 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-47627/">CVE-2023-47627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47627">CVE-2023-47627 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-47641/">CVE-2023-47641 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47641">CVE-2023-47641 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-49081/">CVE-2023-49081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49081">CVE-2023-49081 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-49082/">CVE-2023-49082 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49082">CVE-2023-49082 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23334/">CVE-2024-23334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23334">CVE-2024-23334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-23829/">CVE-2024-23829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23829">CVE-2024-23829 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27306/">CVE-2024-27306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27306">CVE-2024-27306 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42367/">CVE-2024-42367 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42367">CVE-2024-42367 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-52303/">CVE-2024-52303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52303">CVE-2024-52303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-52304/">CVE-2024-52304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52304">CVE-2024-52304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028809" comment="python313-aiohttp-3.11.16-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94238" version="1" class="patch">
	<metadata>
		<title>python313-asyncpg-0.30.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-17446" ref_url="https://www.suse.com/security/cve/CVE-2020-17446/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-asyncpg-0.30.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17446/">CVE-2020-17446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17446">CVE-2020-17446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028810" comment="python313-asyncpg-0.30.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94239" version="1" class="patch">
	<metadata>
		<title>python313-black-25.1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-21503" ref_url="https://www.suse.com/security/cve/CVE-2024-21503/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-black-25.1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-21503/">CVE-2024-21503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21503">CVE-2024-21503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028811" comment="python313-black-25.1.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94240" version="1" class="patch">
	<metadata>
		<title>python313-bleach-6.2.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-7753" ref_url="https://www.suse.com/security/cve/CVE-2018-7753/" source="CVE"/>
		<reference ref_id="CVE-2020-6802" ref_url="https://www.suse.com/security/cve/CVE-2020-6802/" source="CVE"/>
		<reference ref_id="CVE-2020-6816" ref_url="https://www.suse.com/security/cve/CVE-2020-6816/" source="CVE"/>
		<reference ref_id="CVE-2020-6817" ref_url="https://www.suse.com/security/cve/CVE-2020-6817/" source="CVE"/>
		<reference ref_id="CVE-2021-23980" ref_url="https://www.suse.com/security/cve/CVE-2021-23980/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-bleach-6.2.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7753/">CVE-2018-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7753">CVE-2018-7753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6802/">CVE-2020-6802 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6802">CVE-2020-6802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6816/">CVE-2020-6816 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6816">CVE-2020-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6817/">CVE-2020-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6817">CVE-2020-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23980/">CVE-2021-23980 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23980">CVE-2021-23980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028812" comment="python313-bleach-6.2.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94241" version="1" class="patch">
	<metadata>
		<title>python313-certifi-2025.1.31-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491/" source="CVE"/>
		<reference ref_id="CVE-2024-39689" ref_url="https://www.suse.com/security/cve/CVE-2024-39689/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-certifi-2025.1.31-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23491">CVE-2022-23491 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39689/">CVE-2024-39689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39689">CVE-2024-39689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028813" comment="python313-certifi-2025.1.31-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94242" version="1" class="patch">
	<metadata>
		<title>python313-cmarkgfm-2022.10.27-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-37463" ref_url="https://www.suse.com/security/cve/CVE-2023-37463/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-cmarkgfm-2022.10.27-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37463/">CVE-2023-37463 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37463">CVE-2023-37463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028814" comment="python313-cmarkgfm-2022.10.27-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94243" version="1" class="patch">
	<metadata>
		<title>python313-configobj-5.0.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-26112" ref_url="https://www.suse.com/security/cve/CVE-2023-26112/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-configobj-5.0.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26112/">CVE-2023-26112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26112">CVE-2023-26112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028815" comment="python313-configobj-5.0.9-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94244" version="1" class="patch">
	<metadata>
		<title>python313-cryptography-44.0.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<reference ref_id="CVE-2023-38325" ref_url="https://www.suse.com/security/cve/CVE-2023-38325/" source="CVE"/>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<reference ref_id="CVE-2024-26130" ref_url="https://www.suse.com/security/cve/CVE-2024-26130/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-cryptography-44.0.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38325/">CVE-2023-38325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38325">CVE-2023-38325 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26130/">CVE-2024-26130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26130">CVE-2024-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028816" comment="python313-cryptography-44.0.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94245" version="1" class="patch">
	<metadata>
		<title>python313-cryptography-vectors-44.0.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-cryptography-vectors-44.0.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028817" comment="python313-cryptography-vectors-44.0.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94246" version="1" class="patch">
	<metadata>
		<title>python313-dnspython-2.7.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-dnspython-2.7.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028818" comment="python313-dnspython-2.7.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028819" comment="python313-eventlet-0.40.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94247" version="1" class="patch">
	<metadata>
		<title>python313-ecdsa-0.19.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-ecdsa-0.19.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14853">CVE-2019-14853 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14859">CVE-2019-14859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028820" comment="python313-ecdsa-0.19.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94248" version="1" class="patch">
	<metadata>
		<title>python313-fastapi-0.115.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-24762" ref_url="https://www.suse.com/security/cve/CVE-2024-24762/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-fastapi-0.115.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24762/">CVE-2024-24762 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24762">CVE-2024-24762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028821" comment="python313-fastapi-0.115.8-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94249" version="1" class="patch">
	<metadata>
		<title>python313-h11-0.16.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-43859" ref_url="https://www.suse.com/security/cve/CVE-2025-43859/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-h11-0.16.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43859/">CVE-2025-43859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43859">CVE-2025-43859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028822" comment="python313-h11-0.16.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94250" version="1" class="patch">
	<metadata>
		<title>python313-hpack-4.1.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-6581" ref_url="https://www.suse.com/security/cve/CVE-2016-6581/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-hpack-4.1.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6581/">CVE-2016-6581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6581">CVE-2016-6581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028823" comment="python313-hpack-4.1.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94251" version="1" class="patch">
	<metadata>
		<title>python313-httplib2-0.22.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-httplib2-0.22.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21240">CVE-2021-21240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028824" comment="python313-httplib2-0.22.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94252" version="1" class="patch">
	<metadata>
		<title>python313-httptools-0.6.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-httptools-0.6.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22960">CVE-2021-22960 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32214">CVE-2022-32214 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028825" comment="python313-httptools-0.6.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94253" version="1" class="patch">
	<metadata>
		<title>python313-httpx-0.28.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-41945" ref_url="https://www.suse.com/security/cve/CVE-2021-41945/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-httpx-0.28.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41945/">CVE-2021-41945 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41945">CVE-2021-41945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028826" comment="python313-httpx-0.28.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94254" version="1" class="patch">
	<metadata>
		<title>python313-idna-3.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-idna-3.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028827" comment="python313-idna-3.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94255" version="1" class="patch">
	<metadata>
		<title>python313-jwcrypto-1.5.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-3102" ref_url="https://www.suse.com/security/cve/CVE-2022-3102/" source="CVE"/>
		<reference ref_id="CVE-2024-28102" ref_url="https://www.suse.com/security/cve/CVE-2024-28102/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-jwcrypto-1.5.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3102/">CVE-2022-3102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-3102">CVE-2022-3102 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28102/">CVE-2024-28102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28102">CVE-2024-28102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028828" comment="python313-jwcrypto-1.5.6-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94256" version="1" class="patch">
	<metadata>
		<title>python313-markdown-it-py-3.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-26303" ref_url="https://www.suse.com/security/cve/CVE-2023-26303/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-markdown-it-py-3.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26303/">CVE-2023-26303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26303">CVE-2023-26303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028829" comment="python313-markdown-it-py-3.0.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94257" version="1" class="patch">
	<metadata>
		<title>python313-mistune-3.1.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-15612" ref_url="https://www.suse.com/security/cve/CVE-2017-15612/" source="CVE"/>
		<reference ref_id="CVE-2017-16876" ref_url="https://www.suse.com/security/cve/CVE-2017-16876/" source="CVE"/>
		<reference ref_id="CVE-2022-34749" ref_url="https://www.suse.com/security/cve/CVE-2022-34749/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-mistune-3.1.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15612/">CVE-2017-15612 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15612">CVE-2017-15612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16876/">CVE-2017-16876 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16876">CVE-2017-16876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34749/">CVE-2022-34749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34749">CVE-2022-34749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028830" comment="python313-mistune-3.1.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94258" version="1" class="patch">
	<metadata>
		<title>python313-nh3-0.2.17-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-nh3-0.2.17-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028831" comment="python313-nh3-0.2.17-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94259" version="1" class="patch">
	<metadata>
		<title>python313-numpy-2.2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<reference ref_id="CVE-2021-41495" ref_url="https://www.suse.com/security/cve/CVE-2021-41495/" source="CVE"/>
		<reference ref_id="CVE-2021-41496" ref_url="https://www.suse.com/security/cve/CVE-2021-41496/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-numpy-2.2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12852">CVE-2017-12852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">CVE-2021-33430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41495/">CVE-2021-41495 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41495">CVE-2021-41495 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41496/">CVE-2021-41496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41496">CVE-2021-41496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028832" comment="python313-numpy-2.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028833" comment="python313-numpy-devel-2.2.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94260" version="1" class="patch">
	<metadata>
		<title>python313-oauthlib-3.2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-36087" ref_url="https://www.suse.com/security/cve/CVE-2022-36087/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-oauthlib-3.2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36087/">CVE-2022-36087 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36087">CVE-2022-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028834" comment="python313-oauthlib-3.2.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94261" version="1" class="patch">
	<metadata>
		<title>python313-orjson-3.10.15-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-27454" ref_url="https://www.suse.com/security/cve/CVE-2024-27454/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-orjson-3.10.15-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27454/">CVE-2024-27454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27454">CVE-2024-27454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028835" comment="python313-orjson-3.10.15-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94262" version="1" class="patch">
	<metadata>
		<title>python313-pip-25.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123/" source="CVE"/>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2023-5752" ref_url="https://www.suse.com/security/cve/CVE-2023-5752/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-pip-25.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5123">CVE-2013-5123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8991">CVE-2014-8991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5752/">CVE-2023-5752 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5752">CVE-2023-5752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028836" comment="python313-pip-25.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028837" comment="python313-pip-wheel-25.0.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94263" version="1" class="patch">
	<metadata>
		<title>python313-py-1.11.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="CVE-2022-42969" ref_url="https://www.suse.com/security/cve/CVE-2022-42969/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-py-1.11.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42969/">CVE-2022-42969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42969">CVE-2022-42969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028838" comment="python313-py-1.11.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94264" version="1" class="patch">
	<metadata>
		<title>python313-pyOpenSSL-25.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-pyOpenSSL-25.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4314">CVE-2013-4314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028839" comment="python313-pyOpenSSL-25.0.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94265" version="1" class="patch">
	<metadata>
		<title>python313-pycares-4.9.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-48945" ref_url="https://www.suse.com/security/cve/CVE-2025-48945/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-pycares-4.9.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48945/">CVE-2025-48945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48945">CVE-2025-48945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028840" comment="python313-pycares-4.9.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94266" version="1" class="patch">
	<metadata>
		<title>python313-pycryptodome-3.22.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-pycryptodome-3.22.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028841" comment="python313-pycryptodome-3.22.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94267" version="1" class="patch">
	<metadata>
		<title>python313-pydantic-2.11.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2021-29510" ref_url="https://www.suse.com/security/cve/CVE-2021-29510/" source="CVE"/>
		<reference ref_id="CVE-2024-3772" ref_url="https://www.suse.com/security/cve/CVE-2024-3772/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-pydantic-2.11.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29510/">CVE-2021-29510 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29510">CVE-2021-29510 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3772/">CVE-2024-3772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3772">CVE-2024-3772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028842" comment="python313-pydantic-2.11.7-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94268" version="1" class="patch">
	<metadata>
		<title>python313-python-jose-3.4.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-33663" ref_url="https://www.suse.com/security/cve/CVE-2024-33663/" source="CVE"/>
		<reference ref_id="CVE-2024-33664" ref_url="https://www.suse.com/security/cve/CVE-2024-33664/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-python-jose-3.4.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-33663/">CVE-2024-33663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33663">CVE-2024-33663 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33664/">CVE-2024-33664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33664">CVE-2024-33664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028843" comment="python313-python-jose-3.4.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028844" comment="python313-python-jose-cryptography-3.4.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94269" version="1" class="patch">
	<metadata>
		<title>python313-python-multipart-0.0.20-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-24762" ref_url="https://www.suse.com/security/cve/CVE-2024-24762/" source="CVE"/>
		<reference ref_id="CVE-2024-53981" ref_url="https://www.suse.com/security/cve/CVE-2024-53981/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-python-multipart-0.0.20-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24762/">CVE-2024-24762 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24762">CVE-2024-24762 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53981/">CVE-2024-53981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53981">CVE-2024-53981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028845" comment="python313-python-multipart-0.0.20-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94270" version="1" class="patch">
	<metadata>
		<title>python313-pywbem-1.7.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-pywbem-1.7.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6418">CVE-2013-6418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028846" comment="python313-pywbem-1.7.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94271" version="1" class="patch">
	<metadata>
		<title>python313-pyzmq-25.1.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-pyzmq-25.1.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028847" comment="python313-pyzmq-25.1.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028848" comment="python313-pyzmq-devel-25.1.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94272" version="1" class="patch">
	<metadata>
		<title>python313-redis-5.2.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-28858" ref_url="https://www.suse.com/security/cve/CVE-2023-28858/" source="CVE"/>
		<reference ref_id="CVE-2023-28859" ref_url="https://www.suse.com/security/cve/CVE-2023-28859/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-redis-5.2.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28858/">CVE-2023-28858 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28858">CVE-2023-28858 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28859/">CVE-2023-28859 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28859">CVE-2023-28859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028849" comment="python313-redis-5.2.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94273" version="1" class="patch">
	<metadata>
		<title>python313-requests-2.32.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-requests-2.32.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1829">CVE-2014-1829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1830">CVE-2014-1830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028850" comment="python313-requests-2.32.4-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94274" version="1" class="patch">
	<metadata>
		<title>python313-rsa-4.9.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="CVE-2020-25658" ref_url="https://www.suse.com/security/cve/CVE-2020-25658/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-rsa-4.9.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13757">CVE-2020-13757 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25658/">CVE-2020-25658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25658">CVE-2020-25658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028851" comment="python313-rsa-4.9.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94275" version="1" class="patch">
	<metadata>
		<title>python313-ruamel.yaml-0.18.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-20478" ref_url="https://www.suse.com/security/cve/CVE-2019-20478/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-ruamel.yaml-0.18.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20478/">CVE-2019-20478 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20478">CVE-2019-20478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028852" comment="python313-ruamel.yaml-0.18.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94276" version="1" class="patch">
	<metadata>
		<title>python313-setuptools-78.1.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-setuptools-78.1.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028853" comment="python313-setuptools-78.1.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028854" comment="python313-setuptools-wheel-78.1.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94277" version="1" class="patch">
	<metadata>
		<title>python313-sqlparse-0.5.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-32839" ref_url="https://www.suse.com/security/cve/CVE-2021-32839/" source="CVE"/>
		<reference ref_id="CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608/" source="CVE"/>
		<reference ref_id="CVE-2024-2430" ref_url="https://www.suse.com/security/cve/CVE-2024-2430/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-sqlparse-0.5.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32839/">CVE-2021-32839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32839">CVE-2021-32839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2430/">CVE-2024-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2430">CVE-2024-2430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028855" comment="python313-sqlparse-0.5.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94278" version="1" class="patch">
	<metadata>
		<title>python313-starlette-0.41.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-47874" ref_url="https://www.suse.com/security/cve/CVE-2024-47874/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-starlette-0.41.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-47874/">CVE-2024-47874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47874">CVE-2024-47874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028856" comment="python313-starlette-0.41.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94279" version="1" class="patch">
	<metadata>
		<title>python313-suds-1.2.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-2217" ref_url="https://www.suse.com/security/cve/CVE-2013-2217/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-suds-1.2.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2217/">CVE-2013-2217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2217">CVE-2013-2217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028857" comment="python313-suds-1.2.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94280" version="1" class="patch">
	<metadata>
		<title>python313-targetcli-fb-3.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-10699" ref_url="https://www.suse.com/security/cve/CVE-2020-10699/" source="CVE"/>
		<reference ref_id="CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-targetcli-fb-3.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10699/">CVE-2020-10699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10699">CVE-2020-10699 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13867">CVE-2020-13867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028858" comment="python313-targetcli-fb-3.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028859" comment="targetcli-fb-common-3.0.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94281" version="1" class="patch">
	<metadata>
		<title>python313-tornado6-6.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<reference ref_id="CVE-2024-52804" ref_url="https://www.suse.com/security/cve/CVE-2024-52804/" source="CVE"/>
		<reference ref_id="CVE-2025-47287" ref_url="https://www.suse.com/security/cve/CVE-2025-47287/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-tornado6-6.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52804/">CVE-2024-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52804">CVE-2024-52804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47287/">CVE-2025-47287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47287">CVE-2025-47287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028860" comment="python313-tornado6-6.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94282" version="1" class="patch">
	<metadata>
		<title>python313-ujson-5.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-45958" ref_url="https://www.suse.com/security/cve/CVE-2021-45958/" source="CVE"/>
		<reference ref_id="CVE-2022-31116" ref_url="https://www.suse.com/security/cve/CVE-2022-31116/" source="CVE"/>
		<reference ref_id="CVE-2022-31117" ref_url="https://www.suse.com/security/cve/CVE-2022-31117/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-ujson-5.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45958/">CVE-2021-45958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45958">CVE-2021-45958 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31116/">CVE-2022-31116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31116">CVE-2022-31116 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31117/">CVE-2022-31117 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31117">CVE-2022-31117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028861" comment="python313-ujson-5.10.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94283" version="1" class="patch">
	<metadata>
		<title>python313-urllib3-2.5.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="CVE-2025-50181" ref_url="https://www.suse.com/security/cve/CVE-2025-50181/" source="CVE"/>
		<reference ref_id="CVE-2025-50182" ref_url="https://www.suse.com/security/cve/CVE-2025-50182/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-urllib3-2.5.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50181/">CVE-2025-50181 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50181">CVE-2025-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50182/">CVE-2025-50182 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50182">CVE-2025-50182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028862" comment="python313-urllib3-2.5.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94284" version="1" class="patch">
	<metadata>
		<title>python313-urllib3_1-1.26.20-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-urllib3_1-1.26.20-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028863" comment="python313-urllib3_1-1.26.20-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94285" version="1" class="patch">
	<metadata>
		<title>python313-uv-0.7.18-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-54368" ref_url="https://www.suse.com/security/cve/CVE-2025-54368/" source="CVE"/>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-uv-0.7.18-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54368/">CVE-2025-54368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54368">CVE-2025-54368 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028864" comment="python313-uv-0.7.18-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94286" version="1" class="patch">
	<metadata>
		<title>python313-validators-0.35.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-19588" ref_url="https://www.suse.com/security/cve/CVE-2019-19588/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-validators-0.35.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19588/">CVE-2019-19588 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19588">CVE-2019-19588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028865" comment="python313-validators-0.35.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94287" version="1" class="patch">
	<metadata>
		<title>python313-virtualenv-20.29.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-virtualenv-20.29.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028866" comment="python313-virtualenv-20.29.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94288" version="1" class="patch">
	<metadata>
		<title>python313-waitress-3.0.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-24761" ref_url="https://www.suse.com/security/cve/CVE-2022-24761/" source="CVE"/>
		<reference ref_id="CVE-2022-31015" ref_url="https://www.suse.com/security/cve/CVE-2022-31015/" source="CVE"/>
		<reference ref_id="CVE-2024-49768" ref_url="https://www.suse.com/security/cve/CVE-2024-49768/" source="CVE"/>
		<reference ref_id="CVE-2024-49769" ref_url="https://www.suse.com/security/cve/CVE-2024-49769/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-waitress-3.0.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24761/">CVE-2022-24761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24761">CVE-2022-24761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31015/">CVE-2022-31015 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31015">CVE-2022-31015 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49768/">CVE-2024-49768 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49768">CVE-2024-49768 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49769/">CVE-2024-49769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49769">CVE-2024-49769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028867" comment="python313-waitress-3.0.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028868" comment="python313-waitress-doc-3.0.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94289" version="1" class="patch">
	<metadata>
		<title>python313-websockets-14.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000518" ref_url="https://www.suse.com/security/cve/CVE-2018-1000518/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-websockets-14.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000518/">CVE-2018-1000518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000518">CVE-2018-1000518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028869" comment="python313-websockets-14.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94290" version="1" class="patch">
	<metadata>
		<title>python313-wheel-0.45.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-40898" ref_url="https://www.suse.com/security/cve/CVE-2022-40898/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-wheel-0.45.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40898/">CVE-2022-40898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40898">CVE-2022-40898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028870" comment="python313-wheel-0.45.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94291" version="1" class="patch">
	<metadata>
		<title>python313-yarl-1.20.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-yarl-1.20.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028871" comment="python313-yarl-1.20.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94292" version="1" class="patch">
	<metadata>
		<title>python313-zipp-3.21.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-5569" ref_url="https://www.suse.com/security/cve/CVE-2024-5569/" source="CVE"/>
		<description>
These are all security issues fixed in the python313-zipp-3.21.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5569/">CVE-2024-5569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5569">CVE-2024-5569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028872" comment="python313-zipp-3.21.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94293" version="1" class="patch">
	<metadata>
		<title>qemu-10.0.3-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118/" source="CVE"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123/" source="CVE"/>
		<reference ref_id="CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124/" source="CVE"/>
		<reference ref_id="CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191/" source="CVE"/>
		<reference ref_id="CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702/" source="CVE"/>
		<reference ref_id="CVE-2020-10717" ref_url="https://www.suse.com/security/cve/CVE-2020-10717/" source="CVE"/>
		<reference ref_id="CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761/" source="CVE"/>
		<reference ref_id="CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102/" source="CVE"/>
		<reference ref_id="CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-17380" ref_url="https://www.suse.com/security/cve/CVE-2020-17380/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352/" source="CVE"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-20263" ref_url="https://www.suse.com/security/cve/CVE-2021-20263/" source="CVE"/>
		<reference ref_id="CVE-2021-3409" ref_url="https://www.suse.com/security/cve/CVE-2021-3409/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544/" source="CVE"/>
		<reference ref_id="CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545/" source="CVE"/>
		<reference ref_id="CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546/" source="CVE"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="CVE-2021-3929" ref_url="https://www.suse.com/security/cve/CVE-2021-3929/" source="CVE"/>
		<reference ref_id="CVE-2021-4158" ref_url="https://www.suse.com/security/cve/CVE-2021-4158/" source="CVE"/>
		<reference ref_id="CVE-2021-4206" ref_url="https://www.suse.com/security/cve/CVE-2021-4206/" source="CVE"/>
		<reference ref_id="CVE-2021-4207" ref_url="https://www.suse.com/security/cve/CVE-2021-4207/" source="CVE"/>
		<reference ref_id="CVE-2022-0216" ref_url="https://www.suse.com/security/cve/CVE-2022-0216/" source="CVE"/>
		<reference ref_id="CVE-2022-0358" ref_url="https://www.suse.com/security/cve/CVE-2022-0358/" source="CVE"/>
		<reference ref_id="CVE-2022-1050" ref_url="https://www.suse.com/security/cve/CVE-2022-1050/" source="CVE"/>
		<reference ref_id="CVE-2022-26353" ref_url="https://www.suse.com/security/cve/CVE-2022-26353/" source="CVE"/>
		<reference ref_id="CVE-2022-26354" ref_url="https://www.suse.com/security/cve/CVE-2022-26354/" source="CVE"/>
		<reference ref_id="CVE-2022-2962" ref_url="https://www.suse.com/security/cve/CVE-2022-2962/" source="CVE"/>
		<reference ref_id="CVE-2022-3165" ref_url="https://www.suse.com/security/cve/CVE-2022-3165/" source="CVE"/>
		<reference ref_id="CVE-2022-35414" ref_url="https://www.suse.com/security/cve/CVE-2022-35414/" source="CVE"/>
		<reference ref_id="CVE-2022-4144" ref_url="https://www.suse.com/security/cve/CVE-2022-4144/" source="CVE"/>
		<reference ref_id="CVE-2022-4172" ref_url="https://www.suse.com/security/cve/CVE-2022-4172/" source="CVE"/>
		<reference ref_id="CVE-2023-0330" ref_url="https://www.suse.com/security/cve/CVE-2023-0330/" source="CVE"/>
		<reference ref_id="CVE-2023-2861" ref_url="https://www.suse.com/security/cve/CVE-2023-2861/" source="CVE"/>
		<reference ref_id="CVE-2023-3180" ref_url="https://www.suse.com/security/cve/CVE-2023-3180/" source="CVE"/>
		<reference ref_id="CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255/" source="CVE"/>
		<reference ref_id="CVE-2023-3301" ref_url="https://www.suse.com/security/cve/CVE-2023-3301/" source="CVE"/>
		<reference ref_id="CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354/" source="CVE"/>
		<reference ref_id="CVE-2023-42467" ref_url="https://www.suse.com/security/cve/CVE-2023-42467/" source="CVE"/>
		<reference ref_id="CVE-2023-6693" ref_url="https://www.suse.com/security/cve/CVE-2023-6693/" source="CVE"/>
		<reference ref_id="CVE-2024-26328" ref_url="https://www.suse.com/security/cve/CVE-2024-26328/" source="CVE"/>
		<reference ref_id="CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446/" source="CVE"/>
		<reference ref_id="CVE-2024-3447" ref_url="https://www.suse.com/security/cve/CVE-2024-3447/" source="CVE"/>
		<reference ref_id="CVE-2024-3567" ref_url="https://www.suse.com/security/cve/CVE-2024-3567/" source="CVE"/>
		<reference ref_id="CVE-2024-4467" ref_url="https://www.suse.com/security/cve/CVE-2024-4467/" source="CVE"/>
		<reference ref_id="CVE-2024-7409" ref_url="https://www.suse.com/security/cve/CVE-2024-7409/" source="CVE"/>
		<reference ref_id="CVE-2024-8612" ref_url="https://www.suse.com/security/cve/CVE-2024-8612/" source="CVE"/>
		<reference ref_id="CVE-2025-54566" ref_url="https://www.suse.com/security/cve/CVE-2025-54566/" source="CVE"/>
		<reference ref_id="CVE-2025-54567" ref_url="https://www.suse.com/security/cve/CVE-2025-54567/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-10.0.3-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0928">CVE-2008-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1945">CVE-2008-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4539">CVE-2008-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4148">CVE-2013-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4149">CVE-2013-4149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4150">CVE-2013-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4151">CVE-2013-4151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4526">CVE-2013-4526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4531">CVE-2013-4531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4535">CVE-2013-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4536">CVE-2013-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4541">CVE-2013-4541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4542">CVE-2013-4542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4544">CVE-2013-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6399">CVE-2013-6399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0142">CVE-2014-0142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0143">CVE-2014-0143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0144">CVE-2014-0144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0145">CVE-2014-0145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0146">CVE-2014-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0147">CVE-2014-0147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0150">CVE-2014-0150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0182">CVE-2014-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5225">CVE-2015-5225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5279">CVE-2015-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5745">CVE-2015-5745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7295">CVE-2015-7295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10028">CVE-2016-10028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4952">CVE-2016-4952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4964">CVE-2016-4964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6490">CVE-2016-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6833">CVE-2016-6833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6836">CVE-2016-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6888">CVE-2016-6888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7116">CVE-2016-7116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7155">CVE-2016-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7156">CVE-2016-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7157">CVE-2016-7157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7161">CVE-2016-7161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7170">CVE-2016-7170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7421">CVE-2016-7421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7422">CVE-2016-7422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7423">CVE-2016-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7466">CVE-2016-7466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7907">CVE-2016-7907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7994">CVE-2016-7994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7995">CVE-2016-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8577">CVE-2016-8577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8578">CVE-2016-8578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8668">CVE-2016-8668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9102">CVE-2016-9102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9103">CVE-2016-9103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9104">CVE-2016-9104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9105">CVE-2016-9105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9106">CVE-2016-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9602">CVE-2016-9602 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9845">CVE-2016-9845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9846">CVE-2016-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9908">CVE-2016-9908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9912">CVE-2016-9912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9913">CVE-2016-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9923">CVE-2016-9923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13673">CVE-2017-13673 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13711">CVE-2017-13711 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15038">CVE-2017-15038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15118">CVE-2017-15118 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15119">CVE-2017-15119 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15268">CVE-2017-15268 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2630">CVE-2017-2630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5525">CVE-2017-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5552">CVE-2017-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5578">CVE-2017-5578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5667">CVE-2017-5667 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5857">CVE-2017-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5931">CVE-2017-5931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5987">CVE-2017-5987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6058">CVE-2017-6058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7471">CVE-2017-7471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7493">CVE-2017-7493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8112">CVE-2017-8112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8379">CVE-2017-8379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8380">CVE-2017-8380 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9524">CVE-2017-9524 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16847">CVE-2018-16847 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16872">CVE-2018-16872 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20123">CVE-2018-20123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20124">CVE-2018-20124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20125">CVE-2018-20125 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20126">CVE-2018-20126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20191">CVE-2018-20191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20216">CVE-2018-20216 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13164">CVE-2019-13164 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5008">CVE-2019-5008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8934">CVE-2019-8934 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10702">CVE-2020-10702 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10717/">CVE-2020-10717 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10717">CVE-2020-10717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10761">CVE-2020-10761 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11102">CVE-2020-11102 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11869">CVE-2020-11869 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13800">CVE-2020-13800 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17380/">CVE-2020-17380 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17380">CVE-2020-17380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24352">CVE-2020-24352 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25085">CVE-2020-25085 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27821">CVE-2020-27821 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29129">CVE-2020-29129 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35503">CVE-2020-35503 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20263/">CVE-2021-20263 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20263">CVE-2021-20263 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3409/">CVE-2021-3409 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3409">CVE-2021-3409 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3544">CVE-2021-3544 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3545">CVE-2021-3545 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3546">CVE-2021-3546 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3582">CVE-2021-3582 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3607">CVE-2021-3607 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3608">CVE-2021-3608 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3929/">CVE-2021-3929 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3929">CVE-2021-3929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4158/">CVE-2021-4158 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4158">CVE-2021-4158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4206/">CVE-2021-4206 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4206">CVE-2021-4206 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4207/">CVE-2021-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4207">CVE-2021-4207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0216/">CVE-2022-0216 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0216">CVE-2022-0216 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0358/">CVE-2022-0358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0358">CVE-2022-0358 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1050/">CVE-2022-1050 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1050">CVE-2022-1050 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26353/">CVE-2022-26353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26354/">CVE-2022-26354 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2962/">CVE-2022-2962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2962">CVE-2022-2962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3165/">CVE-2022-3165 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3165">CVE-2022-3165 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35414/">CVE-2022-35414 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35414">CVE-2022-35414 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4144/">CVE-2022-4144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4144">CVE-2022-4144 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4172/">CVE-2022-4172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4172">CVE-2022-4172 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0330/">CVE-2023-0330 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2861/">CVE-2023-2861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3180/">CVE-2023-3180 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3180">CVE-2023-3180 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3301/">CVE-2023-3301 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3301">CVE-2023-3301 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42467/">CVE-2023-42467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42467">CVE-2023-42467 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6693/">CVE-2023-6693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6693">CVE-2023-6693 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26328/">CVE-2024-26328 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26328">CVE-2024-26328 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3447/">CVE-2024-3447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3447">CVE-2024-3447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3567/">CVE-2024-3567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3567">CVE-2024-3567 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4467/">CVE-2024-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4467">CVE-2024-4467 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7409/">CVE-2024-7409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7409">CVE-2024-7409 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8612/">CVE-2024-8612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8612">CVE-2024-8612 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54566/">CVE-2025-54566 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54566">CVE-2025-54566 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54567/">CVE-2025-54567 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54567">CVE-2025-54567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028873" comment="qemu-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028874" comment="qemu-SLOF-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028875" comment="qemu-arm-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028876" comment="qemu-audio-alsa-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028877" comment="qemu-audio-dbus-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028878" comment="qemu-audio-jack-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028879" comment="qemu-audio-oss-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028880" comment="qemu-block-curl-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028881" comment="qemu-block-dmg-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028882" comment="qemu-block-iscsi-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028883" comment="qemu-block-nfs-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028884" comment="qemu-block-ssh-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028885" comment="qemu-doc-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028886" comment="qemu-extra-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028887" comment="qemu-guest-agent-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028888" comment="qemu-headless-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028889" comment="qemu-hw-display-virtio-gpu-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028890" comment="qemu-hw-display-virtio-gpu-pci-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028891" comment="qemu-hw-display-virtio-vga-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028892" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028893" comment="qemu-hw-usb-host-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028894" comment="qemu-hw-usb-redirect-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028895" comment="qemu-hw-usb-smartcard-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028896" comment="qemu-img-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028897" comment="qemu-ipxe-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028898" comment="qemu-ivshmem-tools-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028899" comment="qemu-ksm-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028900" comment="qemu-lang-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028901" comment="qemu-linux-user-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028902" comment="qemu-microvm-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028903" comment="qemu-ppc-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028904" comment="qemu-pr-helper-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028905" comment="qemu-s390x-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028906" comment="qemu-seabios-10.0.31.16.3_3_g3d33c746-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028907" comment="qemu-skiboot-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028908" comment="qemu-tools-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028909" comment="qemu-vgabios-10.0.31.16.3_3_g3d33c746-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028910" comment="qemu-vhost-user-gpu-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028911" comment="qemu-vmsr-helper-10.0.3-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028912" comment="qemu-x86-10.0.3-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94294" version="1" class="patch">
	<metadata>
		<title>radvd-2.20-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-2.20-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3602">CVE-2011-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028913" comment="radvd-2.20-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94295" version="1" class="patch">
	<metadata>
		<title>rage-encryption-0.11.1+0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2023-22895" ref_url="https://www.suse.com/security/cve/CVE-2023-22895/" source="CVE"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<description>
These are all security issues fixed in the rage-encryption-0.11.1+0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22895/">CVE-2023-22895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22895">CVE-2023-22895 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028914" comment="rage-encryption-0.11.1+0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028915" comment="rage-encryption-bash-completion-0.11.1+0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028916" comment="rage-encryption-fish-completion-0.11.1+0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028917" comment="rage-encryption-zsh-completion-0.11.1+0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94296" version="1" class="patch">
	<metadata>
		<title>raspberrypi-firmware-dt-2023.05.02-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-22011" ref_url="https://www.suse.com/security/cve/CVE-2025-22011/" source="CVE"/>
		<description>
These are all security issues fixed in the raspberrypi-firmware-dt-2023.05.02-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22011/">CVE-2025-22011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22011">CVE-2025-22011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028918" comment="raspberrypi-firmware-dt-2023.05.02-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94297" version="1" class="patch">
	<metadata>
		<title>rekor-1.3.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-30551" ref_url="https://www.suse.com/security/cve/CVE-2023-30551/" source="CVE"/>
		<reference ref_id="CVE-2023-33199" ref_url="https://www.suse.com/security/cve/CVE-2023-33199/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
These are all security issues fixed in the rekor-1.3.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30551/">CVE-2023-30551 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30551">CVE-2023-30551 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33199/">CVE-2023-33199 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33199">CVE-2023-33199 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028919" comment="rekor-1.3.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94298" version="1" class="patch">
	<metadata>
		<title>rpcbind-1.2.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-1.2.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028920" comment="rpcbind-1.2.7-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94299" version="1" class="patch">
	<metadata>
		<title>rsync-3.4.1-160000.2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="CVE-2020-14387" ref_url="https://www.suse.com/security/cve/CVE-2020-14387/" source="CVE"/>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<reference ref_id="CVE-2024-12084" ref_url="https://www.suse.com/security/cve/CVE-2024-12084/" source="CVE"/>
		<reference ref_id="CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085/" source="CVE"/>
		<reference ref_id="CVE-2024-12086" ref_url="https://www.suse.com/security/cve/CVE-2024-12086/" source="CVE"/>
		<reference ref_id="CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087/" source="CVE"/>
		<reference ref_id="CVE-2024-12088" ref_url="https://www.suse.com/security/cve/CVE-2024-12088/" source="CVE"/>
		<reference ref_id="CVE-2024-12747" ref_url="https://www.suse.com/security/cve/CVE-2024-12747/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.4.1-160000.2.3 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4091">CVE-2007-4091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6199">CVE-2007-6199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1097">CVE-2011-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2855">CVE-2014-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14387/">CVE-2020-14387 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14387">CVE-2020-14387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12084/">CVE-2024-12084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12084">CVE-2024-12084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12086/">CVE-2024-12086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12086">CVE-2024-12086 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12088/">CVE-2024-12088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12747/">CVE-2024-12747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028921" comment="rsync-3.4.1-160000.2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94300" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.2502.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.2502.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3200">CVE-2011-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4758">CVE-2013-4758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3683">CVE-2014-3683 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3243">CVE-2015-3243 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028922" comment="rsyslog-8.2502.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028923" comment="rsyslog-module-gssapi-8.2502.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028924" comment="rsyslog-module-gtls-8.2502.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028925" comment="rsyslog-module-mmnormalize-8.2502.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028926" comment="rsyslog-module-relp-8.2502.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94301" version="1" class="patch">
	<metadata>
		<title>rtkit-0.13-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.13-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4326">CVE-2013-4326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028927" comment="rtkit-0.13-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94302" version="1" class="patch">
	<metadata>
		<title>runc-1.2.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884/" source="CVE"/>
		<reference ref_id="CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<reference ref_id="CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809/" source="CVE"/>
		<reference ref_id="CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561/" source="CVE"/>
		<reference ref_id="CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642/" source="CVE"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.2.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16884">CVE-2019-16884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19921">CVE-2019-19921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">CVE-2021-43784 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028928" comment="runc-1.2.6-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94303" version="1" class="patch">
	<metadata>
		<title>rustup-1.28.1~0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the rustup-1.28.1~0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028929" comment="rustup-1.28.1~0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94304" version="1" class="patch">
	<metadata>
		<title>sca-patterns-sle12-1.5.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<description>
These are all security issues fixed in the sca-patterns-sle12-1.5.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24490">CVE-2020-24490 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028930" comment="sca-patterns-sle12-1.5.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028931" comment="sca-patterns-sle15-1.5.8-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94305" version="1" class="patch">
	<metadata>
		<title>sccache-0.9.1~22-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<description>
These are all security issues fixed in the sccache-0.9.1~22-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028932" comment="sccache-0.9.1~22-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94306" version="1" class="patch">
	<metadata>
		<title>screen-4.9.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5618" ref_url="https://www.suse.com/security/cve/CVE-2017-5618/" source="CVE"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="CVE-2023-24626" ref_url="https://www.suse.com/security/cve/CVE-2023-24626/" source="CVE"/>
		<reference ref_id="CVE-2025-46802" ref_url="https://www.suse.com/security/cve/CVE-2025-46802/" source="CVE"/>
		<description>
These are all security issues fixed in the screen-4.9.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5618/">CVE-2017-5618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5618">CVE-2017-5618 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24626/">CVE-2023-24626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24626">CVE-2023-24626 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46802/">CVE-2025-46802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46802">CVE-2025-46802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028933" comment="screen-4.9.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94307" version="1" class="patch">
	<metadata>
		<title>sevctl-0.6.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-50711" ref_url="https://www.suse.com/security/cve/CVE-2023-50711/" source="CVE"/>
		<description>
These are all security issues fixed in the sevctl-0.6.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-50711/">CVE-2023-50711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50711">CVE-2023-50711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028934" comment="sevctl-0.6.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028935" comment="virtiofsd-1.12.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94308" version="1" class="patch">
	<metadata>
		<title>sharutils-4.15.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-1000097" ref_url="https://www.suse.com/security/cve/CVE-2018-1000097/" source="CVE"/>
		<description>
These are all security issues fixed in the sharutils-4.15.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000097/">CVE-2018-1000097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000097">CVE-2018-1000097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028936" comment="sharutils-4.15.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028937" comment="sharutils-lang-4.15.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94309" version="1" class="patch">
	<metadata>
		<title>shim-15.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<reference ref_id="CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546/" source="CVE"/>
		<reference ref_id="CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547/" source="CVE"/>
		<reference ref_id="CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548/" source="CVE"/>
		<reference ref_id="CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549/" source="CVE"/>
		<reference ref_id="CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550/" source="CVE"/>
		<reference ref_id="CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-15.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3675">CVE-2014-3675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3676">CVE-2014-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3677">CVE-2014-3677 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028938" comment="shim-15.8-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94310" version="1" class="patch">
	<metadata>
		<title>skopeo-1.18.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
These are all security issues fixed in the skopeo-1.18.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028939" comment="skopeo-1.18.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028940" comment="skopeo-bash-completion-1.18.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028941" comment="skopeo-fish-completion-1.18.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028942" comment="skopeo-zsh-completion-1.18.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94311" version="1" class="patch">
	<metadata>
		<title>slirp4netns-1.3.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<description>
These are all security issues fixed in the slirp4netns-1.3.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028943" comment="slirp4netns-1.3.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94312" version="1" class="patch">
	<metadata>
		<title>snakeyaml-2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-18640" ref_url="https://www.suse.com/security/cve/CVE-2017-18640/" source="CVE"/>
		<reference ref_id="CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936/" source="CVE"/>
		<reference ref_id="CVE-2022-25857" ref_url="https://www.suse.com/security/cve/CVE-2022-25857/" source="CVE"/>
		<reference ref_id="CVE-2022-38749" ref_url="https://www.suse.com/security/cve/CVE-2022-38749/" source="CVE"/>
		<reference ref_id="CVE-2022-38750" ref_url="https://www.suse.com/security/cve/CVE-2022-38750/" source="CVE"/>
		<reference ref_id="CVE-2022-38751" ref_url="https://www.suse.com/security/cve/CVE-2022-38751/" source="CVE"/>
		<reference ref_id="CVE-2022-38752" ref_url="https://www.suse.com/security/cve/CVE-2022-38752/" source="CVE"/>
		<description>
These are all security issues fixed in the snakeyaml-2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18640/">CVE-2017-18640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18640">CVE-2017-18640 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13936">CVE-2020-13936 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25857/">CVE-2022-25857 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25857">CVE-2022-25857 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38749/">CVE-2022-38749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38749">CVE-2022-38749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38750/">CVE-2022-38750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38750">CVE-2022-38750 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38751/">CVE-2022-38751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38751">CVE-2022-38751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38752/">CVE-2022-38752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38752">CVE-2022-38752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028944" comment="snakeyaml-2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028945" comment="snakeyaml-javadoc-2.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94313" version="1" class="patch">
	<metadata>
		<title>socat-1.8.0.2-160000.2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.8.0.2-160000.2.3 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3571">CVE-2013-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0019">CVE-2014-0019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028946" comment="socat-1.8.0.2-160000.2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94314" version="1" class="patch">
	<metadata>
		<title>spice-vdagent-0.22.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<reference ref_id="CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650/" source="CVE"/>
		<reference ref_id="CVE-2020-25651" ref_url="https://www.suse.com/security/cve/CVE-2020-25651/" source="CVE"/>
		<reference ref_id="CVE-2020-25652" ref_url="https://www.suse.com/security/cve/CVE-2020-25652/" source="CVE"/>
		<reference ref_id="CVE-2020-25653" ref_url="https://www.suse.com/security/cve/CVE-2020-25653/" source="CVE"/>
		<description>
These are all security issues fixed in the spice-vdagent-0.22.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15108">CVE-2017-15108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25650">CVE-2020-25650 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25651/">CVE-2020-25651 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25651">CVE-2020-25651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25652/">CVE-2020-25652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25652">CVE-2020-25652 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25653/">CVE-2020-25653 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25653">CVE-2020-25653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028947" comment="spice-vdagent-0.22.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94315" version="1" class="patch">
	<metadata>
		<title>squashfs-4.6.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<reference ref_id="CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645/" source="CVE"/>
		<reference ref_id="CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646/" source="CVE"/>
		<reference ref_id="CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153/" source="CVE"/>
		<reference ref_id="CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.6.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4024">CVE-2012-4024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4025">CVE-2012-4025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4646">CVE-2015-4646 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028948" comment="squashfs-4.6.1-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94316" version="1" class="patch">
	<metadata>
		<title>squid-6.12-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<reference ref_id="CVE-2016-10003" ref_url="https://www.suse.com/security/cve/CVE-2016-10003/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<reference ref_id="CVE-2018-19132" ref_url="https://www.suse.com/security/cve/CVE-2018-19132/" source="CVE"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12527" ref_url="https://www.suse.com/security/cve/CVE-2019-12527/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-12854" ref_url="https://www.suse.com/security/cve/CVE-2019-12854/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="CVE-2021-28116" ref_url="https://www.suse.com/security/cve/CVE-2021-28116/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="CVE-2021-28652" ref_url="https://www.suse.com/security/cve/CVE-2021-28652/" source="CVE"/>
		<reference ref_id="CVE-2021-28662" ref_url="https://www.suse.com/security/cve/CVE-2021-28662/" source="CVE"/>
		<reference ref_id="CVE-2021-31806" ref_url="https://www.suse.com/security/cve/CVE-2021-31806/" source="CVE"/>
		<reference ref_id="CVE-2021-33620" ref_url="https://www.suse.com/security/cve/CVE-2021-33620/" source="CVE"/>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<reference ref_id="CVE-2022-41317" ref_url="https://www.suse.com/security/cve/CVE-2022-41317/" source="CVE"/>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<reference ref_id="CVE-2023-46848" ref_url="https://www.suse.com/security/cve/CVE-2023-46848/" source="CVE"/>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<reference ref_id="CVE-2023-49288" ref_url="https://www.suse.com/security/cve/CVE-2023-49288/" source="CVE"/>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2023-5824" ref_url="https://www.suse.com/security/cve/CVE-2023-5824/" source="CVE"/>
		<reference ref_id="CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638/" source="CVE"/>
		<reference ref_id="CVE-2024-25111" ref_url="https://www.suse.com/security/cve/CVE-2024-25111/" source="CVE"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<reference ref_id="CVE-2024-33427" ref_url="https://www.suse.com/security/cve/CVE-2024-33427/" source="CVE"/>
		<reference ref_id="CVE-2024-37894" ref_url="https://www.suse.com/security/cve/CVE-2024-37894/" source="CVE"/>
		<reference ref_id="CVE-2024-45802" ref_url="https://www.suse.com/security/cve/CVE-2024-45802/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-6.12-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7141">CVE-2014-7141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7142">CVE-2014-7142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5400">CVE-2015-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10003/">CVE-2016-10003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10003">CVE-2016-10003 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2390">CVE-2016-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2570">CVE-2016-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2572">CVE-2016-2572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3947">CVE-2016-3947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3948">CVE-2016-3948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4053">CVE-2016-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4054">CVE-2016-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4556">CVE-2016-4556 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1172">CVE-2018-1172 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19131">CVE-2018-19131 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19132/">CVE-2018-19132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19132">CVE-2018-19132 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12527/">CVE-2019-12527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12527">CVE-2019-12527 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12854/">CVE-2019-12854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12854">CVE-2019-12854 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28116/">CVE-2021-28116 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28116">CVE-2021-28116 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28652/">CVE-2021-28652 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28652">CVE-2021-28652 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28662/">CVE-2021-28662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28662">CVE-2021-28662 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31806/">CVE-2021-31806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31806">CVE-2021-31806 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33620/">CVE-2021-33620 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33620">CVE-2021-33620 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41317/">CVE-2022-41317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41317">CVE-2022-41317 at NVD</cve>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46848/">CVE-2023-46848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46848">CVE-2023-46848 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49288/">CVE-2023-49288 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49288">CVE-2023-49288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5824/">CVE-2023-5824 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5824">CVE-2023-5824 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25111/">CVE-2024-25111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25111">CVE-2024-25111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33427/">CVE-2024-33427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33427">CVE-2024-33427 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37894/">CVE-2024-37894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37894">CVE-2024-37894 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45802/">CVE-2024-45802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45802">CVE-2024-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028949" comment="squid-6.12-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94317" version="1" class="patch">
	<metadata>
		<title>stalld-1.19.8-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-54159" ref_url="https://www.suse.com/security/cve/CVE-2024-54159/" source="CVE"/>
		<description>
These are all security issues fixed in the stalld-1.19.8-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-54159/">CVE-2024-54159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54159">CVE-2024-54159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028950" comment="stalld-1.19.8-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94318" version="1" class="patch">
	<metadata>
		<title>strongswan-6.0.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-3991" ref_url="https://www.suse.com/security/cve/CVE-2015-3991/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="CVE-2018-6459" ref_url="https://www.suse.com/security/cve/CVE-2018-6459/" source="CVE"/>
		<reference ref_id="CVE-2021-41990" ref_url="https://www.suse.com/security/cve/CVE-2021-41990/" source="CVE"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="CVE-2023-26463" ref_url="https://www.suse.com/security/cve/CVE-2023-26463/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-6.0.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0790">CVE-2009-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2388">CVE-2012-2388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2944">CVE-2013-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5018">CVE-2013-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6075">CVE-2013-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6076">CVE-2013-6076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2338">CVE-2014-2338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9221">CVE-2014-9221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3991/">CVE-2015-3991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3991">CVE-2015-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4171">CVE-2015-4171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8023">CVE-2015-8023 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11185">CVE-2017-11185 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9022">CVE-2017-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9023">CVE-2017-9023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10811">CVE-2018-10811 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6459/">CVE-2018-6459 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6459">CVE-2018-6459 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41990/">CVE-2021-41990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41990">CVE-2021-41990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26463/">CVE-2023-26463 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26463">CVE-2023-26463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028951" comment="strongswan-6.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028952" comment="strongswan-doc-6.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028953" comment="strongswan-fips-6.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028954" comment="strongswan-ipsec-6.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028955" comment="strongswan-mysql-6.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028956" comment="strongswan-nm-6.0.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028957" comment="strongswan-sqlite-6.0.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94319" version="1" class="patch">
	<metadata>
		<title>stunnel-5.74-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2011-2940" ref_url="https://www.suse.com/security/cve/CVE-2011-2940/" source="CVE"/>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<reference ref_id="CVE-2014-0016" ref_url="https://www.suse.com/security/cve/CVE-2014-0016/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2015-3644" ref_url="https://www.suse.com/security/cve/CVE-2015-3644/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-5.74-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2940/">CVE-2011-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2940">CVE-2011-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0016/">CVE-2014-0016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0016">CVE-2014-0016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3644/">CVE-2015-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3644">CVE-2015-3644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028958" comment="stunnel-5.74-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028959" comment="stunnel-doc-5.74-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94320" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.17p1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-4158" ref_url="https://www.suse.com/security/cve/CVE-2005-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="CVE-2022-43995" ref_url="https://www.suse.com/security/cve/CVE-2022-43995/" source="CVE"/>
		<reference ref_id="CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809/" source="CVE"/>
		<reference ref_id="CVE-2023-27320" ref_url="https://www.suse.com/security/cve/CVE-2023-27320/" source="CVE"/>
		<reference ref_id="CVE-2023-42456" ref_url="https://www.suse.com/security/cve/CVE-2023-42456/" source="CVE"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<reference ref_id="CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462/" source="CVE"/>
		<reference ref_id="CVE-2025-32463" ref_url="https://www.suse.com/security/cve/CVE-2025-32463/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.17p1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4158/">CVE-2005-4158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4158">CVE-2005-4158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1163">CVE-2010-1163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1646">CVE-2010-1646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0010">CVE-2011-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2337">CVE-2012-2337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1775">CVE-2013-1775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000367">CVE-2017-1000367 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000368">CVE-2017-1000368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43995/">CVE-2022-43995 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27320/">CVE-2023-27320 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27320">CVE-2023-27320 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-42456/">CVE-2023-42456 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42456">CVE-2023-42456 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32463/">CVE-2025-32463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32463">CVE-2025-32463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028960" comment="sudo-1.9.17p1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028961" comment="sudo-devel-1.9.17p1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028962" comment="sudo-plugin-python-1.9.17p1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028963" comment="sudo-policy-sudo-auth-self-1.9.17p1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028964" comment="sudo-policy-wheel-auth-self-1.9.17p1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028965" comment="system-group-sudo-1.9.17p1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94321" version="1" class="patch">
	<metadata>
		<title>supportutils-3.2.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="CVE-2022-45154" ref_url="https://www.suse.com/security/cve/CVE-2022-45154/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.2.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19637">CVE-2018-19637 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45154/">CVE-2022-45154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45154">CVE-2022-45154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028966" comment="supportutils-3.2.11-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94322" version="1" class="patch">
	<metadata>
		<title>suse-module-tools-16.0.60-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<description>
These are all security issues fixed in the suse-module-tools-16.0.60-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028967" comment="suse-module-tools-16.0.60-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028968" comment="suse-module-tools-scriptlets-16.0.60-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94323" version="1" class="patch">
	<metadata>
		<title>swtpm-0.10.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-28407" ref_url="https://www.suse.com/security/cve/CVE-2020-28407/" source="CVE"/>
		<reference ref_id="CVE-2022-23645" ref_url="https://www.suse.com/security/cve/CVE-2022-23645/" source="CVE"/>
		<description>
These are all security issues fixed in the swtpm-0.10.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-28407/">CVE-2020-28407 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28407">CVE-2020-28407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23645/">CVE-2022-23645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23645">CVE-2022-23645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028969" comment="swtpm-0.10.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028970" comment="swtpm-selinux-0.10.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94324" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028971" comment="syslog-service-2.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94325" version="1" class="patch">
	<metadata>
		<title>sysstat-12.7.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<reference ref_id="CVE-2022-39377" ref_url="https://www.suse.com/security/cve/CVE-2022-39377/" source="CVE"/>
		<reference ref_id="CVE-2023-33204" ref_url="https://www.suse.com/security/cve/CVE-2023-33204/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-12.7.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3852">CVE-2007-3852 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19416">CVE-2018-19416 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19517">CVE-2018-19517 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16167">CVE-2019-16167 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39377/">CVE-2022-39377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39377">CVE-2022-39377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33204/">CVE-2023-33204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33204">CVE-2023-33204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028972" comment="sysstat-12.7.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94326" version="1" class="patch">
	<metadata>
		<title>system-user-velociraptor-1.0.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-25883" ref_url="https://www.suse.com/security/cve/CVE-2022-25883/" source="CVE"/>
		<reference ref_id="CVE-2023-0242" ref_url="https://www.suse.com/security/cve/CVE-2023-0242/" source="CVE"/>
		<reference ref_id="CVE-2023-0290" ref_url="https://www.suse.com/security/cve/CVE-2023-0290/" source="CVE"/>
		<reference ref_id="CVE-2023-1732" ref_url="https://www.suse.com/security/cve/CVE-2023-1732/" source="CVE"/>
		<reference ref_id="CVE-2023-44270" ref_url="https://www.suse.com/security/cve/CVE-2023-44270/" source="CVE"/>
		<reference ref_id="CVE-2023-45133" ref_url="https://www.suse.com/security/cve/CVE-2023-45133/" source="CVE"/>
		<reference ref_id="CVE-2023-45683" ref_url="https://www.suse.com/security/cve/CVE-2023-45683/" source="CVE"/>
		<reference ref_id="CVE-2023-46234" ref_url="https://www.suse.com/security/cve/CVE-2023-46234/" source="CVE"/>
		<reference ref_id="CVE-2023-5950" ref_url="https://www.suse.com/security/cve/CVE-2023-5950/" source="CVE"/>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<reference ref_id="CVE-2024-23331" ref_url="https://www.suse.com/security/cve/CVE-2024-23331/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-28849" ref_url="https://www.suse.com/security/cve/CVE-2024-28849/" source="CVE"/>
		<reference ref_id="CVE-2024-31207" ref_url="https://www.suse.com/security/cve/CVE-2024-31207/" source="CVE"/>
		<reference ref_id="CVE-2024-37298" ref_url="https://www.suse.com/security/cve/CVE-2024-37298/" source="CVE"/>
		<reference ref_id="CVE-2024-39338" ref_url="https://www.suse.com/security/cve/CVE-2024-39338/" source="CVE"/>
		<reference ref_id="CVE-2024-4067" ref_url="https://www.suse.com/security/cve/CVE-2024-4067/" source="CVE"/>
		<reference ref_id="CVE-2024-4068" ref_url="https://www.suse.com/security/cve/CVE-2024-4068/" source="CVE"/>
		<reference ref_id="CVE-2024-42459" ref_url="https://www.suse.com/security/cve/CVE-2024-42459/" source="CVE"/>
		<reference ref_id="CVE-2024-42460" ref_url="https://www.suse.com/security/cve/CVE-2024-42460/" source="CVE"/>
		<reference ref_id="CVE-2024-42461" ref_url="https://www.suse.com/security/cve/CVE-2024-42461/" source="CVE"/>
		<reference ref_id="CVE-2024-45296" ref_url="https://www.suse.com/security/cve/CVE-2024-45296/" source="CVE"/>
		<reference ref_id="CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338/" source="CVE"/>
		<reference ref_id="CVE-2024-45811" ref_url="https://www.suse.com/security/cve/CVE-2024-45811/" source="CVE"/>
		<reference ref_id="CVE-2024-45812" ref_url="https://www.suse.com/security/cve/CVE-2024-45812/" source="CVE"/>
		<reference ref_id="CVE-2024-47068" ref_url="https://www.suse.com/security/cve/CVE-2024-47068/" source="CVE"/>
		<reference ref_id="CVE-2024-47875" ref_url="https://www.suse.com/security/cve/CVE-2024-47875/" source="CVE"/>
		<reference ref_id="CVE-2024-48948" ref_url="https://www.suse.com/security/cve/CVE-2024-48948/" source="CVE"/>
		<reference ref_id="CVE-2024-48949" ref_url="https://www.suse.com/security/cve/CVE-2024-48949/" source="CVE"/>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2024-55565" ref_url="https://www.suse.com/security/cve/CVE-2024-55565/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
These are all security issues fixed in the system-user-velociraptor-1.0.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-25883/">CVE-2022-25883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25883">CVE-2022-25883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0242/">CVE-2023-0242 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0242">CVE-2023-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0290/">CVE-2023-0290 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0290">CVE-2023-0290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1732/">CVE-2023-1732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1732">CVE-2023-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44270/">CVE-2023-44270 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44270">CVE-2023-44270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45133/">CVE-2023-45133 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45133">CVE-2023-45133 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45683/">CVE-2023-45683 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45683">CVE-2023-45683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46234/">CVE-2023-46234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46234">CVE-2023-46234 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-5950/">CVE-2023-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5950">CVE-2023-5950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23331/">CVE-2024-23331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23331">CVE-2024-23331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28849/">CVE-2024-28849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28849">CVE-2024-28849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31207/">CVE-2024-31207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31207">CVE-2024-31207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37298/">CVE-2024-37298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37298">CVE-2024-37298 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39338/">CVE-2024-39338 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39338">CVE-2024-39338 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4067/">CVE-2024-4067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4067">CVE-2024-4067 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4068/">CVE-2024-4068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4068">CVE-2024-4068 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42459/">CVE-2024-42459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42459">CVE-2024-42459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42460/">CVE-2024-42460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42460">CVE-2024-42460 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42461/">CVE-2024-42461 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42461">CVE-2024-42461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45296/">CVE-2024-45296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45296">CVE-2024-45296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45811/">CVE-2024-45811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45811">CVE-2024-45811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45812/">CVE-2024-45812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45812">CVE-2024-45812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47068/">CVE-2024-47068 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47068">CVE-2024-47068 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47875/">CVE-2024-47875 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47875">CVE-2024-47875 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48948/">CVE-2024-48948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48948">CVE-2024-48948 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48949/">CVE-2024-48949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48949">CVE-2024-48949 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-55565/">CVE-2024-55565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55565">CVE-2024-55565 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028973" comment="system-user-velociraptor-1.0.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028974" comment="velociraptor-0.7.0.4.git152.fb24dfd-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028975" comment="velociraptor-client-0.7.0.4.git152.fb24dfd-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94327" version="1" class="patch">
	<metadata>
		<title>systemtap-5.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2010-0411" ref_url="https://www.suse.com/security/cve/CVE-2010-0411/" source="CVE"/>
		<reference ref_id="CVE-2010-0412" ref_url="https://www.suse.com/security/cve/CVE-2010-0412/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-5.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2911">CVE-2009-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0411/">CVE-2010-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0411">CVE-2010-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0412/">CVE-2010-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0412">CVE-2010-0412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028976" comment="systemtap-5.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028977" comment="systemtap-runtime-5.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028978" comment="systemtap-sdt-devel-5.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028979" comment="systemtap-server-5.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94328" version="1" class="patch">
	<metadata>
		<title>tar-1.35-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2005-1918" ref_url="https://www.suse.com/security/cve/CVE-2005-1918/" source="CVE"/>
		<reference ref_id="CVE-2006-0300" ref_url="https://www.suse.com/security/cve/CVE-2006-0300/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<reference ref_id="CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303/" source="CVE"/>
		<reference ref_id="CVE-2023-39804" ref_url="https://www.suse.com/security/cve/CVE-2023-39804/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.35-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-1267">CVE-2001-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-0399">CVE-2002-0399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1918/">CVE-2005-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1918">CVE-2005-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0300/">CVE-2006-0300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0300">CVE-2006-0300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6097">CVE-2006-6097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39804/">CVE-2023-39804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39804">CVE-2023-39804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028980" comment="tar-1.35-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028981" comment="tar-backup-scripts-1.35-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028982" comment="tar-doc-1.35-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028983" comment="tar-lang-1.35-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028984" comment="tar-rmt-1.35-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94329" version="1" class="patch">
	<metadata>
		<title>tboot-20250417_1.11.10-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-16837" ref_url="https://www.suse.com/security/cve/CVE-2017-16837/" source="CVE"/>
		<description>
These are all security issues fixed in the tboot-20250417_1.11.10-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16837/">CVE-2017-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16837">CVE-2017-16837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028985" comment="tboot-20250417_1.11.10-160000.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94330" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.99.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14470" ref_url="https://www.suse.com/security/cve/CVE-2018-14470/" source="CVE"/>
		<reference ref_id="CVE-2018-14879" ref_url="https://www.suse.com/security/cve/CVE-2018-14879/" source="CVE"/>
		<reference ref_id="CVE-2018-14880" ref_url="https://www.suse.com/security/cve/CVE-2018-14880/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16227" ref_url="https://www.suse.com/security/cve/CVE-2018-16227/" source="CVE"/>
		<reference ref_id="CVE-2018-16228" ref_url="https://www.suse.com/security/cve/CVE-2018-16228/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<reference ref_id="CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<reference ref_id="CVE-2019-15167" ref_url="https://www.suse.com/security/cve/CVE-2019-15167/" source="CVE"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<reference ref_id="CVE-2023-1801" ref_url="https://www.suse.com/security/cve/CVE-2023-1801/" source="CVE"/>
		<reference ref_id="CVE-2024-2397" ref_url="https://www.suse.com/security/cve/CVE-2024-2397/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.99.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8767">CVE-2014-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8768">CVE-2014-8768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8769">CVE-2014-8769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2153">CVE-2015-2153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2155">CVE-2015-2155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3138">CVE-2015-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7924">CVE-2016-7924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7929">CVE-2016-7929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7930">CVE-2016-7930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7932">CVE-2016-7932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7933">CVE-2016-7933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7938">CVE-2016-7938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7985">CVE-2016-7985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7986">CVE-2016-7986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8575">CVE-2016-8575 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11108">CVE-2017-11108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11541">CVE-2017-11541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11542">CVE-2017-11542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11543">CVE-2017-11543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12893">CVE-2017-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12894">CVE-2017-12894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12895">CVE-2017-12895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12896">CVE-2017-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12897">CVE-2017-12897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12898">CVE-2017-12898 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12899">CVE-2017-12899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12900">CVE-2017-12900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12901">CVE-2017-12901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12902">CVE-2017-12902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12985">CVE-2017-12985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12986">CVE-2017-12986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12987">CVE-2017-12987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12988">CVE-2017-12988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12989">CVE-2017-12989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12990">CVE-2017-12990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12991">CVE-2017-12991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12992">CVE-2017-12992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12993">CVE-2017-12993 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12994">CVE-2017-12994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12995">CVE-2017-12995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12996">CVE-2017-12996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12997">CVE-2017-12997 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12998">CVE-2017-12998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12999">CVE-2017-12999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13000">CVE-2017-13000 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13001">CVE-2017-13001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13002">CVE-2017-13002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13003">CVE-2017-13003 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13004">CVE-2017-13004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13005">CVE-2017-13005 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13006">CVE-2017-13006 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13007">CVE-2017-13007 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13008">CVE-2017-13008 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13009">CVE-2017-13009 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13010">CVE-2017-13010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13011">CVE-2017-13011 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13012">CVE-2017-13012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13013">CVE-2017-13013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13014">CVE-2017-13014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13015">CVE-2017-13015 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13016">CVE-2017-13016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13017">CVE-2017-13017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13018">CVE-2017-13018 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13019">CVE-2017-13019 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13020">CVE-2017-13020 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13021">CVE-2017-13021 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13022">CVE-2017-13022 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13023">CVE-2017-13023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13024">CVE-2017-13024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13025">CVE-2017-13025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13026">CVE-2017-13026 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13027">CVE-2017-13027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13028">CVE-2017-13028 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13029">CVE-2017-13029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13030">CVE-2017-13030 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13031">CVE-2017-13031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13032">CVE-2017-13032 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13033">CVE-2017-13033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13034">CVE-2017-13034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13035">CVE-2017-13035 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13036">CVE-2017-13036 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13037">CVE-2017-13037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13038">CVE-2017-13038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13039">CVE-2017-13039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13040">CVE-2017-13040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13041">CVE-2017-13041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13042">CVE-2017-13042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13043">CVE-2017-13043 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13044">CVE-2017-13044 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13045">CVE-2017-13045 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13046">CVE-2017-13046 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13047">CVE-2017-13047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13048">CVE-2017-13048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13049">CVE-2017-13049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13050">CVE-2017-13050 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13051">CVE-2017-13051 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13052">CVE-2017-13052 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13053">CVE-2017-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13054">CVE-2017-13054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13055">CVE-2017-13055 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13687">CVE-2017-13687 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13688">CVE-2017-13688 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13689">CVE-2017-13689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13690">CVE-2017-13690 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13725">CVE-2017-13725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16808">CVE-2017-16808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5205">CVE-2017-5205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5341">CVE-2017-5341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5342">CVE-2017-5342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5482">CVE-2017-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14470/">CVE-2018-14470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14470">CVE-2018-14470 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14879/">CVE-2018-14879 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14879">CVE-2018-14879 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14880/">CVE-2018-14880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14880">CVE-2018-14880 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16227/">CVE-2018-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16227">CVE-2018-16227 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16228/">CVE-2018-16228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16228">CVE-2018-16228 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010220">CVE-2019-1010220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15167/">CVE-2019-15167 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15167">CVE-2019-15167 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8037">CVE-2020-8037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1801/">CVE-2023-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1801">CVE-2023-1801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2397/">CVE-2024-2397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2397">CVE-2024-2397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028986" comment="tcpdump-4.99.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94331" version="1" class="patch">
	<metadata>
		<title>telnet-1.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<description>
These are all security issues fixed in the telnet-1.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39028">CVE-2022-39028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028987" comment="telnet-1.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028988" comment="telnet-server-1.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94332" version="1" class="patch">
	<metadata>
		<title>testng-7.10.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-11022" ref_url="https://www.suse.com/security/cve/CVE-2020-11022/" source="CVE"/>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<reference ref_id="CVE-2022-4065" ref_url="https://www.suse.com/security/cve/CVE-2022-4065/" source="CVE"/>
		<description>
These are all security issues fixed in the testng-7.10.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11022/">CVE-2020-11022 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">CVE-2020-11022 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4065/">CVE-2022-4065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4065">CVE-2022-4065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028989" comment="testng-7.10.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028990" comment="testng-javadoc-7.10.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94333" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2199">CVE-2011-2199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028991" comment="tftp-5.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94334" version="1" class="patch">
	<metadata>
		<title>tigervnc-1.15.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<description>
These are all security issues fixed in the tigervnc-1.15.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0011">CVE-2014-0011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8240">CVE-2014-8240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028992" comment="tigervnc-1.15.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028993" comment="tigervnc-selinux-1.15.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94335" version="1" class="patch">
	<metadata>
		<title>tmux-3.5a-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-19387" ref_url="https://www.suse.com/security/cve/CVE-2018-19387/" source="CVE"/>
		<reference ref_id="CVE-2020-27347" ref_url="https://www.suse.com/security/cve/CVE-2020-27347/" source="CVE"/>
		<reference ref_id="CVE-2022-47016" ref_url="https://www.suse.com/security/cve/CVE-2022-47016/" source="CVE"/>
		<description>
These are all security issues fixed in the tmux-3.5a-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19387/">CVE-2018-19387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-19387">CVE-2018-19387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27347/">CVE-2020-27347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27347">CVE-2020-27347 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47016/">CVE-2022-47016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47016">CVE-2022-47016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028994" comment="tmux-3.5a-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94336" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.108-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<reference ref_id="CVE-2019-0199" ref_url="https://www.suse.com/security/cve/CVE-2019-0199/" source="CVE"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-10072" ref_url="https://www.suse.com/security/cve/CVE-2019-10072/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-11996" ref_url="https://www.suse.com/security/cve/CVE-2020-11996/" source="CVE"/>
		<reference ref_id="CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934/" source="CVE"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943/" source="CVE"/>
		<reference ref_id="CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25122" ref_url="https://www.suse.com/security/cve/CVE-2021-25122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037/" source="CVE"/>
		<reference ref_id="CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079/" source="CVE"/>
		<reference ref_id="CVE-2021-43980" ref_url="https://www.suse.com/security/cve/CVE-2021-43980/" source="CVE"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="CVE-2022-42252" ref_url="https://www.suse.com/security/cve/CVE-2022-42252/" source="CVE"/>
		<reference ref_id="CVE-2022-45143" ref_url="https://www.suse.com/security/cve/CVE-2022-45143/" source="CVE"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<reference ref_id="CVE-2023-28708" ref_url="https://www.suse.com/security/cve/CVE-2023-28708/" source="CVE"/>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<reference ref_id="CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080/" source="CVE"/>
		<reference ref_id="CVE-2023-42794" ref_url="https://www.suse.com/security/cve/CVE-2023-42794/" source="CVE"/>
		<reference ref_id="CVE-2023-42795" ref_url="https://www.suse.com/security/cve/CVE-2023-42795/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45648" ref_url="https://www.suse.com/security/cve/CVE-2023-45648/" source="CVE"/>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<reference ref_id="CVE-2024-22029" ref_url="https://www.suse.com/security/cve/CVE-2024-22029/" source="CVE"/>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<reference ref_id="CVE-2024-50379" ref_url="https://www.suse.com/security/cve/CVE-2024-50379/" source="CVE"/>
		<reference ref_id="CVE-2024-52316" ref_url="https://www.suse.com/security/cve/CVE-2024-52316/" source="CVE"/>
		<reference ref_id="CVE-2024-52317" ref_url="https://www.suse.com/security/cve/CVE-2024-52317/" source="CVE"/>
		<reference ref_id="CVE-2024-54677" ref_url="https://www.suse.com/security/cve/CVE-2024-54677/" source="CVE"/>
		<reference ref_id="CVE-2024-56337" ref_url="https://www.suse.com/security/cve/CVE-2024-56337/" source="CVE"/>
		<reference ref_id="CVE-2025-24813" ref_url="https://www.suse.com/security/cve/CVE-2025-24813/" source="CVE"/>
		<reference ref_id="CVE-2025-31650" ref_url="https://www.suse.com/security/cve/CVE-2025-31650/" source="CVE"/>
		<reference ref_id="CVE-2025-31651" ref_url="https://www.suse.com/security/cve/CVE-2025-31651/" source="CVE"/>
		<reference ref_id="CVE-2025-46701" ref_url="https://www.suse.com/security/cve/CVE-2025-46701/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<reference ref_id="CVE-2025-52434" ref_url="https://www.suse.com/security/cve/CVE-2025-52434/" source="CVE"/>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.108-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5346">CVE-2015-5346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5351">CVE-2015-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0763">CVE-2016-0763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5648">CVE-2017-5648 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8037">CVE-2018-8037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0199/">CVE-2019-0199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0199">CVE-2019-0199 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10072/">CVE-2019-10072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10072">CVE-2019-10072 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11996/">CVE-2020-11996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11996">CVE-2020-11996 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13934">CVE-2020-13934 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13943">CVE-2020-13943 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17527">CVE-2020-17527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25122/">CVE-2021-25122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25122">CVE-2021-25122 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30640">CVE-2021-30640 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33037">CVE-2021-33037 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41079">CVE-2021-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43980/">CVE-2021-43980 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43980">CVE-2021-43980 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23181">CVE-2022-23181 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42252/">CVE-2022-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42252">CVE-2022-42252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45143/">CVE-2022-45143 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45143">CVE-2022-45143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28708/">CVE-2023-28708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28708">CVE-2023-28708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42794/">CVE-2023-42794 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42794">CVE-2023-42794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42795/">CVE-2023-42795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42795">CVE-2023-42795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45648/">CVE-2023-45648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45648">CVE-2023-45648 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22029/">CVE-2024-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22029">CVE-2024-22029 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50379/">CVE-2024-50379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50379">CVE-2024-50379 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-52316/">CVE-2024-52316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52316">CVE-2024-52316 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52317/">CVE-2024-52317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52317">CVE-2024-52317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54677/">CVE-2024-54677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54677">CVE-2024-54677 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56337/">CVE-2024-56337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56337">CVE-2024-56337 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24813/">CVE-2025-24813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24813">CVE-2025-24813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31650/">CVE-2025-31650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31650">CVE-2025-31650 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31651/">CVE-2025-31651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31651">CVE-2025-31651 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46701/">CVE-2025-46701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46701">CVE-2025-46701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52434/">CVE-2025-52434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52434">CVE-2025-52434 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010028995" comment="tomcat-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028996" comment="tomcat-admin-webapps-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028997" comment="tomcat-docs-webapp-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028998" comment="tomcat-el-3_0-api-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010028999" comment="tomcat-embed-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029000" comment="tomcat-javadoc-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029001" comment="tomcat-jsp-2_3-api-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029002" comment="tomcat-jsvc-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029003" comment="tomcat-lib-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029004" comment="tomcat-servlet-4_0-api-9.0.108-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029005" comment="tomcat-webapps-9.0.108-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94337" version="1" class="patch">
	<metadata>
		<title>tomcat10-10.1.44-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<reference ref_id="CVE-2019-0199" ref_url="https://www.suse.com/security/cve/CVE-2019-0199/" source="CVE"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-10072" ref_url="https://www.suse.com/security/cve/CVE-2019-10072/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-11996" ref_url="https://www.suse.com/security/cve/CVE-2020-11996/" source="CVE"/>
		<reference ref_id="CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934/" source="CVE"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943/" source="CVE"/>
		<reference ref_id="CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25122" ref_url="https://www.suse.com/security/cve/CVE-2021-25122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037/" source="CVE"/>
		<reference ref_id="CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079/" source="CVE"/>
		<reference ref_id="CVE-2021-43980" ref_url="https://www.suse.com/security/cve/CVE-2021-43980/" source="CVE"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="CVE-2022-42252" ref_url="https://www.suse.com/security/cve/CVE-2022-42252/" source="CVE"/>
		<reference ref_id="CVE-2022-45143" ref_url="https://www.suse.com/security/cve/CVE-2022-45143/" source="CVE"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<reference ref_id="CVE-2023-28708" ref_url="https://www.suse.com/security/cve/CVE-2023-28708/" source="CVE"/>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<reference ref_id="CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<reference ref_id="CVE-2024-22029" ref_url="https://www.suse.com/security/cve/CVE-2024-22029/" source="CVE"/>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<reference ref_id="CVE-2024-50379" ref_url="https://www.suse.com/security/cve/CVE-2024-50379/" source="CVE"/>
		<reference ref_id="CVE-2024-52316" ref_url="https://www.suse.com/security/cve/CVE-2024-52316/" source="CVE"/>
		<reference ref_id="CVE-2024-52317" ref_url="https://www.suse.com/security/cve/CVE-2024-52317/" source="CVE"/>
		<reference ref_id="CVE-2024-54677" ref_url="https://www.suse.com/security/cve/CVE-2024-54677/" source="CVE"/>
		<reference ref_id="CVE-2024-56337" ref_url="https://www.suse.com/security/cve/CVE-2024-56337/" source="CVE"/>
		<reference ref_id="CVE-2025-24813" ref_url="https://www.suse.com/security/cve/CVE-2025-24813/" source="CVE"/>
		<reference ref_id="CVE-2025-31650" ref_url="https://www.suse.com/security/cve/CVE-2025-31650/" source="CVE"/>
		<reference ref_id="CVE-2025-31651" ref_url="https://www.suse.com/security/cve/CVE-2025-31651/" source="CVE"/>
		<reference ref_id="CVE-2025-46701" ref_url="https://www.suse.com/security/cve/CVE-2025-46701/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat10-10.1.44-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5346">CVE-2015-5346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5351">CVE-2015-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0763">CVE-2016-0763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5648">CVE-2017-5648 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8037">CVE-2018-8037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0199/">CVE-2019-0199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0199">CVE-2019-0199 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10072/">CVE-2019-10072 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10072">CVE-2019-10072 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11996/">CVE-2020-11996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11996">CVE-2020-11996 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13934">CVE-2020-13934 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13943">CVE-2020-13943 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17527">CVE-2020-17527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25122/">CVE-2021-25122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25122">CVE-2021-25122 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30640">CVE-2021-30640 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33037">CVE-2021-33037 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41079">CVE-2021-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43980/">CVE-2021-43980 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43980">CVE-2021-43980 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23181">CVE-2022-23181 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42252/">CVE-2022-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42252">CVE-2022-42252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45143/">CVE-2022-45143 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45143">CVE-2022-45143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28708/">CVE-2023-28708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28708">CVE-2023-28708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22029/">CVE-2024-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22029">CVE-2024-22029 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50379/">CVE-2024-50379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50379">CVE-2024-50379 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-52316/">CVE-2024-52316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52316">CVE-2024-52316 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52317/">CVE-2024-52317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52317">CVE-2024-52317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54677/">CVE-2024-54677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54677">CVE-2024-54677 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56337/">CVE-2024-56337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56337">CVE-2024-56337 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24813/">CVE-2025-24813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24813">CVE-2025-24813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31650/">CVE-2025-31650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31650">CVE-2025-31650 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31651/">CVE-2025-31651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31651">CVE-2025-31651 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46701/">CVE-2025-46701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46701">CVE-2025-46701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029006" comment="tomcat10-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029007" comment="tomcat10-admin-webapps-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029008" comment="tomcat10-doc-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029009" comment="tomcat10-docs-webapp-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029010" comment="tomcat10-el-5_0-api-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029011" comment="tomcat10-embed-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029012" comment="tomcat10-jsp-3_1-api-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029013" comment="tomcat10-jsvc-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029014" comment="tomcat10-lib-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029015" comment="tomcat10-servlet-6_0-api-10.1.44-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029016" comment="tomcat10-webapps-10.1.44-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94338" version="1" class="patch">
	<metadata>
		<title>tomcat11-11.0.10-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2025-46701" ref_url="https://www.suse.com/security/cve/CVE-2025-46701/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat11-11.0.10-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46701/">CVE-2025-46701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46701">CVE-2025-46701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029017" comment="tomcat11-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029018" comment="tomcat11-admin-webapps-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029019" comment="tomcat11-doc-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029020" comment="tomcat11-docs-webapp-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029021" comment="tomcat11-el-6_0-api-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029022" comment="tomcat11-embed-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029023" comment="tomcat11-jsp-4_0-api-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029024" comment="tomcat11-jsvc-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029025" comment="tomcat11-lib-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029026" comment="tomcat11-servlet-6_1-api-11.0.10-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029027" comment="tomcat11-webapps-11.0.10-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94339" version="1" class="patch">
	<metadata>
		<title>tpm2.0-tools-5.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-7524" ref_url="https://www.suse.com/security/cve/CVE-2017-7524/" source="CVE"/>
		<reference ref_id="CVE-2021-3565" ref_url="https://www.suse.com/security/cve/CVE-2021-3565/" source="CVE"/>
		<reference ref_id="CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038/" source="CVE"/>
		<reference ref_id="CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039/" source="CVE"/>
		<description>
These are all security issues fixed in the tpm2.0-tools-5.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7524/">CVE-2017-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7524">CVE-2017-7524 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3565/">CVE-2021-3565 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3565">CVE-2021-3565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029028" comment="tpm2.0-tools-5.7-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94340" version="1" class="patch">
	<metadata>
		<title>traceroute-2.1.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316/" source="CVE"/>
		<description>
These are all security issues fixed in the traceroute-2.1.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029029" comment="traceroute-2.1.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94341" version="1" class="patch">
	<metadata>
		<title>tuned-2.25.1.0+git.889387b-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-52336" ref_url="https://www.suse.com/security/cve/CVE-2024-52336/" source="CVE"/>
		<reference ref_id="CVE-2024-52337" ref_url="https://www.suse.com/security/cve/CVE-2024-52337/" source="CVE"/>
		<description>
These are all security issues fixed in the tuned-2.25.1.0+git.889387b-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52336/">CVE-2024-52336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52336">CVE-2024-52336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52337/">CVE-2024-52337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52337">CVE-2024-52337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029030" comment="tuned-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029031" comment="tuned-gtk-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029032" comment="tuned-profiles-atomic-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029033" comment="tuned-profiles-nfv-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029034" comment="tuned-profiles-openshift-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029035" comment="tuned-profiles-oracle-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029036" comment="tuned-profiles-postgresql-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029037" comment="tuned-profiles-realtime-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029038" comment="tuned-profiles-security-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029039" comment="tuned-profiles-spectrumscale-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029040" comment="tuned-utils-2.25.1.0+git.889387b-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029041" comment="tuned-utils-systemtap-2.25.1.0+git.889387b-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94342" version="1" class="patch">
	<metadata>
		<title>u-boot-rpi3-2023.04-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-18439" ref_url="https://www.suse.com/security/cve/CVE-2018-18439/" source="CVE"/>
		<reference ref_id="CVE-2018-18440" ref_url="https://www.suse.com/security/cve/CVE-2018-18440/" source="CVE"/>
		<reference ref_id="CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648/" source="CVE"/>
		<reference ref_id="CVE-2020-8432" ref_url="https://www.suse.com/security/cve/CVE-2020-8432/" source="CVE"/>
		<reference ref_id="CVE-2024-57256" ref_url="https://www.suse.com/security/cve/CVE-2024-57256/" source="CVE"/>
		<reference ref_id="CVE-2024-57258" ref_url="https://www.suse.com/security/cve/CVE-2024-57258/" source="CVE"/>
		<description>
These are all security issues fixed in the u-boot-rpi3-2023.04-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18439/">CVE-2018-18439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18439">CVE-2018-18439 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18440/">CVE-2018-18440 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18440">CVE-2018-18440 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10648">CVE-2020-10648 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8432/">CVE-2020-8432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8432">CVE-2020-8432 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57256/">CVE-2024-57256 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57256">CVE-2024-57256 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57258/">CVE-2024-57258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57258">CVE-2024-57258 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029042" comment="u-boot-rpi3-2023.04-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029043" comment="u-boot-rpi3-doc-2023.04-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029044" comment="u-boot-rpi4-2023.04-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029045" comment="u-boot-rpi4-doc-2023.04-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029046" comment="u-boot-rpiarm64-2023.04-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029047" comment="u-boot-rpiarm64-doc-2023.04-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029048" comment="u-boot-tools-2023.04-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94343" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20250812-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216/" source="CVE"/>
		<reference ref_id="CVE-2022-21233" ref_url="https://www.suse.com/security/cve/CVE-2022-21233/" source="CVE"/>
		<reference ref_id="CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196/" source="CVE"/>
		<reference ref_id="CVE-2022-33972" ref_url="https://www.suse.com/security/cve/CVE-2022-33972/" source="CVE"/>
		<reference ref_id="CVE-2022-38090" ref_url="https://www.suse.com/security/cve/CVE-2022-38090/" source="CVE"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-41804" ref_url="https://www.suse.com/security/cve/CVE-2022-41804/" source="CVE"/>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<reference ref_id="CVE-2023-23908" ref_url="https://www.suse.com/security/cve/CVE-2023-23908/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-42667" ref_url="https://www.suse.com/security/cve/CVE-2023-42667/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<reference ref_id="CVE-2023-47855" ref_url="https://www.suse.com/security/cve/CVE-2023-47855/" source="CVE"/>
		<reference ref_id="CVE-2023-49141" ref_url="https://www.suse.com/security/cve/CVE-2023-49141/" source="CVE"/>
		<reference ref_id="CVE-2024-21820" ref_url="https://www.suse.com/security/cve/CVE-2024-21820/" source="CVE"/>
		<reference ref_id="CVE-2024-21853" ref_url="https://www.suse.com/security/cve/CVE-2024-21853/" source="CVE"/>
		<reference ref_id="CVE-2024-23918" ref_url="https://www.suse.com/security/cve/CVE-2024-23918/" source="CVE"/>
		<reference ref_id="CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984/" source="CVE"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968/" source="CVE"/>
		<reference ref_id="CVE-2024-24980" ref_url="https://www.suse.com/security/cve/CVE-2024-24980/" source="CVE"/>
		<reference ref_id="CVE-2024-25939" ref_url="https://www.suse.com/security/cve/CVE-2024-25939/" source="CVE"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-31068" ref_url="https://www.suse.com/security/cve/CVE-2024-31068/" source="CVE"/>
		<reference ref_id="CVE-2024-36293" ref_url="https://www.suse.com/security/cve/CVE-2024-36293/" source="CVE"/>
		<reference ref_id="CVE-2024-37020" ref_url="https://www.suse.com/security/cve/CVE-2024-37020/" source="CVE"/>
		<reference ref_id="CVE-2024-39355" ref_url="https://www.suse.com/security/cve/CVE-2024-39355/" source="CVE"/>
		<reference ref_id="CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420/" source="CVE"/>
		<reference ref_id="CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332/" source="CVE"/>
		<reference ref_id="CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012/" source="CVE"/>
		<reference ref_id="CVE-2025-20053" ref_url="https://www.suse.com/security/cve/CVE-2025-20053/" source="CVE"/>
		<reference ref_id="CVE-2025-20054" ref_url="https://www.suse.com/security/cve/CVE-2025-20054/" source="CVE"/>
		<reference ref_id="CVE-2025-20103" ref_url="https://www.suse.com/security/cve/CVE-2025-20103/" source="CVE"/>
		<reference ref_id="CVE-2025-20109" ref_url="https://www.suse.com/security/cve/CVE-2025-20109/" source="CVE"/>
		<reference ref_id="CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623/" source="CVE"/>
		<reference ref_id="CVE-2025-22839" ref_url="https://www.suse.com/security/cve/CVE-2025-22839/" source="CVE"/>
		<reference ref_id="CVE-2025-22840" ref_url="https://www.suse.com/security/cve/CVE-2025-22840/" source="CVE"/>
		<reference ref_id="CVE-2025-22889" ref_url="https://www.suse.com/security/cve/CVE-2025-22889/" source="CVE"/>
		<reference ref_id="CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495/" source="CVE"/>
		<reference ref_id="CVE-2025-26403" ref_url="https://www.suse.com/security/cve/CVE-2025-26403/" source="CVE"/>
		<reference ref_id="CVE-2025-32086" ref_url="https://www.suse.com/security/cve/CVE-2025-32086/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20250812-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21233/">CVE-2022-21233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-33972/">CVE-2022-33972 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33972">CVE-2022-33972 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38090/">CVE-2022-38090 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41804/">CVE-2022-41804 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23908/">CVE-2023-23908 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42667/">CVE-2023-42667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-47855/">CVE-2023-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49141/">CVE-2023-49141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21820/">CVE-2024-21820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21820">CVE-2024-21820 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21853/">CVE-2024-21853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21853">CVE-2024-21853 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-23918/">CVE-2024-23918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23918">CVE-2024-23918 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24980/">CVE-2024-24980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25939/">CVE-2024-25939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-31068/">CVE-2024-31068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31068">CVE-2024-31068 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36293/">CVE-2024-36293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36293">CVE-2024-36293 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-37020/">CVE-2024-37020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37020">CVE-2024-37020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39355/">CVE-2024-39355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39355">CVE-2024-39355 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20053/">CVE-2025-20053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20053">CVE-2025-20053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20054/">CVE-2025-20054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20054">CVE-2025-20054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20103/">CVE-2025-20103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20103">CVE-2025-20103 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20109/">CVE-2025-20109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20109">CVE-2025-20109 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22839/">CVE-2025-22839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22839">CVE-2025-22839 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22840/">CVE-2025-22840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22840">CVE-2025-22840 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22889/">CVE-2025-22889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22889">CVE-2025-22889 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-26403/">CVE-2025-26403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26403">CVE-2025-26403 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-32086/">CVE-2025-32086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32086">CVE-2025-32086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029049" comment="ucode-intel-20250812-160000.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94344" version="1" class="patch">
	<metadata>
		<title>umoci-0.5.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<description>
These are all security issues fixed in the umoci-0.5.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29136">CVE-2021-29136 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029050" comment="umoci-0.5.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94345" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<reference ref_id="CVE-2022-0529" ref_url="https://www.suse.com/security/cve/CVE-2022-0529/" source="CVE"/>
		<reference ref_id="CVE-2022-0530" ref_url="https://www.suse.com/security/cve/CVE-2022-0530/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2475">CVE-2005-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9913">CVE-2014-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7696">CVE-2015-7696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7697">CVE-2015-7697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9844">CVE-2016-9844 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000035">CVE-2018-1000035 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0529/">CVE-2022-0529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">CVE-2022-0529 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0530/">CVE-2022-0530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">CVE-2022-0530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029051" comment="unzip-6.00-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029052" comment="unzip-doc-6.00-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94346" version="1" class="patch">
	<metadata>
		<title>valgrind-3.24.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-4865" ref_url="https://www.suse.com/security/cve/CVE-2008-4865/" source="CVE"/>
		<reference ref_id="CVE-2016-6131" ref_url="https://www.suse.com/security/cve/CVE-2016-6131/" source="CVE"/>
		<description>
These are all security issues fixed in the valgrind-3.24.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4865/">CVE-2008-4865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4865">CVE-2008-4865 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6131/">CVE-2016-6131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6131">CVE-2016-6131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029053" comment="valgrind-3.24.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029054" comment="valgrind-client-headers-3.24.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029055" comment="valgrind-devel-3.24.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94347" version="1" class="patch">
	<metadata>
		<title>valkey-8.0.4-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-31227" ref_url="https://www.suse.com/security/cve/CVE-2024-31227/" source="CVE"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<reference ref_id="CVE-2024-46981" ref_url="https://www.suse.com/security/cve/CVE-2024-46981/" source="CVE"/>
		<reference ref_id="CVE-2024-51741" ref_url="https://www.suse.com/security/cve/CVE-2024-51741/" source="CVE"/>
		<reference ref_id="CVE-2025-21605" ref_url="https://www.suse.com/security/cve/CVE-2025-21605/" source="CVE"/>
		<reference ref_id="CVE-2025-27151" ref_url="https://www.suse.com/security/cve/CVE-2025-27151/" source="CVE"/>
		<reference ref_id="CVE-2025-32023" ref_url="https://www.suse.com/security/cve/CVE-2025-32023/" source="CVE"/>
		<reference ref_id="CVE-2025-48367" ref_url="https://www.suse.com/security/cve/CVE-2025-48367/" source="CVE"/>
		<reference ref_id="CVE-2025-49112" ref_url="https://www.suse.com/security/cve/CVE-2025-49112/" source="CVE"/>
		<description>
These are all security issues fixed in the valkey-8.0.4-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31227/">CVE-2024-31227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31227">CVE-2024-31227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46981/">CVE-2024-46981 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46981">CVE-2024-46981 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51741/">CVE-2024-51741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51741">CVE-2024-51741 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21605/">CVE-2025-21605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21605">CVE-2025-21605 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-27151/">CVE-2025-27151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27151">CVE-2025-27151 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32023/">CVE-2025-32023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32023">CVE-2025-32023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48367/">CVE-2025-48367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48367">CVE-2025-48367 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49112/">CVE-2025-49112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49112">CVE-2025-49112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029056" comment="valkey-8.0.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029057" comment="valkey-compat-redis-8.0.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029058" comment="valkey-devel-8.0.4-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94348" version="1" class="patch">
	<metadata>
		<title>velocity-1.7-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936/" source="CVE"/>
		<description>
These are all security issues fixed in the velocity-1.7-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13936">CVE-2020-13936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029059" comment="velocity-1.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029060" comment="velocity-custom-parser-example-2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029061" comment="velocity-demo-1.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029062" comment="velocity-engine-core-2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029063" comment="velocity-engine-core-javadoc-2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029064" comment="velocity-engine-examples-2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029065" comment="velocity-engine-javadoc-2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029066" comment="velocity-engine-parent-2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029067" comment="velocity-engine-scripting-2.4-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029068" comment="velocity-javadoc-1.7-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029069" comment="velocity-manual-1.7-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94349" version="1" class="patch">
	<metadata>
		<title>virt-install-5.0.0-160000.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-10183" ref_url="https://www.suse.com/security/cve/CVE-2019-10183/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-install-5.0.0-160000.3.1 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10183/">CVE-2019-10183 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10183">CVE-2019-10183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029070" comment="virt-install-5.0.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029071" comment="virt-manager-5.0.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029072" comment="virt-manager-common-5.0.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94350" version="1" class="patch">
	<metadata>
		<title>vsftpd-3.0.5-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-3.0.5-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1419">CVE-2015-1419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029073" comment="vsftpd-3.0.5-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94351" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3+git20230121-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<reference ref_id="CVE-2022-38223" ref_url="https://www.suse.com/security/cve/CVE-2022-38223/" source="CVE"/>
		<reference ref_id="CVE-2023-38252" ref_url="https://www.suse.com/security/cve/CVE-2023-38252/" source="CVE"/>
		<reference ref_id="CVE-2023-38253" ref_url="https://www.suse.com/security/cve/CVE-2023-38253/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3+git20230121-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6772">CVE-2006-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9434">CVE-2016-9434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9435">CVE-2016-9435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9436">CVE-2016-9436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9437">CVE-2016-9437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9438">CVE-2016-9438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9439">CVE-2016-9439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9440">CVE-2016-9440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9441">CVE-2016-9441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9442">CVE-2016-9442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9443">CVE-2016-9443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-9621">CVE-2016-9621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9622">CVE-2016-9622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9623">CVE-2016-9623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9624">CVE-2016-9624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9625">CVE-2016-9625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9626">CVE-2016-9626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9627">CVE-2016-9627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9628">CVE-2016-9628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9629">CVE-2016-9629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9630">CVE-2016-9630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9631">CVE-2016-9631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9632">CVE-2016-9632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9633">CVE-2016-9633 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6196">CVE-2018-6196 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6197">CVE-2018-6197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6198">CVE-2018-6198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38223/">CVE-2022-38223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38223">CVE-2022-38223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38252/">CVE-2023-38252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38252">CVE-2023-38252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38253/">CVE-2023-38253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38253">CVE-2023-38253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029074" comment="w3m-0.5.3+git20230121-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029075" comment="w3m-inline-image-0.5.3+git20230121-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94352" version="1" class="patch">
	<metadata>
		<title>wdiff-1.2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the wdiff-1.2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029076" comment="wdiff-1.2.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029077" comment="wdiff-lang-1.2.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94353" version="1" class="patch">
	<metadata>
		<title>wget-1.25.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-7665" ref_url="https://www.suse.com/security/cve/CVE-2015-7665/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="CVE-2018-20483" ref_url="https://www.suse.com/security/cve/CVE-2018-20483/" source="CVE"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<reference ref_id="CVE-2024-10524" ref_url="https://www.suse.com/security/cve/CVE-2024-10524/" source="CVE"/>
		<reference ref_id="CVE-2024-38428" ref_url="https://www.suse.com/security/cve/CVE-2024-38428/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.25.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6719">CVE-2006-6719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2252">CVE-2010-2252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7665/">CVE-2015-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7665">CVE-2015-7665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13089">CVE-2017-13089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13090">CVE-2017-13090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6508">CVE-2017-6508 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20483/">CVE-2018-20483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20483">CVE-2018-20483 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5953">CVE-2019-5953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10524/">CVE-2024-10524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10524">CVE-2024-10524 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38428/">CVE-2024-38428 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38428">CVE-2024-38428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029078" comment="wget-1.25.0-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029079" comment="wget-lang-1.25.0-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94354" version="1" class="patch">
	<metadata>
		<title>whois-5.6.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the whois-5.6.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029080" comment="whois-5.6.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029081" comment="whois-bash-completion-5.6.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94355" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.11-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144/" source="CVE"/>
		<reference ref_id="CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145/" source="CVE"/>
		<reference ref_id="CVE-2015-4146" ref_url="https://www.suse.com/security/cve/CVE-2015-4146/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-5315" ref_url="https://www.suse.com/security/cve/CVE-2015-5315/" source="CVE"/>
		<reference ref_id="CVE-2015-5316" ref_url="https://www.suse.com/security/cve/CVE-2015-5316/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2016-4476" ref_url="https://www.suse.com/security/cve/CVE-2016-4476/" source="CVE"/>
		<reference ref_id="CVE-2016-4477" ref_url="https://www.suse.com/security/cve/CVE-2016-4477/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004/" source="CVE"/>
		<reference ref_id="CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160/" source="CVE"/>
		<reference ref_id="CVE-2023-52424" ref_url="https://www.suse.com/security/cve/CVE-2023-52424/" source="CVE"/>
		<reference ref_id="CVE-2025-24912" ref_url="https://www.suse.com/security/cve/CVE-2025-24912/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.11-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4143">CVE-2015-4143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4144">CVE-2015-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4145">CVE-2015-4145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4146/">CVE-2015-4146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4146">CVE-2015-4146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5310">CVE-2015-5310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5315/">CVE-2015-5315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5315">CVE-2015-5315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5316/">CVE-2015-5316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5316">CVE-2015-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4476/">CVE-2016-4476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4476">CVE-2016-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4477/">CVE-2016-4477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4477">CVE-2016-4477 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">CVE-2021-30004 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52424/">CVE-2023-52424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52424">CVE-2023-52424 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-24912/">CVE-2025-24912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24912">CVE-2025-24912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029082" comment="wpa_supplicant-2.11-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94356" version="1" class="patch">
	<metadata>
		<title>x3270-4.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
These are all security issues fixed in the x3270-4.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029083" comment="x3270-4.3-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94357" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0107">CVE-2014-0107 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029084" comment="xalan-j2-2.7.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029085" comment="xalan-j2-manual-2.7.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029086" comment="xalan-j2-xsltc-2.7.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94358" version="1" class="patch">
	<metadata>
		<title>xdg-desktop-portal-1.20.3-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-desktop-portal-1.20.3-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029087" comment="xdg-desktop-portal-1.20.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029088" comment="xdg-desktop-portal-devel-1.20.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029089" comment="xdg-desktop-portal-devel-docs-1.20.3-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029090" comment="xdg-desktop-portal-lang-1.20.3-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94359" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.2.1-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<reference ref_id="CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.2.1-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0386">CVE-2008-0386 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18266">CVE-2017-18266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029091" comment="xdg-utils-1.2.1-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029092" comment="xdg-utils-screensaver-1.2.1-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94360" version="1" class="patch">
	<metadata>
		<title>xerces-j2-2.12.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
These are all security issues fixed in the xerces-j2-2.12.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029093" comment="xerces-j2-2.12.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029094" comment="xerces-j2-demo-2.12.2-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029095" comment="xerces-j2-javadoc-2.12.2-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94361" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-batik-1.18-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2019-17566" ref_url="https://www.suse.com/security/cve/CVE-2019-17566/" source="CVE"/>
		<reference ref_id="CVE-2020-11987" ref_url="https://www.suse.com/security/cve/CVE-2020-11987/" source="CVE"/>
		<reference ref_id="CVE-2022-38398" ref_url="https://www.suse.com/security/cve/CVE-2022-38398/" source="CVE"/>
		<reference ref_id="CVE-2022-38648" ref_url="https://www.suse.com/security/cve/CVE-2022-38648/" source="CVE"/>
		<reference ref_id="CVE-2022-40146" ref_url="https://www.suse.com/security/cve/CVE-2022-40146/" source="CVE"/>
		<reference ref_id="CVE-2022-41704" ref_url="https://www.suse.com/security/cve/CVE-2022-41704/" source="CVE"/>
		<reference ref_id="CVE-2022-42890" ref_url="https://www.suse.com/security/cve/CVE-2022-42890/" source="CVE"/>
		<reference ref_id="CVE-2022-44729" ref_url="https://www.suse.com/security/cve/CVE-2022-44729/" source="CVE"/>
		<reference ref_id="CVE-2022-44730" ref_url="https://www.suse.com/security/cve/CVE-2022-44730/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-batik-1.18-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17566/">CVE-2019-17566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17566">CVE-2019-17566 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11987/">CVE-2020-11987 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11987">CVE-2020-11987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38398/">CVE-2022-38398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38398">CVE-2022-38398 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38648/">CVE-2022-38648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38648">CVE-2022-38648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40146/">CVE-2022-40146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40146">CVE-2022-40146 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41704/">CVE-2022-41704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41704">CVE-2022-41704 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42890/">CVE-2022-42890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42890">CVE-2022-42890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44729/">CVE-2022-44729 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44729">CVE-2022-44729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44730/">CVE-2022-44730 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44730">CVE-2022-44730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029096" comment="xmlgraphics-batik-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029097" comment="xmlgraphics-batik-css-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029098" comment="xmlgraphics-batik-demo-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029099" comment="xmlgraphics-batik-javadoc-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029100" comment="xmlgraphics-batik-rasterizer-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029101" comment="xmlgraphics-batik-slideshow-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029102" comment="xmlgraphics-batik-squiggle-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029103" comment="xmlgraphics-batik-svgpp-1.18-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029104" comment="xmlgraphics-batik-ttf2svg-1.18-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94362" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-commons-2.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-11988" ref_url="https://www.suse.com/security/cve/CVE-2020-11988/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-commons-2.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11988/">CVE-2020-11988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11988">CVE-2020-11988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029105" comment="xmlgraphics-commons-2.10-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029106" comment="xmlgraphics-commons-javadoc-2.10-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94363" version="1" class="patch">
	<metadata>
		<title>xmlgraphics-fop-2.10-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2024-28168" ref_url="https://www.suse.com/security/cve/CVE-2024-28168/" source="CVE"/>
		<description>
These are all security issues fixed in the xmlgraphics-fop-2.10-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28168/">CVE-2024-28168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28168">CVE-2024-28168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029107" comment="xmlgraphics-fop-2.10-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94364" version="1" class="patch">
	<metadata>
		<title>xrdb-1.2.2-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xrdb-1.2.2-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0465">CVE-2011-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029108" comment="xrdb-1.2.2-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94365" version="1" class="patch">
	<metadata>
		<title>xterm-393-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="CVE-2022-45063" ref_url="https://www.suse.com/security/cve/CVE-2022-45063/" source="CVE"/>
		<reference ref_id="CVE-2023-40359" ref_url="https://www.suse.com/security/cve/CVE-2023-40359/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-393-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45063/">CVE-2022-45063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45063">CVE-2022-45063 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40359/">CVE-2023-40359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40359">CVE-2023-40359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029109" comment="xterm-393-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029110" comment="xterm-bin-393-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029111" comment="xterm-resize-393-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94366" version="1" class="patch">
	<metadata>
		<title>xtrans-1.6.0-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2020-25697" ref_url="https://www.suse.com/security/cve/CVE-2020-25697/" source="CVE"/>
		<description>
These are all security issues fixed in the xtrans-1.6.0-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25697/">CVE-2020-25697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25697">CVE-2020-25697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029112" comment="xtrans-1.6.0-160000.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94367" version="1" class="patch">
	<metadata>
		<title>xwayland-24.1.6-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<reference ref_id="CVE-2023-5574" ref_url="https://www.suse.com/security/cve/CVE-2023-5574/" source="CVE"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49177" ref_url="https://www.suse.com/security/cve/CVE-2025-49177/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
These are all security issues fixed in the xwayland-24.1.6-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4010">CVE-2021-4010 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5574/">CVE-2023-5574 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5574">CVE-2023-5574 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49177/">CVE-2025-49177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49177">CVE-2025-49177 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029113" comment="xwayland-24.1.6-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029114" comment="xwayland-devel-24.1.6-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94368" version="1" class="patch">
	<metadata>
		<title>zsh-5.9-160000.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<description>
These are all security issues fixed in the zsh-5.9-160000.2.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029115" comment="zsh-5.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029116" comment="zsh-htmldoc-5.9-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029117" comment="zsh-sh-5.9-160000.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94369" version="1" class="patch">
	<metadata>
		<title>zypper-1.14.93-160000.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
		</affected>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<description>
These are all security issues fixed in the zypper-1.14.93-160000.1.2 package on the GA media of SUSE Linux Enterprise Server 16.0.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029118" comment="zypper-1.14.93-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029119" comment="zypper-aptitude-1.14.93-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029120" comment="zypper-log-1.14.93-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029121" comment="zypper-needs-restarting-1.14.93-160000.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94370" version="1" class="patch">
	<metadata>
		<title>Security update for go1.25 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244485" ref_url="https://bugzilla.suse.com/1244485" source="BUGZILLA"/>
		<reference ref_id="1245878" ref_url="https://bugzilla.suse.com/1245878" source="BUGZILLA"/>
		<reference ref_id="1247816" ref_url="https://bugzilla.suse.com/1247816" source="BUGZILLA"/>
		<reference ref_id="1248082" ref_url="https://bugzilla.suse.com/1248082" source="BUGZILLA"/>
		<reference ref_id="1249141" ref_url="https://bugzilla.suse.com/1249141" source="BUGZILLA"/>
		<reference ref_id="1249985" ref_url="https://bugzilla.suse.com/1249985" source="BUGZILLA"/>
		<reference ref_id="1251253" ref_url="https://bugzilla.suse.com/1251253" source="BUGZILLA"/>
		<reference ref_id="1251254" ref_url="https://bugzilla.suse.com/1251254" source="BUGZILLA"/>
		<reference ref_id="1251255" ref_url="https://bugzilla.suse.com/1251255" source="BUGZILLA"/>
		<reference ref_id="1251256" ref_url="https://bugzilla.suse.com/1251256" source="BUGZILLA"/>
		<reference ref_id="1251257" ref_url="https://bugzilla.suse.com/1251257" source="BUGZILLA"/>
		<reference ref_id="1251258" ref_url="https://bugzilla.suse.com/1251258" source="BUGZILLA"/>
		<reference ref_id="1251259" ref_url="https://bugzilla.suse.com/1251259" source="BUGZILLA"/>
		<reference ref_id="1251260" ref_url="https://bugzilla.suse.com/1251260" source="BUGZILLA"/>
		<reference ref_id="1251261" ref_url="https://bugzilla.suse.com/1251261" source="BUGZILLA"/>
		<reference ref_id="1251262" ref_url="https://bugzilla.suse.com/1251262" source="BUGZILLA"/>
		<reference ref_id="1254227" ref_url="https://bugzilla.suse.com/1254227" source="BUGZILLA"/>
		<reference ref_id="1254430" ref_url="https://bugzilla.suse.com/1254430" source="BUGZILLA"/>
		<reference ref_id="1254431" ref_url="https://bugzilla.suse.com/1254431" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47910" ref_url="https://www.suse.com/security/cve/CVE-2025-47910/" source="CVE"/>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724/" source="CVE"/>
		<reference ref_id="CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725/" source="CVE"/>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<description>
This update for go1.25 fixes the following issues:

Update to go1.25.5.

Security issues fixed:

- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation
  (bsc#1254431).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion
  (bsc#1251258).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).

Other issues fixed and changes:

- Version 1.25.5:
  * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
  * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
    is denied, ReOpenFile error handling followup

- Version 1.25.4:
  * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
  * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
  * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
  * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
  * go#75952 encoding/pem: regression when decoding blocks with leading garbage
  * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
    is denied
  * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
  * go#76029 pem/encoding: malformed line endings can cause panics

- Version 1.25.3:
  * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
  * go#75777 spec: Go1.25 spec should be dated closer to actual release date

- Version 1.25.2:
  * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt
  * go#75116 os: Root.MkdirAll can return "file exists" when called concurrently on the same path
  * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root
  * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
  * go#75255 cmd/compile: export to DWARF types only referenced through interfaces
  * go#75347 testing/synctest: test timeout with no runnable goroutines
  * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
  * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
  * go#75537 context: Err can return non-nil before Done channel is closed
  * go#75539 net/http: internal error: connCount underflow
  * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
  * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value
  * go#75669 runtime: debug.decoratemappings don't work as expected

- Version 1.25.1:
  * go#74822 cmd/go: "get toolchain@latest" should ignore release candidates
  * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
  * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
  * go#75021 testing/synctest: bubble not terminating
  * go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles

- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Fix runtime condition for gcc/gcc7 dependency.
- Use at least gcc 7 for all architectures (bsc#1254227).
- Package svgpan.js to fix issues with "go tool pprof" (boo#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1244485">SUSE bug 1244485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245878">SUSE bug 1245878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247816">SUSE bug 1247816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248082">SUSE bug 1248082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249141">SUSE bug 1249141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249985">SUSE bug 1249985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251253">SUSE bug 1251253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251254">SUSE bug 1251254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251255">SUSE bug 1251255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251256">SUSE bug 1251256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251257">SUSE bug 1251257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251258">SUSE bug 1251258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251259">SUSE bug 1251259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251260">SUSE bug 1251260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251261">SUSE bug 1251261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251262">SUSE bug 1251262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254227">SUSE bug 1254227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254430">SUSE bug 1254430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254431">SUSE bug 1254431</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-47910/">CVE-2025-47910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47910">CVE-2025-47910 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94371" version="1" class="patch">
	<metadata>
		<title>Security update for go1.24 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1236217" ref_url="https://bugzilla.suse.com/1236217" source="BUGZILLA"/>
		<reference ref_id="1245878" ref_url="https://bugzilla.suse.com/1245878" source="BUGZILLA"/>
		<reference ref_id="1247816" ref_url="https://bugzilla.suse.com/1247816" source="BUGZILLA"/>
		<reference ref_id="1248082" ref_url="https://bugzilla.suse.com/1248082" source="BUGZILLA"/>
		<reference ref_id="1249985" ref_url="https://bugzilla.suse.com/1249985" source="BUGZILLA"/>
		<reference ref_id="1251253" ref_url="https://bugzilla.suse.com/1251253" source="BUGZILLA"/>
		<reference ref_id="1251254" ref_url="https://bugzilla.suse.com/1251254" source="BUGZILLA"/>
		<reference ref_id="1251255" ref_url="https://bugzilla.suse.com/1251255" source="BUGZILLA"/>
		<reference ref_id="1251256" ref_url="https://bugzilla.suse.com/1251256" source="BUGZILLA"/>
		<reference ref_id="1251257" ref_url="https://bugzilla.suse.com/1251257" source="BUGZILLA"/>
		<reference ref_id="1251258" ref_url="https://bugzilla.suse.com/1251258" source="BUGZILLA"/>
		<reference ref_id="1251259" ref_url="https://bugzilla.suse.com/1251259" source="BUGZILLA"/>
		<reference ref_id="1251260" ref_url="https://bugzilla.suse.com/1251260" source="BUGZILLA"/>
		<reference ref_id="1251261" ref_url="https://bugzilla.suse.com/1251261" source="BUGZILLA"/>
		<reference ref_id="1251262" ref_url="https://bugzilla.suse.com/1251262" source="BUGZILLA"/>
		<reference ref_id="1254430" ref_url="https://bugzilla.suse.com/1254430" source="BUGZILLA"/>
		<reference ref_id="1254431" ref_url="https://bugzilla.suse.com/1254431" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724/" source="CVE"/>
		<reference ref_id="CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725/" source="CVE"/>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<description>
This update for go1.24 fixes the following issues:

Update to go1.24.11.

Security issues fixed:

- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion
  (bsc#1251258).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation
  (bsc#1254431).


Other issues fixed and changes:

- Version 1.24.11:
  * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364
    cores

- Version 1.24.10:
  * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
  * go#75951 encoding/pem: regression when decoding blocks with leading garbage
  * go#76028 pem/encoding: malformed line endings can cause panics

- Version 1.24.9:
  * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot

- Version 1.24.8:
  * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
  * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
  * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
  * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
  * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
  * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
  * go#75538 net/http: internal error: connCount underflow
  * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
  * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value

- Version 1.24.7:
  * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
  * go#74821 cmd/go: "get toolchain@latest" should ignore release candidates
  * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets

- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Package svgpan.js to fix issues with "go tool pprof" (bsc#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236217">SUSE bug 1236217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245878">SUSE bug 1245878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247816">SUSE bug 1247816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248082">SUSE bug 1248082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249985">SUSE bug 1249985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251253">SUSE bug 1251253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251254">SUSE bug 1251254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251255">SUSE bug 1251255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251256">SUSE bug 1251256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251257">SUSE bug 1251257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251258">SUSE bug 1251258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251259">SUSE bug 1251259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251260">SUSE bug 1251260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251261">SUSE bug 1251261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251262">SUSE bug 1251262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254430">SUSE bug 1254430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254431">SUSE bug 1254431</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94372" version="1" class="patch">
	<metadata>
		<title>Security update for keylime (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1237153" ref_url="https://bugzilla.suse.com/1237153" source="BUGZILLA"/>
		<reference ref_id="1254199" ref_url="https://bugzilla.suse.com/1254199" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-1057" ref_url="https://www.suse.com/security/cve/CVE-2025-1057/" source="CVE"/>
		<reference ref_id="CVE-2025-13609" ref_url="https://www.suse.com/security/cve/CVE-2025-13609/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023547.html" source="SUSE-SU"/>
		<description>
This update for keylime fixes the following issues:

Update to version 7.13.0+40.

Security issues fixed:

- CVE-2025-13609: possible agent identity takeover due to registrar allowing the registration of agents with duplicate
  UUIDs (bsc#1254199).
- CVE-2025-1057: registrar denial-of-service due to backward incompatibility in database type handling (bsc#1237153).

Other issues fixed and changes:

- Version 7.13.0+40:
  * Include new attestation information fields (#1818)
  * Fix Database race conditions and SQLAlchemy 2.0 compatibility (#1823)
  * push-model: require HTTPS for authentication and attestation endpoints
  * Fix operational_state tracking in push mode attestations
  * templates: add push model authentication config options to 2.5 templates
  * Security: Hash authentication tokens in logs
  * Fix stale IMA policy cache in verification
  * Fix authentication behavior on failed attestations for push mode
  * Add shared memory infrastructure for multiprocess communication
  * Add agent authentication (challenge/response) protocol for push mode
  * Add agent-driven (push) attestation protocol with PULL mode regression fixes (#1814)
  * docs: Fix man page RST formatting for rst2man compatibility (#1813)
  * Apply limit on keylime-policy workers
  * tpm: fix ECC signature parsing to support variable-length coordinates
  * tpm: fix ECC P-521 credential activation with consistent marshaling
  * tpm: fix ECC P-521 coordinate validation
  * Remove deprecated disabled_signing_algorithms configuration option (#1804)
  * algorithms: add support for specific RSA algorithms
  * algorithms: add support for specific ECC curve algorithms
  * Created manpage for keylime-policy and edited manpages for keylime verifier, registrar, agent
  * Manpage for keylime agent
  * Manpage for keylime verifier
  * Manpage for keylime registrar
  * Use constants for timeout and max retries defaults
  * verifier: Use timeout from `request_timeout` config option
  * revocation_notifier: Use timeout setting from config file
  * tenant: Set timeout when getting version from agent
  * verify/evidence: SEV-SNP evidence type/verifier
  * verify/evidence: Add evidence type to request JSON

- Version v7.13.0:
  * Avoid re-encoding certificate stored in DB
  * Revert "models: Do not re-encode certificate stored in DB"
  * Revert "registrar_agent: Use pyasn1 to parse PEM"
  * policy/sign: use print() when writing to /dev/stdout
  * registrar_agent: Use pyasn1 to parse PEM
  * models: Do not re-encode certificate stored in DB
  * mba: normalize vendor_db in EV_EFI_VARIABLE_AUTHORITY events
  * mb: support vendor_db as logged by newer shim versions
  * mb: support EV_EFI_HANDOFF_TABLES events on PCR1
  * Remove unnecessary configuration values
  * cloud_verifier_tornado: handle exception in notify_error()
  * requests_client: close the session at the end of the resource manager
  * Manpage for keylime_tenant (#1786)
  * Add 2.5 templates including Push Model changes
  * Initial version of verify evidence API
  * db: Do not read pool size and max overflow for sqlite
  * Use context managers to close DB sessions
  * revocations: Try to send notifications on shutdown
  * verifier: Gracefully shutdown on signal
  * Use `fork` as `multiprocessing` start method
  * Fix inaccuracy in threat model and add reference to SBAT
  * Explain TPM properties and expand vTPM discussion
  * Fix invalid RST and update TOC
  * Expand threat model page to include adversarial model
  * Add --push-model option to avoid requests to agents
  * templates: duplicate str_to_version() in the adjust script
  * policy: fix mypy issues with rpm_repo
  * revocation_notifier: fix mypy issue by replacing deprecated call
  * Fix create_runtime_policy in python &lt; 3.12
  * Fix after review
  * fixed CONSTANT names C0103 errors
  * Extend meta_data field in verifierdb
  * docs: update issue templates
  * docs: add GitHub PR template with documentation reminders
  * tpm_util: fix quote signature extraction for ECDSA
  * registrar: Log API versions during startup
  * Remove excessive logging on exception
  * scripts: Fix coverage information downloading script

- Version v7.12.1:
  * models: Add Base64Bytes type to read and write from the database
  * Simplify response check from registrar

- Version v7.12.0:
  * API: Add /version endpoint to registrar
  * scripts: Download coverage data directly from Testing Farm
  * docs: Add separate documentation for each API version
  * scripts/create_runtime_policy.sh: fix path for the exclude list
  * docs: add documentation for keylime-policy
  * templates: Add the new agent.conf option 'api_versions'
  * Enable autocompletion using argcomplete
  * build(deps): bump codecov/codecov-action from 5.1.1 to 5.1.2
  * Configure EPEL-10 repo in packit-ci.fmf
  * build(deps): bump codecov/codecov-action from 5.0.2 to 5.1.1
  * build(deps): bump pypa/gh-action-pypi-publish from 1.12.0 to 1.12.3
  * build(deps): bump docker/metadata-action from 5.5.1 to 5.6.1
  * build(deps): bump docker/build-push-action from 6.9.0 to 6.10.0
  * keylime-policy: improve error handling when provided a bad key (sign)
  * keylime-policy: exit with status 1 when the commands failed
  * keylime-policy: use Certificate() from models.base to validate certs
  * keylime-policy: check for valid cert file when using x509 backend (sign)
  * keylime-policy: fix help for "keylime-policy sign" verb
  * tenant: Correctly log number of tries when deleting
  * update TCTI environment variable usage
  * build(deps): bump codecov/codecov-action from 4.6.0 to 5.0.2
  * keylime-policy: add `create measured-boot' subcommand
  * keylime-policy: add `sign runtime' subcommand
  * keylime-policy: add logger to use with the policy tool
  * installer.sh: Restore execution permission
  * installer: Fix string comparison
  * build(deps): bump docker/build-push-action from 6.7.0 to 6.9.0
  * build(deps): bump codecov/codecov-action from 4.5.0 to 4.6.0
  * build(deps): bump pypa/gh-action-pypi-publish from 1.11.0 to 1.12.0
  * build(deps): bump actions/setup-python from 5.2.0 to 5.3.0
  * installer.sh: updated EPEL, PEP668 Fix, logic fix
  * build(deps): bump pypa/gh-action-pypi-publish from 1.10.3 to 1.11.0
  * build(deps): bump actions/checkout from 4.2.1 to 4.2.2
  * postgresql support for docker using psycopg2
  * installer.sh: update package list, add workaround for PEP 668
  * build(deps): bump actions/checkout from 4.2.0 to 4.2.1
  * keylime.conf: full removal
  * Drop pending SPDX-License-Identifier headers
  * create_runtime_policy: Validate algorithm from IMA measurement log
  * create-runtime-policy: Deal with SHA-256 and SM3_256 ambiguity
  * create_runtime_policy: drop commment with test data
  * create_runtime_policy: Use a common method to guess algorithm
  * keylime-policy: rename tool to keylime-policy instead of keylime_policy
  * keylime_policy: create runtime: remove --use-ima-measurement-list
  * keylime_policy: use consistent arg names for create_runtime_policy
  * build(deps): bump pypa/gh-action-pypi-publish from 1.10.2 to 1.10.3
  * build(deps): bump actions/checkout from 4.1.7 to 4.2.0
  * elchecking/example: workaround empty PK, KEK, db and dbx
  * elchecking: add handling for EV_EFI_PLATFORM_FIRMWARE_BLOB2
  * create_runtime_policy: Fix log level for debug messages
  * build(deps): bump pypa/gh-action-pypi-publish from 1.10.1 to 1.10.2
  * build(deps): bump peter-evans/create-pull-request from 6.1.0 to 7.0.5
  * pylintrc: Ignore too-many-positional-arguments check
  * keylime/web/base/controller: Move TypeAlias definition out of class
  * create_runtime_policy: Calculate digests in multiple threads
  * create_runtime_policy: Allow rootfs to be in any directory
  * keylime_policy: Calculate digests from each source separately
  * create_runtime_policy: Simplify boot_aggregate parsing
  * ima: Validate JSON when loading IMA Keyring from string
  * docs: include IDevID page also in the sidebar
  * docs: point to installation guide from RHEL and SLE Micro
  * build(deps): bump actions/setup-python from 5.1.1 to 5.2.0
  * build(deps): bump pypa/gh-action-pypi-publish from 1.9.0 to 1.10.1
  * change check_tpm_origin_check to a warning that does not prevent registration
  * docs: Fix Runtime Policy JSON schema to reflect the reality
  * Sets absolute path for files inside a rootfs dir
  * policy/create_runtime_policy: fix handling of empty lines in exclude list
  * keylime_policy: setting 'log_hash_alg' to 'sha1' (template-hash algo)
  * codestyle: Assign CERTIFICATE_PRIVATE_KEY_TYPES directly (pyright)
  * codestyle: convert bytearrays to bytes to get expected type (pyright)
  * codestyle: Use new variables after changing datatype (pyright)
  * cert_utils: add description why loading using cryptography might fail
  * ima: list names of the runtime policies
  * build(deps): bump docker/build-push-action from 6.6.1 to 6.7.0
  * tox: Use python 3.10 instead of 3.6
  * revocation_notifier: Use web_util to generate TLS context
  * mba: Add a skip custom policies option when loading mba.
  * build(deps): bump docker/build-push-action from 6.5.0 to 6.6.1
  * build(deps): bump docker/metadata-action from 4.6.0 to 5.5.1
  * cmd/keylime_policy: add tool to handle keylime policies
  * cert_utils: add is_x509_cert()
  * common/algorithms: transform Encrypt and Sign class into enums
  * common/algorithms: add method to calculate digest of a file
  * build(deps): bump docker/build-push-action from 4.2.1 to 6.5.0
  * build(deps): bump docker/login-action from 3.2.0 to 3.3.0
  * build(deps): bump docker/metadata-action from 4.6.0 to 5.5.1
  * build(deps): bump docker/login-action from 3.2.0 to 3.3.0
  * build(deps): bump docker/build-push-action from 6.4.1 to 6.5.0
  * build(deps): bump docker/build-push-action from 4.2.1 to 6.4.1
  * build(deps): bump docker/metadata-action from 4.6.0 to 5.5.1
  * build(deps): bump pre-commit/action from 3.0.0 to 3.0.1
  * tpm: Replace KDFs and ECDH implementations with python-cryptography
  * build(deps): bump codecov/codecov-action from 2.1.0 to 4.5.0
  * build(deps): bump docker/login-action from 2.2.0 to 3.2.0
  * build(deps): bump actions/setup-python from 2.3.4 to 5.1.1
  * build(deps): bump actions/first-interaction
  * build(deps): bump actions/checkout from 2.7.0 to 4.1.7
  * revocation_notifier: Explicitly add CA certificate bundle
  * Introduce new REST API framework and refactor registrar implementation
  * mba: Support named measured boot policies
  * tenant: add friendlier error message if mTLS CA is wrongly configured
  * ca_impl_openssl: Mark extensions as critical following RFC 5280
  * Include Authority Key Identifier in KL-generated certs
  * verifier, tenant: make payload for agent completely optional

		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1237153">SUSE bug 1237153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254199">SUSE bug 1254199</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1057/">CVE-2025-1057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1057">CVE-2025-1057 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-13609/">CVE-2025-13609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13609">CVE-2025-13609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033436" comment="keylime-config-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033437" comment="keylime-firewalld-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033438" comment="keylime-logrotate-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033439" comment="keylime-registrar-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033440" comment="keylime-tenant-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033441" comment="keylime-tpm_cert_store-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033442" comment="keylime-verifier-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033443" comment="python313-keylime-7.13.0+40-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033436" comment="keylime-config-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033437" comment="keylime-firewalld-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033438" comment="keylime-logrotate-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033439" comment="keylime-registrar-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033440" comment="keylime-tenant-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033441" comment="keylime-tpm_cert_store-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033442" comment="keylime-verifier-7.13.0+40-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033443" comment="python313-keylime-7.13.0+40-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94373" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248767" ref_url="https://bugzilla.suse.com/1248767" source="BUGZILLA"/>
		<reference ref_id="1248780" ref_url="https://bugzilla.suse.com/1248780" source="BUGZILLA"/>
		<reference ref_id="1248784" ref_url="https://bugzilla.suse.com/1248784" source="BUGZILLA"/>
		<reference ref_id="1249362" ref_url="https://bugzilla.suse.com/1249362" source="BUGZILLA"/>
		<reference ref_id="1252282" ref_url="https://bugzilla.suse.com/1252282" source="BUGZILLA"/>
		<reference ref_id="1252749" ref_url="https://bugzilla.suse.com/1252749" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55212" ref_url="https://www.suse.com/security/cve/CVE-2025-55212/" source="CVE"/>
		<reference ref_id="CVE-2025-55298" ref_url="https://www.suse.com/security/cve/CVE-2025-55298/" source="CVE"/>
		<reference ref_id="CVE-2025-57803" ref_url="https://www.suse.com/security/cve/CVE-2025-57803/" source="CVE"/>
		<reference ref_id="CVE-2025-57807" ref_url="https://www.suse.com/security/cve/CVE-2025-57807/" source="CVE"/>
		<reference ref_id="CVE-2025-62171" ref_url="https://www.suse.com/security/cve/CVE-2025-62171/" source="CVE"/>
		<reference ref_id="CVE-2025-62594" ref_url="https://www.suse.com/security/cve/CVE-2025-62594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023597.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2025-62594: unsigned underflow and division-by-zero can lead to OOB pointer arithmetic and process crash
  (bsc#1252749).
- CVE-2025-57807: BlobStream Forward-Seek Under-Allocation (bsc#1249362).
- CVE-2025-62171: incomplete fix for integer overflow in BMP Decoder (bsc#1252282).
- CVE-2025-55298: format string bug vulnerability can lead to heap overflow (bsc#1248780).
- CVE-2025-57803: 32-bit integer overflow can lead to heap out-of-bounds (OOB) write (bsc#1248784).
- CVE-2025-55212: division-by-zero in ThumbnailImage() when passing a geometry string containing only a colon to
  `montage -geometry` (bsc#1248767).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248767">SUSE bug 1248767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248780">SUSE bug 1248780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248784">SUSE bug 1248784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249362">SUSE bug 1249362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252282">SUSE bug 1252282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252749">SUSE bug 1252749</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55212/">CVE-2025-55212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55212">CVE-2025-55212 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-55298/">CVE-2025-55298 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55298">CVE-2025-55298 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-57803/">CVE-2025-57803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57803">CVE-2025-57803 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-57807/">CVE-2025-57807 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57807">CVE-2025-57807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62171/">CVE-2025-62171 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62171">CVE-2025-62171 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62594/">CVE-2025-62594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62594">CVE-2025-62594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94374" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1234959" ref_url="https://bugzilla.suse.com/1234959" source="BUGZILLA"/>
		<reference ref_id="1245636" ref_url="https://bugzilla.suse.com/1245636" source="BUGZILLA"/>
		<reference ref_id="1245738" ref_url="https://bugzilla.suse.com/1245738" source="BUGZILLA"/>
		<reference ref_id="1245953" ref_url="https://bugzilla.suse.com/1245953" source="BUGZILLA"/>
		<reference ref_id="1246231" ref_url="https://bugzilla.suse.com/1246231" source="BUGZILLA"/>
		<reference ref_id="1247242" ref_url="https://bugzilla.suse.com/1247242" source="BUGZILLA"/>
		<reference ref_id="1249088" ref_url="https://bugzilla.suse.com/1249088" source="BUGZILLA"/>
		<reference ref_id="1249385" ref_url="https://bugzilla.suse.com/1249385" source="BUGZILLA"/>
		<reference ref_id="1252930" ref_url="https://bugzilla.suse.com/1252930" source="BUGZILLA"/>
		<reference ref_id="1252931" ref_url="https://bugzilla.suse.com/1252931" source="BUGZILLA"/>
		<reference ref_id="1252932" ref_url="https://bugzilla.suse.com/1252932" source="BUGZILLA"/>
		<reference ref_id="1252933" ref_url="https://bugzilla.suse.com/1252933" source="BUGZILLA"/>
		<reference ref_id="1252934" ref_url="https://bugzilla.suse.com/1252934" source="BUGZILLA"/>
		<reference ref_id="1252935" ref_url="https://bugzilla.suse.com/1252935" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56738" ref_url="https://www.suse.com/security/cve/CVE-2024-56738/" source="CVE"/>
		<reference ref_id="CVE-2025-54770" ref_url="https://www.suse.com/security/cve/CVE-2025-54770/" source="CVE"/>
		<reference ref_id="CVE-2025-54771" ref_url="https://www.suse.com/security/cve/CVE-2025-54771/" source="CVE"/>
		<reference ref_id="CVE-2025-61661" ref_url="https://www.suse.com/security/cve/CVE-2025-61661/" source="CVE"/>
		<reference ref_id="CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662/" source="CVE"/>
		<reference ref_id="CVE-2025-61663" ref_url="https://www.suse.com/security/cve/CVE-2025-61663/" source="CVE"/>
		<reference ref_id="CVE-2025-61664" ref_url="https://www.suse.com/security/cve/CVE-2025-61664/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Changes in grub2:

- CVE-2025-54771: Fixed grub_file_close() does not properly controls the fs refcount (bsc#1252931)
- CVE-2025-54770: Fixed missing unregister call for net_set_vlan command may lead to use-after-free  (bsc#1252930)
- CVE-2025-61662: Fixed missing unregister call for gettext command may lead to use-after-free (bsc#1252933)
- CVE-2025-61663: Fixed missing unregister call for normal commands may lead to use-after-free (bsc#1252934)
- CVE-2025-61664: Fixed missing unregister call for normal_exit command may lead to use-after-free (bsc#1252935)
- CVE-2025-61661: Fixed out-of-bounds write in grub_usb_get_string() function (bsc#1252932)

- Bump upstream SBAT generation to 6

- Fix "sparse file not allowed" error after grub2-reboot (bsc#1245738)
- Fix PowerPC network boot prefix to correctly locate grub.cfg (bsc#1249385)
- turn off page flipping for i386-pc using VBE video backend (bsc#1245636)
- Fix boot hangs in setting up serial console when ACPI SPCR table is present
  and redirection is disabled (bsc#1249088)
- Fix timeout when loading initrd via http after PPC CAS reboot (bsc#1245953)
- Skip mount point in grub_find_device function (bsc#1246231)

- CVE-2024-56738: Fixed side-channel attack due to not constant-time algorithm in grub_crypto_memcmp (bsc#1234959)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234959">SUSE bug 1234959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245636">SUSE bug 1245636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245738">SUSE bug 1245738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245953">SUSE bug 1245953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246231">SUSE bug 1246231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247242">SUSE bug 1247242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249088">SUSE bug 1249088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249385">SUSE bug 1249385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252930">SUSE bug 1252930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252931">SUSE bug 1252931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252932">SUSE bug 1252932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252933">SUSE bug 1252933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252934">SUSE bug 1252934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252935">SUSE bug 1252935</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56738/">CVE-2024-56738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56738">CVE-2024-56738 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54770/">CVE-2025-54770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54770">CVE-2025-54770 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54771/">CVE-2025-54771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54771">CVE-2025-54771 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="4.3/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61661/">CVE-2025-61661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61661">CVE-2025-61661 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61663/">CVE-2025-61663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61663">CVE-2025-61663 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61664/">CVE-2025-61664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61664">CVE-2025-61664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94375" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250232" ref_url="https://bugzilla.suse.com/1250232" source="BUGZILLA"/>
		<reference ref_id="1250233" ref_url="https://bugzilla.suse.com/1250233" source="BUGZILLA"/>
		<reference ref_id="1250234" ref_url="https://bugzilla.suse.com/1250234" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<reference ref_id="CVE-2025-9231" ref_url="https://www.suse.com/security/cve/CVE-2025-9231/" source="CVE"/>
		<reference ref_id="CVE-2025-9232" ref_url="https://www.suse.com/security/cve/CVE-2025-9232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2025-9230: Fixed out-of-bounds read &amp; write in RFC 3211 KEK unwrap (bsc#1250232)
- CVE-2025-9231: Fixedk timing side-channel in SM2 algorithm on 64 bit ARM (bsc#1250233)
- CVE-2025-9232: Fixed out-of-bounds read in HTTP client no_proxy handling (bsc#1250234)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250233">SUSE bug 1250233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250234">SUSE bug 1250234</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9231/">CVE-2025-9231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9231">CVE-2025-9231 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9232/">CVE-2025-9232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232">CVE-2025-9232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034152" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034154" comment="libopenssl3-x86-64-v3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034156" comment="openssl-3-doc-3.5.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034152" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034154" comment="libopenssl3-x86-64-v3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034156" comment="openssl-3-doc-3.5.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94376" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1230042" ref_url="https://bugzilla.suse.com/1230042" source="BUGZILLA"/>
		<reference ref_id="1250984" ref_url="https://bugzilla.suse.com/1250984" source="BUGZILLA"/>
		<reference ref_id="1253002" ref_url="https://bugzilla.suse.com/1253002" source="BUGZILLA"/>
		<reference ref_id="1254286" ref_url="https://bugzilla.suse.com/1254286" source="BUGZILLA"/>
		<reference ref_id="1254494" ref_url="https://bugzilla.suse.com/1254494" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11234" ref_url="https://www.suse.com/security/cve/CVE-2025-11234/" source="CVE"/>
		<reference ref_id="CVE-2025-12464" ref_url="https://www.suse.com/security/cve/CVE-2025-12464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023642.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Update to version 10.0.7.

Security issues fixed:

- CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious
  guest user to crash the QEMU process on the host (bsc#1253002).
- CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network
  access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984).

Other updates and bugfixes:

- Version 10.0.7:
  * kvm: Fix kvm_vm_ioctl() and kvm_device_ioctl() return value
  * docs/devel: Update URL for make-pullreq script
  * target/arm: Fix assert on BRA.
  * hw/aspeed/{xdma, rtc, sdhci}: Fix endianness to DEVICE_LITTLE_ENDIAN
  * hw/core/machine: Provide a description for aux-ram-share property
  * hw/pci: Make msix_init take a uint32_t for nentries
  * block/io_uring: avoid potentially getting stuck after resubmit at the end of ioq_submit()
  * block-backend: Fix race when resuming queued requests
  * ui/vnc: Fix qemu abort when query vnc info
  * chardev/char-pty: Do not ignore chr_write() failures
  * hw/display/exynos4210_fimd: Account for zero length in fimd_update_memory_section()
  * hw/arm/armv7m: Disable reentrancy guard for v7m_sysreg_ns_ops MRs
  * hw/arm/aspeed: Fix missing SPI IRQ connection causing DMA interrupt failure
  * migration: Fix transition to COLO state from precopy
  * Full backport list: https://lore.kernel.org/qemu-devel/1765037524.347582.2700543.nullmailer@tls.msk.ru/

- Version 10.0.6:
  * linux-user/microblaze: Fix little-endianness binary
  * target/hppa: correct size bit parity for fmpyadd
  * target/i386: user: do not set up a valid LDT on reset
  * async: access bottom half flags with qatomic_read
  * target/i386: fix x86_64 pushw op
  * i386/tcg/smm_helper: Properly apply DR values on SMM entry / exit
  * i386/cpu: Prevent delivering SIPI during SMM in TCG mode
  * i386/kvm: Expose ARCH_CAP_FB_CLEAR when invulnerable to MDS
  * target/i386: Fix CR2 handling for non-canonical addresses
  * block/curl.c: Use explicit long constants in curl_easy_setopt calls
  * pcie_sriov: Fix broken MMIO accesses from SR-IOV VFs
  * target/riscv: rvv: Fix vslide1[up|down].vx unexpected result when XLEN2 and SEWd
  * target/riscv: Fix ssamoswap error handling
  * Full backport list: https://lore.kernel.org/qemu-devel/1761022287.744330.6357.nullmailer@tls.msk.ru/

- Version 10.0.5:
  * tests/functional/test_aarch64_sbsaref_freebsd: Fix the URL of the ISO image
  * tests/functional/test_ppc_bamboo: Replace broken link with working assets
  * physmem: Destroy all CPU AddressSpaces on unrealize
  * memory: New AS helper to serialize destroy+free
  * include/system/memory.h: Clarify address_space_destroy() behaviour
  * migration: Fix state transition in postcopy_start() error handling
  * target/riscv: rvv: Modify minimum VLEN according to enabled vector extensions
  * target/riscv: rvv: Replace checking V by checking Zve32x
  * target/riscv: Fix endianness swap on compressed instructions
  * hw/riscv/riscv-iommu: Fixup PDT Nested Walk
  * Full backport list: https://lore.kernel.org/qemu-devel/1759986125.676506.643525.nullmailer@tls.msk.ru/

- [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286).
- [openSUSE][RPM] spec: make glusterfs support conditional (bsc#1254494).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230042">SUSE bug 1230042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250984">SUSE bug 1250984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253002">SUSE bug 1253002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254286">SUSE bug 1254286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254494">SUSE bug 1254494</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11234/">CVE-2025-11234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11234">CVE-2025-11234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12464/">CVE-2025-12464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12464">CVE-2025-12464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034877" comment="qemu-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034878" comment="qemu-SLOF-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035030" comment="qemu-arm-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035031" comment="qemu-audio-alsa-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035032" comment="qemu-audio-dbus-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035033" comment="qemu-audio-jack-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035034" comment="qemu-audio-oss-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035037" comment="qemu-block-curl-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035038" comment="qemu-block-dmg-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034881" comment="qemu-block-iscsi-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035039" comment="qemu-block-nfs-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034882" comment="qemu-block-ssh-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035042" comment="qemu-doc-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035043" comment="qemu-extra-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034884" comment="qemu-guest-agent-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035044" comment="qemu-headless-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034886" comment="qemu-hw-display-virtio-gpu-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034887" comment="qemu-hw-display-virtio-gpu-pci-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034888" comment="qemu-hw-display-virtio-vga-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035045" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034890" comment="qemu-hw-usb-host-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034891" comment="qemu-hw-usb-redirect-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035046" comment="qemu-hw-usb-smartcard-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034892" comment="qemu-img-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034893" comment="qemu-ipxe-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035047" comment="qemu-ivshmem-tools-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034894" comment="qemu-ksm-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034895" comment="qemu-lang-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035048" comment="qemu-linux-user-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035049" comment="qemu-microvm-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035050" comment="qemu-ppc-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034897" comment="qemu-pr-helper-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035051" comment="qemu-s390x-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034899" comment="qemu-seabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035052" comment="qemu-skiboot-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034900" comment="qemu-tools-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034903" comment="qemu-vgabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035058" comment="qemu-vhost-user-gpu-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034904" comment="qemu-vmsr-helper-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035059" comment="qemu-x86-10.0.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034877" comment="qemu-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034878" comment="qemu-SLOF-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035030" comment="qemu-arm-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035031" comment="qemu-audio-alsa-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035032" comment="qemu-audio-dbus-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035033" comment="qemu-audio-jack-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035034" comment="qemu-audio-oss-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035037" comment="qemu-block-curl-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035038" comment="qemu-block-dmg-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034881" comment="qemu-block-iscsi-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035039" comment="qemu-block-nfs-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034882" comment="qemu-block-ssh-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035042" comment="qemu-doc-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035043" comment="qemu-extra-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034884" comment="qemu-guest-agent-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035044" comment="qemu-headless-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034886" comment="qemu-hw-display-virtio-gpu-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034887" comment="qemu-hw-display-virtio-gpu-pci-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034888" comment="qemu-hw-display-virtio-vga-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035045" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034890" comment="qemu-hw-usb-host-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034891" comment="qemu-hw-usb-redirect-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035046" comment="qemu-hw-usb-smartcard-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034892" comment="qemu-img-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034893" comment="qemu-ipxe-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035047" comment="qemu-ivshmem-tools-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034894" comment="qemu-ksm-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034895" comment="qemu-lang-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035048" comment="qemu-linux-user-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035049" comment="qemu-microvm-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035050" comment="qemu-ppc-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034897" comment="qemu-pr-helper-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035051" comment="qemu-s390x-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034899" comment="qemu-seabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035052" comment="qemu-skiboot-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034900" comment="qemu-tools-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034903" comment="qemu-vgabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035058" comment="qemu-vhost-user-gpu-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034904" comment="qemu-vmsr-helper-10.0.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035059" comment="qemu-x86-10.0.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94377" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1235463" ref_url="https://bugzilla.suse.com/1235463" source="BUGZILLA"/>
		<reference ref_id="1243474" ref_url="https://bugzilla.suse.com/1243474" source="BUGZILLA"/>
		<reference ref_id="1245193" ref_url="https://bugzilla.suse.com/1245193" source="BUGZILLA"/>
		<reference ref_id="1245431" ref_url="https://bugzilla.suse.com/1245431" source="BUGZILLA"/>
		<reference ref_id="1245498" ref_url="https://bugzilla.suse.com/1245498" source="BUGZILLA"/>
		<reference ref_id="1245499" ref_url="https://bugzilla.suse.com/1245499" source="BUGZILLA"/>
		<reference ref_id="1246328" ref_url="https://bugzilla.suse.com/1246328" source="BUGZILLA"/>
		<reference ref_id="1246843" ref_url="https://bugzilla.suse.com/1246843" source="BUGZILLA"/>
		<reference ref_id="1247500" ref_url="https://bugzilla.suse.com/1247500" source="BUGZILLA"/>
		<reference ref_id="1248792" ref_url="https://bugzilla.suse.com/1248792" source="BUGZILLA"/>
		<reference ref_id="1249256" ref_url="https://bugzilla.suse.com/1249256" source="BUGZILLA"/>
		<reference ref_id="1249397" ref_url="https://bugzilla.suse.com/1249397" source="BUGZILLA"/>
		<reference ref_id="1249912" ref_url="https://bugzilla.suse.com/1249912" source="BUGZILLA"/>
		<reference ref_id="1249977" ref_url="https://bugzilla.suse.com/1249977" source="BUGZILLA"/>
		<reference ref_id="1249982" ref_url="https://bugzilla.suse.com/1249982" source="BUGZILLA"/>
		<reference ref_id="1250034" ref_url="https://bugzilla.suse.com/1250034" source="BUGZILLA"/>
		<reference ref_id="1250176" ref_url="https://bugzilla.suse.com/1250176" source="BUGZILLA"/>
		<reference ref_id="1250237" ref_url="https://bugzilla.suse.com/1250237" source="BUGZILLA"/>
		<reference ref_id="1250252" ref_url="https://bugzilla.suse.com/1250252" source="BUGZILLA"/>
		<reference ref_id="1250705" ref_url="https://bugzilla.suse.com/1250705" source="BUGZILLA"/>
		<reference ref_id="1250723" ref_url="https://bugzilla.suse.com/1250723" source="BUGZILLA"/>
		<reference ref_id="1250746" ref_url="https://bugzilla.suse.com/1250746" source="BUGZILLA"/>
		<reference ref_id="1251120" ref_url="https://bugzilla.suse.com/1251120" source="BUGZILLA"/>
		<reference ref_id="1251817" ref_url="https://bugzilla.suse.com/1251817" source="BUGZILLA"/>
		<reference ref_id="1252054" ref_url="https://bugzilla.suse.com/1252054" source="BUGZILLA"/>
		<reference ref_id="1252063" ref_url="https://bugzilla.suse.com/1252063" source="BUGZILLA"/>
		<reference ref_id="1252301" ref_url="https://bugzilla.suse.com/1252301" source="BUGZILLA"/>
		<reference ref_id="1252303" ref_url="https://bugzilla.suse.com/1252303" source="BUGZILLA"/>
		<reference ref_id="1252342" ref_url="https://bugzilla.suse.com/1252342" source="BUGZILLA"/>
		<reference ref_id="1252352" ref_url="https://bugzilla.suse.com/1252352" source="BUGZILLA"/>
		<reference ref_id="1252357" ref_url="https://bugzilla.suse.com/1252357" source="BUGZILLA"/>
		<reference ref_id="1252681" ref_url="https://bugzilla.suse.com/1252681" source="BUGZILLA"/>
		<reference ref_id="1252686" ref_url="https://bugzilla.suse.com/1252686" source="BUGZILLA"/>
		<reference ref_id="1252763" ref_url="https://bugzilla.suse.com/1252763" source="BUGZILLA"/>
		<reference ref_id="1252776" ref_url="https://bugzilla.suse.com/1252776" source="BUGZILLA"/>
		<reference ref_id="1252779" ref_url="https://bugzilla.suse.com/1252779" source="BUGZILLA"/>
		<reference ref_id="1252790" ref_url="https://bugzilla.suse.com/1252790" source="BUGZILLA"/>
		<reference ref_id="1252794" ref_url="https://bugzilla.suse.com/1252794" source="BUGZILLA"/>
		<reference ref_id="1252795" ref_url="https://bugzilla.suse.com/1252795" source="BUGZILLA"/>
		<reference ref_id="1252808" ref_url="https://bugzilla.suse.com/1252808" source="BUGZILLA"/>
		<reference ref_id="1252809" ref_url="https://bugzilla.suse.com/1252809" source="BUGZILLA"/>
		<reference ref_id="1252817" ref_url="https://bugzilla.suse.com/1252817" source="BUGZILLA"/>
		<reference ref_id="1252821" ref_url="https://bugzilla.suse.com/1252821" source="BUGZILLA"/>
		<reference ref_id="1252824" ref_url="https://bugzilla.suse.com/1252824" source="BUGZILLA"/>
		<reference ref_id="1252836" ref_url="https://bugzilla.suse.com/1252836" source="BUGZILLA"/>
		<reference ref_id="1252845" ref_url="https://bugzilla.suse.com/1252845" source="BUGZILLA"/>
		<reference ref_id="1252901" ref_url="https://bugzilla.suse.com/1252901" source="BUGZILLA"/>
		<reference ref_id="1252912" ref_url="https://bugzilla.suse.com/1252912" source="BUGZILLA"/>
		<reference ref_id="1252917" ref_url="https://bugzilla.suse.com/1252917" source="BUGZILLA"/>
		<reference ref_id="1252919" ref_url="https://bugzilla.suse.com/1252919" source="BUGZILLA"/>
		<reference ref_id="1252923" ref_url="https://bugzilla.suse.com/1252923" source="BUGZILLA"/>
		<reference ref_id="1252928" ref_url="https://bugzilla.suse.com/1252928" source="BUGZILLA"/>
		<reference ref_id="1253018" ref_url="https://bugzilla.suse.com/1253018" source="BUGZILLA"/>
		<reference ref_id="1253155" ref_url="https://bugzilla.suse.com/1253155" source="BUGZILLA"/>
		<reference ref_id="1253176" ref_url="https://bugzilla.suse.com/1253176" source="BUGZILLA"/>
		<reference ref_id="1253238" ref_url="https://bugzilla.suse.com/1253238" source="BUGZILLA"/>
		<reference ref_id="1253275" ref_url="https://bugzilla.suse.com/1253275" source="BUGZILLA"/>
		<reference ref_id="1253318" ref_url="https://bugzilla.suse.com/1253318" source="BUGZILLA"/>
		<reference ref_id="1253324" ref_url="https://bugzilla.suse.com/1253324" source="BUGZILLA"/>
		<reference ref_id="1253328" ref_url="https://bugzilla.suse.com/1253328" source="BUGZILLA"/>
		<reference ref_id="1253330" ref_url="https://bugzilla.suse.com/1253330" source="BUGZILLA"/>
		<reference ref_id="1253342" ref_url="https://bugzilla.suse.com/1253342" source="BUGZILLA"/>
		<reference ref_id="1253348" ref_url="https://bugzilla.suse.com/1253348" source="BUGZILLA"/>
		<reference ref_id="1253349" ref_url="https://bugzilla.suse.com/1253349" source="BUGZILLA"/>
		<reference ref_id="1253352" ref_url="https://bugzilla.suse.com/1253352" source="BUGZILLA"/>
		<reference ref_id="1253355" ref_url="https://bugzilla.suse.com/1253355" source="BUGZILLA"/>
		<reference ref_id="1253360" ref_url="https://bugzilla.suse.com/1253360" source="BUGZILLA"/>
		<reference ref_id="1253362" ref_url="https://bugzilla.suse.com/1253362" source="BUGZILLA"/>
		<reference ref_id="1253363" ref_url="https://bugzilla.suse.com/1253363" source="BUGZILLA"/>
		<reference ref_id="1253367" ref_url="https://bugzilla.suse.com/1253367" source="BUGZILLA"/>
		<reference ref_id="1253369" ref_url="https://bugzilla.suse.com/1253369" source="BUGZILLA"/>
		<reference ref_id="1253386" ref_url="https://bugzilla.suse.com/1253386" source="BUGZILLA"/>
		<reference ref_id="1253394" ref_url="https://bugzilla.suse.com/1253394" source="BUGZILLA"/>
		<reference ref_id="1253395" ref_url="https://bugzilla.suse.com/1253395" source="BUGZILLA"/>
		<reference ref_id="1253402" ref_url="https://bugzilla.suse.com/1253402" source="BUGZILLA"/>
		<reference ref_id="1253403" ref_url="https://bugzilla.suse.com/1253403" source="BUGZILLA"/>
		<reference ref_id="1253405" ref_url="https://bugzilla.suse.com/1253405" source="BUGZILLA"/>
		<reference ref_id="1253407" ref_url="https://bugzilla.suse.com/1253407" source="BUGZILLA"/>
		<reference ref_id="1253408" ref_url="https://bugzilla.suse.com/1253408" source="BUGZILLA"/>
		<reference ref_id="1253409" ref_url="https://bugzilla.suse.com/1253409" source="BUGZILLA"/>
		<reference ref_id="1253410" ref_url="https://bugzilla.suse.com/1253410" source="BUGZILLA"/>
		<reference ref_id="1253412" ref_url="https://bugzilla.suse.com/1253412" source="BUGZILLA"/>
		<reference ref_id="1253416" ref_url="https://bugzilla.suse.com/1253416" source="BUGZILLA"/>
		<reference ref_id="1253421" ref_url="https://bugzilla.suse.com/1253421" source="BUGZILLA"/>
		<reference ref_id="1253422" ref_url="https://bugzilla.suse.com/1253422" source="BUGZILLA"/>
		<reference ref_id="1253423" ref_url="https://bugzilla.suse.com/1253423" source="BUGZILLA"/>
		<reference ref_id="1253424" ref_url="https://bugzilla.suse.com/1253424" source="BUGZILLA"/>
		<reference ref_id="1253425" ref_url="https://bugzilla.suse.com/1253425" source="BUGZILLA"/>
		<reference ref_id="1253426" ref_url="https://bugzilla.suse.com/1253426" source="BUGZILLA"/>
		<reference ref_id="1253427" ref_url="https://bugzilla.suse.com/1253427" source="BUGZILLA"/>
		<reference ref_id="1253428" ref_url="https://bugzilla.suse.com/1253428" source="BUGZILLA"/>
		<reference ref_id="1253431" ref_url="https://bugzilla.suse.com/1253431" source="BUGZILLA"/>
		<reference ref_id="1253433" ref_url="https://bugzilla.suse.com/1253433" source="BUGZILLA"/>
		<reference ref_id="1253436" ref_url="https://bugzilla.suse.com/1253436" source="BUGZILLA"/>
		<reference ref_id="1253438" ref_url="https://bugzilla.suse.com/1253438" source="BUGZILLA"/>
		<reference ref_id="1253440" ref_url="https://bugzilla.suse.com/1253440" source="BUGZILLA"/>
		<reference ref_id="1253441" ref_url="https://bugzilla.suse.com/1253441" source="BUGZILLA"/>
		<reference ref_id="1253443" ref_url="https://bugzilla.suse.com/1253443" source="BUGZILLA"/>
		<reference ref_id="1253445" ref_url="https://bugzilla.suse.com/1253445" source="BUGZILLA"/>
		<reference ref_id="1253448" ref_url="https://bugzilla.suse.com/1253448" source="BUGZILLA"/>
		<reference ref_id="1253449" ref_url="https://bugzilla.suse.com/1253449" source="BUGZILLA"/>
		<reference ref_id="1253450" ref_url="https://bugzilla.suse.com/1253450" source="BUGZILLA"/>
		<reference ref_id="1253451" ref_url="https://bugzilla.suse.com/1253451" source="BUGZILLA"/>
		<reference ref_id="1253453" ref_url="https://bugzilla.suse.com/1253453" source="BUGZILLA"/>
		<reference ref_id="1253455" ref_url="https://bugzilla.suse.com/1253455" source="BUGZILLA"/>
		<reference ref_id="1253456" ref_url="https://bugzilla.suse.com/1253456" source="BUGZILLA"/>
		<reference ref_id="1253457" ref_url="https://bugzilla.suse.com/1253457" source="BUGZILLA"/>
		<reference ref_id="1253463" ref_url="https://bugzilla.suse.com/1253463" source="BUGZILLA"/>
		<reference ref_id="1253472" ref_url="https://bugzilla.suse.com/1253472" source="BUGZILLA"/>
		<reference ref_id="1253622" ref_url="https://bugzilla.suse.com/1253622" source="BUGZILLA"/>
		<reference ref_id="1253624" ref_url="https://bugzilla.suse.com/1253624" source="BUGZILLA"/>
		<reference ref_id="1253635" ref_url="https://bugzilla.suse.com/1253635" source="BUGZILLA"/>
		<reference ref_id="1253643" ref_url="https://bugzilla.suse.com/1253643" source="BUGZILLA"/>
		<reference ref_id="1253647" ref_url="https://bugzilla.suse.com/1253647" source="BUGZILLA"/>
		<reference ref_id="1254119" ref_url="https://bugzilla.suse.com/1254119" source="BUGZILLA"/>
		<reference ref_id="1254181" ref_url="https://bugzilla.suse.com/1254181" source="BUGZILLA"/>
		<reference ref_id="1254221" ref_url="https://bugzilla.suse.com/1254221" source="BUGZILLA"/>
		<reference ref_id="1254308" ref_url="https://bugzilla.suse.com/1254308" source="BUGZILLA"/>
		<reference ref_id="1254315" ref_url="https://bugzilla.suse.com/1254315" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50253" ref_url="https://www.suse.com/security/cve/CVE-2022-50253/" source="CVE"/>
		<reference ref_id="CVE-2025-37916" ref_url="https://www.suse.com/security/cve/CVE-2025-37916/" source="CVE"/>
		<reference ref_id="CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084/" source="CVE"/>
		<reference ref_id="CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085/" source="CVE"/>
		<reference ref_id="CVE-2025-38321" ref_url="https://www.suse.com/security/cve/CVE-2025-38321/" source="CVE"/>
		<reference ref_id="CVE-2025-38728" ref_url="https://www.suse.com/security/cve/CVE-2025-38728/" source="CVE"/>
		<reference ref_id="CVE-2025-39805" ref_url="https://www.suse.com/security/cve/CVE-2025-39805/" source="CVE"/>
		<reference ref_id="CVE-2025-39819" ref_url="https://www.suse.com/security/cve/CVE-2025-39819/" source="CVE"/>
		<reference ref_id="CVE-2025-39822" ref_url="https://www.suse.com/security/cve/CVE-2025-39822/" source="CVE"/>
		<reference ref_id="CVE-2025-39831" ref_url="https://www.suse.com/security/cve/CVE-2025-39831/" source="CVE"/>
		<reference ref_id="CVE-2025-39859" ref_url="https://www.suse.com/security/cve/CVE-2025-39859/" source="CVE"/>
		<reference ref_id="CVE-2025-39897" ref_url="https://www.suse.com/security/cve/CVE-2025-39897/" source="CVE"/>
		<reference ref_id="CVE-2025-39917" ref_url="https://www.suse.com/security/cve/CVE-2025-39917/" source="CVE"/>
		<reference ref_id="CVE-2025-39944" ref_url="https://www.suse.com/security/cve/CVE-2025-39944/" source="CVE"/>
		<reference ref_id="CVE-2025-39961" ref_url="https://www.suse.com/security/cve/CVE-2025-39961/" source="CVE"/>
		<reference ref_id="CVE-2025-39980" ref_url="https://www.suse.com/security/cve/CVE-2025-39980/" source="CVE"/>
		<reference ref_id="CVE-2025-39990" ref_url="https://www.suse.com/security/cve/CVE-2025-39990/" source="CVE"/>
		<reference ref_id="CVE-2025-40001" ref_url="https://www.suse.com/security/cve/CVE-2025-40001/" source="CVE"/>
		<reference ref_id="CVE-2025-40003" ref_url="https://www.suse.com/security/cve/CVE-2025-40003/" source="CVE"/>
		<reference ref_id="CVE-2025-40006" ref_url="https://www.suse.com/security/cve/CVE-2025-40006/" source="CVE"/>
		<reference ref_id="CVE-2025-40021" ref_url="https://www.suse.com/security/cve/CVE-2025-40021/" source="CVE"/>
		<reference ref_id="CVE-2025-40024" ref_url="https://www.suse.com/security/cve/CVE-2025-40024/" source="CVE"/>
		<reference ref_id="CVE-2025-40027" ref_url="https://www.suse.com/security/cve/CVE-2025-40027/" source="CVE"/>
		<reference ref_id="CVE-2025-40031" ref_url="https://www.suse.com/security/cve/CVE-2025-40031/" source="CVE"/>
		<reference ref_id="CVE-2025-40033" ref_url="https://www.suse.com/security/cve/CVE-2025-40033/" source="CVE"/>
		<reference ref_id="CVE-2025-40038" ref_url="https://www.suse.com/security/cve/CVE-2025-40038/" source="CVE"/>
		<reference ref_id="CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047/" source="CVE"/>
		<reference ref_id="CVE-2025-40053" ref_url="https://www.suse.com/security/cve/CVE-2025-40053/" source="CVE"/>
		<reference ref_id="CVE-2025-40055" ref_url="https://www.suse.com/security/cve/CVE-2025-40055/" source="CVE"/>
		<reference ref_id="CVE-2025-40059" ref_url="https://www.suse.com/security/cve/CVE-2025-40059/" source="CVE"/>
		<reference ref_id="CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064/" source="CVE"/>
		<reference ref_id="CVE-2025-40070" ref_url="https://www.suse.com/security/cve/CVE-2025-40070/" source="CVE"/>
		<reference ref_id="CVE-2025-40074" ref_url="https://www.suse.com/security/cve/CVE-2025-40074/" source="CVE"/>
		<reference ref_id="CVE-2025-40075" ref_url="https://www.suse.com/security/cve/CVE-2025-40075/" source="CVE"/>
		<reference ref_id="CVE-2025-40081" ref_url="https://www.suse.com/security/cve/CVE-2025-40081/" source="CVE"/>
		<reference ref_id="CVE-2025-40083" ref_url="https://www.suse.com/security/cve/CVE-2025-40083/" source="CVE"/>
		<reference ref_id="CVE-2025-40086" ref_url="https://www.suse.com/security/cve/CVE-2025-40086/" source="CVE"/>
		<reference ref_id="CVE-2025-40098" ref_url="https://www.suse.com/security/cve/CVE-2025-40098/" source="CVE"/>
		<reference ref_id="CVE-2025-40101" ref_url="https://www.suse.com/security/cve/CVE-2025-40101/" source="CVE"/>
		<reference ref_id="CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102/" source="CVE"/>
		<reference ref_id="CVE-2025-40105" ref_url="https://www.suse.com/security/cve/CVE-2025-40105/" source="CVE"/>
		<reference ref_id="CVE-2025-40107" ref_url="https://www.suse.com/security/cve/CVE-2025-40107/" source="CVE"/>
		<reference ref_id="CVE-2025-40109" ref_url="https://www.suse.com/security/cve/CVE-2025-40109/" source="CVE"/>
		<reference ref_id="CVE-2025-40110" ref_url="https://www.suse.com/security/cve/CVE-2025-40110/" source="CVE"/>
		<reference ref_id="CVE-2025-40111" ref_url="https://www.suse.com/security/cve/CVE-2025-40111/" source="CVE"/>
		<reference ref_id="CVE-2025-40115" ref_url="https://www.suse.com/security/cve/CVE-2025-40115/" source="CVE"/>
		<reference ref_id="CVE-2025-40116" ref_url="https://www.suse.com/security/cve/CVE-2025-40116/" source="CVE"/>
		<reference ref_id="CVE-2025-40118" ref_url="https://www.suse.com/security/cve/CVE-2025-40118/" source="CVE"/>
		<reference ref_id="CVE-2025-40120" ref_url="https://www.suse.com/security/cve/CVE-2025-40120/" source="CVE"/>
		<reference ref_id="CVE-2025-40121" ref_url="https://www.suse.com/security/cve/CVE-2025-40121/" source="CVE"/>
		<reference ref_id="CVE-2025-40127" ref_url="https://www.suse.com/security/cve/CVE-2025-40127/" source="CVE"/>
		<reference ref_id="CVE-2025-40129" ref_url="https://www.suse.com/security/cve/CVE-2025-40129/" source="CVE"/>
		<reference ref_id="CVE-2025-40132" ref_url="https://www.suse.com/security/cve/CVE-2025-40132/" source="CVE"/>
		<reference ref_id="CVE-2025-40133" ref_url="https://www.suse.com/security/cve/CVE-2025-40133/" source="CVE"/>
		<reference ref_id="CVE-2025-40134" ref_url="https://www.suse.com/security/cve/CVE-2025-40134/" source="CVE"/>
		<reference ref_id="CVE-2025-40135" ref_url="https://www.suse.com/security/cve/CVE-2025-40135/" source="CVE"/>
		<reference ref_id="CVE-2025-40139" ref_url="https://www.suse.com/security/cve/CVE-2025-40139/" source="CVE"/>
		<reference ref_id="CVE-2025-40140" ref_url="https://www.suse.com/security/cve/CVE-2025-40140/" source="CVE"/>
		<reference ref_id="CVE-2025-40141" ref_url="https://www.suse.com/security/cve/CVE-2025-40141/" source="CVE"/>
		<reference ref_id="CVE-2025-40142" ref_url="https://www.suse.com/security/cve/CVE-2025-40142/" source="CVE"/>
		<reference ref_id="CVE-2025-40149" ref_url="https://www.suse.com/security/cve/CVE-2025-40149/" source="CVE"/>
		<reference ref_id="CVE-2025-40153" ref_url="https://www.suse.com/security/cve/CVE-2025-40153/" source="CVE"/>
		<reference ref_id="CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154/" source="CVE"/>
		<reference ref_id="CVE-2025-40156" ref_url="https://www.suse.com/security/cve/CVE-2025-40156/" source="CVE"/>
		<reference ref_id="CVE-2025-40157" ref_url="https://www.suse.com/security/cve/CVE-2025-40157/" source="CVE"/>
		<reference ref_id="CVE-2025-40158" ref_url="https://www.suse.com/security/cve/CVE-2025-40158/" source="CVE"/>
		<reference ref_id="CVE-2025-40159" ref_url="https://www.suse.com/security/cve/CVE-2025-40159/" source="CVE"/>
		<reference ref_id="CVE-2025-40161" ref_url="https://www.suse.com/security/cve/CVE-2025-40161/" source="CVE"/>
		<reference ref_id="CVE-2025-40162" ref_url="https://www.suse.com/security/cve/CVE-2025-40162/" source="CVE"/>
		<reference ref_id="CVE-2025-40164" ref_url="https://www.suse.com/security/cve/CVE-2025-40164/" source="CVE"/>
		<reference ref_id="CVE-2025-40165" ref_url="https://www.suse.com/security/cve/CVE-2025-40165/" source="CVE"/>
		<reference ref_id="CVE-2025-40166" ref_url="https://www.suse.com/security/cve/CVE-2025-40166/" source="CVE"/>
		<reference ref_id="CVE-2025-40168" ref_url="https://www.suse.com/security/cve/CVE-2025-40168/" source="CVE"/>
		<reference ref_id="CVE-2025-40169" ref_url="https://www.suse.com/security/cve/CVE-2025-40169/" source="CVE"/>
		<reference ref_id="CVE-2025-40171" ref_url="https://www.suse.com/security/cve/CVE-2025-40171/" source="CVE"/>
		<reference ref_id="CVE-2025-40172" ref_url="https://www.suse.com/security/cve/CVE-2025-40172/" source="CVE"/>
		<reference ref_id="CVE-2025-40173" ref_url="https://www.suse.com/security/cve/CVE-2025-40173/" source="CVE"/>
		<reference ref_id="CVE-2025-40175" ref_url="https://www.suse.com/security/cve/CVE-2025-40175/" source="CVE"/>
		<reference ref_id="CVE-2025-40176" ref_url="https://www.suse.com/security/cve/CVE-2025-40176/" source="CVE"/>
		<reference ref_id="CVE-2025-40177" ref_url="https://www.suse.com/security/cve/CVE-2025-40177/" source="CVE"/>
		<reference ref_id="CVE-2025-40178" ref_url="https://www.suse.com/security/cve/CVE-2025-40178/" source="CVE"/>
		<reference ref_id="CVE-2025-40180" ref_url="https://www.suse.com/security/cve/CVE-2025-40180/" source="CVE"/>
		<reference ref_id="CVE-2025-40183" ref_url="https://www.suse.com/security/cve/CVE-2025-40183/" source="CVE"/>
		<reference ref_id="CVE-2025-40185" ref_url="https://www.suse.com/security/cve/CVE-2025-40185/" source="CVE"/>
		<reference ref_id="CVE-2025-40186" ref_url="https://www.suse.com/security/cve/CVE-2025-40186/" source="CVE"/>
		<reference ref_id="CVE-2025-40187" ref_url="https://www.suse.com/security/cve/CVE-2025-40187/" source="CVE"/>
		<reference ref_id="CVE-2025-40188" ref_url="https://www.suse.com/security/cve/CVE-2025-40188/" source="CVE"/>
		<reference ref_id="CVE-2025-40192" ref_url="https://www.suse.com/security/cve/CVE-2025-40192/" source="CVE"/>
		<reference ref_id="CVE-2025-40194" ref_url="https://www.suse.com/security/cve/CVE-2025-40194/" source="CVE"/>
		<reference ref_id="CVE-2025-40196" ref_url="https://www.suse.com/security/cve/CVE-2025-40196/" source="CVE"/>
		<reference ref_id="CVE-2025-40197" ref_url="https://www.suse.com/security/cve/CVE-2025-40197/" source="CVE"/>
		<reference ref_id="CVE-2025-40198" ref_url="https://www.suse.com/security/cve/CVE-2025-40198/" source="CVE"/>
		<reference ref_id="CVE-2025-40200" ref_url="https://www.suse.com/security/cve/CVE-2025-40200/" source="CVE"/>
		<reference ref_id="CVE-2025-40201" ref_url="https://www.suse.com/security/cve/CVE-2025-40201/" source="CVE"/>
		<reference ref_id="CVE-2025-40202" ref_url="https://www.suse.com/security/cve/CVE-2025-40202/" source="CVE"/>
		<reference ref_id="CVE-2025-40203" ref_url="https://www.suse.com/security/cve/CVE-2025-40203/" source="CVE"/>
		<reference ref_id="CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204/" source="CVE"/>
		<reference ref_id="CVE-2025-40205" ref_url="https://www.suse.com/security/cve/CVE-2025-40205/" source="CVE"/>
		<reference ref_id="CVE-2025-40206" ref_url="https://www.suse.com/security/cve/CVE-2025-40206/" source="CVE"/>
		<reference ref_id="CVE-2025-40207" ref_url="https://www.suse.com/security/cve/CVE-2025-40207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50253: bpf: make sure skb-&gt;len != 0 when redirecting to a tunneling device (bsc#1249912).
- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).
- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).
- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).
- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).
- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).
- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).
- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).
- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).
- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).
- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).
- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).
- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).
- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).
- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).
- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).
- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).
- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).
- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).
- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).
- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).
- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).
- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).
- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817).
- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).
- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).
- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).
- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).
- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).
- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).
- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).
- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).
- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).
- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).
- CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds (bsc#1252923).
- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).
- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).
- CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928).
- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).
- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).
- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).
- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).
- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).
- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).
- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).
- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).
- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).
- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).
- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).
- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).
- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).
- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-&gt;group_leader) in sys_prlimit64() paths (bsc#1253455).
- CVE-2025-40203: listmount: don't call path_put() under namespace semaphore (bsc#1253457).

The following non security issues were fixed:

- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).
- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).
- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a
  proper watchdog interface and has many code issues. It only handles
  obscure and obsolete hardware. Stop building and supporting this driver
  (jsc#PED-14062).
- Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds" (bsc#1252923)
- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).
- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).
- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).
- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).
- KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352).
- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).
- PCI/ERR: Update device error_state already after reset (stable-fixes).
- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).
- Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes).
- Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes).
- Update config files: enable zstd module decompression (jsc#PED-14115).
- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).
- btrfs: do not clear read-only when adding sprout device (bsc#1253238).
- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).
- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)
- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).
- drm/amd/display: update color on atomic commit time (stable-fixes).
- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).
- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).
- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).
- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).
- mount: handle NULL values in mnt_ns_release() (bsc#1254308)
- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).
- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).
- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).
- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).
- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).
- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).
- net: phy: realtek: improve mmd register access for internal PHY's (jsc#PED-14353).
- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).
- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).
- net: phy: realtek: use string choices helpers (jsc#PED-14353).
- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)
- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)
- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)
- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).
- nvmet-auth: update sc_c in target host hash calculation (git-fixes).
- perf list: Add IBM z17 event descriptions (jsc#PED-13611).
- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).
- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).
- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).
- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).
- r8169: add support for Intel Killer E5000 (jsc#PED-14353).
- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).
- r8169: add support for RTL8125D rev.b (jsc#PED-14353).
- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).
- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).
- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).
- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).
- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).
- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).
- r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353).
- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).
- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).
- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).
- r8169: implement additional ethtool stats ops (jsc#PED-14353).
- r8169: improve __rtl8169_set_wol (jsc#PED-14353).
- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).
- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).
- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).
- r8169: remove leftover locks after reverted change (jsc#PED-14353).
- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).
- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).
- r8169: remove support for chip version 11 (jsc#PED-14353).
- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).
- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).
- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).
- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).
- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).
- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).
- sched/fair: Get rid of sched_domains_curr_level hack for tl-&gt;cpumask() (bsc#1246843).
- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).
- sched/fair: Proportional newidle balance (bsc#1248792).
- sched/fair: Proportional newidle balance -KABI (bsc#1248792).
- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).
- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).
- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).
- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).
- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).
- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).
- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).
- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).
- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).
- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).
- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).
- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).
- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)
- spi: tegra210-quad: Fix timeout handling (bsc#1253155)
- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)
- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)
- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-&gt;cork (bsc#1250705).
- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).
- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).
- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).
- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).
- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).
- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).
- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).
- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).
- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).
- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).
- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).
- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).
- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).
- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).
- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).
- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).
- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).
- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).
- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).
- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).
- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1235463">SUSE bug 1235463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243474">SUSE bug 1243474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245193">SUSE bug 1245193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245431">SUSE bug 1245431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245498">SUSE bug 1245498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245499">SUSE bug 1245499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246328">SUSE bug 1246328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246843">SUSE bug 1246843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247500">SUSE bug 1247500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248792">SUSE bug 1248792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249256">SUSE bug 1249256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249397">SUSE bug 1249397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249912">SUSE bug 1249912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249977">SUSE bug 1249977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249982">SUSE bug 1249982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250034">SUSE bug 1250034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250176">SUSE bug 1250176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250237">SUSE bug 1250237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250252">SUSE bug 1250252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250705">SUSE bug 1250705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250723">SUSE bug 1250723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250746">SUSE bug 1250746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251120">SUSE bug 1251120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251817">SUSE bug 1251817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252054">SUSE bug 1252054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252063">SUSE bug 1252063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252301">SUSE bug 1252301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252303">SUSE bug 1252303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252342">SUSE bug 1252342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252352">SUSE bug 1252352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252357">SUSE bug 1252357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252681">SUSE bug 1252681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252686">SUSE bug 1252686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252763">SUSE bug 1252763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252776">SUSE bug 1252776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252779">SUSE bug 1252779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252790">SUSE bug 1252790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252794">SUSE bug 1252794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252795">SUSE bug 1252795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252808">SUSE bug 1252808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252809">SUSE bug 1252809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252817">SUSE bug 1252817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252821">SUSE bug 1252821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252824">SUSE bug 1252824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252836">SUSE bug 1252836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252845">SUSE bug 1252845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252901">SUSE bug 1252901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252912">SUSE bug 1252912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252917">SUSE bug 1252917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252919">SUSE bug 1252919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252923">SUSE bug 1252923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252928">SUSE bug 1252928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253018">SUSE bug 1253018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253155">SUSE bug 1253155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253176">SUSE bug 1253176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253238">SUSE bug 1253238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253275">SUSE bug 1253275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253318">SUSE bug 1253318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253324">SUSE bug 1253324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253328">SUSE bug 1253328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253330">SUSE bug 1253330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253342">SUSE bug 1253342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253348">SUSE bug 1253348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253349">SUSE bug 1253349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253352">SUSE bug 1253352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253355">SUSE bug 1253355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253360">SUSE bug 1253360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253362">SUSE bug 1253362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253363">SUSE bug 1253363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253367">SUSE bug 1253367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253369">SUSE bug 1253369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253386">SUSE bug 1253386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253394">SUSE bug 1253394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253395">SUSE bug 1253395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253402">SUSE bug 1253402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253403">SUSE bug 1253403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253405">SUSE bug 1253405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253407">SUSE bug 1253407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253408">SUSE bug 1253408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253409">SUSE bug 1253409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253410">SUSE bug 1253410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253412">SUSE bug 1253412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253416">SUSE bug 1253416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253421">SUSE bug 1253421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253422">SUSE bug 1253422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253423">SUSE bug 1253423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253424">SUSE bug 1253424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253425">SUSE bug 1253425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253426">SUSE bug 1253426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253427">SUSE bug 1253427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253428">SUSE bug 1253428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253431">SUSE bug 1253431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253433">SUSE bug 1253433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253436">SUSE bug 1253436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253438">SUSE bug 1253438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253440">SUSE bug 1253440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253441">SUSE bug 1253441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253443">SUSE bug 1253443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253445">SUSE bug 1253445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253448">SUSE bug 1253448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253449">SUSE bug 1253449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253450">SUSE bug 1253450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253451">SUSE bug 1253451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253453">SUSE bug 1253453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253455">SUSE bug 1253455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253456">SUSE bug 1253456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253457">SUSE bug 1253457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253463">SUSE bug 1253463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253472">SUSE bug 1253472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253622">SUSE bug 1253622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253624">SUSE bug 1253624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253635">SUSE bug 1253635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253643">SUSE bug 1253643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253647">SUSE bug 1253647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254119">SUSE bug 1254119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254181">SUSE bug 1254181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254221">SUSE bug 1254221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254308">SUSE bug 1254308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254315">SUSE bug 1254315</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50253/">CVE-2022-50253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50253">CVE-2022-50253 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37916/">CVE-2025-37916 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38321/">CVE-2025-38321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38321">CVE-2025-38321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38728/">CVE-2025-38728 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39805/">CVE-2025-39805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39805">CVE-2025-39805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39819/">CVE-2025-39819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39819">CVE-2025-39819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39822/">CVE-2025-39822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39822">CVE-2025-39822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39831/">CVE-2025-39831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39831">CVE-2025-39831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39859/">CVE-2025-39859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39859">CVE-2025-39859 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39897/">CVE-2025-39897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39897">CVE-2025-39897 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39917/">CVE-2025-39917 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39917">CVE-2025-39917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39944/">CVE-2025-39944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944">CVE-2025-39944 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39961/">CVE-2025-39961 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961">CVE-2025-39961 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39980/">CVE-2025-39980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39980">CVE-2025-39980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39990/">CVE-2025-39990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39990">CVE-2025-39990 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40001/">CVE-2025-40001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40001">CVE-2025-40001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40003/">CVE-2025-40003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40003">CVE-2025-40003 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40006/">CVE-2025-40006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40006">CVE-2025-40006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40021/">CVE-2025-40021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40021">CVE-2025-40021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40024/">CVE-2025-40024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40024">CVE-2025-40024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40027/">CVE-2025-40027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40031/">CVE-2025-40031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40033/">CVE-2025-40033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40038/">CVE-2025-40038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40053/">CVE-2025-40053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40055/">CVE-2025-40055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40059/">CVE-2025-40059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40070/">CVE-2025-40070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40074/">CVE-2025-40074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40074">CVE-2025-40074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40075/">CVE-2025-40075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40075">CVE-2025-40075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40081/">CVE-2025-40081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40083/">CVE-2025-40083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40083">CVE-2025-40083 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40086/">CVE-2025-40086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40086">CVE-2025-40086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40098/">CVE-2025-40098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40098">CVE-2025-40098 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40101/">CVE-2025-40101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40105/">CVE-2025-40105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40107/">CVE-2025-40107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40107">CVE-2025-40107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40109/">CVE-2025-40109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40109">CVE-2025-40109 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40110/">CVE-2025-40110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40110">CVE-2025-40110 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40111/">CVE-2025-40111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40111">CVE-2025-40111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40115/">CVE-2025-40115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40115">CVE-2025-40115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40116/">CVE-2025-40116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40116">CVE-2025-40116 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40118/">CVE-2025-40118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40118">CVE-2025-40118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40120/">CVE-2025-40120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40120">CVE-2025-40120 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40121/">CVE-2025-40121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40121">CVE-2025-40121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40127/">CVE-2025-40127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40127">CVE-2025-40127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40129/">CVE-2025-40129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40129">CVE-2025-40129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40132/">CVE-2025-40132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40132">CVE-2025-40132 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40133/">CVE-2025-40133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40133">CVE-2025-40133 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40134/">CVE-2025-40134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40134">CVE-2025-40134 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40135/">CVE-2025-40135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40135">CVE-2025-40135 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40139/">CVE-2025-40139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40139">CVE-2025-40139 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40140/">CVE-2025-40140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40140">CVE-2025-40140 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40141/">CVE-2025-40141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40141">CVE-2025-40141 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40142/">CVE-2025-40142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40142">CVE-2025-40142 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40149/">CVE-2025-40149 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40149">CVE-2025-40149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40153/">CVE-2025-40153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40153">CVE-2025-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40156/">CVE-2025-40156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40156">CVE-2025-40156 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40157/">CVE-2025-40157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40157">CVE-2025-40157 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40158/">CVE-2025-40158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40158">CVE-2025-40158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40159/">CVE-2025-40159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40159">CVE-2025-40159 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40161/">CVE-2025-40161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40161">CVE-2025-40161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40162/">CVE-2025-40162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40162">CVE-2025-40162 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40164/">CVE-2025-40164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40164">CVE-2025-40164 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40165/">CVE-2025-40165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40165">CVE-2025-40165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40166/">CVE-2025-40166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40166">CVE-2025-40166 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40168/">CVE-2025-40168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40168">CVE-2025-40168 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40169/">CVE-2025-40169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40169">CVE-2025-40169 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40171/">CVE-2025-40171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40171">CVE-2025-40171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40172/">CVE-2025-40172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40172">CVE-2025-40172 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40173/">CVE-2025-40173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40173">CVE-2025-40173 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40175/">CVE-2025-40175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40175">CVE-2025-40175 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40176/">CVE-2025-40176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40177/">CVE-2025-40177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40177">CVE-2025-40177 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40178/">CVE-2025-40178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40178">CVE-2025-40178 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40180/">CVE-2025-40180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40180">CVE-2025-40180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40183/">CVE-2025-40183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40183">CVE-2025-40183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40185/">CVE-2025-40185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40185">CVE-2025-40185 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40186/">CVE-2025-40186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40186">CVE-2025-40186 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40187/">CVE-2025-40187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40187">CVE-2025-40187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40188/">CVE-2025-40188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40188">CVE-2025-40188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40192/">CVE-2025-40192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40192">CVE-2025-40192 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40194/">CVE-2025-40194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40194">CVE-2025-40194 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40196/">CVE-2025-40196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40196">CVE-2025-40196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40197/">CVE-2025-40197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40197">CVE-2025-40197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40198/">CVE-2025-40198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40198">CVE-2025-40198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40200/">CVE-2025-40200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40200">CVE-2025-40200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40201/">CVE-2025-40201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40201">CVE-2025-40201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40202/">CVE-2025-40202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40202">CVE-2025-40202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40203/">CVE-2025-40203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40203">CVE-2025-40203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40205/">CVE-2025-40205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40205">CVE-2025-40205 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40206/">CVE-2025-40206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40206">CVE-2025-40206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40207/">CVE-2025-40207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40207">CVE-2025-40207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036932" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036933" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036934" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036932" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036933" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036934" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94378" version="1" class="patch">
	<metadata>
		<title>Security update for fontforge (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252652" ref_url="https://bugzilla.suse.com/1252652" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-50949" ref_url="https://www.suse.com/security/cve/CVE-2025-50949/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023726.html" source="SUSE-SU"/>
		<description>
This update for fontforge fixes the following issues:

- CVE-2025-50949: Fixed memory leak in function DlgCreate8 (bsc#1252652).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-22"/>
	<updated date="2025-12-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1252652">SUSE bug 1252652</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50949/">CVE-2025-50949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50949">CVE-2025-50949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035126" comment="fontforge-20230101-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035127" comment="fontforge-devel-20230101-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035128" comment="fontforge-doc-20230101-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035126" comment="fontforge-20230101-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035127" comment="fontforge-devel-20230101-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035128" comment="fontforge-doc-20230101-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94379" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1243040" ref_url="https://bugzilla.suse.com/1243040" source="BUGZILLA"/>
		<reference ref_id="1252162" ref_url="https://bugzilla.suse.com/1252162" source="BUGZILLA"/>
		<reference ref_id="1254313" ref_url="https://bugzilla.suse.com/1254313" source="BUGZILLA"/>
		<reference ref_id="1254476" ref_url="https://bugzilla.suse.com/1254476" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023725.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 11.8.5:
  * CVE-2025-13699: Fixed Directory Traversal Remote Code Execution
    Vulnerability (bsc#1254313)

Other fixes:

- Add %license tags to license files (bsc#1252162)
- Add INSTALL_DOCREADMEDIR cmake flag to install readme and license files
- Remove client plugin parsec.so, it is shipped by libmariadb_plugins
  (bsc#1243040, bsc#1254476)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-22"/>
	<updated date="2025-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243040">SUSE bug 1243040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252162">SUSE bug 1252162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254313">SUSE bug 1254313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254476">SUSE bug 1254476</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035129" comment="libmariadbd-devel-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035130" comment="libmariadbd19-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035131" comment="mariadb-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035132" comment="mariadb-bench-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035133" comment="mariadb-client-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035134" comment="mariadb-errormessages-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035138" comment="mariadb-tools-11.8.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035129" comment="libmariadbd-devel-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035130" comment="libmariadbd19-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035131" comment="mariadb-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035132" comment="mariadb-bench-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035133" comment="mariadb-client-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035134" comment="mariadb-errormessages-11.8.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035138" comment="mariadb-tools-11.8.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94380" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244325" ref_url="https://bugzilla.suse.com/1244325" source="BUGZILLA"/>
		<reference ref_id="1251827" ref_url="https://bugzilla.suse.com/1251827" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023724.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

- CVE-2025-11561: Fixed default Kerberos configuration allowing privilege
  escalation on AD-joined Linux systems (bsc#1244325)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1244325">SUSE bug 1244325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251827">SUSE bug 1251827</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035629" comment="libipa_hbac-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035630" comment="libipa_hbac0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035631" comment="libnfsidmap-sss-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035632" comment="libsss_certmap-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035633" comment="libsss_certmap0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035634" comment="libsss_idmap-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035635" comment="libsss_idmap0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035636" comment="libsss_nss_idmap-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035637" comment="libsss_nss_idmap0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035638" comment="python3-ipa_hbac-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035639" comment="python3-sss-murmur-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035640" comment="python3-sss_nss_idmap-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035641" comment="python3-sssd-config-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035642" comment="sssd-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035643" comment="sssd-ad-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035645" comment="sssd-dbus-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035646" comment="sssd-ipa-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035647" comment="sssd-kcm-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035648" comment="sssd-krb5-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035649" comment="sssd-krb5-common-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035650" comment="sssd-ldap-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035651" comment="sssd-proxy-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035652" comment="sssd-tools-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035653" comment="sssd-winbind-idmap-2.9.5-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035629" comment="libipa_hbac-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035630" comment="libipa_hbac0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035631" comment="libnfsidmap-sss-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035632" comment="libsss_certmap-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035633" comment="libsss_certmap0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035634" comment="libsss_idmap-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035635" comment="libsss_idmap0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035636" comment="libsss_nss_idmap-devel-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035637" comment="libsss_nss_idmap0-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035638" comment="python3-ipa_hbac-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035639" comment="python3-sss-murmur-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035640" comment="python3-sss_nss_idmap-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035641" comment="python3-sssd-config-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035642" comment="sssd-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035643" comment="sssd-ad-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035645" comment="sssd-dbus-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035646" comment="sssd-ipa-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035647" comment="sssd-kcm-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035648" comment="sssd-krb5-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035649" comment="sssd-krb5-common-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035650" comment="sssd-ldap-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035651" comment="sssd-proxy-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035652" comment="sssd-tools-2.9.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035653" comment="sssd-winbind-idmap-2.9.5-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94381" version="1" class="patch">
	<metadata>
		<title>Security update of valkey (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250995" ref_url="https://bugzilla.suse.com/1250995" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
		<description>
This update for valkey fixes the following issues:

Update to 8.0.6:

  - Security fixes:

    - CVE-2025-49844: Fixed that a Lua script may lead to remote code execution (bsc#1250995)
    - CVE-2025-46817: Fixed that a Lua script may lead to integer overflow and potential RCE (bsc#1250995)
    - CVE-2025-46818: Fixed that a Lua script can be executed in the context of another user (bsc#1250995)
    - CVE-2025-46819: Fixed LUA out-of-bound read (bsc#1250995)

  - Bug fixes:
  
    * Fix accounting for dual channel RDB bytes in replication stats (#2614)
    * Fix EVAL to report unknown error when empty error table is provided (#2229)
    * Fix use-after-free when active expiration triggers hashtable to shrink (#2257)
    * Fix MEMORY USAGE to account for embedded keys (#2290)
    * Fix memory leak when shrinking a hashtable without entries (#2288)
    * Prevent potential assertion in active defrag handling large allocations (#2353)
    * Prevent bad memory access when NOTOUCH client gets unblocked (#2347)
    * Converge divergent shard-id persisted in nodes.conf to primary's shard id (#2174)
    * Fix client tracking memory overhead calculation (#2360)
    * Fix RDB load per slot memory pre-allocation when loading from RDB snapshot (#2466)
    * Don't use AVX2 instructions if the CPU doesn't support it (#2571)
    * Fix bug where active defrag may be unable to defrag sparsely filled pages (#2656)

Changes from 8.0.5:

  https://github.com/valkey-io/valkey/releases/tag/8.0.5

		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-01-07"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037150" comment="valkey-8.0.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037151" comment="valkey-compat-redis-8.0.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037152" comment="valkey-devel-8.0.6-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037150" comment="valkey-8.0.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037151" comment="valkey-compat-redis-8.0.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037152" comment="valkey-devel-8.0.6-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94382" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1233421" ref_url="https://bugzilla.suse.com/1233421" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52615" ref_url="https://www.suse.com/security/cve/CVE-2024-52615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023777.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2024-52615: Fixed DNS spoofing (bsc#1233421)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233421">SUSE bug 1233421</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52615/">CVE-2024-52615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52615">CVE-2024-52615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037153" comment="avahi-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037154" comment="avahi-autoipd-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037156" comment="avahi-compat-mDNSResponder-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037157" comment="avahi-lang-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037158" comment="avahi-utils-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037159" comment="avahi-utils-gtk-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037160" comment="libavahi-client3-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037161" comment="libavahi-common3-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037162" comment="libavahi-core7-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037163" comment="libavahi-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037164" comment="libavahi-glib-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037165" comment="libavahi-glib1-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037166" comment="libavahi-gobject-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037167" comment="libavahi-gobject0-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037168" comment="libavahi-libevent1-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037171" comment="libavahi-ui-gtk3-0-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037172" comment="libdns_sd-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037173" comment="libhowl0-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037174" comment="python3-avahi-gtk-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037175" comment="python313-avahi-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037176" comment="typelib-1_0-Avahi-0_6-0.8-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037153" comment="avahi-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037154" comment="avahi-autoipd-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037156" comment="avahi-compat-mDNSResponder-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037157" comment="avahi-lang-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037158" comment="avahi-utils-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037159" comment="avahi-utils-gtk-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037160" comment="libavahi-client3-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037161" comment="libavahi-common3-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037162" comment="libavahi-core7-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037163" comment="libavahi-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037164" comment="libavahi-glib-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037165" comment="libavahi-glib1-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037166" comment="libavahi-gobject-devel-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037167" comment="libavahi-gobject0-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037168" comment="libavahi-libevent1-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037171" comment="libavahi-ui-gtk3-0-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037172" comment="libdns_sd-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037173" comment="libhowl0-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037174" comment="python3-avahi-gtk-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037175" comment="python313-avahi-0.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037176" comment="typelib-1_0-Avahi-0_6-0.8-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94383" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254551" ref_url="https://bugzilla.suse.com/1254551" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Changes in MozillaFirefox:

Firefox Extended Support Release 140.6.0 ESR was released:

* Fixed: Various security fixes.

MFSA 2025-94 (bsc#1254551):

  * CVE-2025-14321: Use-after-free in the WebRTC: Signaling component
  * CVE-2025-14322: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component
  * CVE-2025-14323: Privilege escalation in the DOM: Notifications component
  * CVE-2025-14324: JIT miscompilation in the JavaScript Engine: JIT component
  * CVE-2025-14325: JIT miscompilation in the JavaScript Engine: JIT component
  * CVE-2025-14328: Privilege escalation in the Netmonitor component
  * CVE-2025-14329: Privilege escalation in the Netmonitor component
  * CVE-2025-14330: JIT miscompilation in the JavaScript Engine: JIT component
  * CVE-2025-14331: Same-origin policy bypass in the Request Handling component
  * CVE-2025-14333: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94384" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254903" ref_url="https://bugzilla.suse.com/1254903" source="BUGZILLA"/>
		<reference ref_id="1254904" ref_url="https://bugzilla.suse.com/1254904" source="BUGZILLA"/>
		<reference ref_id="1254905" ref_url="https://bugzilla.suse.com/1254905" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-67724" ref_url="https://www.suse.com/security/cve/CVE-2025-67724/" source="CVE"/>
		<reference ref_id="CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725/" source="CVE"/>
		<reference ref_id="CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023776.html" source="SUSE-SU"/>
		<description>
This update for python-tornado6 fixes the following issues:

- CVE-2025-67724: unescaped `reason` argument used in HTTP headers and in HTML default error pages can be used by
  attackers to launch header injection or XSS attacks (bsc#1254903).
- CVE-2025-67725: quadratic complexity of string concatenation operations used by the `HTTPHeaders.add` method can lead
  o DoS when processing a maliciously crafted HTTP request (bsc#1254905).
- CVE-2025-67726: quadratic complexity algorithm used in the `_parseparam` function of `httputil.py` can lead to DoS
  when processing maliciously crafted parameters in a `Content-Disposition` header (bsc#1254904).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254903">SUSE bug 1254903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254904">SUSE bug 1254904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254905">SUSE bug 1254905</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67724/">CVE-2025-67724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67724">CVE-2025-67724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94385" version="1" class="patch">
	<metadata>
		<title>Security update for libmicrohttpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253177" ref_url="https://bugzilla.suse.com/1253177" source="BUGZILLA"/>
		<reference ref_id="1253178" ref_url="https://bugzilla.suse.com/1253178" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-59777" ref_url="https://www.suse.com/security/cve/CVE-2025-59777/" source="CVE"/>
		<reference ref_id="CVE-2025-62689" ref_url="https://www.suse.com/security/cve/CVE-2025-62689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023775.html" source="SUSE-SU"/>
		<description>
This update for libmicrohttpd fixes the following issues:

- CVE-2025-62689: Fixed heap-based buffer overflow through
  a specially crafted packet (bsc#1253178)
- CVE-2025-59777: Fixed NULL pointer dereference through
  a specially crafted packet (bsc#1253177)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253177">SUSE bug 1253177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253178">SUSE bug 1253178</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59777/">CVE-2025-59777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59777">CVE-2025-59777 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-62689/">CVE-2025-62689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62689">CVE-2025-62689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037183" comment="libmicrohttpd-devel-1.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037184" comment="libmicrohttpd12-1.0.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037183" comment="libmicrohttpd-devel-1.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037184" comment="libmicrohttpd12-1.0.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94386" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254157" ref_url="https://bugzilla.suse.com/1254157" source="BUGZILLA"/>
		<reference ref_id="1254158" ref_url="https://bugzilla.suse.com/1254158" source="BUGZILLA"/>
		<reference ref_id="1254159" ref_url="https://bugzilla.suse.com/1254159" source="BUGZILLA"/>
		<reference ref_id="1254160" ref_url="https://bugzilla.suse.com/1254160" source="BUGZILLA"/>
		<reference ref_id="1254480" ref_url="https://bugzilla.suse.com/1254480" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-64505" ref_url="https://www.suse.com/security/cve/CVE-2025-64505/" source="CVE"/>
		<reference ref_id="CVE-2025-64506" ref_url="https://www.suse.com/security/cve/CVE-2025-64506/" source="CVE"/>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

- CVE-2025-64505: heap buffer over-read in `png_do_quantize` when processing PNG files malformed palette indices
  (bsc#1254157).
- CVE-2025-64506: heap buffer over-read in `png_write_image_8bit` when processing 8-bit input with `convert_to_8bit`
  enabled (bsc#1254158).
- CVE-2025-64720: out-of-bounds read in `png_image_read_composite` when processing palette images with
  `PNG_FLAG_OPTIMIZE_ALPHA` enabled (bsc#1254159).
- CVE-2025-65018: heap buffer overflow in `png_image_finish_read` when processing specially crafted 16-bit interlaced
  PNGs with 8-bit output format (bsc#1254160).
- CVE-2025-66293: out-of-bounds read of the `png_sRGB_base` array when processing palette PNG images with partial
  transparency and gamma correction (bsc#1254480).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254157">SUSE bug 1254157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254158">SUSE bug 1254158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254159">SUSE bug 1254159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254160">SUSE bug 1254160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254480">SUSE bug 1254480</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64505/">CVE-2025-64505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64505">CVE-2025-64505 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64506/">CVE-2025-64506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64506">CVE-2025-64506 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037186" comment="libpng16-16-x86-64-v3-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037187" comment="libpng16-compat-devel-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037188" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037189" comment="libpng16-devel-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037190" comment="libpng16-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037191" comment="libpng16-tools-1.6.44-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037186" comment="libpng16-16-x86-64-v3-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037187" comment="libpng16-compat-devel-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037188" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037189" comment="libpng16-devel-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037190" comment="libpng16-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037191" comment="libpng16-tools-1.6.44-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94387" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249055" ref_url="https://bugzilla.suse.com/1249055" source="BUGZILLA"/>
		<reference ref_id="1254297" ref_url="https://bugzilla.suse.com/1254297" source="BUGZILLA"/>
		<reference ref_id="1254662" ref_url="https://bugzilla.suse.com/1254662" source="BUGZILLA"/>
		<reference ref_id="1254878" ref_url="https://bugzilla.suse.com/1254878" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601/" source="CVE"/>
		<reference ref_id="CVE-2025-14087" ref_url="https://www.suse.com/security/cve/CVE-2025-14087/" source="CVE"/>
		<reference ref_id="CVE-2025-14512" ref_url="https://www.suse.com/security/cve/CVE-2025-14512/" source="CVE"/>
		<reference ref_id="CVE-2025-7039" ref_url="https://www.suse.com/security/cve/CVE-2025-7039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Update to version 2.84.4.

Security issues fixed:

- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote
  filesystem attribute values can lead to denial-of-service (bsc#1254878).
- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when
  processing attacker-influenced data may lead to crash or code execution (bsc#1254662).
- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a
  large number of unacceptable characters may lead to crash or code execution (bsc#1254297).
- CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be
  used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055).

Other issues fixed and changes:

- Fix GFile leak in `g_local_file_set_display_name` during error handling.
- Fix incorrect output parameter handling in closure helper of `g_settings_bind_with_mapping_closures`.
- `gfileutils`: fix computation of temporary file name.
- Fix GFile leak in  `g_local_file_set_display_name()`.
- `gthreadpool`: catch `pool_spawner` creation failure.
- `gio/filenamecompleter`: fix leaks.
- `gfilenamecompleter`: fix `g_object_unref()` of undefined value.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249055">SUSE bug 1249055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254297">SUSE bug 1254297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254662">SUSE bug 1254662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254878">SUSE bug 1254878</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14087/">CVE-2025-14087 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14087">CVE-2025-14087 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14512/">CVE-2025-14512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14512">CVE-2025-14512 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7039/">CVE-2025-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7039">CVE-2025-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037475" comment="gio-branding-SLE-16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037193" comment="glib2-devel-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037194" comment="glib2-devel-static-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037195" comment="glib2-doc-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037196" comment="glib2-lang-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037204" comment="libgthread-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037205" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037207" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037475" comment="gio-branding-SLE-16-160000.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037193" comment="glib2-devel-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037194" comment="glib2-devel-static-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037195" comment="glib2-doc-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037196" comment="glib2-lang-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037204" comment="libgthread-2_0-0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037205" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037207" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94388" version="1" class="patch">
	<metadata>
		<title>Security update for hawk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1230275" ref_url="https://bugzilla.suse.com/1230275" source="BUGZILLA"/>
		<reference ref_id="1247899" ref_url="https://bugzilla.suse.com/1247899" source="BUGZILLA"/>
		<reference ref_id="1248100" ref_url="https://bugzilla.suse.com/1248100" source="BUGZILLA"/>
		<reference ref_id="1251939" ref_url="https://bugzilla.suse.com/1251939" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55193" ref_url="https://www.suse.com/security/cve/CVE-2025-55193/" source="CVE"/>
		<reference ref_id="CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023807.html" source="SUSE-SU"/>
		<description>
This update for hawk2 fixes the following issues:

- Bump ruby gem rack to 3.1.18 (bsc#1251939).
- Bump ruby gem uri to 1.0.4.
- Fix the mtime in manifest.json (bsc#1230275).
- Make builds determinitstic (bsc#1230275).
- Bump rails version from 8.0.2 to 8.0.2.1 (bsc#1248100).
- Require openssl explicitly (bsc#1247899).		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230275">SUSE bug 1230275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247899">SUSE bug 1247899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248100">SUSE bug 1248100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251939">SUSE bug 1251939</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55193/">CVE-2025-55193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55193">CVE-2025-55193 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038478" comment="hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94389" version="1" class="patch">
	<metadata>
		<title>Security update for python-uv (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249011" ref_url="https://bugzilla.suse.com/1249011" source="BUGZILLA"/>
		<reference ref_id="1252399" ref_url="https://bugzilla.suse.com/1252399" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<reference ref_id="CVE-2025-62518" ref_url="https://www.suse.com/security/cve/CVE-2025-62518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023820.html" source="SUSE-SU"/>
		<description>
This update for python-uv fixes the following issues:

- CVE-2025-62518: astral-tokio-tar: Fixed boundary parsing issue
  allowing attackers to smuggle additional archive entries
  (bsc#1252399)
- CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249011)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249011">SUSE bug 1249011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252399">SUSE bug 1252399</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62518/">CVE-2025-62518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62518">CVE-2025-62518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037704" comment="python313-uv-0.7.18-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037704" comment="python313-uv-0.7.18-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94390" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250627" ref_url="https://bugzilla.suse.com/1250627" source="BUGZILLA"/>
		<reference ref_id="1252281" ref_url="https://bugzilla.suse.com/1252281" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-59362" ref_url="https://www.suse.com/security/cve/CVE-2025-59362/" source="CVE"/>
		<reference ref_id="CVE-2025-62168" ref_url="https://www.suse.com/security/cve/CVE-2025-62168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023819.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2025-62168: failure to redact HTTP authentication credentials in error handling leads to the disclosure of credentials a trusted client uses to authenticate (bsc#1252281).
- CVE-2025-59362: SNMP message processing component of Squid Cache can lead to stack-based buffer overflow (bsc#1250627).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250627">SUSE bug 1250627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252281">SUSE bug 1252281</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59362/">CVE-2025-59362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59362">CVE-2025-59362 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62168/">CVE-2025-62168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62168">CVE-2025-62168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037708" comment="squid-6.12-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037708" comment="squid-6.12-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94391" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255715" ref_url="https://bugzilla.suse.com/1255715" source="BUGZILLA"/>
		<reference ref_id="1256244" ref_url="https://bugzilla.suse.com/1256244" source="BUGZILLA"/>
		<reference ref_id="1256246" ref_url="https://bugzilla.suse.com/1256246" source="BUGZILLA"/>
		<reference ref_id="1256390" ref_url="https://bugzilla.suse.com/1256390" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023818.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2025-68973: out-of-bounds write when processing specially crafted input in the armor parser can lead to memory corruption (bsc#1255715).

Other security fixes:

- gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures (bsc#1256246).
- gpg: Error out on unverified output for non-detached signatures (bsc#1256244).
- gpg: Deprecate the option --not-dash-escaped (bsc#1256390).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255715">SUSE bug 1255715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256244">SUSE bug 1256244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256246">SUSE bug 1256246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256390">SUSE bug 1256390</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037709" comment="dirmngr-2.5.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037710" comment="gpg2-2.5.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037711" comment="gpg2-lang-2.5.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037712" comment="gpg2-tpm-2.5.5-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037709" comment="dirmngr-2.5.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037710" comment="gpg2-2.5.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037711" comment="gpg2-lang-2.5.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037712" comment="gpg2-tpm-2.5.5-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94392" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254511" ref_url="https://bugzilla.suse.com/1254511" source="BUGZILLA"/>
		<reference ref_id="1254512" ref_url="https://bugzilla.suse.com/1254512" source="BUGZILLA"/>
		<reference ref_id="1254514" ref_url="https://bugzilla.suse.com/1254514" source="BUGZILLA"/>
		<reference ref_id="1254515" ref_url="https://bugzilla.suse.com/1254515" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55753" ref_url="https://www.suse.com/security/cve/CVE-2025-55753/" source="CVE"/>
		<reference ref_id="CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098/" source="CVE"/>
		<reference ref_id="CVE-2025-65082" ref_url="https://www.suse.com/security/cve/CVE-2025-65082/" source="CVE"/>
		<reference ref_id="CVE-2025-66200" ref_url="https://www.suse.com/security/cve/CVE-2025-66200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

  - CVE-2025-55753: Fixed mod_md (ACME), unintended retry intervals (bsc#1254511)
  - CVE-2025-58098: Fixed Server Side Includes adds query string to #exec cmd (bsc#1254512)
  - CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)
  - CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254511">SUSE bug 1254511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254512">SUSE bug 1254512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254514">SUSE bug 1254514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254515">SUSE bug 1254515</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55753/">CVE-2025-55753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55753">CVE-2025-55753 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65082/">CVE-2025-65082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65082">CVE-2025-65082 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66200/">CVE-2025-66200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66200">CVE-2025-66200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037713" comment="apache2-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037714" comment="apache2-devel-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037715" comment="apache2-event-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037716" comment="apache2-manual-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037717" comment="apache2-prefork-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037718" comment="apache2-utils-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037719" comment="apache2-worker-2.4.63-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037713" comment="apache2-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037714" comment="apache2-devel-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037715" comment="apache2-event-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037716" comment="apache2-manual-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037717" comment="apache2-prefork-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037718" comment="apache2-utils-2.4.63-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037719" comment="apache2-worker-2.4.63-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94393" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255731" ref_url="https://bugzilla.suse.com/1255731" source="BUGZILLA"/>
		<reference ref_id="1255732" ref_url="https://bugzilla.suse.com/1255732" source="BUGZILLA"/>
		<reference ref_id="1255733" ref_url="https://bugzilla.suse.com/1255733" source="BUGZILLA"/>
		<reference ref_id="1255734" ref_url="https://bugzilla.suse.com/1255734" source="BUGZILLA"/>
		<reference ref_id="1256105" ref_url="https://bugzilla.suse.com/1256105" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14017" ref_url="https://www.suse.com/security/cve/CVE-2025-14017/" source="CVE"/>
		<reference ref_id="CVE-2025-14524" ref_url="https://www.suse.com/security/cve/CVE-2025-14524/" source="CVE"/>
		<reference ref_id="CVE-2025-14819" ref_url="https://www.suse.com/security/cve/CVE-2025-14819/" source="CVE"/>
		<reference ref_id="CVE-2025-15079" ref_url="https://www.suse.com/security/cve/CVE-2025-15079/" source="CVE"/>
		<reference ref_id="CVE-2025-15224" ref_url="https://www.suse.com/security/cve/CVE-2025-15224/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

This update for curl fixes the following issues:

- CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105).
- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).
- CVE-2025-14819: libssh global knownhost override (bsc#1255732).
- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).
- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255731">SUSE bug 1255731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255732">SUSE bug 1255732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255733">SUSE bug 1255733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255734">SUSE bug 1255734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256105">SUSE bug 1256105</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14017/">CVE-2025-14017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14017">CVE-2025-14017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14524/">CVE-2025-14524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14524">CVE-2025-14524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14819/">CVE-2025-14819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14819">CVE-2025-14819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15079/">CVE-2025-15079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15079">CVE-2025-15079 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15224/">CVE-2025-15224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15224">CVE-2025-15224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037722" comment="curl-zsh-completion-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037723" comment="libcurl-devel-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037724" comment="libcurl-devel-doc-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038479" comment="libcurl-mini4-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037722" comment="curl-zsh-completion-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037723" comment="libcurl-devel-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037724" comment="libcurl-devel-doc-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038479" comment="libcurl-mini4-8.14.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94394" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250983" ref_url="https://bugzilla.suse.com/1250983" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023806.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2025-11230: issue in the mjson JSON decoder leads to excessive resource consumption when processing numbers with
  large exponents (bsc#1250983).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250983">SUSE bug 1250983</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038480" comment="haproxy-3.2.0+git0.e134140d2-160000.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94395" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252753" ref_url="https://bugzilla.suse.com/1252753" source="BUGZILLA"/>
		<reference ref_id="1252756" ref_url="https://bugzilla.suse.com/1252756" source="BUGZILLA"/>
		<reference ref_id="1252905" ref_url="https://bugzilla.suse.com/1252905" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<reference ref_id="CVE-2025-55754" ref_url="https://www.suse.com/security/cve/CVE-2025-55754/" source="CVE"/>
		<reference ref_id="CVE-2025-61795" ref_url="https://www.suse.com/security/cve/CVE-2025-61795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023815.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Update to Tomcat 9.0.111
  - Security fixes:
    - CVE-2025-55752: directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753).
    - CVE-2025-55754: improper neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat
    (bsc#1252905).
    - CVE-2025-61795: temporary copies during the processing of multipart upload can lead to a denial of service
    (bsc#1252756).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252753">SUSE bug 1252753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252756">SUSE bug 1252756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252905">SUSE bug 1252905</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55754/">CVE-2025-55754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55754">CVE-2025-55754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61795/">CVE-2025-61795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61795">CVE-2025-61795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037727" comment="tomcat-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037728" comment="tomcat-admin-webapps-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037729" comment="tomcat-docs-webapp-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037730" comment="tomcat-el-3_0-api-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037731" comment="tomcat-embed-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037732" comment="tomcat-javadoc-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037733" comment="tomcat-jsp-2_3-api-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037734" comment="tomcat-jsvc-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037735" comment="tomcat-lib-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037736" comment="tomcat-servlet-4_0-api-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037737" comment="tomcat-webapps-9.0.111-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037727" comment="tomcat-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037728" comment="tomcat-admin-webapps-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037729" comment="tomcat-docs-webapp-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037730" comment="tomcat-el-3_0-api-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037731" comment="tomcat-embed-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037732" comment="tomcat-javadoc-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037733" comment="tomcat-jsp-2_3-api-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037734" comment="tomcat-jsvc-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037735" comment="tomcat-lib-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037736" comment="tomcat-servlet-4_0-api-9.0.111-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037737" comment="tomcat-webapps-9.0.111-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94396" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1230649" ref_url="https://bugzilla.suse.com/1230649" source="BUGZILLA"/>
		<reference ref_id="1252378" ref_url="https://bugzilla.suse.com/1252378" source="BUGZILLA"/>
		<reference ref_id="1252379" ref_url="https://bugzilla.suse.com/1252379" source="BUGZILLA"/>
		<reference ref_id="1252380" ref_url="https://bugzilla.suse.com/1252380" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<reference ref_id="CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780/" source="CVE"/>
		<reference ref_id="CVE-2025-8677" ref_url="https://www.suse.com/security/cve/CVE-2025-8677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Upgrade to release 9.20.15
  Security Fixes:
  * CVE-2025-40778: Fixed cache poisoning attacks with unsolicited RRs (bsc#1252379)
  * CVE-2025-40780: Fixed cache poisoning due to weak PRNG (bsc#1252380)
  * CVE-2025-8677: Fixed resource exhaustion via malformed DNSKEY handling (bsc#1252378)

  New Features:
  * Add dnssec-policy keys configuration check to named-checkconf.
  * Add a new option `manual-mode` to dnssec-policy.
  * Add a new option `servfail-until-ready` to response-policy
    zones.
  * Support for parsing HHIT and BRID records has been added.
  * Support for parsing DSYNC records has been added.

  Removed Features:
  * Deprecate the `tkey-gssapi-credential` statement.
  * Obsolete the `tkey-domain` statement.

  Feature Changes:
  * Add deprecation warnings for RSASHA1, RSASHA1-NSEC3SHA1, and DS
    digest type 1.

  Bug Fixes:
  * Missing DNSSEC information when CD bit is set in query.
  * rndc sign during ZSK rollover will now replace signatures.
  * Use signer name when disabling DNSSEC algorithms.
  * Preserve cache when reload fails and reload the server again.
  * Prevent spurious SERVFAILs for certain 0-TTL resource records.
  * Fix unexpected termination if catalog-zones had undefined
    `default-primaries`.
  * Stale RRsets in a CNAME chain were not always refreshed.
  * Add RPZ extended DNS error for zones with a CNAME override
    policy configured.
  * Fix dig +keepopen option.
  * Log dropped or slipped responses in the query-errors category.
  * Fix synth-from-dnssec not working in some scenarios.
  * Clean enough memory when adding new ADB names/entries under
    memory pressure.
  * Prevent spurious validation failures.
  * Ensure file descriptors 0-2 are in use before using libuv
    [bsc#1230649]
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230649">SUSE bug 1230649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252378">SUSE bug 1252378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252379">SUSE bug 1252379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252380">SUSE bug 1252380</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8677/">CVE-2025-8677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8677">CVE-2025-8677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037847" comment="bind-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037848" comment="bind-doc-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037850" comment="bind-modules-generic-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037851" comment="bind-modules-ldap-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037852" comment="bind-modules-mysql-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037853" comment="bind-modules-perl-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037854" comment="bind-modules-sqlite3-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037855" comment="bind-utils-9.20.15-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037847" comment="bind-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037848" comment="bind-doc-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037850" comment="bind-modules-generic-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037851" comment="bind-modules-ldap-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037852" comment="bind-modules-mysql-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037853" comment="bind-modules-perl-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037854" comment="bind-modules-sqlite3-9.20.15-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037855" comment="bind-utils-9.20.15-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94397" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256340" ref_url="https://bugzilla.suse.com/1256340" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 140.7.0 ESR (bsc#1256340).

- MFSA 2026-03 (bsc#1256340)

  * CVE-2026-0877: Mitigation bypass in the DOM: Security component
  * CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component
  * CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component
  * CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component
  * CVE-2026-0882: Use-after-free in the IPC component
  * CVE-2025-14327: Spoofing issue in the Downloads Panel component
  * CVE-2026-0883: Information disclosure in the Networking component
  * CVE-2026-0884: Use-after-free in the JavaScript Engine component
  * CVE-2026-0885: Use-after-free in the JavaScript: GC component
  * CVE-2026-0886: Incorrect boundary conditions in the Graphics component
  * CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component
  * CVE-2026-0890: Spoofing issue in the DOM: Copy &amp; Paste and Drag &amp; Drop component
  * CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94398" version="1" class="patch">
	<metadata>
		<title>Security update for erlang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249469" ref_url="https://bugzilla.suse.com/1249469" source="BUGZILLA"/>
		<reference ref_id="1249470" ref_url="https://bugzilla.suse.com/1249470" source="BUGZILLA"/>
		<reference ref_id="1249472" ref_url="https://bugzilla.suse.com/1249472" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-48038" ref_url="https://www.suse.com/security/cve/CVE-2025-48038/" source="CVE"/>
		<reference ref_id="CVE-2025-48039" ref_url="https://www.suse.com/security/cve/CVE-2025-48039/" source="CVE"/>
		<reference ref_id="CVE-2025-48040" ref_url="https://www.suse.com/security/cve/CVE-2025-48040/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023812.html" source="SUSE-SU"/>
		<description>
This update for erlang fixes the following issues:

Update the ssh component to the latest in the maint-27 branch.

Security issues fixed:

- CVE-2025-48040: ssh: overly tolerant handling of data received from unauthenticated users when processing key
  exchange messages may lead to excessive resource consumption (bsc#1249472).
- CVE-2025-48039: ssh: unverified paths from authenticated SFTP users may lead to excessive resource consumption
  (bsc#1249469).
- CVE-2025-48038: ssh: unverified file handles from authenticated SFTP users may lead to excessive resource consumption
  (bsc#1249470).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1249469">SUSE bug 1249469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249470">SUSE bug 1249470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249472">SUSE bug 1249472</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-48038/">CVE-2025-48038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48038">CVE-2025-48038 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-48039/">CVE-2025-48039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48039">CVE-2025-48039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-48040/">CVE-2025-48040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48040">CVE-2025-48040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037861" comment="erlang-27.1.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037869" comment="erlang-epmd-27.1.3-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037861" comment="erlang-27.1.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037869" comment="erlang-epmd-27.1.3-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94399" version="1" class="patch">
	<metadata>
		<title>Security update for alloy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251509" ref_url="https://bugzilla.suse.com/1251509" source="BUGZILLA"/>
		<reference ref_id="1251716" ref_url="https://bugzilla.suse.com/1251716" source="BUGZILLA"/>
		<reference ref_id="1253609" ref_url="https://bugzilla.suse.com/1253609" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<description>
This update for alloy fixes the following issues:

Upgrade to version 1.12.1.


Security issues fixed:

- CVE-2025-47911: golang.org/x/net/html: quadratic complexity algorithms used when parsing untrusted HTML documents
  (bsc#1251509).
- CVE-2025-58190: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially
  crafted input (bsc#1251716).
- CVE-2025-47913: golang.org/x/crypto: early client process termination when receiving an unexpected message type in
  response to a key listing or signing request (bsc#1253609).

Other updates and bugfixes:

- Version 1.12.1:
  * Bugfixes
    - update to Beyla 2.7.10.

- Version 1.12.0:
  * Breaking changes
    - `prometheus.exporter.blackbox`, `prometheus.exporter.snmp` and `prometheus.exporter.statsd` now use the component
      ID instead of the hostname as their instance label in their exported metrics.
  * Features
    - (Experimental) Add an `otelcol.receiver.cloudflare` component to receive logs pushed by Cloudflare's LogPush
      jobs.
    - (Experimental) Additions to experimental `database_observability.mysql` component:
      - `explain_plans`
        - collector now changes schema before returning the connection to the pool.
        - collector now passes queries more permissively.
      - enable `explain_plans` collector by default
    - (Experimental) Additions to experimental `database_observability.postgres` component:
      - `explain_plans`
        - added the explain plan collector.
        - collector now passes queries more permissively.
      - `query_samples`
        - add user field to wait events within `query_samples` collector.
        - rework the query samples collector to buffer per-query execution state across scrapes and emit finalized
          entries.
        - process turned idle rows to calculate finalization times precisely and emit first seen idle rows.
      - `query_details`
        - escape queries coming from `pg_stat_statements` with quotes.
      - enable `explain_plans` collector by default.
      - safely generate `server_id` when UDP socket used for database connection.
      - add table registry and include "validated" in parsed table name logs.
    - Add `otelcol.exporter.googlecloudpubsub` community component to export metrics, traces, and logs to Google Cloud
      Pub/Sub topic.
    - Add `structured_metadata_drop` stage for `loki.process` to filter structured metadata.
    - Send remote config status to the remote server for the `remotecfg` service.
    - Send effective config to the remote server for the `remotecfg` service.
    - Add a `stat_statements` configuration block to the `prometheus.exporter.postgres` component to enable selecting
      both the query ID and the full SQL statement. The new block includes one option to enable statement selection,
      and another to configure the maximum length of the statement text.
    - Add truncate stage for `loki.process` to truncate log entries, label values, and `structured_metadata` values.
    - Add `u_probe_links` &amp; `load_probe` configuration fields to alloy `pyroscope.ebpf` to extend configuration of
      the `opentelemetry-ebpf-profiler` to allow uprobe profiling and dynamic probing.
    - Add `verbose_mode` configuration fields to `alloy pyroscope.ebpf` to be enable `ebpf-profiler` verbose mode.
    - Add `file_match` block to `loki.source.file` for built-in file discovery using glob patterns.
    - Add a regex argument to the `structured_metadata` stage in `loki.process` to extract labels matching a regular
      expression.
    - OpenTelemetry Collector dependencies upgraded from v0.134.0 to v0.139.0.
      - See the upstream
        [core](https://github.com/open-telemetry/opentelemetry-collector/blob/v0.139.0/CHANGELOG.md)
        and
        [contrib](https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/v0.139.0/CHANGELOG.md)
        changelogs for more details.
    - A new `mimir.alerts.kubernetes` component which discovers AlertmanagerConfig Kubernetes resources and loads them
      into a Mimir instance.
    - Mark `stage.windowsevent` block in the `loki.process` component as GA.
  * Enhancements
    - Add per-application rate limiting with the strategy attribute in the `faro.receiver` component, to prevent one
      application from consuming the rate limit quota of others.
    - Add support of tls in components `loki.source.(awsfirehose|gcplog|heroku|api)` and `prometheus.receive_http` and
      `pyroscope.receive_http`.
    - Remove `SendSIGKILL=no` from unit files and recommendations.
    - Reduce memory overhead of `prometheus.remote_write`'s WAL by lowering the size of the allocated series storage.
    - Reduce lock wait/contention on the `labelstore.LabelStore` by removing unecessary usage from
      `prometheus.relabel`.
    - `prometheus.exporter.postgres` dependency has been updated to v0.18.1.
    - Update Beyla component to 2.7.8.
    - Support delimiters in `stage.luhn`.
    - `pyroscope.java`: update `async-profiler` to 4.2.
    - `prometheus.exporter.unix`: Add an arp config block to configure the ARP collector.
    - `prometheus.exporter.snowflake` dependency has been updated to 20251016132346-6d442402afb2.
    - `loki.source.podlogs` now supports `preserve_discovered_labels` parameter to preserve discovered pod metadata
      labels for use by downstream components.
    - Rework underlying framework of Alloy UI to use Vite instead of Create React App.
    - Use POST requests for remote config requests to avoid hitting http2 header limits.
    - `loki.source.api` during component shutdown will now reject all the inflight requests with status code 503 after
      `graceful_shutdown_timeout` has expired.
    - `kubernetes.discovery`: Add support for attaching namespace metadata.
    - Add `meta_cache_address` to `beyla.ebpf` component.
  * Bugfixes
    - Stop `loki.source.kubernetes` discarding log lines with duplicate timestamps.
    - Fix direction of arrows for pyroscope components in UI graph.
    - Only log EOF errors for syslog port investigations in `loki.source.syslog` as Debug, not Warn.
    - Fix `prometheus.exporter.process` ignoring the `remove_empty_groups` argument.
    - Fix issues with "unknown series ref when trying to add exemplar" from `prometheus.remote_write` by allowing
      series ref links to be updated if they change.
    - Fix `loki.source.podlogs` component to register the Kubernetes field index for `spec.nodeName` when node
      filtering is enabled, preventing "Index with name `field:spec.nodeName` does not exist" errors.
    - Fix issue in `loki.source.file` where scheduling files could take too long.
    - Fix `loki.write` no longer includes internal labels __.
    - Fix missing native histograms custom buckets (NHCB) samples from `prometheus.remote_write`.
    - `otelcol.receiver.prometheus` now supports mixed histograms if `prometheus.scrape` has `honor_metadata` set to
      true.
    - `loki.source.file` has better support for non-UTF-8 encoded files.
    - Fix the `loki.write` endpoint block's `enable_http2` attribute to actually affect the client.
    - Optionally remove trailing newlines before appending entries in `stage.multiline`.
    - `loki.source.api` no longer drops request when relabel rules drops a specific stream.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1251509">SUSE bug 1251509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251716">SUSE bug 1251716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253609">SUSE bug 1253609</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037881" comment="alloy-1.12.1-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037881" comment="alloy-1.12.1-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94400" version="1" class="patch">
	<metadata>
		<title>Security update for cpp-httplib (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254734" ref_url="https://bugzilla.suse.com/1254734" source="BUGZILLA"/>
		<reference ref_id="1254735" ref_url="https://bugzilla.suse.com/1254735" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66570" ref_url="https://www.suse.com/security/cve/CVE-2025-66570/" source="CVE"/>
		<reference ref_id="CVE-2025-66577" ref_url="https://www.suse.com/security/cve/CVE-2025-66577/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023810.html" source="SUSE-SU"/>
		<description>
This update for cpp-httplib fixes the following issues:

- CVE-2025-66570: IP spoofing, log poisoning, and authorization bypass via header shadowing due to acceptance and
  parsing of client-controlled injected HTTP headers in incoming requests (bsc#1254734).
- CVE-2025-66577: access and error log poisoning with spoofed client IPs due to unconditional acceptance of
  client-controlled `X-Forwarded-For` and `X-Real-IP` headers (bsc#1254735).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1254734">SUSE bug 1254734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254735">SUSE bug 1254735</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66570/">CVE-2025-66570 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66570">CVE-2025-66570 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66577/">CVE-2025-66577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66577">CVE-2025-66577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037883" comment="libcpp-httplib0_22-0.22.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037883" comment="libcpp-httplib0_22-0.22.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94401" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247367" ref_url="https://bugzilla.suse.com/1247367" source="BUGZILLA"/>
		<reference ref_id="1247594" ref_url="https://bugzilla.suse.com/1247594" source="BUGZILLA"/>
		<reference ref_id="1248373" ref_url="https://bugzilla.suse.com/1248373" source="BUGZILLA"/>
		<reference ref_id="1250508" ref_url="https://bugzilla.suse.com/1250508" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-54388" ref_url="https://www.suse.com/security/cve/CVE-2025-54388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023886.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

Changes in docker:

- Update to Docker 28.5.1-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/28/#2851&gt;

- Update to Docker 28.5.0-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/28/#2850&gt;

- Update to docker-buildx v0.29.0. Upstream changelog:
  &lt;https://github.com/docker/buildx/releases/tag/v0.29.0&gt;

- Remove git-core recommends on SLE. Most SLE systems have
  installRecommends=yes by default and thus end up installing git with Docker.
  bsc#1250508

  This feature is mostly intended for developers ("docker build git://") so
  most users already have the dependency installed, and the error when git is
  missing is fairly straightforward (so they can easily figure out what they
  need to install).

- Update to docker-buildx v0.28.0. Upstream changelog:
  &lt;https://github.com/docker/buildx/releases/tag/v0.28.0&gt;

- Update to Docker 28.4.0-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/28/#2840&gt;
  * Fixes a nil pointer panic in "docker push". bsc#1248373

- Update warnings and errors related to "docker buildx ..." so that they
  reference our openSUSE docker-buildx packages.

- Enable building docker-buildx for SLE15 systems with SUSEConnect secret
  injection enabled. PED-12534 PED-8905 bsc#1247594

  As docker-buildx does not support our SUSEConnect secret injection (and some
  users depend "docker build" working transparently), patch the docker CLI so
  that "docker build" will no longer automatically call "docker buildx build",
  effectively making DOCKER_BUILDKIT=0 the default configuration. Users can
  manually use "docker buildx ..." commands or set DOCKER_BUILDKIT=1 in order
  to opt-in to using docker-buildx.

  Users can silence the "docker build" warning by setting DOCKER_BUILDKIT=0
  explicitly.

  In order to inject SCC credentials with docker-buildx, users should use

    RUN --mount=type=secret,id=SCCcredentials zypper -n ...

  in their Dockerfiles, and

    docker buildx build --secret id=SCCcredentials,src=/etc/zypp/credentials.d/SCCcredentials,type=file .

  when doing their builds.

- Update to Docker 28.3.3-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/28/#2833&gt;
  CVE-2025-54388 bsc#1247367

- Update to docker-buildx v0.26.1. Upstream changelog:
  &lt;https://github.com/docker/buildx/releases/tag/v0.26.1&gt;

- Update to docker-buildx v0.26.0. Upstream changelog:
  &lt;https://github.com/docker/buildx/releases/tag/v0.26.0&gt;
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-01-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1247367">SUSE bug 1247367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247594">SUSE bug 1247594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248373">SUSE bug 1248373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250508">SUSE bug 1250508</bugzilla>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54388/">CVE-2025-54388 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037884" comment="docker-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037885" comment="docker-bash-completion-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037886" comment="docker-buildx-0.29.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037887" comment="docker-fish-completion-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037888" comment="docker-rootless-extras-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037889" comment="docker-zsh-completion-28.5.1_ce-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037884" comment="docker-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037885" comment="docker-bash-completion-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037886" comment="docker-buildx-0.29.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037887" comment="docker-fish-completion-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037888" comment="docker-rootless-extras-28.5.1_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037889" comment="docker-zsh-completion-28.5.1_ce-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94402" version="1" class="patch">
	<metadata>
		<title>Security update for cargo-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1243179" ref_url="https://bugzilla.suse.com/1243179" source="BUGZILLA"/>
		<reference ref_id="1243851" ref_url="https://bugzilla.suse.com/1243851" source="BUGZILLA"/>
		<reference ref_id="1249012" ref_url="https://bugzilla.suse.com/1249012" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2025-4574" ref_url="https://www.suse.com/security/cve/CVE-2025-4574/" source="CVE"/>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023885.html" source="SUSE-SU"/>
		<description>
This update for cargo-c fixes the following issues:

- CVE-2025-4574: crossbeam-channel: Fixed double-free on drop in Channel::discard_all_messages (bsc#1243179)
- CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249012)
- CVE-2024-12224: idna: Fixed improper validation of Punycode labels (bsc#1243851)

Other fixes:
- Fixed _service file to have proper versioning
- Update to version 0.10.15~git0.3e178d5:
  * Bump actions/download-artifact from 4 to 5
  * Update implib requirement from 0.3.5 to 0.4.0
  * Add rlib to the targets when building tests
  * Allow disabling emission of library version constants in header files
  * Bump to cargo 0.90
  * Fix static_libraries swallowing sequence of -framework flags
  * Fix non-POSIX paths in Libdir under Windows
  * Bump actions-rs-plus/clippy-check from 2.2.1 to 2.3.0
  * Fix clippy lints
  * Bump cargo-0.89, object-0.37.1, cbindgen-0.29
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243179">SUSE bug 1243179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243851">SUSE bug 1243851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249012">SUSE bug 1249012</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4574/">CVE-2025-4574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4574">CVE-2025-4574 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038432" comment="cargo-c-0.10.15-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038432" comment="cargo-c-0.10.15-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94403" version="1" class="patch">
	<metadata>
		<title>Security update for rust1.91, rust1.92 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:20099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023884.html" source="SUSE-SU"/>
		<description>
This update for rust1.91 and rust1.92 fixes the following issues:

Rust is shipped in 1.91.0 version.

Please see https://github.com/rust-lang/rust/releases/tag/1.91.0 for changes.

Rust is shipped in 1.92.0 version.

Please see https://github.com/rust-lang/rust/releases/tag/1.92.0 for changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-01-19"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038433" comment="cargo1.91-1.91.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038434" comment="cargo1.92-1.92.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038435" comment="rust1.91-1.91.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038437" comment="rust1.92-1.92.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038433" comment="cargo1.91-1.91.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038434" comment="cargo1.92-1.92.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038435" comment="rust1.91-1.91.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038437" comment="rust1.92-1.92.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94404" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250439" ref_url="https://bugzilla.suse.com/1250439" source="BUGZILLA"/>
		<reference ref_id="1250440" ref_url="https://bugzilla.suse.com/1250440" source="BUGZILLA"/>
		<reference ref_id="1250441" ref_url="https://bugzilla.suse.com/1250441" source="BUGZILLA"/>
		<reference ref_id="1250442" ref_url="https://bugzilla.suse.com/1250442" source="BUGZILLA"/>
		<reference ref_id="1251975" ref_url="https://bugzilla.suse.com/1251975" source="BUGZILLA"/>
		<reference ref_id="1254164" ref_url="https://bugzilla.suse.com/1254164" source="BUGZILLA"/>
		<reference ref_id="1254165" ref_url="https://bugzilla.suse.com/1254165" source="BUGZILLA"/>
		<reference ref_id="1254166" ref_url="https://bugzilla.suse.com/1254166" source="BUGZILLA"/>
		<reference ref_id="1254167" ref_url="https://bugzilla.suse.com/1254167" source="BUGZILLA"/>
		<reference ref_id="1254168" ref_url="https://bugzilla.suse.com/1254168" source="BUGZILLA"/>
		<reference ref_id="1254169" ref_url="https://bugzilla.suse.com/1254169" source="BUGZILLA"/>
		<reference ref_id="1254170" ref_url="https://bugzilla.suse.com/1254170" source="BUGZILLA"/>
		<reference ref_id="1254171" ref_url="https://bugzilla.suse.com/1254171" source="BUGZILLA"/>
		<reference ref_id="1254172" ref_url="https://bugzilla.suse.com/1254172" source="BUGZILLA"/>
		<reference ref_id="1254174" ref_url="https://bugzilla.suse.com/1254174" source="BUGZILLA"/>
		<reference ref_id="1254175" ref_url="https://bugzilla.suse.com/1254175" source="BUGZILLA"/>
		<reference ref_id="1254176" ref_url="https://bugzilla.suse.com/1254176" source="BUGZILLA"/>
		<reference ref_id="1254177" ref_url="https://bugzilla.suse.com/1254177" source="BUGZILLA"/>
		<reference ref_id="1254179" ref_url="https://bugzilla.suse.com/1254179" source="BUGZILLA"/>
		<reference ref_id="1254208" ref_url="https://bugzilla.suse.com/1254208" source="BUGZILLA"/>
		<reference ref_id="1254473" ref_url="https://bugzilla.suse.com/1254473" source="BUGZILLA"/>
		<reference ref_id="1254498" ref_url="https://bugzilla.suse.com/1254498" source="BUGZILLA"/>
		<reference ref_id="1254509" ref_url="https://bugzilla.suse.com/1254509" source="BUGZILLA"/>
		<reference ref_id="1255183" ref_url="https://bugzilla.suse.com/1255183" source="BUGZILLA"/>
		<reference ref_id="1255191" ref_url="https://bugzilla.suse.com/1255191" source="BUGZILLA"/>
		<reference ref_id="1255194" ref_url="https://bugzilla.suse.com/1255194" source="BUGZILLA"/>
		<reference ref_id="1255195" ref_url="https://bugzilla.suse.com/1255195" source="BUGZILLA"/>
		<reference ref_id="1255198" ref_url="https://bugzilla.suse.com/1255198" source="BUGZILLA"/>
		<reference ref_id="1255200" ref_url="https://bugzilla.suse.com/1255200" source="BUGZILLA"/>
		<reference ref_id="1255497" ref_url="https://bugzilla.suse.com/1255497" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43000" ref_url="https://www.suse.com/security/cve/CVE-2023-43000/" source="CVE"/>
		<reference ref_id="CVE-2025-13502" ref_url="https://www.suse.com/security/cve/CVE-2025-13502/" source="CVE"/>
		<reference ref_id="CVE-2025-13947" ref_url="https://www.suse.com/security/cve/CVE-2025-13947/" source="CVE"/>
		<reference ref_id="CVE-2025-14174" ref_url="https://www.suse.com/security/cve/CVE-2025-14174/" source="CVE"/>
		<reference ref_id="CVE-2025-43272" ref_url="https://www.suse.com/security/cve/CVE-2025-43272/" source="CVE"/>
		<reference ref_id="CVE-2025-43342" ref_url="https://www.suse.com/security/cve/CVE-2025-43342/" source="CVE"/>
		<reference ref_id="CVE-2025-43343" ref_url="https://www.suse.com/security/cve/CVE-2025-43343/" source="CVE"/>
		<reference ref_id="CVE-2025-43356" ref_url="https://www.suse.com/security/cve/CVE-2025-43356/" source="CVE"/>
		<reference ref_id="CVE-2025-43368" ref_url="https://www.suse.com/security/cve/CVE-2025-43368/" source="CVE"/>
		<reference ref_id="CVE-2025-43392" ref_url="https://www.suse.com/security/cve/CVE-2025-43392/" source="CVE"/>
		<reference ref_id="CVE-2025-43419" ref_url="https://www.suse.com/security/cve/CVE-2025-43419/" source="CVE"/>
		<reference ref_id="CVE-2025-43421" ref_url="https://www.suse.com/security/cve/CVE-2025-43421/" source="CVE"/>
		<reference ref_id="CVE-2025-43425" ref_url="https://www.suse.com/security/cve/CVE-2025-43425/" source="CVE"/>
		<reference ref_id="CVE-2025-43427" ref_url="https://www.suse.com/security/cve/CVE-2025-43427/" source="CVE"/>
		<reference ref_id="CVE-2025-43429" ref_url="https://www.suse.com/security/cve/CVE-2025-43429/" source="CVE"/>
		<reference ref_id="CVE-2025-43430" ref_url="https://www.suse.com/security/cve/CVE-2025-43430/" source="CVE"/>
		<reference ref_id="CVE-2025-43431" ref_url="https://www.suse.com/security/cve/CVE-2025-43431/" source="CVE"/>
		<reference ref_id="CVE-2025-43432" ref_url="https://www.suse.com/security/cve/CVE-2025-43432/" source="CVE"/>
		<reference ref_id="CVE-2025-43434" ref_url="https://www.suse.com/security/cve/CVE-2025-43434/" source="CVE"/>
		<reference ref_id="CVE-2025-43440" ref_url="https://www.suse.com/security/cve/CVE-2025-43440/" source="CVE"/>
		<reference ref_id="CVE-2025-43443" ref_url="https://www.suse.com/security/cve/CVE-2025-43443/" source="CVE"/>
		<reference ref_id="CVE-2025-43458" ref_url="https://www.suse.com/security/cve/CVE-2025-43458/" source="CVE"/>
		<reference ref_id="CVE-2025-43480" ref_url="https://www.suse.com/security/cve/CVE-2025-43480/" source="CVE"/>
		<reference ref_id="CVE-2025-43501" ref_url="https://www.suse.com/security/cve/CVE-2025-43501/" source="CVE"/>
		<reference ref_id="CVE-2025-43529" ref_url="https://www.suse.com/security/cve/CVE-2025-43529/" source="CVE"/>
		<reference ref_id="CVE-2025-43531" ref_url="https://www.suse.com/security/cve/CVE-2025-43531/" source="CVE"/>
		<reference ref_id="CVE-2025-43535" ref_url="https://www.suse.com/security/cve/CVE-2025-43535/" source="CVE"/>
		<reference ref_id="CVE-2025-43536" ref_url="https://www.suse.com/security/cve/CVE-2025-43536/" source="CVE"/>
		<reference ref_id="CVE-2025-43541" ref_url="https://www.suse.com/security/cve/CVE-2025-43541/" source="CVE"/>
		<reference ref_id="CVE-2025-66287" ref_url="https://www.suse.com/security/cve/CVE-2025-66287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.50.4.

Security issues fixed:

- CVE-2025-13502: processing of maliciously crafted payloads by the GLib remote inspector server may lead to a
  UIProcess crash due to an out-of-bounds read and an integer underflow (bsc#1254208).
- CVE-2025-13947: use of the file drag-and-drop mechanism may lead to remote information disclosure due to a lack of
  verification of the origins of drag operations (bsc#1254473).
- CVE-2025-14174: processing maliciously crafted web content may lead to memory corruption due to improper validation
  (bsc#1255497).
- CVE-2025-43272: processing maliciously crafted web content may lead to an unexpected process crash due to improper
  memory handling (bsc#1250439).
- CVE-2025-43342: processing maliciously crafted web content may lead to an unexpected process crash due to a
  correctness issue and missing checks (bsc#1250440).
- CVE-2025-43343: processing maliciously crafted web content may lead to an unexpected process crash due to improper
  memory handling (bsc#1251975).
- CVE-2025-43356: a website may be able to access sensor information without user consent due to improper cache handling
  (bsc#1250441).
- CVE-2025-43368: processing maliciously crafted web content may lead to an unexpected process crash due to a
  use-after-free issue (bsc#1250442).
- CVE-2025-43392: websites may exfiltrate image data cross-origin due to issues with cache handling (bsc#1254165).
- CVE-2025-43419: processing maliciously crafted web content may lead to memory corruption due to improper memory
  handling (bsc#1254166).
- CVE-2025-43421: processing maliciously crafted web content may lead to an unexpected process crash due to enabled
  array allocation sinking (bsc#1254167).
- CVE-2025-43425: processing maliciously crafted web content may lead to an unexpected process crash due to improper
  memory handling (bsc#1254168).
- CVE-2025-43427: processing maliciously crafted web content may lead to an unexpected process crash due to issues with
  state management (bsc#1254169).
- CVE-2025-43429: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer
  overflow issue (bsc#1254174).
- CVE-2025-43430: processing maliciously crafted web content may lead to an unexpected process crash due to issues with
  state management (bsc#1254172).
- CVE-2025-43431: processing maliciously crafted web content may lead to memory corruption due to improper memory
  handling (bsc#1254170).
- CVE-2025-43432: processing maliciously crafted web content may lead to an unexpected process crash due to a
  use-after-free issue (bsc#1254171).
- CVE-2025-43434: processing maliciously crafted web content may lead to an unexpected process crash due to a
  use-after-free issue (bsc#1254179).
- CVE-2025-43440: processing maliciously crafted web content may lead to an unexpected process crash due to missing
  checks (bsc#1254177).
- CVE-2025-43443: processing maliciously crafted web content may lead to an unexpected process crash due to missing
  checks (bsc#1254176).
- CVE-2025-43458: processing maliciously crafted web content may lead to an unexpected process crash due to issues with
  state management (bsc#1254498).
- CVE-2025-43501: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer
  overflow issue (bsc#1255194).
- CVE-2025-43529: processing maliciously crafted web content may lead to arbitrary code execution due to a
  use-after-free issue (bsc#1255198).
- CVE-2025-43531: processing maliciously crafted web content may lead to an unexpected process crash due to a race
  condition (bsc#1255183).
- CVE-2025-43535: processing maliciously crafted web content may lead to an unexpected process crash due to improper
  memory handling (bsc#1255195).
- CVE-2025-43536: processing maliciously crafted web content may lead to an unexpected process crash due to a
  use-after-free issue (bsc#1255200).
- CVE-2025-43541: processing maliciously crafted web content may lead to an unexpected process crash due to type
  confusion (bsc#1255191).
- CVE-2025-66287: processing maliciously crafted web content may lead to an unexpected process crash due to improper
  memory handling (bsc#1254509).

Other issues fixed and changes:

- Version 2.50.4:
  * Correctly handle the program name passed to the sleep disabler.
  * Ensure GStreamer is initialized before using the Quirks.
  * Fix several crashes and rendering issues.

- Version 2.50.3:
  * Fix seeking and looping of media elements that set the "loop" property.
  * Fix several crashes and rendering issues.

- Version 2.50.2:
  * Prevent unsafe URI schemes from participating in media playback.
  * Make jsc_value_array_buffer_get_data() function introspectable.
  * Fix logging in to Google accounts that have a WebAuthn second factor configured.
  * Fix loading webkit://gpu when there are no threads configured for GPU rendering.
  * Fix rendering gradiants that use the CSS hue interpolation method.
  * Fix pasting image data from the clipboard.
  * Fix font-family selection when the font name contains spaces.
  * Fix the build with standard C libraries that lack execinfo.h, like Musl or uClibc.
  * Fix capturing canvas snapshots in the Web Inspector.
  * Fix several crashes and rendering issues.

- Version 2.50.1:
  * Improve text rendering performance.
  * Fix audio playback broken on instagram.
  * Fix rendering of layers with fractional transforms.
  * Fix the build with ENABLE(VIDEO) disabled.
  * Fix the build in s390x.
  * Fix several crashes and rendering issues.

- Version 2.50.0:
  * Improved rendering performance by recording each layer once and replaying every dirty region in different worker
    threads.
  * Enable damage propagation to the UI process by default.
  * CSS property font-variant-emoji is now enabled by default.
  * Font synthesis properties (bold/italic) are now properly handled.
  * Ensure web view is focused on tap gesture.
  * Added new API to get the theme color of a WebKitWebView.

- Version 2.49.90:
  * Add support for font collection / fragment identifiers.
  * Fix web process deadlock on exit.
  * Fix stuttering when playing WebP animations
  * Fix CSS animations with cubic-bezier timing function.
  * Do not start the MemoryPressureMonitor if it’s disabled
  * Fix several crashes and rendering issues.
  * Updated translations.

- Version 2.48.6:
  * Fix emojis incorrectly rendered in their text variant.
  * Add support for font collection / fragment identifiers.
  * Fix web process deadlock on exit.
  * Fix stuttering when playing WebP animations.
  * Fix CSS animations with cubic-bezier timing function.
  * Do not start the MemoryPressureMonitor if it's disabled.
  * Fix several crashes and rendering issues.

- Fix a11y regression where AT-SPI roles were mapped incorrectly.
- Disable skia on ppc64le.

		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250439">SUSE bug 1250439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250440">SUSE bug 1250440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250441">SUSE bug 1250441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250442">SUSE bug 1250442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251975">SUSE bug 1251975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254164">SUSE bug 1254164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254165">SUSE bug 1254165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254166">SUSE bug 1254166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254167">SUSE bug 1254167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254168">SUSE bug 1254168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254169">SUSE bug 1254169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254170">SUSE bug 1254170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254171">SUSE bug 1254171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254172">SUSE bug 1254172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254174">SUSE bug 1254174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254175">SUSE bug 1254175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254176">SUSE bug 1254176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254177">SUSE bug 1254177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254179">SUSE bug 1254179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254208">SUSE bug 1254208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254473">SUSE bug 1254473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254498">SUSE bug 1254498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254509">SUSE bug 1254509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255183">SUSE bug 1255183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255191">SUSE bug 1255191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255194">SUSE bug 1255194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255195">SUSE bug 1255195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255198">SUSE bug 1255198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255200">SUSE bug 1255200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255497">SUSE bug 1255497</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-43000/">CVE-2023-43000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000">CVE-2023-43000 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13502/">CVE-2025-13502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13502">CVE-2025-13502 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13947/">CVE-2025-13947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13947">CVE-2025-13947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14174/">CVE-2025-14174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14174">CVE-2025-14174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43272/">CVE-2025-43272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43272">CVE-2025-43272 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-43342/">CVE-2025-43342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43342">CVE-2025-43342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43343/">CVE-2025-43343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43343">CVE-2025-43343 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43356/">CVE-2025-43356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43356">CVE-2025-43356 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43368/">CVE-2025-43368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43368">CVE-2025-43368 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43392/">CVE-2025-43392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43392">CVE-2025-43392 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43419/">CVE-2025-43419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43419">CVE-2025-43419 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43421/">CVE-2025-43421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43421">CVE-2025-43421 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43425/">CVE-2025-43425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43425">CVE-2025-43425 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43427/">CVE-2025-43427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43427">CVE-2025-43427 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43429/">CVE-2025-43429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43429">CVE-2025-43429 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43430/">CVE-2025-43430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43430">CVE-2025-43430 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-43431/">CVE-2025-43431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43431">CVE-2025-43431 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43432/">CVE-2025-43432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43432">CVE-2025-43432 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43434/">CVE-2025-43434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43434">CVE-2025-43434 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43440/">CVE-2025-43440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43440">CVE-2025-43440 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43443/">CVE-2025-43443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43443">CVE-2025-43443 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43458/">CVE-2025-43458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43458">CVE-2025-43458 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43480/">CVE-2025-43480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43480">CVE-2025-43480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43501/">CVE-2025-43501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43501">CVE-2025-43501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43529/">CVE-2025-43529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529">CVE-2025-43529 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43531/">CVE-2025-43531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43531">CVE-2025-43531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43535/">CVE-2025-43535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43535">CVE-2025-43535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43536/">CVE-2025-43536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43536">CVE-2025-43536 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43541/">CVE-2025-43541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43541">CVE-2025-43541 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66287/">CVE-2025-66287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66287">CVE-2025-66287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94405" version="1" class="patch">
	<metadata>
		<title>Security update of open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250373" ref_url="https://bugzilla.suse.com/1250373" source="BUGZILLA"/>
		<reference ref_id="1250692" ref_url="https://bugzilla.suse.com/1250692" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023883.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

Update to open-vm-tools 13.0.5 based on build 24915695. (boo#1250692):

Please refer to the Release Notes at
https://github.com/vmware/open-vm-tools/blob/stable-13.0.5/ReleaseNotes.md.

The granular changes that have gone into the open-vm-tools 13.0.5 release
are in the ChangeLog at
https://github.com/vmware/open-vm-tools/blob/stable-13.0.5/open-vm-tools/ChangeLog.

There are no new features in the open-vm-tools 13.0.5 release. This is
primarily a maintenance release that addresses a security issue.

This release resolves and includes the patch for CVE-2025-41244. For more
information on this vulnerability and its impact on Broadcom products,
see VMSA-2025-0015.

A minor enhancement has been made for Guest OS Customization. The
DeployPkg plugin has been updated to use "systemctl reboot", if available.

For a more complete list of issues addressed in this release, see the
What's New and Resolved Issues section of the Release Notes.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250373">SUSE bug 1250373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250692">SUSE bug 1250692</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038469" comment="libvmtools-devel-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038470" comment="libvmtools0-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038471" comment="open-vm-tools-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038472" comment="open-vm-tools-containerinfo-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038473" comment="open-vm-tools-desktop-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038475" comment="open-vm-tools-sdmp-13.0.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038469" comment="libvmtools-devel-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038470" comment="libvmtools0-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038471" comment="open-vm-tools-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038472" comment="open-vm-tools-containerinfo-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038473" comment="open-vm-tools-desktop-13.0.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038475" comment="open-vm-tools-sdmp-13.0.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94406" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249154" ref_url="https://bugzilla.suse.com/1249154" source="BUGZILLA"/>
		<reference ref_id="1252376" ref_url="https://bugzilla.suse.com/1252376" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2025-31133,CVE-2025-52565,CVE-2025-52881: container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1252376).
- CVE-2025-9566: kube play command may overwrite host files (bsc#1249154).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-21"/>
	<updated date="2026-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249154">SUSE bug 1249154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252376">SUSE bug 1252376</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039518" comment="podman-5.4.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039519" comment="podman-docker-5.4.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039520" comment="podman-remote-5.4.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039521" comment="podmansh-5.4.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039518" comment="podman-5.4.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039519" comment="podman-docker-5.4.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039520" comment="podman-remote-5.4.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039521" comment="podmansh-5.4.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94407" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255765" ref_url="https://bugzilla.suse.com/1255765" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11961" ref_url="https://www.suse.com/security/cve/CVE-2025-11961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043751.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds
  read and write (bsc#1255765).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1255765">SUSE bug 1255765</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11961/">CVE-2025-11961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11961">CVE-2025-11961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039638" comment="libpcap-devel-1.10.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039640" comment="libpcap1-1.10.5-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039638" comment="libpcap-devel-1.10.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039640" comment="libpcap1-1.10.5-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94408" version="1" class="patch">
	<metadata>
		<title>Security update for libheif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255735" ref_url="https://bugzilla.suse.com/1255735" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68431" ref_url="https://www.suse.com/security/cve/CVE-2025-68431/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043750.html" source="SUSE-SU"/>
		<description>
This update for libheif fixes the following issues:

- CVE-2025-68431: heap buffer over-read in `HeifPixelImage::overlay()` via crafted HEIF file that exercises the overlay
  image item path (bsc#1255735).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255735">SUSE bug 1255735</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68431/">CVE-2025-68431 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68431">CVE-2025-68431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039641" comment="gdk-pixbuf-loader-libheif-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039642" comment="libheif-aom-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039643" comment="libheif-dav1d-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039645" comment="libheif-ffmpeg-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039646" comment="libheif-jpeg-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039647" comment="libheif-openjpeg-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039648" comment="libheif-rav1e-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039649" comment="libheif-svtenc-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039650" comment="libheif1-1.19.7-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039641" comment="gdk-pixbuf-loader-libheif-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039642" comment="libheif-aom-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039643" comment="libheif-dav1d-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039645" comment="libheif-ffmpeg-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039646" comment="libheif-jpeg-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039647" comment="libheif-openjpeg-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039648" comment="libheif-rav1e-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039649" comment="libheif-svtenc-1.19.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039650" comment="libheif1-1.19.7-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94409" version="1" class="patch">
	<metadata>
		<title>Security update for go1.24 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1236217" ref_url="https://bugzilla.suse.com/1236217" source="BUGZILLA"/>
		<reference ref_id="1256816" ref_url="https://bugzilla.suse.com/1256816" source="BUGZILLA"/>
		<reference ref_id="1256817" ref_url="https://bugzilla.suse.com/1256817" source="BUGZILLA"/>
		<reference ref_id="1256818" ref_url="https://bugzilla.suse.com/1256818" source="BUGZILLA"/>
		<reference ref_id="1256819" ref_url="https://bugzilla.suse.com/1256819" source="BUGZILLA"/>
		<reference ref_id="1256820" ref_url="https://bugzilla.suse.com/1256820" source="BUGZILLA"/>
		<reference ref_id="1256821" ref_url="https://bugzilla.suse.com/1256821" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61730" ref_url="https://www.suse.com/security/cve/CVE-2025-61730/" source="CVE"/>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<description>
This update for go1.24 fixes the following issues:

Update to go1.24.12 (released 2026-01-15) (bsc#1236217)

Security fixes:

 - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
 - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
 - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
 - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
 - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
 - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).

Other fixes:

  * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
  * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
  * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
  * go#76796 runtime: race detector crash on ppc64le
  * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling &amp;lt;function&amp;gt;: runtime error: index out of range
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236217">SUSE bug 1236217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256816">SUSE bug 1256816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256817">SUSE bug 1256817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256819">SUSE bug 1256819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256820">SUSE bug 1256820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256821">SUSE bug 1256821</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61730/">CVE-2025-61730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039651" comment="go1.24-1.24.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039652" comment="go1.24-doc-1.24.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039653" comment="go1.24-libstd-1.24.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039654" comment="go1.24-race-1.24.12-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039651" comment="go1.24-1.24.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039652" comment="go1.24-doc-1.24.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039653" comment="go1.24-libstd-1.24.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039654" comment="go1.24-race-1.24.12-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94410" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253096" ref_url="https://bugzilla.suse.com/1253096" source="BUGZILLA"/>
		<reference ref_id="1253598" ref_url="https://bugzilla.suse.com/1253598" source="BUGZILLA"/>
		<reference ref_id="1254054" ref_url="https://bugzilla.suse.com/1254054" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2025-47914: golang.org/x/crypto/ssh/agent: Fixed non validated message size causing a panic due to an out
  of bounds read (bsc#1254054)
- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected
  message type in response to a key listing or signing request (bsc#1253598)
- CVE-2025-31133,CVE-2025-52565,CVE-2025-52881: Fixed container breakouts by bypassing runc's restrictions for writing to arbitrary /proc
  files (bsc#1253096)

Other fixes:

- Updated to version 1.39.5.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253096">SUSE bug 1253096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253598">SUSE bug 1253598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254054">SUSE bug 1254054</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039655" comment="buildah-1.39.5-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039655" comment="buildah-1.39.5-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94411" version="1" class="patch">
	<metadata>
		<title>Security update for python313 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244680" ref_url="https://bugzilla.suse.com/1244680" source="BUGZILLA"/>
		<reference ref_id="1244705" ref_url="https://bugzilla.suse.com/1244705" source="BUGZILLA"/>
		<reference ref_id="1247249" ref_url="https://bugzilla.suse.com/1247249" source="BUGZILLA"/>
		<reference ref_id="1251305" ref_url="https://bugzilla.suse.com/1251305" source="BUGZILLA"/>
		<reference ref_id="1252974" ref_url="https://bugzilla.suse.com/1252974" source="BUGZILLA"/>
		<reference ref_id="1254400" ref_url="https://bugzilla.suse.com/1254400" source="BUGZILLA"/>
		<reference ref_id="1254401" ref_url="https://bugzilla.suse.com/1254401" source="BUGZILLA"/>
		<reference ref_id="1254997" ref_url="https://bugzilla.suse.com/1254997" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<description>
This update for python313 fixes the following issues:

- Update to 3.13.11:

- Security
    - CVE-2025-12084: cpython: Fixed quadratic algorithm in
      xml.dom.minidom leading to denial of service (bsc#1254997)
    - CVE-2025-13836: Fixed default Content-Lenght read amount
      from HTTP response (bsc#1254400)
    - CVE-2025-13837: Fixed plistlib module denial of service (bsc#1254401)
    - CVE-2025-8291: Fixed validity of the ZIP64 End of Central Directory
      (EOCD) not checked by the 'zipfile' module (bsc#1251305)
    - gh-137836: Add support of the “plaintext” element, RAWTEXT
      elements “xmp”, “iframe”, “noembed” and “noframes”, and
      optionally RAWTEXT element “noscript” in
      html.parser.HTMLParser.
    - gh-136063: email.message: ensure linear complexity for
      legacy HTTP parameters parsing. Patch by B?n?dikt Tran.
    - CVE-2025-6075: Fixed performance issues caused by user-controller
      os.path.expandvars() (bsc#1252974)
- Library
    - gh-140797: Revert changes to the undocumented re.Scanner
      class. Capturing groups are still allowed for backward
      compatibility, although using them can lead to incorrect
      result. They will be forbidden in future Python versions.
    - gh-142206: The resource tracker in the multiprocessing
      module now uses the original communication protocol, as in
      Python 3.14.0 and below, by default. This avoids issues
      with upgrading Python while it is running. (Note that such
      ‘in-place’ upgrades are not tested.) The tracker remains
      compatible with subprocesses that use new protocol (that
      is, subprocesses using Python 3.13.10, 3.14.1 and 3.15).
- Core and Builtins
    - gh-142218: Fix crash when inserting into a split table
      dictionary with a non str key that matches an existing key.


- Update to 3.13.10:

- Tools/Demos
    - gh-141442: The iOS testbed now correctly handles test
      arguments that contain spaces.
- Tests
    - gh-140482: Preserve and restore the state of stty echo as
      part of the test environment.
    - gh-140082: Update python -m test to set FORCE_COLOR=1 when
      being run with color enabled so that unittest which is run
      by it with redirected output will output in color.
    - gh-136442: Use exitcode 1 instead of 5 if
      unittest.TestCase.setUpClass() raises an exception
- Library
    - gh-74389: When the stdin being used by a subprocess.Popen
      instance is closed, this is now ignored in
      subprocess.Popen.communicate() instead of leaving the class
      in an inconsistent state.
    - gh-87512: Fix subprocess.Popen.communicate() timeout
      handling on Windows when writing large input. Previously,
      the timeout was ignored during stdin writing, causing the
      method to block indefinitely if the child process did not
      consume input quickly. The stdin write is now performed in
      a background thread, allowing the timeout to be properly
      enforced.
    - gh-141473: When subprocess.Popen.communicate() was called
      with input and a timeout and is called for a second time
      after a TimeoutExpired exception before the process has
      died, it should no longer hang.
    - gh-59000: Fix pdb breakpoint resolution for class methods
      when the module defining the class is not imported.
    - gh-141570: Support file-like object raising OSError from
      fileno() in color detection (_colorize.can_colorize()).
      This can occur when sys.stdout is redirected.
    - gh-141659: Fix bad file descriptor errors from
      _posixsubprocess on AIX.
    - gh-141497: ipaddress: ensure that the methods
      IPv4Network.hosts() and IPv6Network.hosts() always return
      an iterator.
    - gh-140938: The statistics.stdev() and statistics.pstdev()
      functions now raise a ValueError when the input contains an
      infinity or a NaN.
    - gh-124111: Updated Tcl threading configuration in _tkinter
      to assume that threads are always available in Tcl 9 and
      later.
    - gh-137109: The os.fork and related forking APIs will no
      longer warn in the common case where Linux or macOS
      platform APIs return the number of threads in a process and
      find the answer to be 1 even when a os.register_at_fork()
      after_in_parent= callback (re)starts a thread.
    - gh-141314: Fix assertion failure in io.TextIOWrapper.tell()
      when reading files with standalone carriage return (\r)
      line endings.
    - gh-141311: Fix assertion failure in io.BytesIO.readinto()
      and undefined behavior arising when read position is above
      capcity in io.BytesIO.
    - gh-141141: Fix a thread safety issue with
      base64.b85decode(). Contributed by Benel Tayar.
    - gh-140911: collections: Ensure that the methods
      UserString.rindex() and UserString.index() accept
      collections.UserString instances as the sub argument.
    - gh-140797: The undocumented re.Scanner class now forbids
      regular expressions containing capturing groups in its
      lexicon patterns. Patterns using capturing groups could
      previously lead to crashes with segmentation fault. Use
      non-capturing groups (?:…) instead.
    - gh-140815: faulthandler now detects if a frame or a code
      object is invalid or freed. Patch by Victor Stinner.
    - gh-100218: Correctly set errno when socket.if_nametoindex()
      or socket.if_indextoname() raise an OSError. Patch by
      B?n?dikt Tran.
    - gh-140875: Fix handling of unclosed character references
      (named and numerical) followed by the end of file in
      html.parser.HTMLParser with convert_charrefs=False.
    - gh-140734: multiprocessing: fix off-by-one error when
      checking the length of a temporary socket file path. Patch
      by B?n?dikt Tran.
    - gh-140874: Bump the version of pip bundled in ensurepip to
      version 25.3
    - gh-140691: In urllib.request, when opening a FTP URL fails
      because a data connection cannot be made, the control
      connection’s socket is now closed to avoid
      a ResourceWarning.
    - gh-103847: Fix hang when cancelling process created by
      asyncio.create_subprocess_exec() or
      asyncio.create_subprocess_shell(). Patch by Kumar Aditya.
    - gh-140590: Fix arguments checking for the
      functools.partial.__setstate__() that may lead to internal
      state corruption and crash. Patch by Sergey Miryanov.
    - gh-140634: Fix a reference counting bug in
      os.sched_param.__reduce__().
    - gh-140633: Ignore AttributeError when setting a module’s
      __file__ attribute when loading an extension module
      packaged as Apple Framework.
    - gh-140593: xml.parsers.expat: Fix a memory leak that could
      affect users with ElementDeclHandler() set to a custom
      element declaration handler. Patch by Sebastian Pipping.
    - gh-140607: Inside io.RawIOBase.read(), validate that the
      count of bytes returned by io.RawIOBase.readinto() is valid
      (inside the provided buffer).
    - gh-138162: Fix logging.LoggerAdapter with merge_extra=True
      and without the extra argument.
    - gh-140474: Fix memory leak in array.array when creating
      arrays from an empty str and the u type code.
    - gh-140272: Fix memory leak in the clear() method of the
      dbm.gnu database.
    - gh-140041: Fix import of ctypes on Android and Cygwin when
      ABI flags are present.
    - gh-139905: Add suggestion to error message for
      typing.Generic subclasses when cls.__parameters__ is
      missing due to a parent class failing to call
      super().__init_subclass__() in its __init_subclass__.
    - gh-139845: Fix to not print KeyboardInterrupt twice in
      default asyncio REPL.
    - gh-139783: Fix inspect.getsourcelines() for the case when
      a decorator is followed by a comment or an empty line.
    - gh-70765: http.server: fix default handling of HTTP/0.9
      requests in BaseHTTPRequestHandler. Previously,
      BaseHTTPRequestHandler.parse_request() incorrectly waited
      for headers in the request although those are not supported
      in HTTP/0.9. Patch by B?n?dikt Tran.
    - gh-139391: Fix an issue when, on non-Windows platforms, it
      was not possible to gracefully exit a python -m asyncio
      process suspended by Ctrl+Z and later resumed by fg other
      than with kill.
    - gh-101828: Fix 'shift_jisx0213', 'shift_jis_2004',
      'euc_jisx0213' and 'euc_jis_2004' codecs truncating null
      chars as they were treated as part of multi-character
      sequences.
    - gh-139246: fix: paste zero-width in default repl width is
      wrong.
    - gh-90949: Add SetAllocTrackerActivationThreshold() and
      SetAllocTrackerMaximumAmplification() to xmlparser objects
      to prevent use of disproportional amounts of dynamic memory
      from within an Expat parser. Patch by B?n?dikt Tran.
    - gh-139065: Fix trailing space before a wrapped long word if
      the line length is exactly width in textwrap.
    - gh-138993: Dedent credits text.
    - gh-138859: Fix generic type parameterization raising
      a TypeError when omitting a ParamSpec that has a default
      which is not a list of types.
    - gh-138775: Use of python -m with base64 has been fixed to
      detect input from a terminal so that it properly notices
      EOF.
    - gh-98896: Fix a failure in multiprocessing resource_tracker
      when SharedMemory names contain colons. Patch by Rani
      Pinchuk.
    - gh-75989: tarfile.TarFile.extractall() and
      tarfile.TarFile.extract() now overwrite symlinks when
      extracting hardlinks. (Contributed by Alexander Enrique
      Urieles Nieto in gh-75989.)
    - gh-83424: Allows creating a ctypes.CDLL without name when
      passing a handle as an argument.
    - gh-136234: Fix asyncio.WriteTransport.writelines() to be
      robust to connection failure, by using the same behavior as
      write().
    - gh-136057: Fixed the bug in pdb and bdb where next and step
      can’t go over the line if a loop exists in the line.
    - gh-135307: email: Fix exception in set_content() when
      encoding text and max_line_length is set to 0 or None
      (unlimited).
    - gh-134453: Fixed subprocess.Popen.communicate() input=
      handling of memoryview instances that were non-byte shaped
      on POSIX platforms. Those are now properly cast to a byte
      shaped view instead of truncating the input. Windows
      platforms did not have this bug.
    - gh-102431: Clarify constraints for “logical” arguments in
      methods of decimal.Context.
- IDLE
    - gh-96491: Deduplicate version number in IDLE shell title
      bar after saving to a file.
- Documentation
    - gh-141994: xml.sax.handler: Make Documentation of
      xml.sax.handler.feature_external_ges warn of opening up to
      external entity attacks. Patch by Sebastian Pipping.
    - gh-140578: Remove outdated sencence in the documentation
      for multiprocessing, that implied that
      concurrent.futures.ThreadPoolExecutor did not exist.
- Core and Builtins
    - gh-142048: Fix quadratically increasing garbage collection
      delays in free-threaded build.
    - gh-141930: When importing a module, use Python’s regular
      file object to ensure that writes to .pyc files are
      complete or an appropriate error is raised.
    - gh-120158: Fix inconsistent state when enabling or
      disabling monitoring events too many times.
    - gh-141579: Fix sys.activate_stack_trampoline() to properly
      support the perf_jit backend. Patch by Pablo Galindo.
    - gh-141312: Fix the assertion failure in the __setstate__
      method of the range iterator when a non-integer argument is
      passed. Patch by Sergey Miryanov.
    - gh-140939: Fix memory leak when bytearray or bytes is
      formated with the
      %*b format with a large width that results in
      %a MemoryError.
    - gh-140530: Fix a reference leak when raise exc from cause
      fails. Patch by B?n?dikt Tran.
    - gh-140576: Fixed crash in tokenize.generate_tokens() in
      case of specific incorrect input. Patch by Mikhail Efimov.
    - gh-140551: Fixed crash in dict if dict.clear() is called at
      the lookup stage. Patch by Mikhail Efimov and Inada Naoki.
    - gh-140471: Fix potential buffer overflow in ast.AST node
      initialization when encountering malformed _fields
      containing non-str.
    - gh-140406: Fix memory leak when an object’s __hash__()
      method returns an object that isn’t an int.
    - gh-140306: Fix memory leaks in cross-interpreter channel
      operations and shared namespace handling.
    - gh-140301: Fix memory leak of PyConfig in subinterpreters.
    - gh-140000: Fix potential memory leak when a reference cycle
      exists between an instance of typing.TypeAliasType,
      typing.TypeVar, typing.ParamSpec, or typing.TypeVarTuple
      and its __name__ attribute. Patch by Mikhail Efimov.
    - gh-139748: Fix reference leaks in error branches of
      functions accepting path strings or bytes such as compile()
      and os.system(). Patch by B?n?dikt Tran.
    - gh-139516: Fix lambda colon erroneously start format spec
      in f-string in tokenizer.
    - gh-139640: Fix swallowing some syntax warnings in different
      modules if they accidentally have the same message and are
      emitted from the same line. Fix duplicated warnings in the
      finally block.
    - gh-137400: Fix a crash in the free threading build when
      disabling profiling or tracing across all threads with
      PyEval_SetProfileAllThreads() or
      PyEval_SetTraceAllThreads() or their Python equivalents
      threading.settrace_all_threads() and
      threading.setprofile_all_threads().
    - gh-133400: Fixed Ctrl+D (^D) behavior in _pyrepl module to
      match old pre-3.13 REPL behavior.
- C API
    - gh-140042: Removed the sqlite3_shutdown call that could
      cause closing connections for sqlite when used with
      multiple sub interpreters.
    - gh-140487: Fix Py_RETURN_NOTIMPLEMENTED in limited C API
      3.11 and older: don’t treat Py_NotImplemented as immortal.
      Patch by Victor Stinner.

- Update to 3.13.9:

  - Library
    - gh-139783: Fix inspect.getsourcelines() for the case when a
      decorator is followed by a comment or an empty line.

- Update to 3.13.8:

  - Tools/Demos
    - gh-139330: SBOM generation tool didn’t cross-check the version
      and checksum values against the Modules/expat/refresh.sh script,
      leading to the values becoming out-of-date during routine
      updates.
    - gh-137873: The iOS test runner has been simplified, resolving
      some issues that have been observed using the runner in GitHub
      Actions and Azure Pipelines test environments.
  - Tests
    - gh-139208: Fix regrtest --fast-ci --verbose: don’t ignore the
      --verbose option anymore. Patch by Victor Stinner.
  - Security
    - gh-139400: xml.parsers.expat: Make sure that parent Expat
      parsers are only garbage-collected once they are no longer
      referenced by subparsers created by
      ExternalEntityParserCreate(). Patch by Sebastian Pipping.
    - gh-139283: sqlite3: correctly handle maximum number of rows to
      fetch in Cursor.fetchmany and reject negative values for
      Cursor.arraysize. Patch by B?n?dikt Tran.
    - gh-135661: Fix CDATA section parsing in html.parser.HTMLParser
      according to the HTML5 standard: ] ]&gt; and ]] &gt; no longer end the
      CDATA section. Add private method _set_support_cdata() which can
      be used to specify how to parse &lt;[CDATA[ — as a CDATA section in
      foreign content (SVG or MathML) or as a bogus comment in the
      HTML namespace.
  - Library
    - gh-139312: Upgrade bundled libexpat to 2.7.3
    - gh-139289: Do a real lazy-import on rlcompleter in pdb and
      restore the existing completer after importing rlcompleter.
    - gh-139210: Fix use-after-free when reporting unknown event in
      xml.etree.ElementTree.iterparse(). Patch by Ken Jin.
    - gh-138860: Lazy import rlcompleter in pdb to avoid deadlock in
      subprocess.
    - gh-112729: Fix crash when calling _interpreters.create when the
      process is out of memory.
    - gh-139076: Fix a bug in the pydoc module that was hiding
      functions in a Python module if they were implemented in an
      extension module and the module did not have __all__.
    - gh-138998: Update bundled libexpat to 2.7.2
    - gh-130567: Fix possible crash in locale.strxfrm() due to a
      platform bug on macOS.
    - gh-138779: Support device numbers larger than 2**63-1 for the
      st_rdev field of the os.stat_result structure.
    - gh-128636: Fix crash in PyREPL when os.environ is overwritten
      with an invalid value for mac
    - gh-88375: Fix normalization of the robots.txt rules and URLs in
      the urllib.robotparser module. No longer ignore trailing ?.
      Distinguish raw special characters ?, = and &amp; from the
      percent-encoded ones.
    - gh-138515: email is added to Emscripten build.
    - gh-111788: Fix parsing errors in the urllib.robotparser module.
      Don’t fail trying to parse weird paths. Don’t fail trying to
      decode non-UTF-8 robots.txt files.
    - gh-138432: zoneinfo.reset_tzpath() will now convert any
      os.PathLike objects it receives into strings before adding them
      to TZPATH. It will raise TypeError if anything other than a
      string is found after this conversion. If given an os.PathLike
      object that represents a relative path, it will now raise
      ValueError instead of TypeError, and present a more informative
      error message.
    - gh-138008: Fix segmentation faults in the ctypes module due to
      invalid argtypes. Patch by Dung Nguyen.
    - gh-60462: Fix locale.strxfrm() on Solaris (and possibly other
      platforms).
    - gh-138204: Forbid expansion of shared anonymous memory maps on
      Linux, which caused a bus error.
    - gh-138010: Fix an issue where defining a class with a
      @warnings.deprecated-decorated base class may not invoke the
      correct __init_subclass__() method in cases involving multiple
      inheritance. Patch by Brian Schubert.
    - gh-138133: Prevent infinite traceback loop when sending CTRL^C
      to Python through strace.
    - gh-134869: Fix an issue where pressing Ctrl+C during tab
      completion in the REPL would leave the autocompletion menu in a
      corrupted state.
    - gh-137317: inspect.signature() now correctly handles classes
      that use a descriptor on a wrapped __init__() or __new__()
      method. Contributed by Yongyu Yan.
    - gh-137754: Fix import of the zoneinfo module if the C
      implementation of the datetime module is not available.
    - gh-137490: Handle ECANCELED in the same way as EINTR in
      signal.sigwaitinfo() on NetBSD.
    - gh-137477: Fix inspect.getblock(), inspect.getsourcelines() and
      inspect.getsource() for generator expressions.
    - gh-137017: Fix threading.Thread.is_alive to remain True until
      the underlying OS thread is fully cleaned up. This avoids false
      negatives in edge cases involving thread monitoring or premature
      threading.Thread.is_alive calls.
    - gh-136134: SMTP.auth_cram_md5() now raises an SMTPException
      instead of a ValueError if Python has been built without MD5
      support. In particular, SMTP clients will not attempt to use
      this method even if the remote server is assumed to support it.
      Patch by B?n?dikt Tran.
    - gh-136134: IMAP4.login_cram_md5 now raises an IMAP4.error if
      CRAM-MD5 authentication is not supported. Patch by B?n?dikt
      Tran.
    - gh-135386: Fix opening a dbm.sqlite3 database for reading from
      read-only file or directory.
    - gh-126631: Fix multiprocessing forkserver bug which prevented
      __main__ from being preloaded.
    - gh-123085: In a bare call to importlib.resources.files(), ensure
      the caller’s frame is properly detected when importlib.resources
      is itself available as a compiled module only (no source).
    - gh-118981: Fix potential hang in
      multiprocessing.popen_spawn_posix that can happen when the child
      proc dies early by closing the child fds right away.
    - gh-78319: UTF8 support for the IMAP APPEND command has been made
      RFC compliant.
    - bpo-38735: Fix failure when importing a module from the root
      directory on unix-like platforms with sys.pycache_prefix set.
    - bpo-41839: Allow negative priority values from
      os.sched_get_priority_min() and os.sched_get_priority_max()
      functions.
  - Core and Builtins
    - gh-134466: Don’t run PyREPL in a degraded environment where
      setting termios attributes is not allowed.
    - gh-71810: Raise OverflowError for (-1).to_bytes() for signed
      conversions when bytes count is zero. Patch by Sergey B
      Kirpichev.
    - gh-105487: Remove non-existent __copy__(), __deepcopy__(), and
      __bases__ from the __dir__() entries of types.GenericAlias.
    - gh-134163: Fix a hang when the process is out of memory inside
      an exception handler.
    - gh-138479: Fix a crash when a generic object’s __typing_subst__
      returns an object that isn’t a tuple.
    - gh-137576: Fix for incorrect source code being shown in
      tracebacks from the Basic REPL when PYTHONSTARTUP is given.
      Patch by Adam Hartz.
    - gh-132744: Certain calls now check for runaway recursion and
      respect the system recursion limit.
  - C API
    - gh-87135: Attempting to acquire the GIL after runtime
      finalization has begun in a different thread now causes the
      thread to hang rather than terminate, which avoids potential
      crashes or memory corruption caused by attempting to terminate a
      thread that is running code not specifically designed to support
      termination. In most cases this hanging is harmless since the
      process will soon exit anyway.
      While not officially marked deprecated until 3.14,
      PyThread_exit_thread is no longer called internally and remains
      solely for interface compatibility. Its behavior is inconsistent
      across platforms, and it can only be used safely in the unlikely
      case that every function in the entire call stack has been
      designed to support the platform-dependent termination
      mechanism. It is recommended that users of this function change
      their design to not require thread termination. In the unlikely
      case that thread termination is needed and can be done safely,
      users may migrate to calling platform-specific APIs such as
      pthread_exit (POSIX) or _endthreadex (Windows) directly.
  - Build
    - gh-135734: Python can correctly be configured and built with
      ./configure --enable-optimizations --disable-test-modules.
      Previously, the profile data generation step failed due to PGO
      tests where immortalization couldn’t be properly suppressed.


- Update to 3.13.7:

  - gh-137583: Fix a deadlock introduced in 3.13.6 when a call
    to ssl.SSLSocket.recv was blocked in one thread, and then
    another method on the object (such as ssl.SSLSocket.send) was
    subsequently called in another thread.
  - gh-137044: Return large limit values as positive integers
    instead of negative integers in resource.getrlimit().
    Accept large values and reject negative values (except
    RLIM_INFINITY) for limits in resource.setrlimit().
  - gh-136914: Fix retrieval of doctest.DocTest.lineno
    for objects decorated with functools.cache() or
    functools.cached_property.
  - gh-131788: Make ResourceTracker.send from multiprocessing
    re-entrant safe
  - gh-136155: We are now checking for fatal errors in EPUB
    builds in CI.
  - gh-137400: Fix a crash in the free threading build when
    disabling profiling or tracing across all threads with
    PyEval_SetProfileAllThreads() or PyEval_SetTraceAllThreads()
    or their Python equivalents threading.settrace_all_threads()
    and threading.setprofile_all_threads().


- Update to 3.13.6:

  - Security
    - gh-135661: Fix parsing start and end tags in
      html.parser.HTMLParser according to the HTML5 standard.
    - gh-102555: Fix comment parsing in html.parser.HTMLParser
      according to the HTML5 standard.
    - CVE-2025-6069: Fix quadratic complexity in processing specially
      crafted input in html.parser.HTMLParser. End-of-file errors
      are now handled according to the HTML5 specs – comments and
      declarations are automatically closed, tags are ignored
      (gh-135462, bsc#1244705).
    - CVE-2025-8194: tarfile now validates archives to ensure member
      offsets are non-negative. (gh-130577, bsc#1247249).
    - gh-118350: Fix support of escapable raw text mode (elements
      “textarea” and “title”) in html.parser.HTMLParser.
  - Core and Builtins
    - gh-58124: Fix name of the Python encoding in Unicode errors
      of the code page codec: use “cp65000” and “cp65001” instead
      of “CP_UTF7” and “CP_UTF8” which are not valid Python code
      names. Patch by Victor Stinner.
    - gh-137314: Fixed a regression where raw f-strings
      incorrectly interpreted escape sequences in format
      specifications. Raw f-strings now properly preserve literal
      backslashes in format specs, matching the behavior from
      Python 3.11. For example, rf"{obj:\xFF}" now correctly
      produces '\\xFF' instead of '?'. Patch by Pablo Galindo.
    - gh-136541: Fix some issues with the perf trampolines
      on x86-64 and aarch64. The trampolines were not being
      generated correctly for some cases, which could lead to
      the perf integration not working correctly. Patch by Pablo
      Galindo.
    - gh-109700: Fix memory error handling in
      PyDict_SetDefault().
    - gh-78465: Fix error message for cls.__new__(cls, ...) where
      cls is not instantiable builtin or extension type (with
      tp_new set to NULL).
    - gh-135871: Non-blocking mutex lock attempts now return
      immediately when the lock is busy instead of briefly
      spinning in the free threading build.
    - gh-135607: Fix potential weakref races in an object’s
      destructor on the free threaded build.
    - gh-135496: Fix typo in the f-string conversion type error
      (“exclamanation” -&gt; “exclamation”).
    - gh-130077: Properly raise custom syntax errors when
      incorrect syntax containing names that are prefixes of soft
      keywords is encountered. Patch by Pablo Galindo.
    - gh-135148: Fixed a bug where f-string debug expressions
      (using =) would incorrectly strip out parts of strings
      containing escaped quotes and # characters. Patch by Pablo
      Galindo.
    - gh-133136: Limit excess memory usage in the free threading
      build when a large dictionary or list is resized and
      accessed by multiple threads.
    - gh-132617: Fix dict.update() modification check that could
      incorrectly raise a “dict mutated during update” error when
      a different dictionary was modified that happens to share
      the same underlying keys object.
    - gh-91153: Fix a crash when a bytearray is concurrently
      mutated during item assignment.
    - gh-127971: Fix off-by-one read beyond the end of a string
      in string search.
    - gh-125723: Fix crash with gi_frame.f_locals when generator
      frames outlive their generator. Patch by Mikhail Efimov.
  - Library
    - gh-132710: If possible, ensure that uuid.getnode()
      returns the same result even across different processes.
      Previously, the result was constant only within the same
      process. Patch by B?n?dikt Tran.
    - gh-137273: Fix debug assertion failure in
      locale.setlocale() on Windows.
    - gh-137257: Bump the version of pip bundled in ensurepip to
      version 25.2
    - gh-81325: tarfile.TarFile now accepts a path-like when
      working on a tar archive. (Contributed by Alexander Enrique
      Urieles Nieto in gh-81325.)
    - gh-130522: Fix unraisable TypeError raised during
      interpreter shutdown in the threading module.
    - gh-136549: Fix signature of threading.excepthook().
    - gh-136523: Fix wave.Wave_write emitting an unraisable when
      open raises.
    - gh-52876: Add missing keepends (default True)
      parameter to codecs.StreamReaderWriter.readline() and
      codecs.StreamReaderWriter.readlines().
    - gh-85702: If zoneinfo._common.load_tzdata is given a
      package without a resource a zoneinfo.ZoneInfoNotFoundError
      is raised rather than a PermissionError. Patch by Victor
      Stinner.
    - gh-134759: Fix UnboundLocalError in
      email.message.Message.get_payload() when the payload to
      decode is a bytes object. Patch by Kliment Lamonov.
    - gh-136028: Fix parsing month names containing “İ” (U+0130,
      LATIN CAPITAL LETTER I WITH DOT ABOVE) in time.strptime().
      This affects locales az_AZ, ber_DZ, ber_MA and crh_UA.
    - gh-135995: In the palmos encoding, make byte 0x9b decode to
      › (U+203A - SINGLE RIGHT-POINTING ANGLE QUOTATION MARK).
    - gh-53203: Fix time.strptime() for %c and %x formats on
      locales byn_ER, wal_ET and lzh_TW, and for %X format on
      locales ar_SA, bg_BG and lzh_TW.
    - gh-91555: An earlier change, which was introduced in
      3.13.4, has been reverted. It disabled logging for a logger
      during handling of log messages for that logger. Since the
      reversion, the behaviour should be as it was before 3.13.4.
    - gh-135878: Fixes a crash of types.SimpleNamespace on free
      threading builds, when several threads were calling its
      __repr__() method at the same time.
    - gh-135836: Fix IndexError in
      asyncio.loop.create_connection() that could occur when
      non-OSError exception is raised during connection and
      socket’s close() raises OSError.
    - gh-135836: Fix IndexError in
      asyncio.loop.create_connection() that could occur when the
      Happy Eyeballs algorithm resulted in an empty exceptions
      list during connection attempts.
    - gh-135855: Raise TypeError instead of SystemError when
      _interpreters.set___main___attrs() is passed a non-dict
      object. Patch by Brian Schubert.
    - gh-135815: netrc: skip security checks if os.getuid() is
      missing. Patch by B?n?dikt Tran.
    - gh-135640: Address bug where it was possible to call
      xml.etree.ElementTree.ElementTree.write() on an ElementTree
      object with an invalid root element. This behavior blanked
      the file passed to write if it already existed.
    - gh-135444: Fix asyncio.DatagramTransport.sendto() to
      account for datagram header size when data cannot be sent.
    - gh-135497: Fix os.getlogin() failing for longer usernames
      on BSD-based platforms.
    - gh-135487: Fix reprlib.Repr.repr_int() when given integers
      with more than sys.get_int_max_str_digits() digits. Patch
      by B?n?dikt Tran.
    - gh-135335: multiprocessing: Flush stdout and stderr after
      preloading modules in the forkserver.
    - gh-135244: uuid: when the MAC address cannot be
      determined, the 48-bit node ID is now generated with a
      cryptographically-secure pseudo-random number generator
      (CSPRNG) as per RFC 9562, ?6.10.3. This affects uuid1().
    - gh-135069: Fix the “Invalid error handling” exception in
      encodings.idna.IncrementalDecoder to correctly replace the
      ‘errors’ parameter.
    - gh-134698: Fix a crash when calling methods of
      ssl.SSLContext or ssl.SSLSocket across multiple threads.
    - gh-132124: On POSIX-compliant systems,
      multiprocessing.util.get_temp_dir() now ignores TMPDIR
      (and similar environment variables) if the path length of
      AF_UNIX socket files exceeds the platform-specific maximum
      length when using the forkserver start method. Patch by
      B?n?dikt Tran.
    - gh-133439: Fix dot commands with trailing spaces are
      mistaken for multi-line SQL statements in the sqlite3
      command-line interface.
    - gh-132969: Prevent the ProcessPoolExecutor executor thread,
      which remains running when shutdown(wait=False), from
      attempting to adjust the pool’s worker processes after
      the object state has already been reset during shutdown.
      A combination of conditions, including a worker process
      having terminated abormally, resulted in an exception and
      a potential hang when the still-running executor thread
      attempted to replace dead workers within the pool.
    - gh-130664: Support the '_' digit separator in formatting
      of the integral part of Decimal’s. Patch by Sergey B
      Kirpichev.
    - gh-85702: If zoneinfo._common.load_tzdata is given a
      package without a resource a ZoneInfoNotFoundError is
      raised rather than a IsADirectoryError.
    - gh-130664: Handle corner-case for Fraction’s formatting:
      treat zero-padding (preceding the width field by a zero
      ('0') character) as an equivalent to a fill character of
      '0' with an alignment type of '=', just as in case of
      float’s.
  - Tools/Demos
    - gh-135968: Stubs for strip are now provided as part of an
      iOS install.
  - Tests
    - gh-135966: The iOS testbed now handles the app_packages
      folder as a site directory.
    - gh-135494: Fix regrtest to support excluding tests from
      --pgo tests. Patch by Victor Stinner.
    - gh-135489: Show verbose output for failing tests during PGO
      profiling step with –enable-optimizations.
  - Documentation
    - gh-135171: Document that the iterator for the leftmost for
      clause in the generator expression is created immediately.
  - Build
    - gh-135497: Fix the detection of MAXLOGNAME in the
      configure.ac script.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244680">SUSE bug 1244680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244705">SUSE bug 1244705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247249">SUSE bug 1247249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251305">SUSE bug 1251305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252974">SUSE bug 1252974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254400">SUSE bug 1254400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254401">SUSE bug 1254401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254997">SUSE bug 1254997</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94412" version="1" class="patch">
	<metadata>
		<title>Security update for rabbitmq-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246091" ref_url="https://bugzilla.suse.com/1246091" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-30219" ref_url="https://www.suse.com/security/cve/CVE-2025-30219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043747.html" source="SUSE-SU"/>
		<description>
This update for rabbitmq-server fixes the following issues:

Changes in rabbitmq-server:

Update to 4.1.5:

* Highlights

  - Khepri, an alternative schema data store developed to replace Mnesia,
    has matured and is now fully supported (it previously was an experimental feature)
  - AMQP 1.0 is now a core protocol that is always enabled. Its plugin is now a no-op that only exists to simplify upgrades.
  - The AMQP 1.0 implementation is now significantly more efficient: its peak throughput is more than double than that of 3.13.x
    on some workloads
  - Efficient sub-linear quorum queue recovery on node startup using checkpoints
  - Quorum queues now support priorities (but not exactly the same way as classic queues)
  - AMQP 1.0 clients now can manage topologies similarly to how AMQP 0-9-1 clients do it
  - The AMQP 1.0 convention (address format) used for interacting with with AMQP 0-9-1 entities is now easier to reason about
  - Mirroring (replication) of classic queues was removed after several years of deprecation. For replicated messaging data types,
    use quorum queues and/or streams. Non-replicated classic queues remain and their development continues
  - Classic queue storage efficiency improvements, in particular recovery time and storage of multi-MiB messages
  - Nodes with multiple enabled plugins and little on disk data to recover now start up to 20-30% faster
  - New exchange type: Local Random Exchange
  - Quorum queue log reads are now offloaded to channels (sessions, connections).
  - Initial Support for AMQP 1.0 Filter Expressions
  - Feature Flags Quality of Life Improvements
  - rabbitmqadmin v2

* Breaking Changes

  - Before a client connection can negotiate a maximum frame size (frame_max), it must authenticate
    successfully. Before the authenticated phase, a special lower frame_max value
    is used.
  - With this release, the value was increased from the original 4096 bytes to 8192
    to accommodate larger JWT tokens.
  - amqplib is a popular client library that has been using
    a low frame_max default of 4096. Its users must upgrade to a compatible version
    (starting with 0.10.7) or explicitly use a higher frame_max.
    amqplib versions older than 0.10.7 will not be able to connect to
    RabbitMQ 4.1.0 and later versions due to the initial AMQP 0-9-1 maximum frame size
    increase covered above.
  - The default MQTT Maximum Packet Size changed from 256 MiB to 16 MiB.
  - The following rabbitmq.conf settings are unsupported:

    - cluster_formation.etcd.ssl_options.fail_if_no_peer_cert
    - cluster_formation.etcd.ssl_options.dh
    - cluster_formation.etcd.ssl_options.dhfile

  - Classic Queues is Now a Non-Replicated Queue Type
  - Quorum Queues Now Have a Default Redelivery Limit
  - Up to RabbitMQ 3.13, when an AMQP 0.9.1 client (re-)published a message to RabbitMQ, RabbitMQ interpreted the
  - AMQP 0.9.1 x-death header in the published message's basic_message.content.properties.headers field.
  - RabbitMQ 4.x will not interpret this x-death header anymore when clients (re-)publish a message.
  - CQv1 Storage Implementation was Removed
  - Settings cluster_formation.randomized_startup_delay_range.* were Removed
  - Several Disk I/O-Related Metrics were Removed
  - Default Maximum Message Size Reduced to 16 MiB
  - RabbitMQ 3.13 rabbitmq.conf setting rabbitmq_amqp1_0.default_vhost is unsupported in RabbitMQ 4.0.
  - RabbitMQ 3.13 rabbitmq.conf settings mqtt.default_user, mqtt.default_password,
    and amqp1_0.default_user are unsupported in RabbitMQ 4.0.
  - Starting with Erlang 26, client side TLS peer certificate chain verification settings are enabled by default in most contexts:
    from federation links to shovels to TLS-enabled LDAP client connections.
  - RabbitMQ Shovels will be able connect to a RabbitMQ 4.0 node via AMQP 1.0 only when the Shovel runs on a RabbitMQ node &gt;= 3.13.7.

    * See https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.0.1
    * and https://github.com/rabbitmq/rabbitmq-server/releases/tag/v4.1.0 for more info

- Restore SLES logrotate file, (bsc#1246091)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246091">SUSE bug 1246091</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30219/">CVE-2025-30219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30219">CVE-2025-30219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039681" comment="erlang-rabbitmq-client-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039682" comment="rabbitmq-server-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039683" comment="rabbitmq-server-bash-completion-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039684" comment="rabbitmq-server-plugins-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039685" comment="rabbitmq-server-zsh-completion-4.1.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039681" comment="erlang-rabbitmq-client-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039682" comment="rabbitmq-server-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039683" comment="rabbitmq-server-bash-completion-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039684" comment="rabbitmq-server-plugins-4.1.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039685" comment="rabbitmq-server-zsh-completion-4.1.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94413" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256525" ref_url="https://bugzilla.suse.com/1256525" source="BUGZILLA"/>
		<reference ref_id="1256526" ref_url="https://bugzilla.suse.com/1256526" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695/" source="CVE"/>
		<reference ref_id="CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043746.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

- CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525).
- CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in png_image_write_* (bsc#1256526).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256525">SUSE bug 1256525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256526">SUSE bug 1256526</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039686" comment="libpng16-16-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039687" comment="libpng16-16-x86-64-v3-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039688" comment="libpng16-compat-devel-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039689" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039690" comment="libpng16-devel-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039691" comment="libpng16-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039692" comment="libpng16-tools-1.6.44-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039686" comment="libpng16-16-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039687" comment="libpng16-16-x86-64-v3-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039688" comment="libpng16-compat-devel-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039689" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039690" comment="libpng16-devel-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039691" comment="libpng16-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039692" comment="libpng16-tools-1.6.44-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94414" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1245227" ref_url="https://bugzilla.suse.com/1245227" source="BUGZILLA"/>
		<reference ref_id="1246114" ref_url="https://bugzilla.suse.com/1246114" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6199" ref_url="https://www.suse.com/security/cve/CVE-2025-6199/" source="CVE"/>
		<reference ref_id="CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043744.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2025-7345: heap buffer overflow in gdk-pixbuf within the gdk_pixbuf__jpeg_image_load_increment function
  (io-jpeg.c) and in glib g_base64_encode_step (bsc#1246114).
- CVE-2025-6199: uninitialized memory could lead to leak arbitrary memory contents (bsc#1245227).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1245227">SUSE bug 1245227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246114">SUSE bug 1246114</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6199/">CVE-2025-6199 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6199">CVE-2025-6199 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039693" comment="gdk-pixbuf-devel-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039694" comment="gdk-pixbuf-lang-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039695" comment="gdk-pixbuf-query-loaders-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039696" comment="gdk-pixbuf-thumbnailer-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039697" comment="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039698" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039699" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039693" comment="gdk-pixbuf-devel-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039694" comment="gdk-pixbuf-lang-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039695" comment="gdk-pixbuf-query-loaders-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039696" comment="gdk-pixbuf-thumbnailer-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039697" comment="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039698" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039699" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94415" version="1" class="patch">
	<metadata>
		<title>Security update for go1.25 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244485" ref_url="https://bugzilla.suse.com/1244485" source="BUGZILLA"/>
		<reference ref_id="1256816" ref_url="https://bugzilla.suse.com/1256816" source="BUGZILLA"/>
		<reference ref_id="1256817" ref_url="https://bugzilla.suse.com/1256817" source="BUGZILLA"/>
		<reference ref_id="1256818" ref_url="https://bugzilla.suse.com/1256818" source="BUGZILLA"/>
		<reference ref_id="1256819" ref_url="https://bugzilla.suse.com/1256819" source="BUGZILLA"/>
		<reference ref_id="1256820" ref_url="https://bugzilla.suse.com/1256820" source="BUGZILLA"/>
		<reference ref_id="1256821" ref_url="https://bugzilla.suse.com/1256821" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61730" ref_url="https://www.suse.com/security/cve/CVE-2025-61730/" source="CVE"/>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<description>
This update for go1.25 fixes the following issues:

Update to go1.25.6 (released 2026-01-15) (bsc#1244485)

Security fixes:

 - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
 - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
 - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
 - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
 - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
 - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).

Other fixes:

  * go#76392 os: package initialization hangs is Stdin is blocked
  * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
  * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes
  * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
  * go#76776 runtime: race detector crash on ppc64le
  * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling &amp;lt;function&amp;gt;: runtime error: index out of range
  * go#76973 errors: errors.Join behavior changed in 1.25
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1244485">SUSE bug 1244485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256816">SUSE bug 1256816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256817">SUSE bug 1256817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256819">SUSE bug 1256819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256820">SUSE bug 1256820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256821">SUSE bug 1256821</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61730/">CVE-2025-61730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039700" comment="go1.25-1.25.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039701" comment="go1.25-doc-1.25.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039702" comment="go1.25-libstd-1.25.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039703" comment="go1.25-race-1.25.6-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039700" comment="go1.25-1.25.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039701" comment="go1.25-doc-1.25.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039702" comment="go1.25-libstd-1.25.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039703" comment="go1.25-race-1.25.6-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94416" version="1" class="patch">
	<metadata>
		<title>Security update for python-virtualenv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256458" ref_url="https://bugzilla.suse.com/1256458" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-22702" ref_url="https://www.suse.com/security/cve/CVE-2026-22702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20129-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043742.html" source="SUSE-SU"/>
		<description>
This update for python-virtualenv fixes the following issues:

- CVE-2026-22702: Fixed local attacker can redirect file operations via TOCTOU race condition (bsc#1256458).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256458">SUSE bug 1256458</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22702/">CVE-2026-22702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22702">CVE-2026-22702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039704" comment="python313-virtualenv-20.29.3-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039704" comment="python313-virtualenv-20.29.3-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94417" version="1" class="patch">
	<metadata>
		<title>Security update for python-marshmallow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255473" ref_url="https://bugzilla.suse.com/1255473" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68480" ref_url="https://www.suse.com/security/cve/CVE-2025-68480/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043741.html" source="SUSE-SU"/>
		<description>
This update for python-marshmallow fixes the following issues:

- CVE-2025-68480: Fixed possible DoS when using Schema.load(data, many=True) (bsc#1255473).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255473">SUSE bug 1255473</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68480/">CVE-2025-68480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68480">CVE-2025-68480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039705" comment="python-marshmallow-doc-3.20.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039706" comment="python313-marshmallow-3.20.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039705" comment="python-marshmallow-doc-3.20.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039706" comment="python313-marshmallow-3.20.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94418" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256331" ref_url="https://bugzilla.suse.com/1256331" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043740.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2026-21441: Fixed excessive resource consumption during decompression of data in HTTP redirect responses (bsc#1256331).

		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256331">SUSE bug 1256331</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039707" comment="python313-urllib3-2.5.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039707" comment="python313-urllib3-2.5.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94419" version="1" class="patch">
	<metadata>
		<title>Security update for python-pyasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256902" ref_url="https://bugzilla.suse.com/1256902" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043738.html" source="SUSE-SU"/>
		<description>
This update for python-pyasn1 fixes the following issues:

- CVE-2026-23490: Fixed Denial-of-Service issue that may lead to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets (bsc#1256902)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256902">SUSE bug 1256902</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039708" comment="python313-pyasn1-0.6.1-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039708" comment="python313-pyasn1-0.6.1-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94420" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1236670" ref_url="https://bugzilla.suse.com/1236670" source="BUGZILLA"/>
		<reference ref_id="1241661" ref_url="https://bugzilla.suse.com/1241661" source="BUGZILLA"/>
		<reference ref_id="1249237" ref_url="https://bugzilla.suse.com/1249237" source="BUGZILLA"/>
		<reference ref_id="1253245" ref_url="https://bugzilla.suse.com/1253245" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-46394" ref_url="https://www.suse.com/security/cve/CVE-2025-46394/" source="CVE"/>
		<reference ref_id="CVE-2025-60876" ref_url="https://www.suse.com/security/cve/CVE-2025-60876/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20134-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043737.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

Security fixes:

- CVE-2025-60876: HTTP request header injection in wget (bsc#1253245).
- CVE-2025-46394: Fixed tar hidden files via escape sequence (bsc#1241661).

Other fixes:

- Set CONFIG_FIRST_SYSTEM_ID to 201 to avoid confclict (bsc#1236670)
- Fix unshare -mrpf sh core dump on  ppc64le (bsc#1249237)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236670">SUSE bug 1236670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241661">SUSE bug 1241661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249237">SUSE bug 1249237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253245">SUSE bug 1253245</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46394/">CVE-2025-46394 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46394">CVE-2025-46394 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" cvss4="8.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-60876/">CVE-2025-60876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-60876">CVE-2025-60876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039709" comment="busybox-1.37.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039710" comment="busybox-static-1.37.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039711" comment="busybox-warewulf3-1.37.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039709" comment="busybox-1.37.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039710" comment="busybox-static-1.37.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039711" comment="busybox-warewulf3-1.37.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94421" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256997" ref_url="https://bugzilla.suse.com/1256997" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13878" ref_url="https://www.suse.com/security/cve/CVE-2025-13878/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043736.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Upgrade to release 9.20.18:

- CVE-2025-13878: Fixed incorrect length checks for BRID and HHIT records (bsc#1256997)

  Feature Changes:
  * Add more information to the rndc recursing output about
    fetches.
  * Reduce the number of outgoing queries.
  * Provide more information when memory allocation fails.

  Bug Fixes:
  * Make DNSSEC key rollovers more robust.
  * Fix a catalog zone issue, where member zones could fail to
    load.
  * Allow glue in delegations with QTYPE=ANY.
  * Fix slow speed when signing a large delegation zone with NSEC3
    opt-out.
  * Reconfiguring an NSEC3 opt-out zone to NSEC caused the zone to
    be invalid.
  * Fix a possible catalog zone issue during reconfiguration.
  * Fix the charts in the statistics channel.
  * Adding NSEC3 opt-out records could leave invalid records in
    chain.
  * Fix spurious timeouts while resolving names.
  * Fix bug where zone switches from NSEC3 to NSEC after
    retransfer.
  * AMTRELAY type 0 presentation format handling was wrong.
  * Fix parsing bug in remote-servers with key or TLS.
  * Fix DoT reconfigure/reload bug in the resolver.
  * Skip unsupported algorithms when looking for a signing key.
  * Fix dnssec-keygen key collision checking for KEY RRtype keys.
  * dnssec-verify now uses exit code 1 when failing due to illegal
    options.
  * Prevent assertion failures of dig when a server is specified
    before the -b option.
  * Skip buffer allocations if not logging.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256997">SUSE bug 1256997</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13878/">CVE-2025-13878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13878">CVE-2025-13878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039712" comment="bind-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039713" comment="bind-doc-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039715" comment="bind-modules-generic-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039716" comment="bind-modules-ldap-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039717" comment="bind-modules-mysql-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039718" comment="bind-modules-perl-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039719" comment="bind-modules-sqlite3-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039720" comment="bind-utils-9.20.18-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039712" comment="bind-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039713" comment="bind-doc-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039715" comment="bind-modules-generic-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039716" comment="bind-modules-ldap-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039717" comment="bind-modules-mysql-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039718" comment="bind-modules-perl-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039719" comment="bind-modules-sqlite3-9.20.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039720" comment="bind-utils-9.20.18-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94422" version="1" class="patch">
	<metadata>
		<title>Security update for python-jaraco.context (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256954" ref_url="https://bugzilla.suse.com/1256954" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-23949" ref_url="https://www.suse.com/security/cve/CVE-2026-23949/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023954.html" source="SUSE-SU"/>
		<description>
This update for python-jaraco.context fixes the following issues:

- CVE-2026-23949: Fixed malicious tar archives may lead to path traversal (bsc#1256954).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-23"/>
	<updated date="2026-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256954">SUSE bug 1256954</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23949/">CVE-2026-23949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23949">CVE-2026-23949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039721" comment="python313-jaraco.context-5.3.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039721" comment="python313-jaraco.context-5.3.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94423" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254196" ref_url="https://bugzilla.suse.com/1254196" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40212" ref_url="https://www.suse.com/security/cve/CVE-2025-40212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023951.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.7.1 fixes one security issue

The following security issue was fixed:

- CVE-2025-40212: nfsd: fix refcount leak in nfsd_set_fh_dentry() (bsc#1254196).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-23"/>
	<updated date="2026-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254196">SUSE bug 1254196</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40212/">CVE-2025-40212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039722" comment="kernel-default 6.12.0-160000.7 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010039723" comment="kernel-livepatch-6_12_0-160000_7-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010039724" comment="kernel-livepatch-6_12_0-160000_7-default-2-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039722" comment="kernel-default 6.12.0-160000.7 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010039723" comment="kernel-livepatch-6_12_0-160000_7-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010039724" comment="kernel-livepatch-6_12_0-160000_7-default-2-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94424" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256498" ref_url="https://bugzilla.suse.com/1256498" source="BUGZILLA"/>
		<reference ref_id="1256499" ref_url="https://bugzilla.suse.com/1256499" source="BUGZILLA"/>
		<reference ref_id="1256500" ref_url="https://bugzilla.suse.com/1256500" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68276" ref_url="https://www.suse.com/security/cve/CVE-2025-68276/" source="CVE"/>
		<reference ref_id="CVE-2025-68468" ref_url="https://www.suse.com/security/cve/CVE-2025-68468/" source="CVE"/>
		<reference ref_id="CVE-2025-68471" ref_url="https://www.suse.com/security/cve/CVE-2025-68471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023953.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2025-68276: Fixed refuse to create wide-area record browsers when
  wide-area is off (bsc#1256498)
- CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
- CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256498">SUSE bug 1256498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256499">SUSE bug 1256499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256500">SUSE bug 1256500</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68276/">CVE-2025-68276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68276">CVE-2025-68276 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68468/">CVE-2025-68468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68468">CVE-2025-68468 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68471/">CVE-2025-68471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68471">CVE-2025-68471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040026" comment="avahi-autoipd-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040028" comment="avahi-compat-mDNSResponder-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040029" comment="avahi-lang-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040030" comment="avahi-utils-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040031" comment="avahi-utils-gtk-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040035" comment="libavahi-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040036" comment="libavahi-glib-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040037" comment="libavahi-glib1-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040038" comment="libavahi-gobject-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040039" comment="libavahi-gobject0-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040040" comment="libavahi-libevent1-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040043" comment="libavahi-ui-gtk3-0-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040044" comment="libdns_sd-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040045" comment="libhowl0-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040046" comment="python3-avahi-gtk-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040047" comment="python313-avahi-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040048" comment="typelib-1_0-Avahi-0_6-0.8-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040026" comment="avahi-autoipd-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040028" comment="avahi-compat-mDNSResponder-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040029" comment="avahi-lang-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040030" comment="avahi-utils-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040031" comment="avahi-utils-gtk-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040035" comment="libavahi-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040036" comment="libavahi-glib-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040037" comment="libavahi-glib1-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040038" comment="libavahi-gobject-devel-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040039" comment="libavahi-gobject0-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040040" comment="libavahi-libevent1-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040043" comment="libavahi-ui-gtk3-0-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040044" comment="libdns_sd-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040045" comment="libhowl0-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040046" comment="python3-avahi-gtk-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040047" comment="python313-avahi-0.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040048" comment="typelib-1_0-Avahi-0_6-0.8-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94425" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246019" ref_url="https://bugzilla.suse.com/1246019" source="BUGZILLA"/>
		<reference ref_id="1248301" ref_url="https://bugzilla.suse.com/1248301" source="BUGZILLA"/>
		<reference ref_id="1248400" ref_url="https://bugzilla.suse.com/1248400" source="BUGZILLA"/>
		<reference ref_id="1248631" ref_url="https://bugzilla.suse.com/1248631" source="BUGZILLA"/>
		<reference ref_id="1248670" ref_url="https://bugzilla.suse.com/1248670" source="BUGZILLA"/>
		<reference ref_id="1248672" ref_url="https://bugzilla.suse.com/1248672" source="BUGZILLA"/>
		<reference ref_id="1249207" ref_url="https://bugzilla.suse.com/1249207" source="BUGZILLA"/>
		<reference ref_id="1249208" ref_url="https://bugzilla.suse.com/1249208" source="BUGZILLA"/>
		<reference ref_id="1249241" ref_url="https://bugzilla.suse.com/1249241" source="BUGZILLA"/>
		<reference ref_id="1249537" ref_url="https://bugzilla.suse.com/1249537" source="BUGZILLA"/>
		<reference ref_id="1250192" ref_url="https://bugzilla.suse.com/1250192" source="BUGZILLA"/>
		<reference ref_id="1251956" ref_url="https://bugzilla.suse.com/1251956" source="BUGZILLA"/>
		<reference ref_id="1251982" ref_url="https://bugzilla.suse.com/1251982" source="BUGZILLA"/>
		<reference ref_id="1252270" ref_url="https://bugzilla.suse.com/1252270" source="BUGZILLA"/>
		<reference ref_id="1253437" ref_url="https://bugzilla.suse.com/1253437" source="BUGZILLA"/>
		<reference ref_id="1254196" ref_url="https://bugzilla.suse.com/1254196" source="BUGZILLA"/>
		<reference ref_id="1256928" ref_url="https://bugzilla.suse.com/1256928" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164/" source="CVE"/>
		<reference ref_id="CVE-2025-38500" ref_url="https://www.suse.com/security/cve/CVE-2025-38500/" source="CVE"/>
		<reference ref_id="CVE-2025-38554" ref_url="https://www.suse.com/security/cve/CVE-2025-38554/" source="CVE"/>
		<reference ref_id="CVE-2025-38572" ref_url="https://www.suse.com/security/cve/CVE-2025-38572/" source="CVE"/>
		<reference ref_id="CVE-2025-38588" ref_url="https://www.suse.com/security/cve/CVE-2025-38588/" source="CVE"/>
		<reference ref_id="CVE-2025-38608" ref_url="https://www.suse.com/security/cve/CVE-2025-38608/" source="CVE"/>
		<reference ref_id="CVE-2025-38616" ref_url="https://www.suse.com/security/cve/CVE-2025-38616/" source="CVE"/>
		<reference ref_id="CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617/" source="CVE"/>
		<reference ref_id="CVE-2025-38618" ref_url="https://www.suse.com/security/cve/CVE-2025-38618/" source="CVE"/>
		<reference ref_id="CVE-2025-38664" ref_url="https://www.suse.com/security/cve/CVE-2025-38664/" source="CVE"/>
		<reference ref_id="CVE-2025-39682" ref_url="https://www.suse.com/security/cve/CVE-2025-39682/" source="CVE"/>
		<reference ref_id="CVE-2025-39963" ref_url="https://www.suse.com/security/cve/CVE-2025-39963/" source="CVE"/>
		<reference ref_id="CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204/" source="CVE"/>
		<reference ref_id="CVE-2025-40212" ref_url="https://www.suse.com/security/cve/CVE-2025-40212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.5.1 fixes various security issues

The following security issues were fixed:

- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019).
- CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672).
- CVE-2025-38554: mm: fix a UAF when vma-&gt;mm is freed after vma-&gt;vm_refcnt got dropped (bsc#1248301).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400).
- CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670).
- CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631).
- CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192).
- CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251982).
- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
- CVE-2025-40212: nfsd: fix refcount leak in nfsd_set_fh_dentry() (bsc#1254196).

The following non security issues were fixed:

- Explicitly add module-common.c with vermagic and retpoline modinfo (bsc#1252270).
- powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (bsc#1251956).
- fix addr_bit_set() issue on big-endian machines (bsc#1256928).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246019">SUSE bug 1246019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248301">SUSE bug 1248301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248400">SUSE bug 1248400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248631">SUSE bug 1248631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248670">SUSE bug 1248670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248672">SUSE bug 1248672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249207">SUSE bug 1249207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249208">SUSE bug 1249208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249241">SUSE bug 1249241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249537">SUSE bug 1249537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250192">SUSE bug 1250192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251956">SUSE bug 1251956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251982">SUSE bug 1251982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252270">SUSE bug 1252270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253437">SUSE bug 1253437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254196">SUSE bug 1254196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256928">SUSE bug 1256928</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38500/">CVE-2025-38500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38554/">CVE-2025-38554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38554">CVE-2025-38554 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38572/">CVE-2025-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38588/">CVE-2025-38588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38608/">CVE-2025-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38616/">CVE-2025-38616 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38616">CVE-2025-38616 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38618/">CVE-2025-38618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38664/">CVE-2025-38664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-39682/">CVE-2025-39682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39963/">CVE-2025-39963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40212/">CVE-2025-40212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040504" comment="kernel-default 6.12.0-160000.5 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010040505" comment="kernel-livepatch-6_12_0-160000_5-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040504" comment="kernel-default 6.12.0-160000.5 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010040505" comment="kernel-livepatch-6_12_0-160000_5-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94426" version="1" class="patch">
	<metadata>
		<title>Security update for php8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255043" ref_url="https://bugzilla.suse.com/1255043" source="BUGZILLA"/>
		<reference ref_id="1255710" ref_url="https://bugzilla.suse.com/1255710" source="BUGZILLA"/>
		<reference ref_id="1255711" ref_url="https://bugzilla.suse.com/1255711" source="BUGZILLA"/>
		<reference ref_id="1255712" ref_url="https://bugzilla.suse.com/1255712" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177/" source="CVE"/>
		<reference ref_id="CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178/" source="CVE"/>
		<reference ref_id="CVE-2025-14180" ref_url="https://www.suse.com/security/cve/CVE-2025-14180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023952.html" source="SUSE-SU"/>
		<description>
This update for php8 fixes the following issues:

Version update to 8.4.16:

Security fixes:

- CVE-2025-14177: getimagesize() function may leak uninitialized heap memory into the APPn segments when reading images in multi-chunk mode (bsc#1255710).
- CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE (bsc#1255711).
- CVE-2025-14180: null pointer dereference in pdo_parse_params() function when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled (bsc#1255712).

Other fixes:

- php8 contains Directories owned by wwwrun but does not require User. (bsc#1255043)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-26"/>
	<updated date="2026-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255043">SUSE bug 1255043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255710">SUSE bug 1255710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255711">SUSE bug 1255711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255712">SUSE bug 1255712</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14180/">CVE-2025-14180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040052" comment="apache2-mod_php8-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040053" comment="php8-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040054" comment="php8-bcmath-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040055" comment="php8-bz2-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040056" comment="php8-calendar-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040057" comment="php8-cli-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040058" comment="php8-ctype-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040059" comment="php8-curl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040060" comment="php8-dba-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040061" comment="php8-devel-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040062" comment="php8-dom-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040063" comment="php8-embed-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040064" comment="php8-enchant-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040065" comment="php8-exif-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040066" comment="php8-fastcgi-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040067" comment="php8-ffi-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040068" comment="php8-fileinfo-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040069" comment="php8-fpm-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040070" comment="php8-fpm-apache-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040071" comment="php8-ftp-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040072" comment="php8-gd-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040073" comment="php8-gettext-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040074" comment="php8-gmp-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040075" comment="php8-iconv-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040076" comment="php8-intl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040077" comment="php8-ldap-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040078" comment="php8-mbstring-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040079" comment="php8-mysql-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040080" comment="php8-odbc-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040081" comment="php8-opcache-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040082" comment="php8-openssl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040083" comment="php8-pcntl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040084" comment="php8-pdo-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040085" comment="php8-pgsql-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040086" comment="php8-phar-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040087" comment="php8-posix-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040088" comment="php8-readline-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040089" comment="php8-shmop-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040090" comment="php8-snmp-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040091" comment="php8-soap-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040092" comment="php8-sockets-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040093" comment="php8-sodium-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040094" comment="php8-sqlite-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040095" comment="php8-sysvmsg-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040096" comment="php8-sysvsem-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040097" comment="php8-sysvshm-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040099" comment="php8-tidy-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040100" comment="php8-tokenizer-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040101" comment="php8-xmlreader-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040102" comment="php8-xmlwriter-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040103" comment="php8-xsl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040104" comment="php8-zip-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040105" comment="php8-zlib-8.4.16-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040052" comment="apache2-mod_php8-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040053" comment="php8-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040054" comment="php8-bcmath-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040055" comment="php8-bz2-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040056" comment="php8-calendar-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040057" comment="php8-cli-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040058" comment="php8-ctype-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040059" comment="php8-curl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040060" comment="php8-dba-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040061" comment="php8-devel-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040062" comment="php8-dom-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040063" comment="php8-embed-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040064" comment="php8-enchant-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040065" comment="php8-exif-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040066" comment="php8-fastcgi-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040067" comment="php8-ffi-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040068" comment="php8-fileinfo-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040069" comment="php8-fpm-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040070" comment="php8-fpm-apache-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040071" comment="php8-ftp-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040072" comment="php8-gd-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040073" comment="php8-gettext-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040074" comment="php8-gmp-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040075" comment="php8-iconv-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040076" comment="php8-intl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040077" comment="php8-ldap-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040078" comment="php8-mbstring-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040079" comment="php8-mysql-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040080" comment="php8-odbc-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040081" comment="php8-opcache-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040082" comment="php8-openssl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040083" comment="php8-pcntl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040084" comment="php8-pdo-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040085" comment="php8-pgsql-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040086" comment="php8-phar-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040087" comment="php8-posix-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040088" comment="php8-readline-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040089" comment="php8-shmop-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040090" comment="php8-snmp-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040091" comment="php8-soap-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040092" comment="php8-sockets-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040093" comment="php8-sodium-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040094" comment="php8-sqlite-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040095" comment="php8-sysvmsg-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040096" comment="php8-sysvsem-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040097" comment="php8-sysvshm-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040099" comment="php8-tidy-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040100" comment="php8-tokenizer-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040101" comment="php8-xmlreader-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040102" comment="php8-xmlwriter-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040103" comment="php8-xsl-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040104" comment="php8-zip-8.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040105" comment="php8-zlib-8.4.16-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94427" version="1" class="patch">
	<metadata>
		<title>Recommended update of flake-pilot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248004" ref_url="https://bugzilla.suse.com/1248004" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023169.html" source="SUSE-SU"/>
		<description>
This update for flake-pilot fixes the following issues:

Update version to 3.1.22.

- Fixes to use flakes as normal user

  Running a flake is a container based instance provisioning
  and startup. Some part of this process requires root permissions
  for example mounting the container instance store for the
  provisioning step. This commit fixes the required calls to
  be properly managed by sudo.

- seed from entropy

- Fix assignment of random sequence number

  We should use a seed for the sequence as described in
  https://rust-random.github.io/book/guide-seeding.html#a-simple-number
  In addition the logic when a random sequence number should
  be used was wrong and needed a fix regarding resume and
  attach type flakes which must not use a random sequence

- Pass --init option for resume type flakes

  In resume mode a sleep command is used to keep the container
  open. However, without the --init option there is no signal
  handling available. This commit fixes it

- Revert "kill prior remove when using %remove flag"

  This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2.
  no hard killing needed with the event loop entrypoint

- Fixed CVE-2025-55159 slab: incorrect bounds check

  Update to slab 0.4.11 to fix the mentioned CVE.
  This Fixes bsc#1248004

- Apply clippy fixes

- Create sequence number for the same invocation

  If a flake which is not a resume or attach flake is called twice
  with the same invocation arguments an error message is displayed
  to give this invocation a new name via the @NAME runtime option.
  This commit makes this more comfortable and automatically assigns
  a random sequence number for the call if no @NAME is given.

- kill prior remove when using %remove flag

  In case the container instance should be removed via the %remove
  flag, send a kill first, followed by a force remove. The reason
  for this is because we use a never ending sleep command as entry
  point for resume type containers. If they should be removed the
  standard signal send on podman rm will not stop the sleep and
  after a period of 10 seconds podman sends a kill signal itself.
  We can speedup this process as we know the entry point command
  and send the kill signal first followed by the remove which
  saves us some wait time spent in podman otherwise.

- Fix clippy hints

  variables can be used directly in the format! string

- Prune old images after load

  Make sure no &lt;none&gt; image references stay in the registry

		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-15"/>
	<updated date="2025-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1248004">SUSE bug 1248004</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024369" comment="flake-pilot-3.1.22-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024373" comment="flake-pilot-podman-3.1.22-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024369" comment="flake-pilot-3.1.22-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024373" comment="flake-pilot-podman-3.1.22-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94428" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-subscriptions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255425" ref_url="https://bugzilla.suse.com/1255425" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-64718" ref_url="https://www.suse.com/security/cve/CVE-2025-64718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024033.html" source="SUSE-SU"/>
		<description>
This update for cockpit-subscriptions fixes the following issues:

Update to version 12.1:

- CVE-2025-64718: js-yaml: fixed prototype pollution in merge (bsc#1255425).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255425">SUSE bug 1255425</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64718/">CVE-2025-64718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718">CVE-2025-64718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041320" comment="cockpit-subscriptions-12.1-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041320" comment="cockpit-subscriptions-12.1-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94429" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254435" ref_url="https://bugzilla.suse.com/1254435" source="BUGZILLA"/>
		<reference ref_id="1254820" ref_url="https://bugzilla.suse.com/1254820" source="BUGZILLA"/>
		<reference ref_id="1255821" ref_url="https://bugzilla.suse.com/1255821" source="BUGZILLA"/>
		<reference ref_id="1255822" ref_url="https://bugzilla.suse.com/1255822" source="BUGZILLA"/>
		<reference ref_id="1255823" ref_url="https://bugzilla.suse.com/1255823" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-65955" ref_url="https://www.suse.com/security/cve/CVE-2025-65955/" source="CVE"/>
		<reference ref_id="CVE-2025-66628" ref_url="https://www.suse.com/security/cve/CVE-2025-66628/" source="CVE"/>
		<reference ref_id="CVE-2025-68618" ref_url="https://www.suse.com/security/cve/CVE-2025-68618/" source="CVE"/>
		<reference ref_id="CVE-2025-68950" ref_url="https://www.suse.com/security/cve/CVE-2025-68950/" source="CVE"/>
		<reference ref_id="CVE-2025-69204" ref_url="https://www.suse.com/security/cve/CVE-2025-69204/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024032.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2025-65955: Fixed use-after-free/double-free in ImageMagick (bsc#1254435)
- CVE-2025-66628: Fixed Integer Overflow leading to out of bounds read in ImageMagick (32-bit only)  (bsc#1254820)
- CVE-2025-68618: Fixed that reading a malicious SVG file may result in a DoS attack (bsc#1255821)
- CVE-2025-68950: Fixed check for circular references in mvg files may lead to stack overflow (bsc#1255822)
- CVE-2025-69204: Fixed an integer overflow can lead to a DoS attack (bsc#1255823)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254435">SUSE bug 1254435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254820">SUSE bug 1254820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255821">SUSE bug 1255821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255822">SUSE bug 1255822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255823">SUSE bug 1255823</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65955/">CVE-2025-65955 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-65955">CVE-2025-65955 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66628/">CVE-2025-66628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66628">CVE-2025-66628 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68618/">CVE-2025-68618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68618">CVE-2025-68618 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68950/">CVE-2025-68950 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68950">CVE-2025-68950 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69204/">CVE-2025-69204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69204">CVE-2025-69204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041321" comment="ImageMagick-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041322" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041323" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041324" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041325" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041326" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041327" comment="ImageMagick-devel-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041328" comment="ImageMagick-doc-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041329" comment="ImageMagick-extra-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041330" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041331" comment="libMagick++-devel-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041332" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041333" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041334" comment="perl-PerlMagick-7.1.2.0-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041321" comment="ImageMagick-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041322" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041323" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041324" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041325" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041326" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041327" comment="ImageMagick-devel-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041328" comment="ImageMagick-doc-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041329" comment="ImageMagick-extra-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041330" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041331" comment="libMagick++-devel-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041332" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041333" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041334" comment="perl-PerlMagick-7.1.2.0-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94430" version="1" class="patch">
	<metadata>
		<title>Security update for python-FontTools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254366" ref_url="https://bugzilla.suse.com/1254366" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66034" ref_url="https://www.suse.com/security/cve/CVE-2025-66034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024031.html" source="SUSE-SU"/>
		<description>
This update for python-FontTools fixes the following issues:

- CVE-2025-66034: Fixed arbitrary file write vulnerability that could lead to remote code execution (bsc#1254366).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254366">SUSE bug 1254366</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66034/">CVE-2025-66034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66034">CVE-2025-66034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041335" comment="python313-FontTools-4.53.1-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041335" comment="python313-FontTools-4.53.1-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94431" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251982" ref_url="https://bugzilla.suse.com/1251982" source="BUGZILLA"/>
		<reference ref_id="1252270" ref_url="https://bugzilla.suse.com/1252270" source="BUGZILLA"/>
		<reference ref_id="1253437" ref_url="https://bugzilla.suse.com/1253437" source="BUGZILLA"/>
		<reference ref_id="1254196" ref_url="https://bugzilla.suse.com/1254196" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-39963" ref_url="https://www.suse.com/security/cve/CVE-2025-39963/" source="CVE"/>
		<reference ref_id="CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204/" source="CVE"/>
		<reference ref_id="CVE-2025-40212" ref_url="https://www.suse.com/security/cve/CVE-2025-40212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.6.1 fixes various security issues

The following security issues were fixed:

- CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251982).
- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
- CVE-2025-40212: nfsd: fix refcount leak in nfsd_set_fh_dentry() (bsc#1254196).

The following non security issues was fixed:

- Explicitly add module-common.c with vermagic and retpoline modinfo (bsc#1252270).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1251982">SUSE bug 1251982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252270">SUSE bug 1252270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253437">SUSE bug 1253437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254196">SUSE bug 1254196</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39963/">CVE-2025-39963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40212/">CVE-2025-40212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010041338" comment="kernel-livepatch-6_12_0-160000_6-default-3-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010041338" comment="kernel-livepatch-6_12_0-160000_6-default-3-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94432" version="1" class="patch">
	<metadata>
		<title>Security update for python-h2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248737" ref_url="https://bugzilla.suse.com/1248737" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-57804" ref_url="https://www.suse.com/security/cve/CVE-2025-57804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024029.html" source="SUSE-SU"/>
		<description>
This update for python-h2 fixes the following issues:

- CVE-2025-57804: Fixed HTTP Request Smuggling due to illegal characters in headers (bsc#1248737)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1248737">SUSE bug 1248737</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-57804/">CVE-2025-57804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-57804">CVE-2025-57804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041339" comment="python313-h2-4.2.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041339" comment="python313-h2-4.2.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94433" version="1" class="patch">
	<metadata>
		<title>Security update for xkbcomp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1105832" ref_url="https://bugzilla.suse.com/1105832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<description>
This update for xkbcomp fixes the following issues:

- CVE-2018-15863, CVE-2018-15861, CVE-2018-15859, CVE-2018-15853:
  Fixed multiple memory handling and correctness issues (bsc#1105832)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041340" comment="xkbcomp-1.4.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041341" comment="xkbcomp-devel-1.4.7-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041340" comment="xkbcomp-1.4.7-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041341" comment="xkbcomp-devel-1.4.7-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94434" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-amd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:20203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024016.html" source="SUSE-SU"/>
		<description>
This update for ucode-amd fixes the following issues:

Changes in ucode-amd:

- Update to version 20251203 (git commit a0f0e52138e5):

  * linux-firmware: Update amd-ucode copyright information
  * linux-firmware: Update AMD cpu microcode

- Update to version 20251113 (git commit fb0dbcd30118):

  * linux-firmware: Update AMD cpu microcode

- Update to version 20251031 (git commit 04b323bb64f9):

  * linux-firmware: Update AMD cpu microcode

- Update to version 20251028 (git commit 4f72031fc195):

  * linux-firmware: Update AMD cpu microcode

- Update to version 20251024 (git commit 9b899c779b8a):

  * amd-ucode: Fix minimum revisions in README

- Update to version 20250730 (git commit 910c19074091):

  * linux-firmware: Update AMD cpu microcode
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041342" comment="ucode-amd-20251203-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041342" comment="ucode-amd-20251203-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94435" version="1" class="patch">
	<metadata>
		<title>Security update for python-python-multipart (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257301" ref_url="https://bugzilla.suse.com/1257301" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-24486" ref_url="https://www.suse.com/security/cve/CVE-2026-24486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024028.html" source="SUSE-SU"/>
		<description>
This update for python-python-multipart fixes the following issues:

- CVE-2026-24486: Fixed non-default configuration options can lead to path traversal (bsc#1257301).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257301">SUSE bug 1257301</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24486/">CVE-2026-24486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24486">CVE-2026-24486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041343" comment="python313-python-multipart-0.0.20-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041343" comment="python313-python-multipart-0.0.20-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94436" version="1" class="patch">
	<metadata>
		<title>Security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257034" ref_url="https://bugzilla.suse.com/1257034" source="BUGZILLA"/>
		<reference ref_id="1257036" ref_url="https://bugzilla.suse.com/1257036" source="BUGZILLA"/>
		<reference ref_id="1257037" ref_url="https://bugzilla.suse.com/1257037" source="BUGZILLA"/>
		<reference ref_id="1257038" ref_url="https://bugzilla.suse.com/1257038" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<description>
This update for java-21-openjdk fixes the following issues:

Update to upstream tag jdk-21.0.10+7 (January 2026 CPU)

Security fixes:

- CVE-2026-21925: Fixed Oracle Java SE component RMI (bsc#1257034).
- CVE-2026-21932: Fixed Oracle Java SE component AWT and JavaFX (bsc#1257036).
- CVE-2026-21933: Fixed Oracle Java SE component Networking (bsc#1257037).
- CVE-2026-21945: Fixed Oracle Java SE component Security (bsc#1257038).

Other fixes:

- Do not depend on update-desktop-files (jsc#PED-14507, jsc#PED-15217).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257034">SUSE bug 1257034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257036">SUSE bug 1257036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257037">SUSE bug 1257037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257038">SUSE bug 1257038</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041344" comment="java-21-openjdk-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041345" comment="java-21-openjdk-demo-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041346" comment="java-21-openjdk-devel-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041347" comment="java-21-openjdk-headless-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041348" comment="java-21-openjdk-javadoc-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041349" comment="java-21-openjdk-jmods-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041350" comment="java-21-openjdk-src-21.0.10.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041344" comment="java-21-openjdk-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041345" comment="java-21-openjdk-demo-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041346" comment="java-21-openjdk-devel-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041347" comment="java-21-openjdk-headless-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041348" comment="java-21-openjdk-javadoc-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041349" comment="java-21-openjdk-jmods-21.0.10.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041350" comment="java-21-openjdk-src-21.0.10.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94437" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254866" ref_url="https://bugzilla.suse.com/1254866" source="BUGZILLA"/>
		<reference ref_id="1254867" ref_url="https://bugzilla.suse.com/1254867" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024027.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2025-66471: Fixed excessive resource consumption via decompression
  of highly compressed data in Streaming API (bsc#1254867)
- CVE-2025-66418: Fixed resource exhaustion via unbounded number of links
  in the decompression chain (bsc#1254866)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254866">SUSE bug 1254866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041351" comment="python313-urllib3-2.5.0-160000.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041351" comment="python313-urllib3-2.5.0-160000.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94438" version="1" class="patch">
	<metadata>
		<title>Recommended update for cloud-init (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1245401" ref_url="https://bugzilla.suse.com/1245401" source="BUGZILLA"/>
		<reference ref_id="1245403" ref_url="https://bugzilla.suse.com/1245403" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11584" ref_url="https://www.suse.com/security/cve/CVE-2024-11584/" source="CVE"/>
		<reference ref_id="CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174/" source="CVE"/>
		<reference ref_id="SUSE-RU-2026:20192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043824.html" source="SUSE-SU"/>
		<description>
This update for cloud-init fixes the following issues:

Changes in cloud-init:

- Fix dependency replace -serial with -pyserial

- Drop unneeded test dependency on httpretty, fixed long ago
  * https://github.com/canonical/cloud-init/pull/1720

- Update to version 25.1.3 (bsc#1245401 , CVE-2024-6174, bsc#1245403, CVE-2024-11584)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1245401">SUSE bug 1245401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245403">SUSE bug 1245403</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11584/">CVE-2024-11584 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11584">CVE-2024-11584 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041352" comment="cloud-init-25.1.3-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041353" comment="cloud-init-config-suse-25.1.3-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041354" comment="cloud-init-doc-25.1.3-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041352" comment="cloud-init-25.1.3-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041353" comment="cloud-init-config-suse-25.1.3-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041354" comment="cloud-init-doc-25.1.3-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94439" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253332" ref_url="https://bugzilla.suse.com/1253332" source="BUGZILLA"/>
		<reference ref_id="1253333" ref_url="https://bugzilla.suse.com/1253333" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024025.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

Security fixes:

- CVE-2025-12817: Missing check for CREATE
  privileges on the schema in CREATE STATISTICS allowed table
  owners to create statistics in any schema, potentially leading
  to unexpected naming conflicts (bsc#1253332)
- CVE-2025-12818: Several places in libpq were not
  sufficiently careful about computing the required size of a
  memory allocation. Sufficiently large inputs could cause
  integer overflow, resulting in an undersized buffer, which
  would then lead to writing past the end of the buffer (bsc#1253333)

Other fixes:

  - Upgrade to 16.11
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253332">SUSE bug 1253332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253333">SUSE bug 1253333</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041355" comment="postgresql16-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041356" comment="postgresql16-contrib-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041357" comment="postgresql16-devel-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041358" comment="postgresql16-docs-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041361" comment="postgresql16-plperl-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041362" comment="postgresql16-plpython-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041363" comment="postgresql16-pltcl-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041364" comment="postgresql16-server-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041365" comment="postgresql16-server-devel-16.11-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041355" comment="postgresql16-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041356" comment="postgresql16-contrib-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041357" comment="postgresql16-devel-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041358" comment="postgresql16-docs-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041361" comment="postgresql16-plperl-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041362" comment="postgresql16-plpython-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041363" comment="postgresql16-pltcl-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041364" comment="postgresql16-server-16.11-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041365" comment="postgresql16-server-devel-16.11-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94440" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql17 and postgresql18 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253332" ref_url="https://bugzilla.suse.com/1253332" source="BUGZILLA"/>
		<reference ref_id="1253333" ref_url="https://bugzilla.suse.com/1253333" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024023.html" source="SUSE-SU"/>
		<description>
This update for postgresql17 and postgresql18 fixes the following issues:

Changes in postgresql17, postgresql18:

Update to 17.7:

* https://www.postgresql.org/about/news/p-3171/
* https://www.postgresql.org/docs/release/17.7/

* bsc#1253332, CVE-2025-12817: Missing check for CREATE
  privileges on the schema in CREATE STATISTICS allowed table
  owners to create statistics in any schema, potentially leading
  to unexpected naming conflicts.
* bsc#1253333, CVE-2025-12818: Several places in libpq were not
  sufficiently careful about computing the required size of a
  memory allocation. Sufficiently large inputs could cause
  integer overflow, resulting in an undersized buffer, which
  would then lead to writing past the end of the buffer.


Postgresql is shipped in version 18.1.

pgvector was updated to 0.8.1 to support postgresql18.

pgaudit was updated to support postgresql18.

		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253332">SUSE bug 1253332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253333">SUSE bug 1253333</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050151" comment="libecpg6-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050152" comment="libpq5-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041369" comment="postgresql-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041370" comment="postgresql-contrib-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041371" comment="postgresql-devel-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041372" comment="postgresql-docs-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041375" comment="postgresql-plperl-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041376" comment="postgresql-plpython-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041377" comment="postgresql-pltcl-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041378" comment="postgresql-server-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041379" comment="postgresql-server-devel-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041381" comment="postgresql13-pgaudit-1.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041382" comment="postgresql13-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041383" comment="postgresql14-pgaudit-1.6.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041384" comment="postgresql14-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041385" comment="postgresql15-pgaudit-1.7.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041386" comment="postgresql15-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041387" comment="postgresql16-pgaudit-16.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041388" comment="postgresql16-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041389" comment="postgresql17-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041390" comment="postgresql17-contrib-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041391" comment="postgresql17-devel-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041392" comment="postgresql17-docs-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041395" comment="postgresql17-pgaudit-17.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041396" comment="postgresql17-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041397" comment="postgresql17-plperl-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041398" comment="postgresql17-plpython-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041399" comment="postgresql17-pltcl-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041400" comment="postgresql17-server-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041401" comment="postgresql17-server-devel-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050153" comment="postgresql18-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050154" comment="postgresql18-contrib-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050155" comment="postgresql18-devel-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050156" comment="postgresql18-docs-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041410" comment="postgresql18-pgaudit-18.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041411" comment="postgresql18-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050159" comment="postgresql18-plperl-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050160" comment="postgresql18-plpython-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050161" comment="postgresql18-pltcl-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050162" comment="postgresql18-server-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050163" comment="postgresql18-server-devel-18.1-160000.1.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050151" comment="libecpg6-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050152" comment="libpq5-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041369" comment="postgresql-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041370" comment="postgresql-contrib-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041371" comment="postgresql-devel-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041372" comment="postgresql-docs-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041375" comment="postgresql-plperl-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041376" comment="postgresql-plpython-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041377" comment="postgresql-pltcl-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041378" comment="postgresql-server-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041379" comment="postgresql-server-devel-18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041381" comment="postgresql13-pgaudit-1.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041382" comment="postgresql13-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041383" comment="postgresql14-pgaudit-1.6.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041384" comment="postgresql14-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041385" comment="postgresql15-pgaudit-1.7.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041386" comment="postgresql15-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041387" comment="postgresql16-pgaudit-16.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041388" comment="postgresql16-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041389" comment="postgresql17-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041390" comment="postgresql17-contrib-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041391" comment="postgresql17-devel-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041392" comment="postgresql17-docs-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041395" comment="postgresql17-pgaudit-17.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041396" comment="postgresql17-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041397" comment="postgresql17-plperl-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041398" comment="postgresql17-plpython-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041399" comment="postgresql17-pltcl-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041400" comment="postgresql17-server-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041401" comment="postgresql17-server-devel-17.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050153" comment="postgresql18-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050154" comment="postgresql18-contrib-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050155" comment="postgresql18-devel-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050156" comment="postgresql18-docs-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041410" comment="postgresql18-pgaudit-18.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041411" comment="postgresql18-pgvector-0.8.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050159" comment="postgresql18-plperl-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050160" comment="postgresql18-plpython-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050161" comment="postgresql18-pltcl-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050162" comment="postgresql18-server-18.1-160000.1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050163" comment="postgresql18-server-devel-18.1-160000.1.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94441" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1236282" ref_url="https://bugzilla.suse.com/1236282" source="BUGZILLA"/>
		<reference ref_id="1256436" ref_url="https://bugzilla.suse.com/1256436" source="BUGZILLA"/>
		<reference ref_id="1256766" ref_url="https://bugzilla.suse.com/1256766" source="BUGZILLA"/>
		<reference ref_id="1256822" ref_url="https://bugzilla.suse.com/1256822" source="BUGZILLA"/>
		<reference ref_id="1257005" ref_url="https://bugzilla.suse.com/1257005" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395/" source="CVE"/>
		<reference ref_id="CVE-2025-15281" ref_url="https://www.suse.com/security/cve/CVE-2025-15281/" source="CVE"/>
		<reference ref_id="CVE-2026-0861" ref_url="https://www.suse.com/security/cve/CVE-2026-0861/" source="CVE"/>
		<reference ref_id="CVE-2026-0915" ref_url="https://www.suse.com/security/cve/CVE-2026-0915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security fixes:

- CVE-2025-0395: Fixed buffer overflow in the assert() function (bsc#1236282).
- CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256766).
- CVE-2026-0915: Fixed uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r (bsc#1256822).
- CVE-2025-15281: Fixed uninitialized memory may cause the process abort (bsc#1257005).

Other fixes:

- NPTL: Optimize trylock for high cache contention workloads (bsc#1256436)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236282">SUSE bug 1236282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256436">SUSE bug 1256436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256766">SUSE bug 1256766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256822">SUSE bug 1256822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257005">SUSE bug 1257005</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15281/">CVE-2025-15281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15281">CVE-2025-15281 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0861/">CVE-2026-0861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0861">CVE-2026-0861 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0915/">CVE-2026-0915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0915">CVE-2026-0915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041427" comment="glibc-devel-static-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041428" comment="glibc-extra-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041429" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041430" comment="glibc-html-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041431" comment="glibc-i18ndata-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041432" comment="glibc-info-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041433" comment="glibc-lang-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041436" comment="glibc-profile-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041437" comment="glibc-utils-2.40-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041427" comment="glibc-devel-static-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041428" comment="glibc-extra-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041429" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041430" comment="glibc-html-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041431" comment="glibc-i18ndata-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041432" comment="glibc-info-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041433" comment="glibc-lang-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041436" comment="glibc-profile-2.40-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041437" comment="glibc-utils-2.40-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94442" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255446" ref_url="https://bugzilla.suse.com/1255446" source="BUGZILLA"/>
		<reference ref_id="1257034" ref_url="https://bugzilla.suse.com/1257034" source="BUGZILLA"/>
		<reference ref_id="1257036" ref_url="https://bugzilla.suse.com/1257036" source="BUGZILLA"/>
		<reference ref_id="1257037" ref_url="https://bugzilla.suse.com/1257037" source="BUGZILLA"/>
		<reference ref_id="1257038" ref_url="https://bugzilla.suse.com/1257038" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

Upgrade to upstream tag jdk-17.0.18+8 (January 2026 CPU)

Security fixes:

- CVE-2026-21925: Fixed Oracle Java SE component RMI (bsc#1257034).
- CVE-2026-21932: Fixed Oracle Java SE component AWT and JavaFX (bsc#1257036).
- CVE-2026-21933: Fixed Oracle Java SE component Networking (bsc#1257037).
- CVE-2026-21945: Fixed Oracle Java SE component Security (bsc#1257038).

Other fixes:

- OpenJDK rendering blue borders when it should not, due to missing the fix for JDK-6304250 from upstream (bsc#1255446).
- Do not depend on update-desktop-files (jsc#PED-14507, jsc#PED-15216).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255446">SUSE bug 1255446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257034">SUSE bug 1257034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257036">SUSE bug 1257036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257037">SUSE bug 1257037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257038">SUSE bug 1257038</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041438" comment="java-17-openjdk-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041439" comment="java-17-openjdk-demo-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041440" comment="java-17-openjdk-devel-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041441" comment="java-17-openjdk-headless-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041442" comment="java-17-openjdk-javadoc-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041443" comment="java-17-openjdk-jmods-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041444" comment="java-17-openjdk-src-17.0.18.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041438" comment="java-17-openjdk-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041439" comment="java-17-openjdk-demo-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041440" comment="java-17-openjdk-devel-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041441" comment="java-17-openjdk-headless-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041442" comment="java-17-openjdk-javadoc-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041443" comment="java-17-openjdk-jmods-17.0.18.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041444" comment="java-17-openjdk-src-17.0.18.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94443" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249087" ref_url="https://bugzilla.suse.com/1249087" source="BUGZILLA"/>
		<reference ref_id="1249179" ref_url="https://bugzilla.suse.com/1249179" source="BUGZILLA"/>
		<reference ref_id="1249180" ref_url="https://bugzilla.suse.com/1249180" source="BUGZILLA"/>
		<reference ref_id="1249181" ref_url="https://bugzilla.suse.com/1249181" source="BUGZILLA"/>
		<reference ref_id="1251279" ref_url="https://bugzilla.suse.com/1251279" source="BUGZILLA"/>
		<reference ref_id="1251280" ref_url="https://bugzilla.suse.com/1251280" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10230" ref_url="https://www.suse.com/security/cve/CVE-2025-10230/" source="CVE"/>
		<reference ref_id="CVE-2025-9640" ref_url="https://www.suse.com/security/cve/CVE-2025-9640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023386.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Update to 4.22.5:

  * CVE-2025-10230: Command injection via WINS server hook script (bsc#1251280).
  * CVE-2025-9640: uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279).

- Relax samba-gpupdate requirement for cepces, certmonger, and sscep
  to a recommends. They are only required if utilizing certificate
  auto enrollment (bsc#1249087).

- Disable timeouts for smb.service so that possibly slow running
  ExecStartPre script 'update-samba-security-profile' doesn't
  cause service start to fail due to timeouts (bsc#1249181).

- Ensure semanage is pulled in as a requirement when samba in
  installed when selinux security access mechanism that is used
  (bsc#1249180).

- don't attempt to label paths that don't exist, also remove
  unecessary evaluation of semange &amp; restorecon cmds (bsc#1249179).

Update to 4.22.4:

  * netr_LogonSamLogonEx returns NR_STATUS_ACCESS_DENIED with
    SysvolReady=0
  * getpwuid does not shift to new DC when current DC is down
  * Windows security hardening locks out schannel'ed netlogon dc
    calls like netr_DsRGetDCName-
  * Unresponsive second DC can cause idmapping failure when using
    idmap_ad-
  * kinit command is failing with Missing cache Error.
  * Figuring out the DC name from IP address fails and breaks
    fork_domain_child().
  * vfs_streams_depot fstatat broken.
  * Delayed leader broadcast can block ctdb forever.
  * Apparently there is a conflict between shadow_copy2 module
    and virusfilter (action quarantine).
  * Fix handling of empty GPO link.
  * SMB ACL inheritance doesn't work for files created.

- adjust gpgme build dependency for future-proofing

		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-18"/>
	<updated date="2025-11-18"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1249087">SUSE bug 1249087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249179">SUSE bug 1249179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249180">SUSE bug 1249180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249181">SUSE bug 1249181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251279">SUSE bug 1251279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251280">SUSE bug 1251280</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10230/">CVE-2025-10230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10230">CVE-2025-10230 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9640/">CVE-2025-9640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9640">CVE-2025-9640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030508" comment="ctdb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030509" comment="ctdb-pcp-pmda-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030510" comment="ldb-tools-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030511" comment="libldb-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030512" comment="libldb2-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030513" comment="python3-ldb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030514" comment="samba-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030515" comment="samba-ad-dc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030516" comment="samba-ad-dc-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030518" comment="samba-client-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030519" comment="samba-client-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030520" comment="samba-dcerpc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030521" comment="samba-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030522" comment="samba-doc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030523" comment="samba-dsdb-modules-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030524" comment="samba-gpupdate-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030525" comment="samba-ldb-ldap-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030526" comment="samba-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030527" comment="samba-libs-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030528" comment="samba-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030530" comment="samba-tool-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030531" comment="samba-winbind-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030532" comment="samba-winbind-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030508" comment="ctdb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030509" comment="ctdb-pcp-pmda-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030510" comment="ldb-tools-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030511" comment="libldb-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030512" comment="libldb2-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030513" comment="python3-ldb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030514" comment="samba-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030515" comment="samba-ad-dc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030516" comment="samba-ad-dc-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030518" comment="samba-client-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030519" comment="samba-client-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030520" comment="samba-dcerpc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030521" comment="samba-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030522" comment="samba-doc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030523" comment="samba-dsdb-modules-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030524" comment="samba-gpupdate-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030525" comment="samba-ldb-ldap-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030526" comment="samba-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030527" comment="samba-libs-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030528" comment="samba-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030530" comment="samba-tool-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030531" comment="samba-winbind-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030532" comment="samba-winbind-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94444" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256389" ref_url="https://bugzilla.suse.com/1256389" source="BUGZILLA"/>
		<reference ref_id="1257395" ref_url="https://bugzilla.suse.com/1257395" source="BUGZILLA"/>
		<reference ref_id="1257396" ref_url="https://bugzilla.suse.com/1257396" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-24882" ref_url="https://www.suse.com/security/cve/CVE-2026-24882/" source="CVE"/>
		<reference ref_id="CVE-2026-24883" ref_url="https://www.suse.com/security/cve/CVE-2026-24883/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024024.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2026-24882: stack-based buffer overflow in TPM2 PKDECRYPT for TPM-backed RSA and ECC keys (bsc#1257396).
- CVE-2026-24883: denial of service due to long signature packet length causing parse_signature to return success with sig-&gt;data[] set to a NULL value (bsc#1257395).
- gpg.fail/filename: GnuPG Accepts Path Separators and Path Traversals in Literal Data "Filename" Field (bsc#1256389).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256389">SUSE bug 1256389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257395">SUSE bug 1257395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257396">SUSE bug 1257396</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24882/">CVE-2026-24882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24882">CVE-2026-24882 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24883/">CVE-2026-24883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24883">CVE-2026-24883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041445" comment="dirmngr-2.5.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041446" comment="gpg2-2.5.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041447" comment="gpg2-lang-2.5.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041448" comment="gpg2-tpm-2.5.5-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041445" comment="dirmngr-2.5.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041446" comment="gpg2-2.5.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041447" comment="gpg2-lang-2.5.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041448" comment="gpg2-tpm-2.5.5-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94445" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254486" ref_url="https://bugzilla.suse.com/1254486" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13086" ref_url="https://www.suse.com/security/cve/CVE-2025-13086/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024022.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2025-13086: Fixed improper validation of source IP addresses in OpenVPN that could lead to DoS (bsc#1254486).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254486">SUSE bug 1254486</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13086/">CVE-2025-13086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13086">CVE-2025-13086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041449" comment="openvpn-2.6.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041450" comment="openvpn-auth-pam-plugin-2.6.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041451" comment="openvpn-devel-2.6.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041452" comment="openvpn-down-root-plugin-2.6.10-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041449" comment="openvpn-2.6.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041450" comment="openvpn-auth-pam-plugin-2.6.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041451" comment="openvpn-devel-2.6.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041452" comment="openvpn-down-root-plugin-2.6.10-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94446" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247901" ref_url="https://bugzilla.suse.com/1247901" source="BUGZILLA"/>
		<reference ref_id="1247902" ref_url="https://bugzilla.suse.com/1247902" source="BUGZILLA"/>
		<reference ref_id="1247904" ref_url="https://bugzilla.suse.com/1247904" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8835" ref_url="https://www.suse.com/security/cve/CVE-2025-8835/" source="CVE"/>
		<reference ref_id="CVE-2025-8836" ref_url="https://www.suse.com/security/cve/CVE-2025-8836/" source="CVE"/>
		<reference ref_id="CVE-2025-8837" ref_url="https://www.suse.com/security/cve/CVE-2025-8837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024019.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Update to 4.2.8:

- CVE-2025-8837: Fixed a bug in the JPC decoder that could cause bad memory accesses if the debug level is set sufficiently high (bsc#1247901).
- CVE-2025-8836: Added some missing range checking on several coding parameters in the JPC encoder (bsc#1247902).
- CVE-2025-8835: Added a check for a missing color component in the jas_image_chclrspc function (bsc#1247904).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1247901">SUSE bug 1247901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247902">SUSE bug 1247902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247904">SUSE bug 1247904</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8835/">CVE-2025-8835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8835">CVE-2025-8835 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8836/">CVE-2025-8836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8836">CVE-2025-8836 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8837/">CVE-2025-8837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8837">CVE-2025-8837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041453" comment="jasper-4.2.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041455" comment="libjasper7-4.2.8-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041453" comment="jasper-4.2.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041455" comment="libjasper7-4.2.8-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94447" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252525" ref_url="https://bugzilla.suse.com/1252525" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11411" ref_url="https://www.suse.com/security/cve/CVE-2025-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024018.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

Update to 1.24.1:

- CVE-2025-11411: Fixed possible domain hijacking attack (bsc#1252525).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1252525">SUSE bug 1252525</bugzilla>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L" cvss4="7.1/CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-11411/">CVE-2025-11411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11411">CVE-2025-11411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041456" comment="libunbound8-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041457" comment="python3-unbound-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041458" comment="unbound-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041459" comment="unbound-anchor-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041460" comment="unbound-devel-1.24.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041456" comment="libunbound8-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041457" comment="python3-unbound-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041458" comment="unbound-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041459" comment="unbound-anchor-1.24.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041460" comment="unbound-devel-1.24.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94448" version="1" class="patch">
	<metadata>
		<title>Security update for alloy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255074" ref_url="https://bugzilla.suse.com/1255074" source="BUGZILLA"/>
		<reference ref_id="1255333" ref_url="https://bugzilla.suse.com/1255333" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<description>
This update for alloy fixes the following issues:

Update to 1.12.2:

Security fixes:

- CVE-2025-68156: github.com/expr-lang/expr/builtin: Fixed potential DoS via unbounded recursion (bsc#1255333):
- CVE-2025-31133, CVE-2025-52565, CVE-2025-52881: github.com/opencontainers/runc: Fixed container
  breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1255074)

Other fixes:

    - Add missing configuration parameter
      deployment_name_from_replicaset to k8sattributes processor
      (5b90a9d) (@dehaansa)
    - database_observability: Fix schema_details collector to fetch
      column definitions with case sensitive table names (#4872)
      (560dff4) (@jharvey10, @fridgepoet)
    - deps: Update jose2go to 1.7.0 (#4858) (dfdd341) (@jharvey10)
    - deps: Update npm dependencies [backport] (#5201) (8e06c26)
      (@jharvey10)
    - Ensure the squid exporter wrapper properly brackets ipv6
      addresses [backport] (#5205) (e329cc6) (@dehaansa)
    - Preserve meta labels in loki.source.podlogs (#5097) (ab4b21e)
      (@kalleep)
    - Prevent panic in import.git when update fails [backport]
      (#5204) (c82fbae) (@dehaansa, @jharvey10)
    - show correct fallback alloy version instead of v1.13.0
      (#5110) (b72be99) (@dehaansa, @jharvey10)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255074">SUSE bug 1255074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255333">SUSE bug 1255333</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041462" comment="alloy-1.12.2-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041462" comment="alloy-1.12.2-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94449" version="1" class="patch">
	<metadata>
		<title>Security update for udisks2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248502" ref_url="https://bugzilla.suse.com/1248502" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024073.html" source="SUSE-SU"/>
		<description>
This update for udisks2 fixes the following issues:

- CVE-2025-8067: Fixed a missing bounds check that could lead to out-of-bounds
  read in udisks daemon (bsc#1248502).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1248502">SUSE bug 1248502</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041463" comment="libudisks2-0-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041464" comment="libudisks2-0-devel-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041465" comment="libudisks2-0_btrfs-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041466" comment="libudisks2-0_lsm-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041467" comment="libudisks2-0_lvm2-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041468" comment="typelib-1_0-UDisks-2_0-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041469" comment="udisks2-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041471" comment="udisks2-docs-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041472" comment="udisks2-lang-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041473" comment="udisks2-zsh-completion-2.10.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041463" comment="libudisks2-0-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041464" comment="libudisks2-0-devel-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041465" comment="libudisks2-0_btrfs-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041466" comment="libudisks2-0_lsm-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041467" comment="libudisks2-0_lvm2-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041468" comment="typelib-1_0-UDisks-2_0-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041469" comment="udisks2-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041471" comment="udisks2-docs-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041472" comment="udisks2-lang-2.10.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041473" comment="udisks2-zsh-completion-2.10.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94450" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250562" ref_url="https://bugzilla.suse.com/1250562" source="BUGZILLA"/>
		<reference ref_id="1256399" ref_url="https://bugzilla.suse.com/1256399" source="BUGZILLA"/>
		<reference ref_id="1256418" ref_url="https://bugzilla.suse.com/1256418" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021/" source="CVE"/>
		<reference ref_id="CVE-2026-0716" ref_url="https://www.suse.com/security/cve/CVE-2026-0716/" source="CVE"/>
		<reference ref_id="CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

- CVE-2025-11021: Fixed out-of-bounds read in Cookie Date Handling of libsoup HTTP Library (bsc#1250562).
- CVE-2026-0719: Fixed stack-based buffer overflow in NTLM authentication can lead to arbitrary code execution (bsc#1256399).
- CVE-2026-0716: Fixed improper bounds handling may allow out-of-bounds read (bsc#1256418).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256399">SUSE bug 1256399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256418">SUSE bug 1256418</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0716/">CVE-2026-0716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0716">CVE-2026-0716 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041475" comment="libsoup-devel-3.6.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041476" comment="libsoup-lang-3.6.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041477" comment="typelib-1_0-Soup-3_0-3.6.5-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041475" comment="libsoup-devel-3.6.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041476" comment="libsoup-lang-3.6.5-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041477" comment="typelib-1_0-Soup-3_0-3.6.5-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94451" version="1" class="patch">
	<metadata>
		<title>Security update for java-25-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257034" ref_url="https://bugzilla.suse.com/1257034" source="BUGZILLA"/>
		<reference ref_id="1257036" ref_url="https://bugzilla.suse.com/1257036" source="BUGZILLA"/>
		<reference ref_id="1257037" ref_url="https://bugzilla.suse.com/1257037" source="BUGZILLA"/>
		<reference ref_id="1257038" ref_url="https://bugzilla.suse.com/1257038" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
		<description>
This update for java-25-openjdk fixes the following issues:

Update to upstream tag jdk-25.0.2+10 (January 2026 CPU)

Security fixes:

- CVE-2026-21925: Fixed Oracle Java SE component RMI (bsc#1257034).
- CVE-2026-21932: Fixed Oracle Java SE component AWT and JavaFX (bsc#1257036).
- CVE-2026-21933: Fixed Oracle Java SE component Networking (bsc#1257037).
- CVE-2026-21945: Fixed Oracle Java SE component Security (bsc#1257038).

Other fixes:

- Do not depend on update-desktop-files (jsc#PED-14507, jsc#PED-15221).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257034">SUSE bug 1257034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257036">SUSE bug 1257036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257037">SUSE bug 1257037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257038">SUSE bug 1257038</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041478" comment="java-25-openjdk-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041479" comment="java-25-openjdk-demo-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041480" comment="java-25-openjdk-devel-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041481" comment="java-25-openjdk-headless-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041482" comment="java-25-openjdk-javadoc-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041483" comment="java-25-openjdk-jmods-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041484" comment="java-25-openjdk-src-25.0.2.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041478" comment="java-25-openjdk-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041479" comment="java-25-openjdk-demo-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041480" comment="java-25-openjdk-devel-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041481" comment="java-25-openjdk-headless-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041482" comment="java-25-openjdk-javadoc-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041483" comment="java-25-openjdk-jmods-25.0.2.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041484" comment="java-25-openjdk-src-25.0.2.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94452" version="1" class="patch">
	<metadata>
		<title>Security update for python-filelock (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255244" ref_url="https://bugzilla.suse.com/1255244" source="BUGZILLA"/>
		<reference ref_id="1256457" ref_url="https://bugzilla.suse.com/1256457" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68146" ref_url="https://www.suse.com/security/cve/CVE-2025-68146/" source="CVE"/>
		<reference ref_id="CVE-2026-22701" ref_url="https://www.suse.com/security/cve/CVE-2026-22701/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024068.html" source="SUSE-SU"/>
		<description>
This update for python-filelock fixes the following issues:

- CVE-2025-68146: TOCTOU race condition may allow local attackers to corrupt or truncate arbitrary user files (bsc#1255244).
- CVE-2026-22701: TOCTOU race condition in the SoftFileLock implementation (bsc#1256457).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255244">SUSE bug 1255244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256457">SUSE bug 1256457</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68146/">CVE-2025-68146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68146">CVE-2025-68146 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22701/">CVE-2026-22701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22701">CVE-2026-22701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041485" comment="python313-filelock-3.18.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041485" comment="python313-filelock-3.18.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94453" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1243503" ref_url="https://bugzilla.suse.com/1243503" source="BUGZILLA"/>
		<reference ref_id="1247106" ref_url="https://bugzilla.suse.com/1247106" source="BUGZILLA"/>
		<reference ref_id="1247108" ref_url="https://bugzilla.suse.com/1247108" source="BUGZILLA"/>
		<reference ref_id="1247581" ref_url="https://bugzilla.suse.com/1247581" source="BUGZILLA"/>
		<reference ref_id="1247582" ref_url="https://bugzilla.suse.com/1247582" source="BUGZILLA"/>
		<reference ref_id="1248117" ref_url="https://bugzilla.suse.com/1248117" source="BUGZILLA"/>
		<reference ref_id="1248330" ref_url="https://bugzilla.suse.com/1248330" source="BUGZILLA"/>
		<reference ref_id="1250413" ref_url="https://bugzilla.suse.com/1250413" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-13978" ref_url="https://www.suse.com/security/cve/CVE-2024-13978/" source="CVE"/>
		<reference ref_id="CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176/" source="CVE"/>
		<reference ref_id="CVE-2025-8177" ref_url="https://www.suse.com/security/cve/CVE-2025-8177/" source="CVE"/>
		<reference ref_id="CVE-2025-8534" ref_url="https://www.suse.com/security/cve/CVE-2025-8534/" source="CVE"/>
		<reference ref_id="CVE-2025-8961" ref_url="https://www.suse.com/security/cve/CVE-2025-8961/" source="CVE"/>
		<reference ref_id="CVE-2025-9165" ref_url="https://www.suse.com/security/cve/CVE-2025-9165/" source="CVE"/>
		<reference ref_id="CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

tiff was updated to 4.7.1:

* Software configuration changes:

  * Define HAVE_JPEGTURBO_DUAL_MODE_8_12 and LERC_STATIC in tif_config.h.
  * CMake: define WORDS_BIGENDIAN via tif_config.h
  * doc/CMakeLists.txt: remove useless cmake_minimum_required()
  * CMake: fix build with LLVM/Clang 17 (fixes issue #651)
  * CMake: set CMP0074 new policy
  * Set LINKER_LANGUAGE for C targets with C deps
  * Export tiffxx cmake target (fixes issue #674)
  * autogen.sh: Enable verbose wget.
  * configure.ac: Syntax updates for Autoconf 2.71
  * autogen.sh: Re-implement based on autoreconf. Failure to update
    config.guess/config.sub does not return error (fixes issue #672)
  * CMake: fix CMake 4.0 warning when minimum required version is &lt; 3.10.
  * CMake: Add build option tiff-static (fixes issue #709)
  Library changes:
  * Add TIFFOpenOptionsSetWarnAboutUnknownTags() for explicit control
    about emitting warnings for unknown tags. No longer emit warnings
    about unknown tags by default
  * tif_predict.c: speed-up decompression in some cases.

* Bug fixes:

  * tif_fax3: For fax group 3 data if no EOL is detected, reading is
    retried without synchronisation for EOLs. (fixes issue #54)
  * Updating TIFFMergeFieldInfo() with read_count=write_count=0 for
    FIELD_IGNORE. Updating TIFFMergeFieldInfo() with read_count=write_count=0 for
    FIELD_IGNORE. Improving handling when field_name = NULL. (fixes issue #532)
  * tiff.h: add COMPRESSION_JXL_DNG_1_7=52546 as used for JPEGXL compression in
    the DNG 1.7 specification
  * TIFFWriteDirectorySec: Increment string length for ASCII tags for codec tags
    defined with FIELD_xxx bits, as it is done for FIELD_CUSTOM tags. (fixes issue #648)
  * Do not error out on a tag whose tag count value is zero, just issue a warning.
    Fix parsing a private tag 0x80a6 (fixes issue #647)
  * TIFFDefaultTransferFunction(): give up beyond td_bitspersample = 24
    Fixes https://github.com/OSGeo/gdal/issues/10875)
  * tif_getimage.c: Remove unnecessary calls to TIFFRGBAImageOK() (fixes issue #175)
  * Fix writing a Predictor=3 file with non-native endianness
  * _TIFFVSetField(): fix potential use of unallocated memory (out-of-bounds
  * read / nullptr dereference) in case of out-of-memory situation when dealing with
    custom tags (fixes issue #663)
  * tif_fax3.c: Error out for CCITT fax encoding if SamplesPerPixel is not equal 1 and
    PlanarConfiguration = Contiguous (fixes issue #26)
  * tif_fax3.c: error out after a number of times end-of-line or unexpected bad code
    words have been reached. (fixes issue #670)
  * Fix memory leak in TIFFSetupStrips() (fixes issue #665)
  * tif_zip.c: Provide zlib allocation functions. Otherwise for zlib built with
    -DZ_SOLO inflating will fail.
  * Fix memory leak in _TIFFSetDefaultCompressionState. (fixes issue #676)
  * tif_predict.c: Don’t overwrite input buffer of TIFFWriteScanline() if "prediction"
    is enabled. Use extra working buffer in PredictorEncodeRow(). (fixes issue #5)
  * tif_getimage.c: update some integer overflow checks (fixes issue #79)
  * tif_getimage.c: Fix buffer underflow crash for less raster rows at
    TIFFReadRGBAImageOriented() (fixes issue #704, bsc#1250413, CVE-2025-9900)
  * TIFFReadRGBAImage(): several fixes to avoid buffer overflows.
  * Correct passing arguments to TIFFCvtIEEEFloatToNative() and TIFFCvtIEEEDoubleToNative()
    if HAVE_IEEEFP is not defined. (fixes issue #699)
  * LZWDecode(): avoid nullptr dereference when trying to read again after EOI marker
    has been found with remaining output bytes (fixes issue #698)
  * TIFFSetSubDirectory(): check _TIFFCheckDirNumberAndOffset() return.
  * TIFFUnlinkDirectory() and TIFFWriteDirectorySec(): clear tif_rawcp when clearing
    tif_rawdata (fixes issue #711)
  * JPEGEncodeRaw(): error out if a previous scanline failed to be written, to avoid
    out-of-bounds access (fixes issue #714)
  * tif_jpeg: Fix bug in JPEGDecodeRaw() if JPEG_LIB_MK1_OR_12BIT is defined for 8/12bit
    dual mode, introduced in libjpeg-turbo 2.2, which was actually released as 3.0.
    Fixes issue #717
  * add assert for TIFFReadCustomDirectory infoarray check.
  * ppm2tiff: Fix bug in pack_words trailing bytes, where last two bytes of each line
    were written wrongly. (fixes issue #467)
  * fax2ps: fix regression of commit 28c38d648b64a66c3218778c4745225fe3e3a06d where
    TIFFTAG_FAXFILLFUNC is being used rather than an output buffer (fixes issue #649)
  * tiff2pdf: Check TIFFTAG_TILELENGTH and TIFFTAGTILEWIDTH (fixes issue #650)
  * tiff2pdf: check h_samp and v_samp for range 1 to 4 to avoid division by zero.
    Fixes issue #654
  * tiff2pdf: avoid null pointer dereference. (fixes issue #741)
  * Improve non-secure integer overflow check (comparison of division result with
    multiplicant) at compiler optimisation in tiffcp, rgb2ycbcr and tiff2rgba.
    Fixes issue #546
  * tiff2rgba: fix some "a partial expression can generate an overflow before it is
    assigned to a broader type" warnings. (fixes issue #682)
  * tiffdither/tiffmedian: Don't skip the first line of the input image. (fixes issue #703)
  * tiffdither: avoid out-of-bounds read identified in issue #733
  * tiffmedian: error out if TIFFReadScanline() fails (fixes issue #707)
  * tiffmedian: close input file. (fixes issue #735)
  * thumbail: avoid potential out of bounds access (fixes issue #715)
  * tiffcrop: close open TIFF files and release allocated buffers before exiting in case
    of error to avoid memory leaks. (fixes issue #716)
  * tiffcrop: fix double-free and memory leak exposed by issue #721
  * tiffcrop: avoid buffer overflow. (fixes issue #740)
  * tiffcrop: avoid nullptr dereference. (fixes issue #734)
  * tiffdump: Fix coverity scan issue CID 1373365: Passing tainted expression *datamem
    to PrintData, which uses it as a divisor or modulus.
  * tiff2ps: check return of TIFFGetFiled() for TIFFTAG_STRIPBYTECOUNTS and
    TIFFTAG_TILEBYTECOUNTS to avoid NULL pointer dereference. (fixes issue #718)
  * tiffcmp: fix memory leak when second file cannot be opened. (fixes issue #718 and issue #729)
  * tiffcp: fix setting compression level for lossless codecs. (fixes issue #730)
  * raw2tiff: close input file before exit (fixes issue #742)
  Tools changes:
  * tiffinfo: add a -W switch to warn about unknown tags.
  * tiffdither: process all pages in input TIFF file.

* Documentation:

  * TIFFRGBAImage.rst note added for incorrect saving of images with TIFF orientation
    from 5 (LeftTop) to 8 (LeftBottom) in the raster.
  * TIFFRGBAImage.rst note added about un-associated alpha handling (fixes issue #67)
  * Update "Defining New TIFF Tags" description. (fixes issue #642)
  * Fix return type of TIFFReadEncodedTile()
  * Update the documentation to reflect deprecated typedefs.
  * TIFFWriteDirectory.rst: Clarify TIFFSetWriteOffset() only sets offset for image
    data and not for IFD data.
  * Update documentation on re-entrancy and thread safety.
  * Remove dead links to no more existing Awaresystems web-site.
  * Updating BigTIFF specification and some miscelaneous editions.
  * Replace some last links and remove last todos.
  * Added hints for correct allocation of TIFFYCbCrtoRGB structure and its
    associated buffers. (fixes issue #681)
  * Added chapter to "Using the TIFF Library" with links to handling multi-page TIFF
    and custom directories. (fixes issue #43)
  * update TIFFOpen.rst with the return values of mapproc and unmapproc. (fixes issue #12)

Security issues fixed:

  * CVE-2025-8961: Fix segmentation fault via main function of tiffcrop utility [bsc#1248117]
  * CVE-2025-8534: Fix null pointer dereference in function PS_Lvl2page [bsc#1247582]
  * CVE-2025-9165: Fix local execution manipulation can lead to memory leak [bsc#1248330]
  * CVE-2024-13978: Fix null pointer dereference in tiff2pdf [bsc#1247581]
  * CVE-2025-8176: Fix heap use-after-free in tools/tiffmedian.c [bsc#1247108]
  * CVE-2025-8177: Fix possible buffer overflow in tools/thumbnail.c:setrow()  [bsc#1247106]

- Fix TIFFMergeFieldInfo() read_count=write_count=0 (bsc#1243503)

		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243503">SUSE bug 1243503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247106">SUSE bug 1247106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247108">SUSE bug 1247108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247581">SUSE bug 1247581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247582">SUSE bug 1247582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248117">SUSE bug 1248117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248330">SUSE bug 1248330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250413">SUSE bug 1250413</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13978/">CVE-2024-13978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13978">CVE-2024-13978 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8177/">CVE-2025-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8177">CVE-2025-8177 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8534/">CVE-2025-8534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8534">CVE-2025-8534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8961/">CVE-2025-8961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8961">CVE-2025-8961 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9165/">CVE-2025-9165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9165">CVE-2025-9165 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94454" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1243112" ref_url="https://bugzilla.suse.com/1243112" source="BUGZILLA"/>
		<reference ref_id="1245193" ref_url="https://bugzilla.suse.com/1245193" source="BUGZILLA"/>
		<reference ref_id="1247500" ref_url="https://bugzilla.suse.com/1247500" source="BUGZILLA"/>
		<reference ref_id="1250388" ref_url="https://bugzilla.suse.com/1250388" source="BUGZILLA"/>
		<reference ref_id="1252046" ref_url="https://bugzilla.suse.com/1252046" source="BUGZILLA"/>
		<reference ref_id="1252861" ref_url="https://bugzilla.suse.com/1252861" source="BUGZILLA"/>
		<reference ref_id="1253155" ref_url="https://bugzilla.suse.com/1253155" source="BUGZILLA"/>
		<reference ref_id="1253238" ref_url="https://bugzilla.suse.com/1253238" source="BUGZILLA"/>
		<reference ref_id="1253262" ref_url="https://bugzilla.suse.com/1253262" source="BUGZILLA"/>
		<reference ref_id="1253365" ref_url="https://bugzilla.suse.com/1253365" source="BUGZILLA"/>
		<reference ref_id="1253400" ref_url="https://bugzilla.suse.com/1253400" source="BUGZILLA"/>
		<reference ref_id="1253413" ref_url="https://bugzilla.suse.com/1253413" source="BUGZILLA"/>
		<reference ref_id="1253414" ref_url="https://bugzilla.suse.com/1253414" source="BUGZILLA"/>
		<reference ref_id="1253442" ref_url="https://bugzilla.suse.com/1253442" source="BUGZILLA"/>
		<reference ref_id="1253458" ref_url="https://bugzilla.suse.com/1253458" source="BUGZILLA"/>
		<reference ref_id="1253623" ref_url="https://bugzilla.suse.com/1253623" source="BUGZILLA"/>
		<reference ref_id="1253674" ref_url="https://bugzilla.suse.com/1253674" source="BUGZILLA"/>
		<reference ref_id="1253739" ref_url="https://bugzilla.suse.com/1253739" source="BUGZILLA"/>
		<reference ref_id="1254126" ref_url="https://bugzilla.suse.com/1254126" source="BUGZILLA"/>
		<reference ref_id="1254128" ref_url="https://bugzilla.suse.com/1254128" source="BUGZILLA"/>
		<reference ref_id="1254195" ref_url="https://bugzilla.suse.com/1254195" source="BUGZILLA"/>
		<reference ref_id="1254244" ref_url="https://bugzilla.suse.com/1254244" source="BUGZILLA"/>
		<reference ref_id="1254363" ref_url="https://bugzilla.suse.com/1254363" source="BUGZILLA"/>
		<reference ref_id="1254378" ref_url="https://bugzilla.suse.com/1254378" source="BUGZILLA"/>
		<reference ref_id="1254408" ref_url="https://bugzilla.suse.com/1254408" source="BUGZILLA"/>
		<reference ref_id="1254477" ref_url="https://bugzilla.suse.com/1254477" source="BUGZILLA"/>
		<reference ref_id="1254510" ref_url="https://bugzilla.suse.com/1254510" source="BUGZILLA"/>
		<reference ref_id="1254518" ref_url="https://bugzilla.suse.com/1254518" source="BUGZILLA"/>
		<reference ref_id="1254519" ref_url="https://bugzilla.suse.com/1254519" source="BUGZILLA"/>
		<reference ref_id="1254520" ref_url="https://bugzilla.suse.com/1254520" source="BUGZILLA"/>
		<reference ref_id="1254615" ref_url="https://bugzilla.suse.com/1254615" source="BUGZILLA"/>
		<reference ref_id="1254616" ref_url="https://bugzilla.suse.com/1254616" source="BUGZILLA"/>
		<reference ref_id="1254618" ref_url="https://bugzilla.suse.com/1254618" source="BUGZILLA"/>
		<reference ref_id="1254621" ref_url="https://bugzilla.suse.com/1254621" source="BUGZILLA"/>
		<reference ref_id="1254624" ref_url="https://bugzilla.suse.com/1254624" source="BUGZILLA"/>
		<reference ref_id="1254791" ref_url="https://bugzilla.suse.com/1254791" source="BUGZILLA"/>
		<reference ref_id="1254793" ref_url="https://bugzilla.suse.com/1254793" source="BUGZILLA"/>
		<reference ref_id="1254794" ref_url="https://bugzilla.suse.com/1254794" source="BUGZILLA"/>
		<reference ref_id="1254795" ref_url="https://bugzilla.suse.com/1254795" source="BUGZILLA"/>
		<reference ref_id="1254796" ref_url="https://bugzilla.suse.com/1254796" source="BUGZILLA"/>
		<reference ref_id="1254797" ref_url="https://bugzilla.suse.com/1254797" source="BUGZILLA"/>
		<reference ref_id="1254798" ref_url="https://bugzilla.suse.com/1254798" source="BUGZILLA"/>
		<reference ref_id="1254808" ref_url="https://bugzilla.suse.com/1254808" source="BUGZILLA"/>
		<reference ref_id="1254809" ref_url="https://bugzilla.suse.com/1254809" source="BUGZILLA"/>
		<reference ref_id="1254813" ref_url="https://bugzilla.suse.com/1254813" source="BUGZILLA"/>
		<reference ref_id="1254815" ref_url="https://bugzilla.suse.com/1254815" source="BUGZILLA"/>
		<reference ref_id="1254821" ref_url="https://bugzilla.suse.com/1254821" source="BUGZILLA"/>
		<reference ref_id="1254824" ref_url="https://bugzilla.suse.com/1254824" source="BUGZILLA"/>
		<reference ref_id="1254825" ref_url="https://bugzilla.suse.com/1254825" source="BUGZILLA"/>
		<reference ref_id="1254827" ref_url="https://bugzilla.suse.com/1254827" source="BUGZILLA"/>
		<reference ref_id="1254828" ref_url="https://bugzilla.suse.com/1254828" source="BUGZILLA"/>
		<reference ref_id="1254829" ref_url="https://bugzilla.suse.com/1254829" source="BUGZILLA"/>
		<reference ref_id="1254830" ref_url="https://bugzilla.suse.com/1254830" source="BUGZILLA"/>
		<reference ref_id="1254832" ref_url="https://bugzilla.suse.com/1254832" source="BUGZILLA"/>
		<reference ref_id="1254835" ref_url="https://bugzilla.suse.com/1254835" source="BUGZILLA"/>
		<reference ref_id="1254840" ref_url="https://bugzilla.suse.com/1254840" source="BUGZILLA"/>
		<reference ref_id="1254843" ref_url="https://bugzilla.suse.com/1254843" source="BUGZILLA"/>
		<reference ref_id="1254846" ref_url="https://bugzilla.suse.com/1254846" source="BUGZILLA"/>
		<reference ref_id="1254847" ref_url="https://bugzilla.suse.com/1254847" source="BUGZILLA"/>
		<reference ref_id="1254849" ref_url="https://bugzilla.suse.com/1254849" source="BUGZILLA"/>
		<reference ref_id="1254850" ref_url="https://bugzilla.suse.com/1254850" source="BUGZILLA"/>
		<reference ref_id="1254851" ref_url="https://bugzilla.suse.com/1254851" source="BUGZILLA"/>
		<reference ref_id="1254852" ref_url="https://bugzilla.suse.com/1254852" source="BUGZILLA"/>
		<reference ref_id="1254854" ref_url="https://bugzilla.suse.com/1254854" source="BUGZILLA"/>
		<reference ref_id="1254856" ref_url="https://bugzilla.suse.com/1254856" source="BUGZILLA"/>
		<reference ref_id="1254858" ref_url="https://bugzilla.suse.com/1254858" source="BUGZILLA"/>
		<reference ref_id="1254860" ref_url="https://bugzilla.suse.com/1254860" source="BUGZILLA"/>
		<reference ref_id="1254861" ref_url="https://bugzilla.suse.com/1254861" source="BUGZILLA"/>
		<reference ref_id="1254864" ref_url="https://bugzilla.suse.com/1254864" source="BUGZILLA"/>
		<reference ref_id="1254868" ref_url="https://bugzilla.suse.com/1254868" source="BUGZILLA"/>
		<reference ref_id="1254869" ref_url="https://bugzilla.suse.com/1254869" source="BUGZILLA"/>
		<reference ref_id="1254871" ref_url="https://bugzilla.suse.com/1254871" source="BUGZILLA"/>
		<reference ref_id="1254894" ref_url="https://bugzilla.suse.com/1254894" source="BUGZILLA"/>
		<reference ref_id="1254957" ref_url="https://bugzilla.suse.com/1254957" source="BUGZILLA"/>
		<reference ref_id="1254959" ref_url="https://bugzilla.suse.com/1254959" source="BUGZILLA"/>
		<reference ref_id="1254961" ref_url="https://bugzilla.suse.com/1254961" source="BUGZILLA"/>
		<reference ref_id="1254964" ref_url="https://bugzilla.suse.com/1254964" source="BUGZILLA"/>
		<reference ref_id="1254996" ref_url="https://bugzilla.suse.com/1254996" source="BUGZILLA"/>
		<reference ref_id="1255026" ref_url="https://bugzilla.suse.com/1255026" source="BUGZILLA"/>
		<reference ref_id="1255030" ref_url="https://bugzilla.suse.com/1255030" source="BUGZILLA"/>
		<reference ref_id="1255034" ref_url="https://bugzilla.suse.com/1255034" source="BUGZILLA"/>
		<reference ref_id="1255035" ref_url="https://bugzilla.suse.com/1255035" source="BUGZILLA"/>
		<reference ref_id="1255039" ref_url="https://bugzilla.suse.com/1255039" source="BUGZILLA"/>
		<reference ref_id="1255040" ref_url="https://bugzilla.suse.com/1255040" source="BUGZILLA"/>
		<reference ref_id="1255041" ref_url="https://bugzilla.suse.com/1255041" source="BUGZILLA"/>
		<reference ref_id="1255042" ref_url="https://bugzilla.suse.com/1255042" source="BUGZILLA"/>
		<reference ref_id="1255057" ref_url="https://bugzilla.suse.com/1255057" source="BUGZILLA"/>
		<reference ref_id="1255058" ref_url="https://bugzilla.suse.com/1255058" source="BUGZILLA"/>
		<reference ref_id="1255064" ref_url="https://bugzilla.suse.com/1255064" source="BUGZILLA"/>
		<reference ref_id="1255065" ref_url="https://bugzilla.suse.com/1255065" source="BUGZILLA"/>
		<reference ref_id="1255068" ref_url="https://bugzilla.suse.com/1255068" source="BUGZILLA"/>
		<reference ref_id="1255071" ref_url="https://bugzilla.suse.com/1255071" source="BUGZILLA"/>
		<reference ref_id="1255072" ref_url="https://bugzilla.suse.com/1255072" source="BUGZILLA"/>
		<reference ref_id="1255075" ref_url="https://bugzilla.suse.com/1255075" source="BUGZILLA"/>
		<reference ref_id="1255077" ref_url="https://bugzilla.suse.com/1255077" source="BUGZILLA"/>
		<reference ref_id="1255081" ref_url="https://bugzilla.suse.com/1255081" source="BUGZILLA"/>
		<reference ref_id="1255082" ref_url="https://bugzilla.suse.com/1255082" source="BUGZILLA"/>
		<reference ref_id="1255083" ref_url="https://bugzilla.suse.com/1255083" source="BUGZILLA"/>
		<reference ref_id="1255087" ref_url="https://bugzilla.suse.com/1255087" source="BUGZILLA"/>
		<reference ref_id="1255092" ref_url="https://bugzilla.suse.com/1255092" source="BUGZILLA"/>
		<reference ref_id="1255094" ref_url="https://bugzilla.suse.com/1255094" source="BUGZILLA"/>
		<reference ref_id="1255095" ref_url="https://bugzilla.suse.com/1255095" source="BUGZILLA"/>
		<reference ref_id="1255097" ref_url="https://bugzilla.suse.com/1255097" source="BUGZILLA"/>
		<reference ref_id="1255099" ref_url="https://bugzilla.suse.com/1255099" source="BUGZILLA"/>
		<reference ref_id="1255103" ref_url="https://bugzilla.suse.com/1255103" source="BUGZILLA"/>
		<reference ref_id="1255116" ref_url="https://bugzilla.suse.com/1255116" source="BUGZILLA"/>
		<reference ref_id="1255120" ref_url="https://bugzilla.suse.com/1255120" source="BUGZILLA"/>
		<reference ref_id="1255121" ref_url="https://bugzilla.suse.com/1255121" source="BUGZILLA"/>
		<reference ref_id="1255122" ref_url="https://bugzilla.suse.com/1255122" source="BUGZILLA"/>
		<reference ref_id="1255124" ref_url="https://bugzilla.suse.com/1255124" source="BUGZILLA"/>
		<reference ref_id="1255131" ref_url="https://bugzilla.suse.com/1255131" source="BUGZILLA"/>
		<reference ref_id="1255134" ref_url="https://bugzilla.suse.com/1255134" source="BUGZILLA"/>
		<reference ref_id="1255135" ref_url="https://bugzilla.suse.com/1255135" source="BUGZILLA"/>
		<reference ref_id="1255136" ref_url="https://bugzilla.suse.com/1255136" source="BUGZILLA"/>
		<reference ref_id="1255138" ref_url="https://bugzilla.suse.com/1255138" source="BUGZILLA"/>
		<reference ref_id="1255140" ref_url="https://bugzilla.suse.com/1255140" source="BUGZILLA"/>
		<reference ref_id="1255142" ref_url="https://bugzilla.suse.com/1255142" source="BUGZILLA"/>
		<reference ref_id="1255145" ref_url="https://bugzilla.suse.com/1255145" source="BUGZILLA"/>
		<reference ref_id="1255146" ref_url="https://bugzilla.suse.com/1255146" source="BUGZILLA"/>
		<reference ref_id="1255149" ref_url="https://bugzilla.suse.com/1255149" source="BUGZILLA"/>
		<reference ref_id="1255150" ref_url="https://bugzilla.suse.com/1255150" source="BUGZILLA"/>
		<reference ref_id="1255152" ref_url="https://bugzilla.suse.com/1255152" source="BUGZILLA"/>
		<reference ref_id="1255154" ref_url="https://bugzilla.suse.com/1255154" source="BUGZILLA"/>
		<reference ref_id="1255155" ref_url="https://bugzilla.suse.com/1255155" source="BUGZILLA"/>
		<reference ref_id="1255156" ref_url="https://bugzilla.suse.com/1255156" source="BUGZILLA"/>
		<reference ref_id="1255161" ref_url="https://bugzilla.suse.com/1255161" source="BUGZILLA"/>
		<reference ref_id="1255167" ref_url="https://bugzilla.suse.com/1255167" source="BUGZILLA"/>
		<reference ref_id="1255169" ref_url="https://bugzilla.suse.com/1255169" source="BUGZILLA"/>
		<reference ref_id="1255171" ref_url="https://bugzilla.suse.com/1255171" source="BUGZILLA"/>
		<reference ref_id="1255175" ref_url="https://bugzilla.suse.com/1255175" source="BUGZILLA"/>
		<reference ref_id="1255179" ref_url="https://bugzilla.suse.com/1255179" source="BUGZILLA"/>
		<reference ref_id="1255181" ref_url="https://bugzilla.suse.com/1255181" source="BUGZILLA"/>
		<reference ref_id="1255182" ref_url="https://bugzilla.suse.com/1255182" source="BUGZILLA"/>
		<reference ref_id="1255186" ref_url="https://bugzilla.suse.com/1255186" source="BUGZILLA"/>
		<reference ref_id="1255187" ref_url="https://bugzilla.suse.com/1255187" source="BUGZILLA"/>
		<reference ref_id="1255190" ref_url="https://bugzilla.suse.com/1255190" source="BUGZILLA"/>
		<reference ref_id="1255193" ref_url="https://bugzilla.suse.com/1255193" source="BUGZILLA"/>
		<reference ref_id="1255196" ref_url="https://bugzilla.suse.com/1255196" source="BUGZILLA"/>
		<reference ref_id="1255197" ref_url="https://bugzilla.suse.com/1255197" source="BUGZILLA"/>
		<reference ref_id="1255199" ref_url="https://bugzilla.suse.com/1255199" source="BUGZILLA"/>
		<reference ref_id="1255202" ref_url="https://bugzilla.suse.com/1255202" source="BUGZILLA"/>
		<reference ref_id="1255203" ref_url="https://bugzilla.suse.com/1255203" source="BUGZILLA"/>
		<reference ref_id="1255206" ref_url="https://bugzilla.suse.com/1255206" source="BUGZILLA"/>
		<reference ref_id="1255209" ref_url="https://bugzilla.suse.com/1255209" source="BUGZILLA"/>
		<reference ref_id="1255218" ref_url="https://bugzilla.suse.com/1255218" source="BUGZILLA"/>
		<reference ref_id="1255220" ref_url="https://bugzilla.suse.com/1255220" source="BUGZILLA"/>
		<reference ref_id="1255221" ref_url="https://bugzilla.suse.com/1255221" source="BUGZILLA"/>
		<reference ref_id="1255223" ref_url="https://bugzilla.suse.com/1255223" source="BUGZILLA"/>
		<reference ref_id="1255226" ref_url="https://bugzilla.suse.com/1255226" source="BUGZILLA"/>
		<reference ref_id="1255227" ref_url="https://bugzilla.suse.com/1255227" source="BUGZILLA"/>
		<reference ref_id="1255228" ref_url="https://bugzilla.suse.com/1255228" source="BUGZILLA"/>
		<reference ref_id="1255230" ref_url="https://bugzilla.suse.com/1255230" source="BUGZILLA"/>
		<reference ref_id="1255231" ref_url="https://bugzilla.suse.com/1255231" source="BUGZILLA"/>
		<reference ref_id="1255233" ref_url="https://bugzilla.suse.com/1255233" source="BUGZILLA"/>
		<reference ref_id="1255234" ref_url="https://bugzilla.suse.com/1255234" source="BUGZILLA"/>
		<reference ref_id="1255242" ref_url="https://bugzilla.suse.com/1255242" source="BUGZILLA"/>
		<reference ref_id="1255243" ref_url="https://bugzilla.suse.com/1255243" source="BUGZILLA"/>
		<reference ref_id="1255246" ref_url="https://bugzilla.suse.com/1255246" source="BUGZILLA"/>
		<reference ref_id="1255247" ref_url="https://bugzilla.suse.com/1255247" source="BUGZILLA"/>
		<reference ref_id="1255251" ref_url="https://bugzilla.suse.com/1255251" source="BUGZILLA"/>
		<reference ref_id="1255252" ref_url="https://bugzilla.suse.com/1255252" source="BUGZILLA"/>
		<reference ref_id="1255253" ref_url="https://bugzilla.suse.com/1255253" source="BUGZILLA"/>
		<reference ref_id="1255255" ref_url="https://bugzilla.suse.com/1255255" source="BUGZILLA"/>
		<reference ref_id="1255256" ref_url="https://bugzilla.suse.com/1255256" source="BUGZILLA"/>
		<reference ref_id="1255259" ref_url="https://bugzilla.suse.com/1255259" source="BUGZILLA"/>
		<reference ref_id="1255260" ref_url="https://bugzilla.suse.com/1255260" source="BUGZILLA"/>
		<reference ref_id="1255261" ref_url="https://bugzilla.suse.com/1255261" source="BUGZILLA"/>
		<reference ref_id="1255262" ref_url="https://bugzilla.suse.com/1255262" source="BUGZILLA"/>
		<reference ref_id="1255272" ref_url="https://bugzilla.suse.com/1255272" source="BUGZILLA"/>
		<reference ref_id="1255273" ref_url="https://bugzilla.suse.com/1255273" source="BUGZILLA"/>
		<reference ref_id="1255274" ref_url="https://bugzilla.suse.com/1255274" source="BUGZILLA"/>
		<reference ref_id="1255276" ref_url="https://bugzilla.suse.com/1255276" source="BUGZILLA"/>
		<reference ref_id="1255279" ref_url="https://bugzilla.suse.com/1255279" source="BUGZILLA"/>
		<reference ref_id="1255297" ref_url="https://bugzilla.suse.com/1255297" source="BUGZILLA"/>
		<reference ref_id="1255312" ref_url="https://bugzilla.suse.com/1255312" source="BUGZILLA"/>
		<reference ref_id="1255316" ref_url="https://bugzilla.suse.com/1255316" source="BUGZILLA"/>
		<reference ref_id="1255318" ref_url="https://bugzilla.suse.com/1255318" source="BUGZILLA"/>
		<reference ref_id="1255325" ref_url="https://bugzilla.suse.com/1255325" source="BUGZILLA"/>
		<reference ref_id="1255329" ref_url="https://bugzilla.suse.com/1255329" source="BUGZILLA"/>
		<reference ref_id="1255346" ref_url="https://bugzilla.suse.com/1255346" source="BUGZILLA"/>
		<reference ref_id="1255349" ref_url="https://bugzilla.suse.com/1255349" source="BUGZILLA"/>
		<reference ref_id="1255351" ref_url="https://bugzilla.suse.com/1255351" source="BUGZILLA"/>
		<reference ref_id="1255354" ref_url="https://bugzilla.suse.com/1255354" source="BUGZILLA"/>
		<reference ref_id="1255357" ref_url="https://bugzilla.suse.com/1255357" source="BUGZILLA"/>
		<reference ref_id="1255377" ref_url="https://bugzilla.suse.com/1255377" source="BUGZILLA"/>
		<reference ref_id="1255379" ref_url="https://bugzilla.suse.com/1255379" source="BUGZILLA"/>
		<reference ref_id="1255380" ref_url="https://bugzilla.suse.com/1255380" source="BUGZILLA"/>
		<reference ref_id="1255395" ref_url="https://bugzilla.suse.com/1255395" source="BUGZILLA"/>
		<reference ref_id="1255401" ref_url="https://bugzilla.suse.com/1255401" source="BUGZILLA"/>
		<reference ref_id="1255415" ref_url="https://bugzilla.suse.com/1255415" source="BUGZILLA"/>
		<reference ref_id="1255428" ref_url="https://bugzilla.suse.com/1255428" source="BUGZILLA"/>
		<reference ref_id="1255433" ref_url="https://bugzilla.suse.com/1255433" source="BUGZILLA"/>
		<reference ref_id="1255434" ref_url="https://bugzilla.suse.com/1255434" source="BUGZILLA"/>
		<reference ref_id="1255480" ref_url="https://bugzilla.suse.com/1255480" source="BUGZILLA"/>
		<reference ref_id="1255483" ref_url="https://bugzilla.suse.com/1255483" source="BUGZILLA"/>
		<reference ref_id="1255488" ref_url="https://bugzilla.suse.com/1255488" source="BUGZILLA"/>
		<reference ref_id="1255489" ref_url="https://bugzilla.suse.com/1255489" source="BUGZILLA"/>
		<reference ref_id="1255493" ref_url="https://bugzilla.suse.com/1255493" source="BUGZILLA"/>
		<reference ref_id="1255495" ref_url="https://bugzilla.suse.com/1255495" source="BUGZILLA"/>
		<reference ref_id="1255505" ref_url="https://bugzilla.suse.com/1255505" source="BUGZILLA"/>
		<reference ref_id="1255507" ref_url="https://bugzilla.suse.com/1255507" source="BUGZILLA"/>
		<reference ref_id="1255508" ref_url="https://bugzilla.suse.com/1255508" source="BUGZILLA"/>
		<reference ref_id="1255509" ref_url="https://bugzilla.suse.com/1255509" source="BUGZILLA"/>
		<reference ref_id="1255533" ref_url="https://bugzilla.suse.com/1255533" source="BUGZILLA"/>
		<reference ref_id="1255541" ref_url="https://bugzilla.suse.com/1255541" source="BUGZILLA"/>
		<reference ref_id="1255550" ref_url="https://bugzilla.suse.com/1255550" source="BUGZILLA"/>
		<reference ref_id="1255552" ref_url="https://bugzilla.suse.com/1255552" source="BUGZILLA"/>
		<reference ref_id="1255553" ref_url="https://bugzilla.suse.com/1255553" source="BUGZILLA"/>
		<reference ref_id="1255567" ref_url="https://bugzilla.suse.com/1255567" source="BUGZILLA"/>
		<reference ref_id="1255580" ref_url="https://bugzilla.suse.com/1255580" source="BUGZILLA"/>
		<reference ref_id="1255601" ref_url="https://bugzilla.suse.com/1255601" source="BUGZILLA"/>
		<reference ref_id="1255603" ref_url="https://bugzilla.suse.com/1255603" source="BUGZILLA"/>
		<reference ref_id="1255611" ref_url="https://bugzilla.suse.com/1255611" source="BUGZILLA"/>
		<reference ref_id="1255614" ref_url="https://bugzilla.suse.com/1255614" source="BUGZILLA"/>
		<reference ref_id="1255672" ref_url="https://bugzilla.suse.com/1255672" source="BUGZILLA"/>
		<reference ref_id="1255688" ref_url="https://bugzilla.suse.com/1255688" source="BUGZILLA"/>
		<reference ref_id="1255698" ref_url="https://bugzilla.suse.com/1255698" source="BUGZILLA"/>
		<reference ref_id="1255706" ref_url="https://bugzilla.suse.com/1255706" source="BUGZILLA"/>
		<reference ref_id="1255707" ref_url="https://bugzilla.suse.com/1255707" source="BUGZILLA"/>
		<reference ref_id="1255709" ref_url="https://bugzilla.suse.com/1255709" source="BUGZILLA"/>
		<reference ref_id="1255722" ref_url="https://bugzilla.suse.com/1255722" source="BUGZILLA"/>
		<reference ref_id="1255723" ref_url="https://bugzilla.suse.com/1255723" source="BUGZILLA"/>
		<reference ref_id="1255724" ref_url="https://bugzilla.suse.com/1255724" source="BUGZILLA"/>
		<reference ref_id="1255812" ref_url="https://bugzilla.suse.com/1255812" source="BUGZILLA"/>
		<reference ref_id="1255813" ref_url="https://bugzilla.suse.com/1255813" source="BUGZILLA"/>
		<reference ref_id="1255814" ref_url="https://bugzilla.suse.com/1255814" source="BUGZILLA"/>
		<reference ref_id="1255816" ref_url="https://bugzilla.suse.com/1255816" source="BUGZILLA"/>
		<reference ref_id="1255931" ref_url="https://bugzilla.suse.com/1255931" source="BUGZILLA"/>
		<reference ref_id="1255932" ref_url="https://bugzilla.suse.com/1255932" source="BUGZILLA"/>
		<reference ref_id="1255934" ref_url="https://bugzilla.suse.com/1255934" source="BUGZILLA"/>
		<reference ref_id="1255943" ref_url="https://bugzilla.suse.com/1255943" source="BUGZILLA"/>
		<reference ref_id="1255944" ref_url="https://bugzilla.suse.com/1255944" source="BUGZILLA"/>
		<reference ref_id="1256238" ref_url="https://bugzilla.suse.com/1256238" source="BUGZILLA"/>
		<reference ref_id="1256495" ref_url="https://bugzilla.suse.com/1256495" source="BUGZILLA"/>
		<reference ref_id="1256606" ref_url="https://bugzilla.suse.com/1256606" source="BUGZILLA"/>
		<reference ref_id="1256794" ref_url="https://bugzilla.suse.com/1256794" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-38704" ref_url="https://www.suse.com/security/cve/CVE-2025-38704/" source="CVE"/>
		<reference ref_id="CVE-2025-39880" ref_url="https://www.suse.com/security/cve/CVE-2025-39880/" source="CVE"/>
		<reference ref_id="CVE-2025-39977" ref_url="https://www.suse.com/security/cve/CVE-2025-39977/" source="CVE"/>
		<reference ref_id="CVE-2025-40042" ref_url="https://www.suse.com/security/cve/CVE-2025-40042/" source="CVE"/>
		<reference ref_id="CVE-2025-40123" ref_url="https://www.suse.com/security/cve/CVE-2025-40123/" source="CVE"/>
		<reference ref_id="CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130/" source="CVE"/>
		<reference ref_id="CVE-2025-40160" ref_url="https://www.suse.com/security/cve/CVE-2025-40160/" source="CVE"/>
		<reference ref_id="CVE-2025-40167" ref_url="https://www.suse.com/security/cve/CVE-2025-40167/" source="CVE"/>
		<reference ref_id="CVE-2025-40170" ref_url="https://www.suse.com/security/cve/CVE-2025-40170/" source="CVE"/>
		<reference ref_id="CVE-2025-40179" ref_url="https://www.suse.com/security/cve/CVE-2025-40179/" source="CVE"/>
		<reference ref_id="CVE-2025-40190" ref_url="https://www.suse.com/security/cve/CVE-2025-40190/" source="CVE"/>
		<reference ref_id="CVE-2025-40209" ref_url="https://www.suse.com/security/cve/CVE-2025-40209/" source="CVE"/>
		<reference ref_id="CVE-2025-40211" ref_url="https://www.suse.com/security/cve/CVE-2025-40211/" source="CVE"/>
		<reference ref_id="CVE-2025-40212" ref_url="https://www.suse.com/security/cve/CVE-2025-40212/" source="CVE"/>
		<reference ref_id="CVE-2025-40213" ref_url="https://www.suse.com/security/cve/CVE-2025-40213/" source="CVE"/>
		<reference ref_id="CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214/" source="CVE"/>
		<reference ref_id="CVE-2025-40215" ref_url="https://www.suse.com/security/cve/CVE-2025-40215/" source="CVE"/>
		<reference ref_id="CVE-2025-40218" ref_url="https://www.suse.com/security/cve/CVE-2025-40218/" source="CVE"/>
		<reference ref_id="CVE-2025-40219" ref_url="https://www.suse.com/security/cve/CVE-2025-40219/" source="CVE"/>
		<reference ref_id="CVE-2025-40220" ref_url="https://www.suse.com/security/cve/CVE-2025-40220/" source="CVE"/>
		<reference ref_id="CVE-2025-40221" ref_url="https://www.suse.com/security/cve/CVE-2025-40221/" source="CVE"/>
		<reference ref_id="CVE-2025-40223" ref_url="https://www.suse.com/security/cve/CVE-2025-40223/" source="CVE"/>
		<reference ref_id="CVE-2025-40225" ref_url="https://www.suse.com/security/cve/CVE-2025-40225/" source="CVE"/>
		<reference ref_id="CVE-2025-40226" ref_url="https://www.suse.com/security/cve/CVE-2025-40226/" source="CVE"/>
		<reference ref_id="CVE-2025-40231" ref_url="https://www.suse.com/security/cve/CVE-2025-40231/" source="CVE"/>
		<reference ref_id="CVE-2025-40233" ref_url="https://www.suse.com/security/cve/CVE-2025-40233/" source="CVE"/>
		<reference ref_id="CVE-2025-40235" ref_url="https://www.suse.com/security/cve/CVE-2025-40235/" source="CVE"/>
		<reference ref_id="CVE-2025-40237" ref_url="https://www.suse.com/security/cve/CVE-2025-40237/" source="CVE"/>
		<reference ref_id="CVE-2025-40238" ref_url="https://www.suse.com/security/cve/CVE-2025-40238/" source="CVE"/>
		<reference ref_id="CVE-2025-40239" ref_url="https://www.suse.com/security/cve/CVE-2025-40239/" source="CVE"/>
		<reference ref_id="CVE-2025-40240" ref_url="https://www.suse.com/security/cve/CVE-2025-40240/" source="CVE"/>
		<reference ref_id="CVE-2025-40242" ref_url="https://www.suse.com/security/cve/CVE-2025-40242/" source="CVE"/>
		<reference ref_id="CVE-2025-40246" ref_url="https://www.suse.com/security/cve/CVE-2025-40246/" source="CVE"/>
		<reference ref_id="CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248/" source="CVE"/>
		<reference ref_id="CVE-2025-40250" ref_url="https://www.suse.com/security/cve/CVE-2025-40250/" source="CVE"/>
		<reference ref_id="CVE-2025-40251" ref_url="https://www.suse.com/security/cve/CVE-2025-40251/" source="CVE"/>
		<reference ref_id="CVE-2025-40252" ref_url="https://www.suse.com/security/cve/CVE-2025-40252/" source="CVE"/>
		<reference ref_id="CVE-2025-40254" ref_url="https://www.suse.com/security/cve/CVE-2025-40254/" source="CVE"/>
		<reference ref_id="CVE-2025-40255" ref_url="https://www.suse.com/security/cve/CVE-2025-40255/" source="CVE"/>
		<reference ref_id="CVE-2025-40256" ref_url="https://www.suse.com/security/cve/CVE-2025-40256/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40262" ref_url="https://www.suse.com/security/cve/CVE-2025-40262/" source="CVE"/>
		<reference ref_id="CVE-2025-40263" ref_url="https://www.suse.com/security/cve/CVE-2025-40263/" source="CVE"/>
		<reference ref_id="CVE-2025-40264" ref_url="https://www.suse.com/security/cve/CVE-2025-40264/" source="CVE"/>
		<reference ref_id="CVE-2025-40266" ref_url="https://www.suse.com/security/cve/CVE-2025-40266/" source="CVE"/>
		<reference ref_id="CVE-2025-40268" ref_url="https://www.suse.com/security/cve/CVE-2025-40268/" source="CVE"/>
		<reference ref_id="CVE-2025-40269" ref_url="https://www.suse.com/security/cve/CVE-2025-40269/" source="CVE"/>
		<reference ref_id="CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271/" source="CVE"/>
		<reference ref_id="CVE-2025-40272" ref_url="https://www.suse.com/security/cve/CVE-2025-40272/" source="CVE"/>
		<reference ref_id="CVE-2025-40273" ref_url="https://www.suse.com/security/cve/CVE-2025-40273/" source="CVE"/>
		<reference ref_id="CVE-2025-40274" ref_url="https://www.suse.com/security/cve/CVE-2025-40274/" source="CVE"/>
		<reference ref_id="CVE-2025-40275" ref_url="https://www.suse.com/security/cve/CVE-2025-40275/" source="CVE"/>
		<reference ref_id="CVE-2025-40276" ref_url="https://www.suse.com/security/cve/CVE-2025-40276/" source="CVE"/>
		<reference ref_id="CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277/" source="CVE"/>
		<reference ref_id="CVE-2025-40278" ref_url="https://www.suse.com/security/cve/CVE-2025-40278/" source="CVE"/>
		<reference ref_id="CVE-2025-40279" ref_url="https://www.suse.com/security/cve/CVE-2025-40279/" source="CVE"/>
		<reference ref_id="CVE-2025-40280" ref_url="https://www.suse.com/security/cve/CVE-2025-40280/" source="CVE"/>
		<reference ref_id="CVE-2025-40282" ref_url="https://www.suse.com/security/cve/CVE-2025-40282/" source="CVE"/>
		<reference ref_id="CVE-2025-40283" ref_url="https://www.suse.com/security/cve/CVE-2025-40283/" source="CVE"/>
		<reference ref_id="CVE-2025-40284" ref_url="https://www.suse.com/security/cve/CVE-2025-40284/" source="CVE"/>
		<reference ref_id="CVE-2025-40287" ref_url="https://www.suse.com/security/cve/CVE-2025-40287/" source="CVE"/>
		<reference ref_id="CVE-2025-40288" ref_url="https://www.suse.com/security/cve/CVE-2025-40288/" source="CVE"/>
		<reference ref_id="CVE-2025-40289" ref_url="https://www.suse.com/security/cve/CVE-2025-40289/" source="CVE"/>
		<reference ref_id="CVE-2025-40292" ref_url="https://www.suse.com/security/cve/CVE-2025-40292/" source="CVE"/>
		<reference ref_id="CVE-2025-40293" ref_url="https://www.suse.com/security/cve/CVE-2025-40293/" source="CVE"/>
		<reference ref_id="CVE-2025-40294" ref_url="https://www.suse.com/security/cve/CVE-2025-40294/" source="CVE"/>
		<reference ref_id="CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297/" source="CVE"/>
		<reference ref_id="CVE-2025-40301" ref_url="https://www.suse.com/security/cve/CVE-2025-40301/" source="CVE"/>
		<reference ref_id="CVE-2025-40302" ref_url="https://www.suse.com/security/cve/CVE-2025-40302/" source="CVE"/>
		<reference ref_id="CVE-2025-40303" ref_url="https://www.suse.com/security/cve/CVE-2025-40303/" source="CVE"/>
		<reference ref_id="CVE-2025-40304" ref_url="https://www.suse.com/security/cve/CVE-2025-40304/" source="CVE"/>
		<reference ref_id="CVE-2025-40307" ref_url="https://www.suse.com/security/cve/CVE-2025-40307/" source="CVE"/>
		<reference ref_id="CVE-2025-40308" ref_url="https://www.suse.com/security/cve/CVE-2025-40308/" source="CVE"/>
		<reference ref_id="CVE-2025-40309" ref_url="https://www.suse.com/security/cve/CVE-2025-40309/" source="CVE"/>
		<reference ref_id="CVE-2025-40310" ref_url="https://www.suse.com/security/cve/CVE-2025-40310/" source="CVE"/>
		<reference ref_id="CVE-2025-40311" ref_url="https://www.suse.com/security/cve/CVE-2025-40311/" source="CVE"/>
		<reference ref_id="CVE-2025-40314" ref_url="https://www.suse.com/security/cve/CVE-2025-40314/" source="CVE"/>
		<reference ref_id="CVE-2025-40315" ref_url="https://www.suse.com/security/cve/CVE-2025-40315/" source="CVE"/>
		<reference ref_id="CVE-2025-40316" ref_url="https://www.suse.com/security/cve/CVE-2025-40316/" source="CVE"/>
		<reference ref_id="CVE-2025-40317" ref_url="https://www.suse.com/security/cve/CVE-2025-40317/" source="CVE"/>
		<reference ref_id="CVE-2025-40318" ref_url="https://www.suse.com/security/cve/CVE-2025-40318/" source="CVE"/>
		<reference ref_id="CVE-2025-40319" ref_url="https://www.suse.com/security/cve/CVE-2025-40319/" source="CVE"/>
		<reference ref_id="CVE-2025-40320" ref_url="https://www.suse.com/security/cve/CVE-2025-40320/" source="CVE"/>
		<reference ref_id="CVE-2025-40321" ref_url="https://www.suse.com/security/cve/CVE-2025-40321/" source="CVE"/>
		<reference ref_id="CVE-2025-40322" ref_url="https://www.suse.com/security/cve/CVE-2025-40322/" source="CVE"/>
		<reference ref_id="CVE-2025-40323" ref_url="https://www.suse.com/security/cve/CVE-2025-40323/" source="CVE"/>
		<reference ref_id="CVE-2025-40324" ref_url="https://www.suse.com/security/cve/CVE-2025-40324/" source="CVE"/>
		<reference ref_id="CVE-2025-40328" ref_url="https://www.suse.com/security/cve/CVE-2025-40328/" source="CVE"/>
		<reference ref_id="CVE-2025-40329" ref_url="https://www.suse.com/security/cve/CVE-2025-40329/" source="CVE"/>
		<reference ref_id="CVE-2025-40330" ref_url="https://www.suse.com/security/cve/CVE-2025-40330/" source="CVE"/>
		<reference ref_id="CVE-2025-40331" ref_url="https://www.suse.com/security/cve/CVE-2025-40331/" source="CVE"/>
		<reference ref_id="CVE-2025-40332" ref_url="https://www.suse.com/security/cve/CVE-2025-40332/" source="CVE"/>
		<reference ref_id="CVE-2025-40337" ref_url="https://www.suse.com/security/cve/CVE-2025-40337/" source="CVE"/>
		<reference ref_id="CVE-2025-40338" ref_url="https://www.suse.com/security/cve/CVE-2025-40338/" source="CVE"/>
		<reference ref_id="CVE-2025-40339" ref_url="https://www.suse.com/security/cve/CVE-2025-40339/" source="CVE"/>
		<reference ref_id="CVE-2025-40340" ref_url="https://www.suse.com/security/cve/CVE-2025-40340/" source="CVE"/>
		<reference ref_id="CVE-2025-40342" ref_url="https://www.suse.com/security/cve/CVE-2025-40342/" source="CVE"/>
		<reference ref_id="CVE-2025-40343" ref_url="https://www.suse.com/security/cve/CVE-2025-40343/" source="CVE"/>
		<reference ref_id="CVE-2025-40344" ref_url="https://www.suse.com/security/cve/CVE-2025-40344/" source="CVE"/>
		<reference ref_id="CVE-2025-40345" ref_url="https://www.suse.com/security/cve/CVE-2025-40345/" source="CVE"/>
		<reference ref_id="CVE-2025-40346" ref_url="https://www.suse.com/security/cve/CVE-2025-40346/" source="CVE"/>
		<reference ref_id="CVE-2025-40347" ref_url="https://www.suse.com/security/cve/CVE-2025-40347/" source="CVE"/>
		<reference ref_id="CVE-2025-40350" ref_url="https://www.suse.com/security/cve/CVE-2025-40350/" source="CVE"/>
		<reference ref_id="CVE-2025-40353" ref_url="https://www.suse.com/security/cve/CVE-2025-40353/" source="CVE"/>
		<reference ref_id="CVE-2025-40354" ref_url="https://www.suse.com/security/cve/CVE-2025-40354/" source="CVE"/>
		<reference ref_id="CVE-2025-40355" ref_url="https://www.suse.com/security/cve/CVE-2025-40355/" source="CVE"/>
		<reference ref_id="CVE-2025-40357" ref_url="https://www.suse.com/security/cve/CVE-2025-40357/" source="CVE"/>
		<reference ref_id="CVE-2025-40359" ref_url="https://www.suse.com/security/cve/CVE-2025-40359/" source="CVE"/>
		<reference ref_id="CVE-2025-40360" ref_url="https://www.suse.com/security/cve/CVE-2025-40360/" source="CVE"/>
		<reference ref_id="CVE-2025-40362" ref_url="https://www.suse.com/security/cve/CVE-2025-40362/" source="CVE"/>
		<reference ref_id="CVE-2025-68167" ref_url="https://www.suse.com/security/cve/CVE-2025-68167/" source="CVE"/>
		<reference ref_id="CVE-2025-68170" ref_url="https://www.suse.com/security/cve/CVE-2025-68170/" source="CVE"/>
		<reference ref_id="CVE-2025-68171" ref_url="https://www.suse.com/security/cve/CVE-2025-68171/" source="CVE"/>
		<reference ref_id="CVE-2025-68172" ref_url="https://www.suse.com/security/cve/CVE-2025-68172/" source="CVE"/>
		<reference ref_id="CVE-2025-68176" ref_url="https://www.suse.com/security/cve/CVE-2025-68176/" source="CVE"/>
		<reference ref_id="CVE-2025-68180" ref_url="https://www.suse.com/security/cve/CVE-2025-68180/" source="CVE"/>
		<reference ref_id="CVE-2025-68181" ref_url="https://www.suse.com/security/cve/CVE-2025-68181/" source="CVE"/>
		<reference ref_id="CVE-2025-68183" ref_url="https://www.suse.com/security/cve/CVE-2025-68183/" source="CVE"/>
		<reference ref_id="CVE-2025-68184" ref_url="https://www.suse.com/security/cve/CVE-2025-68184/" source="CVE"/>
		<reference ref_id="CVE-2025-68185" ref_url="https://www.suse.com/security/cve/CVE-2025-68185/" source="CVE"/>
		<reference ref_id="CVE-2025-68190" ref_url="https://www.suse.com/security/cve/CVE-2025-68190/" source="CVE"/>
		<reference ref_id="CVE-2025-68192" ref_url="https://www.suse.com/security/cve/CVE-2025-68192/" source="CVE"/>
		<reference ref_id="CVE-2025-68194" ref_url="https://www.suse.com/security/cve/CVE-2025-68194/" source="CVE"/>
		<reference ref_id="CVE-2025-68195" ref_url="https://www.suse.com/security/cve/CVE-2025-68195/" source="CVE"/>
		<reference ref_id="CVE-2025-68197" ref_url="https://www.suse.com/security/cve/CVE-2025-68197/" source="CVE"/>
		<reference ref_id="CVE-2025-68198" ref_url="https://www.suse.com/security/cve/CVE-2025-68198/" source="CVE"/>
		<reference ref_id="CVE-2025-68201" ref_url="https://www.suse.com/security/cve/CVE-2025-68201/" source="CVE"/>
		<reference ref_id="CVE-2025-68202" ref_url="https://www.suse.com/security/cve/CVE-2025-68202/" source="CVE"/>
		<reference ref_id="CVE-2025-68206" ref_url="https://www.suse.com/security/cve/CVE-2025-68206/" source="CVE"/>
		<reference ref_id="CVE-2025-68207" ref_url="https://www.suse.com/security/cve/CVE-2025-68207/" source="CVE"/>
		<reference ref_id="CVE-2025-68208" ref_url="https://www.suse.com/security/cve/CVE-2025-68208/" source="CVE"/>
		<reference ref_id="CVE-2025-68209" ref_url="https://www.suse.com/security/cve/CVE-2025-68209/" source="CVE"/>
		<reference ref_id="CVE-2025-68210" ref_url="https://www.suse.com/security/cve/CVE-2025-68210/" source="CVE"/>
		<reference ref_id="CVE-2025-68213" ref_url="https://www.suse.com/security/cve/CVE-2025-68213/" source="CVE"/>
		<reference ref_id="CVE-2025-68215" ref_url="https://www.suse.com/security/cve/CVE-2025-68215/" source="CVE"/>
		<reference ref_id="CVE-2025-68217" ref_url="https://www.suse.com/security/cve/CVE-2025-68217/" source="CVE"/>
		<reference ref_id="CVE-2025-68222" ref_url="https://www.suse.com/security/cve/CVE-2025-68222/" source="CVE"/>
		<reference ref_id="CVE-2025-68223" ref_url="https://www.suse.com/security/cve/CVE-2025-68223/" source="CVE"/>
		<reference ref_id="CVE-2025-68230" ref_url="https://www.suse.com/security/cve/CVE-2025-68230/" source="CVE"/>
		<reference ref_id="CVE-2025-68233" ref_url="https://www.suse.com/security/cve/CVE-2025-68233/" source="CVE"/>
		<reference ref_id="CVE-2025-68235" ref_url="https://www.suse.com/security/cve/CVE-2025-68235/" source="CVE"/>
		<reference ref_id="CVE-2025-68237" ref_url="https://www.suse.com/security/cve/CVE-2025-68237/" source="CVE"/>
		<reference ref_id="CVE-2025-68238" ref_url="https://www.suse.com/security/cve/CVE-2025-68238/" source="CVE"/>
		<reference ref_id="CVE-2025-68239" ref_url="https://www.suse.com/security/cve/CVE-2025-68239/" source="CVE"/>
		<reference ref_id="CVE-2025-68242" ref_url="https://www.suse.com/security/cve/CVE-2025-68242/" source="CVE"/>
		<reference ref_id="CVE-2025-68244" ref_url="https://www.suse.com/security/cve/CVE-2025-68244/" source="CVE"/>
		<reference ref_id="CVE-2025-68249" ref_url="https://www.suse.com/security/cve/CVE-2025-68249/" source="CVE"/>
		<reference ref_id="CVE-2025-68252" ref_url="https://www.suse.com/security/cve/CVE-2025-68252/" source="CVE"/>
		<reference ref_id="CVE-2025-68254" ref_url="https://www.suse.com/security/cve/CVE-2025-68254/" source="CVE"/>
		<reference ref_id="CVE-2025-68255" ref_url="https://www.suse.com/security/cve/CVE-2025-68255/" source="CVE"/>
		<reference ref_id="CVE-2025-68256" ref_url="https://www.suse.com/security/cve/CVE-2025-68256/" source="CVE"/>
		<reference ref_id="CVE-2025-68257" ref_url="https://www.suse.com/security/cve/CVE-2025-68257/" source="CVE"/>
		<reference ref_id="CVE-2025-68258" ref_url="https://www.suse.com/security/cve/CVE-2025-68258/" source="CVE"/>
		<reference ref_id="CVE-2025-68259" ref_url="https://www.suse.com/security/cve/CVE-2025-68259/" source="CVE"/>
		<reference ref_id="CVE-2025-68264" ref_url="https://www.suse.com/security/cve/CVE-2025-68264/" source="CVE"/>
		<reference ref_id="CVE-2025-68283" ref_url="https://www.suse.com/security/cve/CVE-2025-68283/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68286" ref_url="https://www.suse.com/security/cve/CVE-2025-68286/" source="CVE"/>
		<reference ref_id="CVE-2025-68287" ref_url="https://www.suse.com/security/cve/CVE-2025-68287/" source="CVE"/>
		<reference ref_id="CVE-2025-68289" ref_url="https://www.suse.com/security/cve/CVE-2025-68289/" source="CVE"/>
		<reference ref_id="CVE-2025-68290" ref_url="https://www.suse.com/security/cve/CVE-2025-68290/" source="CVE"/>
		<reference ref_id="CVE-2025-68293" ref_url="https://www.suse.com/security/cve/CVE-2025-68293/" source="CVE"/>
		<reference ref_id="CVE-2025-68298" ref_url="https://www.suse.com/security/cve/CVE-2025-68298/" source="CVE"/>
		<reference ref_id="CVE-2025-68301" ref_url="https://www.suse.com/security/cve/CVE-2025-68301/" source="CVE"/>
		<reference ref_id="CVE-2025-68302" ref_url="https://www.suse.com/security/cve/CVE-2025-68302/" source="CVE"/>
		<reference ref_id="CVE-2025-68303" ref_url="https://www.suse.com/security/cve/CVE-2025-68303/" source="CVE"/>
		<reference ref_id="CVE-2025-68305" ref_url="https://www.suse.com/security/cve/CVE-2025-68305/" source="CVE"/>
		<reference ref_id="CVE-2025-68306" ref_url="https://www.suse.com/security/cve/CVE-2025-68306/" source="CVE"/>
		<reference ref_id="CVE-2025-68307" ref_url="https://www.suse.com/security/cve/CVE-2025-68307/" source="CVE"/>
		<reference ref_id="CVE-2025-68308" ref_url="https://www.suse.com/security/cve/CVE-2025-68308/" source="CVE"/>
		<reference ref_id="CVE-2025-68311" ref_url="https://www.suse.com/security/cve/CVE-2025-68311/" source="CVE"/>
		<reference ref_id="CVE-2025-68312" ref_url="https://www.suse.com/security/cve/CVE-2025-68312/" source="CVE"/>
		<reference ref_id="CVE-2025-68313" ref_url="https://www.suse.com/security/cve/CVE-2025-68313/" source="CVE"/>
		<reference ref_id="CVE-2025-68317" ref_url="https://www.suse.com/security/cve/CVE-2025-68317/" source="CVE"/>
		<reference ref_id="CVE-2025-68327" ref_url="https://www.suse.com/security/cve/CVE-2025-68327/" source="CVE"/>
		<reference ref_id="CVE-2025-68328" ref_url="https://www.suse.com/security/cve/CVE-2025-68328/" source="CVE"/>
		<reference ref_id="CVE-2025-68330" ref_url="https://www.suse.com/security/cve/CVE-2025-68330/" source="CVE"/>
		<reference ref_id="CVE-2025-68331" ref_url="https://www.suse.com/security/cve/CVE-2025-68331/" source="CVE"/>
		<reference ref_id="CVE-2025-68332" ref_url="https://www.suse.com/security/cve/CVE-2025-68332/" source="CVE"/>
		<reference ref_id="CVE-2025-68335" ref_url="https://www.suse.com/security/cve/CVE-2025-68335/" source="CVE"/>
		<reference ref_id="CVE-2025-68339" ref_url="https://www.suse.com/security/cve/CVE-2025-68339/" source="CVE"/>
		<reference ref_id="CVE-2025-68340" ref_url="https://www.suse.com/security/cve/CVE-2025-68340/" source="CVE"/>
		<reference ref_id="CVE-2025-68342" ref_url="https://www.suse.com/security/cve/CVE-2025-68342/" source="CVE"/>
		<reference ref_id="CVE-2025-68343" ref_url="https://www.suse.com/security/cve/CVE-2025-68343/" source="CVE"/>
		<reference ref_id="CVE-2025-68344" ref_url="https://www.suse.com/security/cve/CVE-2025-68344/" source="CVE"/>
		<reference ref_id="CVE-2025-68345" ref_url="https://www.suse.com/security/cve/CVE-2025-68345/" source="CVE"/>
		<reference ref_id="CVE-2025-68346" ref_url="https://www.suse.com/security/cve/CVE-2025-68346/" source="CVE"/>
		<reference ref_id="CVE-2025-68347" ref_url="https://www.suse.com/security/cve/CVE-2025-68347/" source="CVE"/>
		<reference ref_id="CVE-2025-68351" ref_url="https://www.suse.com/security/cve/CVE-2025-68351/" source="CVE"/>
		<reference ref_id="CVE-2025-68352" ref_url="https://www.suse.com/security/cve/CVE-2025-68352/" source="CVE"/>
		<reference ref_id="CVE-2025-68353" ref_url="https://www.suse.com/security/cve/CVE-2025-68353/" source="CVE"/>
		<reference ref_id="CVE-2025-68354" ref_url="https://www.suse.com/security/cve/CVE-2025-68354/" source="CVE"/>
		<reference ref_id="CVE-2025-68362" ref_url="https://www.suse.com/security/cve/CVE-2025-68362/" source="CVE"/>
		<reference ref_id="CVE-2025-68363" ref_url="https://www.suse.com/security/cve/CVE-2025-68363/" source="CVE"/>
		<reference ref_id="CVE-2025-68378" ref_url="https://www.suse.com/security/cve/CVE-2025-68378/" source="CVE"/>
		<reference ref_id="CVE-2025-68380" ref_url="https://www.suse.com/security/cve/CVE-2025-68380/" source="CVE"/>
		<reference ref_id="CVE-2025-68724" ref_url="https://www.suse.com/security/cve/CVE-2025-68724/" source="CVE"/>
		<reference ref_id="CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732/" source="CVE"/>
		<reference ref_id="CVE-2025-68736" ref_url="https://www.suse.com/security/cve/CVE-2025-68736/" source="CVE"/>
		<reference ref_id="CVE-2025-68740" ref_url="https://www.suse.com/security/cve/CVE-2025-68740/" source="CVE"/>
		<reference ref_id="CVE-2025-68742" ref_url="https://www.suse.com/security/cve/CVE-2025-68742/" source="CVE"/>
		<reference ref_id="CVE-2025-68744" ref_url="https://www.suse.com/security/cve/CVE-2025-68744/" source="CVE"/>
		<reference ref_id="CVE-2025-68746" ref_url="https://www.suse.com/security/cve/CVE-2025-68746/" source="CVE"/>
		<reference ref_id="CVE-2025-68747" ref_url="https://www.suse.com/security/cve/CVE-2025-68747/" source="CVE"/>
		<reference ref_id="CVE-2025-68748" ref_url="https://www.suse.com/security/cve/CVE-2025-68748/" source="CVE"/>
		<reference ref_id="CVE-2025-68749" ref_url="https://www.suse.com/security/cve/CVE-2025-68749/" source="CVE"/>
		<reference ref_id="CVE-2025-68750" ref_url="https://www.suse.com/security/cve/CVE-2025-68750/" source="CVE"/>
		<reference ref_id="CVE-2025-68753" ref_url="https://www.suse.com/security/cve/CVE-2025-68753/" source="CVE"/>
		<reference ref_id="CVE-2025-68757" ref_url="https://www.suse.com/security/cve/CVE-2025-68757/" source="CVE"/>
		<reference ref_id="CVE-2025-68758" ref_url="https://www.suse.com/security/cve/CVE-2025-68758/" source="CVE"/>
		<reference ref_id="CVE-2025-68759" ref_url="https://www.suse.com/security/cve/CVE-2025-68759/" source="CVE"/>
		<reference ref_id="CVE-2025-68765" ref_url="https://www.suse.com/security/cve/CVE-2025-68765/" source="CVE"/>
		<reference ref_id="CVE-2025-68766" ref_url="https://www.suse.com/security/cve/CVE-2025-68766/" source="CVE"/>
		<reference ref_id="CVE-2025-71096" ref_url="https://www.suse.com/security/cve/CVE-2025-71096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-38704: rcu/nocb: Fix possible invalid rdp's-&gt;nocb_cb_kthread pointer (bsc#1254408).
- CVE-2025-39880: ceph: fix race condition validating r_parent before applying state (bsc#1250388).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861).
- CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365).
- CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling
- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).
- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).
- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
- CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
- CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr update (bsc#1253623).
- CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1254961).
- CVE-2025-40215: xfrm: delete x-&gt;tunnel as we delete x (bsc#1254959).
- CVE-2025-40218: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success (bsc#1254964).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport() (bsc#1254815).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40237: fs/notify: call exportfs_encode_fid with s_umount (bsc#1254809).
- CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).
- CVE-2025-40239: net: phy: micrel: always set shared-&gt;phydev for LAN8814 (bsc#1254868).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-40246: xfs: fix out of bounds memory read error in symlink repair (bsc#1254861).
- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).
- CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq() failure (bsc#1254854).
- CVE-2025-40251: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (bsc#1254856).
- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in
  qede_tpa_cont() and qede_tpa_end() (bsc#1254849).
- CVE-2025-40254: net: openvswitch: remove never-working support for setting nsh fields (bsc#1254852).
- CVE-2025-40255: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() (bsc#1255156).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
- CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param (bsc#1255082).
- CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).
- CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying (bsc#1254830).
- CVE-2025-40276: drm/panthor: Flush shmem writes before mapping buffers CPU-uncached (bsc#1254824).
- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).
- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40292: virtio-net: fix received length check in big packets (bsc#1255175).
- CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking (bsc#1255179).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187).
- CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer (bsc#1254794).
- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).
- CVE-2025-40330: bnxt_en: Shutdown FW DMA in bnxt_shutdown() (bsc#1254616).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between components (bsc#1255273).
- CVE-2025-40346: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() (bsc#1255318).
- CVE-2025-40347: net: enetc: fix the deadlock of enetc_mdio_lock (bsc#1255262).
- CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ (bsc#1255260).
- CVE-2025-40355: sysfs: check visibility before changing group attribute ownership (bsc#1255261).
- CVE-2025-40357: net/smc: fix general protection fault in __smc_diag_dump (bsc#1255097).
- CVE-2025-40359: perf/x86/intel: Fix KASAN global-out-of-bounds warning (bsc#1255087).
- CVE-2025-40362: ceph: fix multifs mds auth caps issue (bsc#1255103).
- CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).
- CVE-2025-68197: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() (bsc#1255242).
- CVE-2025-68198: crash: fix crashkernel resource shrink (bsc#1255243).
- CVE-2025-68202: sched_ext: Fix unsafe locking in the scx_dump_state() (bsc#1255223).
- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).
- CVE-2025-68208: bpf: account for current allocated stack depth in widen_imprecise_scalars() (bsc#1255227).
- CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230).
- CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path (bsc#1255226).
- CVE-2025-68239: binfmt_misc: restore write access before closing files opened by open_exec() (bsc#1255272).
- CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199).
- CVE-2025-68264: ext4: refresh inline data size before write operations (bsc#1255380).
- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map-&gt;max_osd (bsc#1255379).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).
- CVE-2025-68293: mm/huge_memory: fix NULL pointer deference when splitting folio (bsc#1255150).
- CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path (bsc#1255120).
- CVE-2025-68302: net: sxgbe: fix potential NULL dereference in sxgbe_rx() (bsc#1255121).
- CVE-2025-68317: io_uring/zctx: check chained notif contexts (bsc#1255354).
- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).
- CVE-2025-68353: net: vxlan: prevent NULL deref in vxlan_xmit_one (bsc#1255533).
- CVE-2025-68363: bpf: Check skb-&gt;transport_header is set in bpf_skb_check_mtu (bsc#1255552).
- CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper function (bsc#1255614).
- CVE-2025-68736: landlock: Optimize file path walks and prepare for audit support (bsc#1255698).
- CVE-2025-68742: bpf: Fix invalid prog-&gt;stats access when update_effective_progs fails (bsc#1255707).
- CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps (bsc#1255709).
- CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606).

The following non security issues were fixed:

- KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it (bsc#1255672).
- Set HZ=1000 for ppc64 default configuration (jsc#PED-14344)
- bpf: Do not limit bpf_cgroup_from_id to current's namespace (bsc#1255433).
- btrfs: handle aligned EOF truncation correctly for subpage cases (bsc#1253238).
- cgroup: rstat: use LOCK CMPXCHG in css_rstat_updated (bsc#1255434).
- cifs: update dstaddr whenever channel iface is updated (git-fixes).
- cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026).
- cpuset: fix warning when disabling remote partition (bsc#1256794).
- ext4: use optimized mballoc scanning regardless of inode format (bsc#1254378).
- net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes).
- netdevsim: print human readable IP address (bsc#1255071).
- powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event
  handling (bsc#1253262 ltc#216029).
- powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285
  bsc#1205462 ltc#200161 ltc#200588 git-fixes bsc#1253739 ltc#211493
  bsc#1254244 ltc#216496).
- sched: Increase sched_tick_remote timeout (bsc#1254510).
- selftests: net: fib-onlink-tests: Set high metric for default IPv6 route (bsc#1255346).
- selftests: net: use slowwait to make sure IPv6 setup finished (bsc#1255349).
- selftests: net: use slowwait to stabilize vrf_route_leaking test (bsc#1255349).
- serial: xilinx_uartps: Use helper function hrtimer_update_function() (stable-fixes).
- supported.conf: Mark lan 743x supported (jsc#PED-14571)
- tick/sched: Limit non-timekeeper CPUs calling jiffies update (bsc#1254477).
- wifi: ath10k: Avoid vdev delete timeout when firmware is already down (stable-fixes).
- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256495).
- x86/microcode/AMD: Make __verify_patch_size() return bool (bsc#1256495).
- x86/microcode/AMD: Remove bogus comment from parse_container() (bsc#1256495).
- x86/microcode/AMD: Select which microcode patch to load (bsc#1256495).
- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256495).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243112">SUSE bug 1243112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245193">SUSE bug 1245193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247500">SUSE bug 1247500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250388">SUSE bug 1250388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252046">SUSE bug 1252046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252861">SUSE bug 1252861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253155">SUSE bug 1253155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253238">SUSE bug 1253238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253262">SUSE bug 1253262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253365">SUSE bug 1253365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253400">SUSE bug 1253400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253413">SUSE bug 1253413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253414">SUSE bug 1253414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253442">SUSE bug 1253442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253458">SUSE bug 1253458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253623">SUSE bug 1253623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253674">SUSE bug 1253674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253739">SUSE bug 1253739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254126">SUSE bug 1254126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254128">SUSE bug 1254128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254195">SUSE bug 1254195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254244">SUSE bug 1254244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254363">SUSE bug 1254363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254378">SUSE bug 1254378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254408">SUSE bug 1254408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254477">SUSE bug 1254477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254510">SUSE bug 1254510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254518">SUSE bug 1254518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254519">SUSE bug 1254519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254520">SUSE bug 1254520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254615">SUSE bug 1254615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254616">SUSE bug 1254616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254618">SUSE bug 1254618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254621">SUSE bug 1254621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254624">SUSE bug 1254624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254791">SUSE bug 1254791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254793">SUSE bug 1254793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254794">SUSE bug 1254794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254795">SUSE bug 1254795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254796">SUSE bug 1254796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254797">SUSE bug 1254797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254798">SUSE bug 1254798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254808">SUSE bug 1254808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254809">SUSE bug 1254809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254813">SUSE bug 1254813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254815">SUSE bug 1254815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254821">SUSE bug 1254821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254824">SUSE bug 1254824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254825">SUSE bug 1254825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254827">SUSE bug 1254827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254828">SUSE bug 1254828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254829">SUSE bug 1254829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254830">SUSE bug 1254830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254832">SUSE bug 1254832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254835">SUSE bug 1254835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254840">SUSE bug 1254840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254843">SUSE bug 1254843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254846">SUSE bug 1254846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254847">SUSE bug 1254847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254849">SUSE bug 1254849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254850">SUSE bug 1254850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254851">SUSE bug 1254851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254852">SUSE bug 1254852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254854">SUSE bug 1254854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254856">SUSE bug 1254856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254858">SUSE bug 1254858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254860">SUSE bug 1254860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254861">SUSE bug 1254861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254864">SUSE bug 1254864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254868">SUSE bug 1254868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254869">SUSE bug 1254869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254871">SUSE bug 1254871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254894">SUSE bug 1254894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254957">SUSE bug 1254957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254959">SUSE bug 1254959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254961">SUSE bug 1254961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254964">SUSE bug 1254964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254996">SUSE bug 1254996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255026">SUSE bug 1255026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255030">SUSE bug 1255030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255034">SUSE bug 1255034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255035">SUSE bug 1255035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255039">SUSE bug 1255039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255040">SUSE bug 1255040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255041">SUSE bug 1255041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255042">SUSE bug 1255042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255057">SUSE bug 1255057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255058">SUSE bug 1255058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255064">SUSE bug 1255064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255065">SUSE bug 1255065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255068">SUSE bug 1255068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255071">SUSE bug 1255071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255072">SUSE bug 1255072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255075">SUSE bug 1255075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255077">SUSE bug 1255077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255081">SUSE bug 1255081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255082">SUSE bug 1255082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255083">SUSE bug 1255083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255087">SUSE bug 1255087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255092">SUSE bug 1255092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255094">SUSE bug 1255094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255095">SUSE bug 1255095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255097">SUSE bug 1255097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255099">SUSE bug 1255099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255103">SUSE bug 1255103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255116">SUSE bug 1255116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255120">SUSE bug 1255120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255121">SUSE bug 1255121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255122">SUSE bug 1255122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255124">SUSE bug 1255124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255131">SUSE bug 1255131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255134">SUSE bug 1255134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255135">SUSE bug 1255135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255136">SUSE bug 1255136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255138">SUSE bug 1255138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255140">SUSE bug 1255140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255142">SUSE bug 1255142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255145">SUSE bug 1255145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255146">SUSE bug 1255146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255149">SUSE bug 1255149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255150">SUSE bug 1255150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255152">SUSE bug 1255152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255154">SUSE bug 1255154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255155">SUSE bug 1255155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255156">SUSE bug 1255156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255161">SUSE bug 1255161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255167">SUSE bug 1255167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255169">SUSE bug 1255169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255171">SUSE bug 1255171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255175">SUSE bug 1255175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255179">SUSE bug 1255179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255181">SUSE bug 1255181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255182">SUSE bug 1255182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255186">SUSE bug 1255186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255187">SUSE bug 1255187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255190">SUSE bug 1255190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255193">SUSE bug 1255193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255196">SUSE bug 1255196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255197">SUSE bug 1255197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255199">SUSE bug 1255199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255202">SUSE bug 1255202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255203">SUSE bug 1255203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255206">SUSE bug 1255206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255209">SUSE bug 1255209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255218">SUSE bug 1255218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255220">SUSE bug 1255220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255221">SUSE bug 1255221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255223">SUSE bug 1255223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255226">SUSE bug 1255226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255227">SUSE bug 1255227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255228">SUSE bug 1255228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255230">SUSE bug 1255230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255231">SUSE bug 1255231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255233">SUSE bug 1255233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255234">SUSE bug 1255234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255242">SUSE bug 1255242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255243">SUSE bug 1255243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255246">SUSE bug 1255246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255247">SUSE bug 1255247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255251">SUSE bug 1255251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255252">SUSE bug 1255252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255253">SUSE bug 1255253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255255">SUSE bug 1255255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255256">SUSE bug 1255256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255259">SUSE bug 1255259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255260">SUSE bug 1255260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255261">SUSE bug 1255261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255262">SUSE bug 1255262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255272">SUSE bug 1255272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255273">SUSE bug 1255273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255274">SUSE bug 1255274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255276">SUSE bug 1255276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255279">SUSE bug 1255279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255297">SUSE bug 1255297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255312">SUSE bug 1255312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255316">SUSE bug 1255316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255318">SUSE bug 1255318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255325">SUSE bug 1255325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255329">SUSE bug 1255329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255346">SUSE bug 1255346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255349">SUSE bug 1255349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255351">SUSE bug 1255351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255354">SUSE bug 1255354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255357">SUSE bug 1255357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255377">SUSE bug 1255377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255379">SUSE bug 1255379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255380">SUSE bug 1255380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255395">SUSE bug 1255395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255415">SUSE bug 1255415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255428">SUSE bug 1255428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255433">SUSE bug 1255433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255434">SUSE bug 1255434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255480">SUSE bug 1255480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255483">SUSE bug 1255483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255488">SUSE bug 1255488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255489">SUSE bug 1255489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255493">SUSE bug 1255493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255495">SUSE bug 1255495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255505">SUSE bug 1255505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255507">SUSE bug 1255507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255508">SUSE bug 1255508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255509">SUSE bug 1255509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255533">SUSE bug 1255533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255541">SUSE bug 1255541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255550">SUSE bug 1255550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255552">SUSE bug 1255552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255553">SUSE bug 1255553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255567">SUSE bug 1255567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255580">SUSE bug 1255580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255601">SUSE bug 1255601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255603">SUSE bug 1255603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255611">SUSE bug 1255611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255614">SUSE bug 1255614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255672">SUSE bug 1255672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255688">SUSE bug 1255688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255698">SUSE bug 1255698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255706">SUSE bug 1255706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255707">SUSE bug 1255707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255709">SUSE bug 1255709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255722">SUSE bug 1255722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255723">SUSE bug 1255723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255724">SUSE bug 1255724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255812">SUSE bug 1255812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255813">SUSE bug 1255813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255814">SUSE bug 1255814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255816">SUSE bug 1255816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255931">SUSE bug 1255931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255932">SUSE bug 1255932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255934">SUSE bug 1255934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255943">SUSE bug 1255943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255944">SUSE bug 1255944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256238">SUSE bug 1256238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256495">SUSE bug 1256495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256606">SUSE bug 1256606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256794">SUSE bug 1256794</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38704/">CVE-2025-38704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38704">CVE-2025-38704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39880/">CVE-2025-39880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39977/">CVE-2025-39977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39977">CVE-2025-39977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40042/">CVE-2025-40042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40123/">CVE-2025-40123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40123">CVE-2025-40123 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40160/">CVE-2025-40160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40160">CVE-2025-40160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40167/">CVE-2025-40167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40167">CVE-2025-40167 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40170/">CVE-2025-40170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40170">CVE-2025-40170 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40179/">CVE-2025-40179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40179">CVE-2025-40179 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40190/">CVE-2025-40190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40190">CVE-2025-40190 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40209/">CVE-2025-40209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40209">CVE-2025-40209 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40211/">CVE-2025-40211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40211">CVE-2025-40211 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40212/">CVE-2025-40212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40213/">CVE-2025-40213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40213">CVE-2025-40213 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40215/">CVE-2025-40215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40215">CVE-2025-40215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40218/">CVE-2025-40218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40218">CVE-2025-40218 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40219/">CVE-2025-40219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40219">CVE-2025-40219 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40220/">CVE-2025-40220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40220">CVE-2025-40220 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40221/">CVE-2025-40221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40221">CVE-2025-40221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40223/">CVE-2025-40223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40223">CVE-2025-40223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40225/">CVE-2025-40225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40225">CVE-2025-40225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40226/">CVE-2025-40226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40226">CVE-2025-40226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40231/">CVE-2025-40231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40231">CVE-2025-40231 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40233/">CVE-2025-40233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40233">CVE-2025-40233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40235/">CVE-2025-40235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40235">CVE-2025-40235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40237/">CVE-2025-40237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40237">CVE-2025-40237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40238/">CVE-2025-40238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40238">CVE-2025-40238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40239/">CVE-2025-40239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40239">CVE-2025-40239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40240/">CVE-2025-40240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40240">CVE-2025-40240 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40242/">CVE-2025-40242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40242">CVE-2025-40242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40246/">CVE-2025-40246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40246">CVE-2025-40246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40250/">CVE-2025-40250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40250">CVE-2025-40250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40251/">CVE-2025-40251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40252/">CVE-2025-40252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40252">CVE-2025-40252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40254/">CVE-2025-40254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40254">CVE-2025-40254 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40255/">CVE-2025-40255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40255">CVE-2025-40255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40256/">CVE-2025-40256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40256">CVE-2025-40256 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40262/">CVE-2025-40262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40262">CVE-2025-40262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40263/">CVE-2025-40263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40263">CVE-2025-40263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40264/">CVE-2025-40264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40264">CVE-2025-40264 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40266/">CVE-2025-40266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40266">CVE-2025-40266 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40268/">CVE-2025-40268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40268">CVE-2025-40268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40269/">CVE-2025-40269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40272/">CVE-2025-40272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40272">CVE-2025-40272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40273/">CVE-2025-40273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40273">CVE-2025-40273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40274/">CVE-2025-40274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40274">CVE-2025-40274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40275/">CVE-2025-40275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40275">CVE-2025-40275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40276/">CVE-2025-40276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40276">CVE-2025-40276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40278/">CVE-2025-40278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40278">CVE-2025-40278 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40279/">CVE-2025-40279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40279">CVE-2025-40279 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40280/">CVE-2025-40280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40282/">CVE-2025-40282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40282">CVE-2025-40282 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40283/">CVE-2025-40283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40283">CVE-2025-40283 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40284/">CVE-2025-40284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40287/">CVE-2025-40287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40287">CVE-2025-40287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40288/">CVE-2025-40288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40288">CVE-2025-40288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40289/">CVE-2025-40289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40289">CVE-2025-40289 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40292/">CVE-2025-40292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40292">CVE-2025-40292 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40293/">CVE-2025-40293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40293">CVE-2025-40293 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40294/">CVE-2025-40294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40294">CVE-2025-40294 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40301/">CVE-2025-40301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40301">CVE-2025-40301 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40302/">CVE-2025-40302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40302">CVE-2025-40302 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40303/">CVE-2025-40303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40303">CVE-2025-40303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40304/">CVE-2025-40304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40304">CVE-2025-40304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40307/">CVE-2025-40307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40307">CVE-2025-40307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40308/">CVE-2025-40308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40308">CVE-2025-40308 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40309/">CVE-2025-40309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40309">CVE-2025-40309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40310/">CVE-2025-40310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40310">CVE-2025-40310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40311/">CVE-2025-40311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40311">CVE-2025-40311 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40314/">CVE-2025-40314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40314">CVE-2025-40314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40315/">CVE-2025-40315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40315">CVE-2025-40315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40316/">CVE-2025-40316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40316">CVE-2025-40316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40317/">CVE-2025-40317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40317">CVE-2025-40317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40318/">CVE-2025-40318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40318">CVE-2025-40318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40319/">CVE-2025-40319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40319">CVE-2025-40319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40320/">CVE-2025-40320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40320">CVE-2025-40320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40321/">CVE-2025-40321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40321">CVE-2025-40321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40322/">CVE-2025-40322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40322">CVE-2025-40322 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40323/">CVE-2025-40323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40323">CVE-2025-40323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40324/">CVE-2025-40324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40324">CVE-2025-40324 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40328/">CVE-2025-40328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40328">CVE-2025-40328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40329/">CVE-2025-40329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40329">CVE-2025-40329 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40330/">CVE-2025-40330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40330">CVE-2025-40330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40331/">CVE-2025-40331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40331">CVE-2025-40331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40332/">CVE-2025-40332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40332">CVE-2025-40332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40337/">CVE-2025-40337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40337">CVE-2025-40337 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40338/">CVE-2025-40338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40338">CVE-2025-40338 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40339/">CVE-2025-40339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40339">CVE-2025-40339 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40340/">CVE-2025-40340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40340">CVE-2025-40340 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40342/">CVE-2025-40342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40342">CVE-2025-40342 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40343/">CVE-2025-40343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40343">CVE-2025-40343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40344/">CVE-2025-40344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40344">CVE-2025-40344 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40345/">CVE-2025-40345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40345">CVE-2025-40345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40346/">CVE-2025-40346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40346">CVE-2025-40346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40347/">CVE-2025-40347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40347">CVE-2025-40347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40350/">CVE-2025-40350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40350">CVE-2025-40350 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40353/">CVE-2025-40353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40353">CVE-2025-40353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40354/">CVE-2025-40354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40354">CVE-2025-40354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40355/">CVE-2025-40355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40355">CVE-2025-40355 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40357/">CVE-2025-40357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40357">CVE-2025-40357 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40359/">CVE-2025-40359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40359">CVE-2025-40359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40360/">CVE-2025-40360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40360">CVE-2025-40360 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40362/">CVE-2025-40362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40362">CVE-2025-40362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68167/">CVE-2025-68167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68167">CVE-2025-68167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68170/">CVE-2025-68170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68170">CVE-2025-68170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68171/">CVE-2025-68171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68171">CVE-2025-68171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68172/">CVE-2025-68172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68172">CVE-2025-68172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68176/">CVE-2025-68176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68176">CVE-2025-68176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68180/">CVE-2025-68180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68180">CVE-2025-68180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68181/">CVE-2025-68181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68181">CVE-2025-68181 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68183/">CVE-2025-68183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68183">CVE-2025-68183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68184/">CVE-2025-68184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68184">CVE-2025-68184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68185/">CVE-2025-68185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68185">CVE-2025-68185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68190/">CVE-2025-68190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68190">CVE-2025-68190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68192/">CVE-2025-68192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68192">CVE-2025-68192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68194/">CVE-2025-68194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68194">CVE-2025-68194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68195/">CVE-2025-68195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68195">CVE-2025-68195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68197/">CVE-2025-68197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68197">CVE-2025-68197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68198/">CVE-2025-68198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68198">CVE-2025-68198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68201/">CVE-2025-68201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68201">CVE-2025-68201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68202/">CVE-2025-68202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68202">CVE-2025-68202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68206/">CVE-2025-68206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68206">CVE-2025-68206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68207/">CVE-2025-68207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68207">CVE-2025-68207 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68208/">CVE-2025-68208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68208">CVE-2025-68208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68209/">CVE-2025-68209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68209">CVE-2025-68209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68210/">CVE-2025-68210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68210">CVE-2025-68210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68213/">CVE-2025-68213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68213">CVE-2025-68213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68215/">CVE-2025-68215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68215">CVE-2025-68215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68217/">CVE-2025-68217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68217">CVE-2025-68217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68222/">CVE-2025-68222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68222">CVE-2025-68222 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68223/">CVE-2025-68223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68223">CVE-2025-68223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68230/">CVE-2025-68230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68230">CVE-2025-68230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68233/">CVE-2025-68233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68233">CVE-2025-68233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68235/">CVE-2025-68235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68235">CVE-2025-68235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68237/">CVE-2025-68237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68237">CVE-2025-68237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68238/">CVE-2025-68238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68238">CVE-2025-68238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68239/">CVE-2025-68239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68239">CVE-2025-68239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68242/">CVE-2025-68242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68242">CVE-2025-68242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68244/">CVE-2025-68244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68244">CVE-2025-68244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68249/">CVE-2025-68249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68249">CVE-2025-68249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68252/">CVE-2025-68252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68252">CVE-2025-68252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68254/">CVE-2025-68254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68255/">CVE-2025-68255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68256/">CVE-2025-68256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68257/">CVE-2025-68257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68258/">CVE-2025-68258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68259/">CVE-2025-68259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68264/">CVE-2025-68264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68283/">CVE-2025-68283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68283">CVE-2025-68283 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68286/">CVE-2025-68286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68286">CVE-2025-68286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68287/">CVE-2025-68287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68287">CVE-2025-68287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68289/">CVE-2025-68289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68289">CVE-2025-68289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68290/">CVE-2025-68290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68290">CVE-2025-68290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68293/">CVE-2025-68293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68293">CVE-2025-68293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68298/">CVE-2025-68298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68298">CVE-2025-68298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68301/">CVE-2025-68301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68301">CVE-2025-68301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68302/">CVE-2025-68302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68302">CVE-2025-68302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68303/">CVE-2025-68303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68303">CVE-2025-68303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68305/">CVE-2025-68305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68305">CVE-2025-68305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68306/">CVE-2025-68306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68306">CVE-2025-68306 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68307/">CVE-2025-68307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68307">CVE-2025-68307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68308/">CVE-2025-68308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68308">CVE-2025-68308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68311/">CVE-2025-68311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68311">CVE-2025-68311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68312/">CVE-2025-68312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68312">CVE-2025-68312 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68313/">CVE-2025-68313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68313">CVE-2025-68313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68317/">CVE-2025-68317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68317">CVE-2025-68317 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68327/">CVE-2025-68327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68327">CVE-2025-68327 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68328/">CVE-2025-68328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68328">CVE-2025-68328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68330/">CVE-2025-68330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68330">CVE-2025-68330 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68331/">CVE-2025-68331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68331">CVE-2025-68331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68332/">CVE-2025-68332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68335/">CVE-2025-68335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68339/">CVE-2025-68339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68339">CVE-2025-68339 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68340/">CVE-2025-68340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68340">CVE-2025-68340 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68342/">CVE-2025-68342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68342">CVE-2025-68342 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68343/">CVE-2025-68343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68343">CVE-2025-68343 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68344/">CVE-2025-68344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68345/">CVE-2025-68345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68345">CVE-2025-68345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68346/">CVE-2025-68346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68347/">CVE-2025-68347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68351/">CVE-2025-68351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68351">CVE-2025-68351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68352/">CVE-2025-68352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68353/">CVE-2025-68353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68353">CVE-2025-68353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68354/">CVE-2025-68354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68362/">CVE-2025-68362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68363/">CVE-2025-68363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68378/">CVE-2025-68378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68380/">CVE-2025-68380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68724/">CVE-2025-68724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68736/">CVE-2025-68736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68736">CVE-2025-68736 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68740/">CVE-2025-68740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68742/">CVE-2025-68742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68744/">CVE-2025-68744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68746/">CVE-2025-68746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68747/">CVE-2025-68747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68748/">CVE-2025-68748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68749/">CVE-2025-68749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68749">CVE-2025-68749 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68750/">CVE-2025-68750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68750">CVE-2025-68750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68753/">CVE-2025-68753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68757/">CVE-2025-68757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68758/">CVE-2025-68758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68759/">CVE-2025-68759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68765/">CVE-2025-68765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68766/">CVE-2025-68766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71096/">CVE-2025-71096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71096">CVE-2025-71096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042236" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042237" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042238" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042236" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042237" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042238" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94455" version="1" class="patch">
	<metadata>
		<title>Security update for python-wheel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257100" ref_url="https://bugzilla.suse.com/1257100" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-24049" ref_url="https://www.suse.com/security/cve/CVE-2026-24049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024070.html" source="SUSE-SU"/>
		<description>
This update for python-wheel fixes the following issues:

- CVE-2026-24049: Fixed absent path sanitization can cause arbitrary file permission modification (bsc#1257100).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257100">SUSE bug 1257100</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-24049/">CVE-2026-24049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24049">CVE-2026-24049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041562" comment="python313-wheel-0.45.1-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041562" comment="python313-wheel-0.45.1-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94456" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247389" ref_url="https://bugzilla.suse.com/1247389" source="BUGZILLA"/>
		<reference ref_id="1254161" ref_url="https://bugzilla.suse.com/1254161" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-23259" ref_url="https://www.suse.com/security/cve/CVE-2025-23259/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024069.html" source="SUSE-SU"/>
		<description>
This update for dpdk fixes the following issues:

Update to version 24.11.4.

Security issues fixed:

- CVE-2025-23259: issue in the Poll Mode Driver (PMD) allows an attacker on a VM in the system to leak information and
  cause a denial of service on the network interface (bsc#1254161).

Other issues fixed:

- Remove obsolete build option -Denable_kmods.
- Add "which" as a build requirement.
- Drop pesign and needssslcertforbuild because we don't build a kmp anymore (bsc#1247389).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1247389">SUSE bug 1247389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254161">SUSE bug 1254161</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23259/">CVE-2025-23259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23259">CVE-2025-23259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041563" comment="dpdk-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041564" comment="dpdk-devel-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041565" comment="dpdk-devel-static-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041566" comment="dpdk-doc-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041568" comment="dpdk-tools-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041569" comment="libdpdk-25-24.11.4-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041563" comment="dpdk-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041564" comment="dpdk-devel-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041565" comment="dpdk-devel-static-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041566" comment="dpdk-doc-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041568" comment="dpdk-tools-24.11.4-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041569" comment="libdpdk-25-24.11.4-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94457" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257049" ref_url="https://bugzilla.suse.com/1257049" source="BUGZILLA"/>
		<reference ref_id="1257353" ref_url="https://bugzilla.suse.com/1257353" source="BUGZILLA"/>
		<reference ref_id="1257354" ref_url="https://bugzilla.suse.com/1257354" source="BUGZILLA"/>
		<reference ref_id="1257355" ref_url="https://bugzilla.suse.com/1257355" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-0988" ref_url="https://www.suse.com/security/cve/CVE-2026-0988/" source="CVE"/>
		<reference ref_id="CVE-2026-1484" ref_url="https://www.suse.com/security/cve/CVE-2026-1484/" source="CVE"/>
		<reference ref_id="CVE-2026-1485" ref_url="https://www.suse.com/security/cve/CVE-2026-1485/" source="CVE"/>
		<reference ref_id="CVE-2026-1489" ref_url="https://www.suse.com/security/cve/CVE-2026-1489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257049">SUSE bug 1257049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257353">SUSE bug 1257353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257354">SUSE bug 1257354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257355">SUSE bug 1257355</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0988/">CVE-2026-0988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0988">CVE-2026-0988 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1484/">CVE-2026-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1484">CVE-2026-1484 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1485/">CVE-2026-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1485">CVE-2026-1485 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1489/">CVE-2026-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1489">CVE-2026-1489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041571" comment="glib2-devel-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041572" comment="glib2-devel-static-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041573" comment="glib2-doc-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041574" comment="glib2-lang-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041582" comment="libgthread-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041583" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041585" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041571" comment="glib2-devel-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041572" comment="glib2-devel-static-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041573" comment="glib2-doc-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041574" comment="glib2-lang-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041582" comment="libgthread-2_0-0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041583" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041585" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94458" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249090" ref_url="https://bugzilla.suse.com/1249090" source="BUGZILLA"/>
		<reference ref_id="1251933" ref_url="https://bugzilla.suse.com/1251933" source="BUGZILLA"/>
		<reference ref_id="1254108" ref_url="https://bugzilla.suse.com/1254108" source="BUGZILLA"/>
		<reference ref_id="1254471" ref_url="https://bugzilla.suse.com/1254471" source="BUGZILLA"/>
		<reference ref_id="1254472" ref_url="https://bugzilla.suse.com/1254472" source="BUGZILLA"/>
		<reference ref_id="1256734" ref_url="https://bugzilla.suse.com/1256734" source="BUGZILLA"/>
		<reference ref_id="1256738" ref_url="https://bugzilla.suse.com/1256738" source="BUGZILLA"/>
		<reference ref_id="1256739" ref_url="https://bugzilla.suse.com/1256739" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11626" ref_url="https://www.suse.com/security/cve/CVE-2025-11626/" source="CVE"/>
		<reference ref_id="CVE-2025-13499" ref_url="https://www.suse.com/security/cve/CVE-2025-13499/" source="CVE"/>
		<reference ref_id="CVE-2025-13945" ref_url="https://www.suse.com/security/cve/CVE-2025-13945/" source="CVE"/>
		<reference ref_id="CVE-2025-13946" ref_url="https://www.suse.com/security/cve/CVE-2025-13946/" source="CVE"/>
		<reference ref_id="CVE-2025-9817" ref_url="https://www.suse.com/security/cve/CVE-2025-9817/" source="CVE"/>
		<reference ref_id="CVE-2026-0959" ref_url="https://www.suse.com/security/cve/CVE-2026-0959/" source="CVE"/>
		<reference ref_id="CVE-2026-0961" ref_url="https://www.suse.com/security/cve/CVE-2026-0961/" source="CVE"/>
		<reference ref_id="CVE-2026-0962" ref_url="https://www.suse.com/security/cve/CVE-2026-0962/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 4.4.13:

- CVE-2025-11626: MONGO dissector infinite loop (bsc#1251933).
- CVE-2025-13499: Kafka dissector crash (bsc#1254108).
- CVE-2025-13945: HTTP3 dissector crash (bsc#1254471).
- CVE-2025-13946: MEGACO dissector infinite loop (bsc#1254472).
- CVE-2025-9817: SSH dissector crash (bsc#1249090).
- CVE-2026-0959: IEEE 802.11 dissector crash (bsc#1256734).
- CVE-2026-0961: BLF file parser crash (bsc#1256738).
- CVE-2026-0962: SOME/IP-SD dissector crash (bsc#1256739).

Full changelog:

https://www.wireshark.org/docs/relnotes/wireshark-4.4.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1249090">SUSE bug 1249090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251933">SUSE bug 1251933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254108">SUSE bug 1254108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254471">SUSE bug 1254471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254472">SUSE bug 1254472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256734">SUSE bug 1256734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256738">SUSE bug 1256738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256739">SUSE bug 1256739</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11626/">CVE-2025-11626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11626">CVE-2025-11626 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13499/">CVE-2025-13499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13499">CVE-2025-13499 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-13945/">CVE-2025-13945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13945">CVE-2025-13945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-13946/">CVE-2025-13946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13946">CVE-2025-13946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9817/">CVE-2025-9817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9817">CVE-2025-9817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0959/">CVE-2026-0959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0959">CVE-2026-0959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0961/">CVE-2026-0961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0961">CVE-2026-0961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0962/">CVE-2026-0962 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0962">CVE-2026-0962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94459" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256829" ref_url="https://bugzilla.suse.com/1256829" source="BUGZILLA"/>
		<reference ref_id="1256830" ref_url="https://bugzilla.suse.com/1256830" source="BUGZILLA"/>
		<reference ref_id="1256831" ref_url="https://bugzilla.suse.com/1256831" source="BUGZILLA"/>
		<reference ref_id="1256832" ref_url="https://bugzilla.suse.com/1256832" source="BUGZILLA"/>
		<reference ref_id="1256833" ref_url="https://bugzilla.suse.com/1256833" source="BUGZILLA"/>
		<reference ref_id="1256834" ref_url="https://bugzilla.suse.com/1256834" source="BUGZILLA"/>
		<reference ref_id="1256835" ref_url="https://bugzilla.suse.com/1256835" source="BUGZILLA"/>
		<reference ref_id="1256836" ref_url="https://bugzilla.suse.com/1256836" source="BUGZILLA"/>
		<reference ref_id="1256837" ref_url="https://bugzilla.suse.com/1256837" source="BUGZILLA"/>
		<reference ref_id="1256838" ref_url="https://bugzilla.suse.com/1256838" source="BUGZILLA"/>
		<reference ref_id="1256839" ref_url="https://bugzilla.suse.com/1256839" source="BUGZILLA"/>
		<reference ref_id="1256840" ref_url="https://bugzilla.suse.com/1256840" source="BUGZILLA"/>
		<reference ref_id="1257274" ref_url="https://bugzilla.suse.com/1257274" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11187" ref_url="https://www.suse.com/security/cve/CVE-2025-11187/" source="CVE"/>
		<reference ref_id="CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467/" source="CVE"/>
		<reference ref_id="CVE-2025-15468" ref_url="https://www.suse.com/security/cve/CVE-2025-15468/" source="CVE"/>
		<reference ref_id="CVE-2025-15469" ref_url="https://www.suse.com/security/cve/CVE-2025-15469/" source="CVE"/>
		<reference ref_id="CVE-2025-66199" ref_url="https://www.suse.com/security/cve/CVE-2025-66199/" source="CVE"/>
		<reference ref_id="CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160/" source="CVE"/>
		<reference ref_id="CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418/" source="CVE"/>
		<reference ref_id="CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419/" source="CVE"/>
		<reference ref_id="CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420/" source="CVE"/>
		<reference ref_id="CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421/" source="CVE"/>
		<reference ref_id="CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795/" source="CVE"/>
		<reference ref_id="CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

Security fixes:

 - CVE-2025-11187: Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (bsc#1256829).
 - CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
 - CVE-2025-15468: NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (bsc#1256831).
 - CVE-2025-15469: "openssl dgst" one-shot codepath silently truncates inputs &gt;16MB (bsc#1256832).
 - CVE-2025-66199: TLS 1.3 CompressedCertificate excessive memory allocation (bsc#1256833).
 - CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
 - CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
 - CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
 - CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
 - CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
 - CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
 - CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).

Other fixes:

- Enable livepatching support for ppc64le (bsc#1257274).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256829">SUSE bug 1256829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256830">SUSE bug 1256830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256831">SUSE bug 1256831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256832">SUSE bug 1256832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256833">SUSE bug 1256833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256834">SUSE bug 1256834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256835">SUSE bug 1256835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256836">SUSE bug 1256836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256837">SUSE bug 1256837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256838">SUSE bug 1256838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256839">SUSE bug 1256839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256840">SUSE bug 1256840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257274">SUSE bug 1257274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11187/">CVE-2025-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15468/">CVE-2025-15468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15469/">CVE-2025-15469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15469">CVE-2025-15469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66199/">CVE-2025-66199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66199">CVE-2025-66199 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94460" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250553" ref_url="https://bugzilla.suse.com/1250553" source="BUGZILLA"/>
		<reference ref_id="1251979" ref_url="https://bugzilla.suse.com/1251979" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911/" source="CVE"/>
		<reference ref_id="CVE-2025-11731" ref_url="https://www.suse.com/security/cve/CVE-2025-11731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023384.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

Changes in libxslt:

- CVE-2025-11731: Fixed type confusion in exsltFuncResultCompfunction leading to denial of service (bsc#1251979)
- CVE-2025-10911: Fixed use-after-free with key data stored cross-RVT (bsc#1250553)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250553">SUSE bug 1250553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251979">SUSE bug 1251979</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11731/">CVE-2025-11731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11731">CVE-2025-11731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030538" comment="libexslt0-1.1.43-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030539" comment="libxslt-devel-1.1.43-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030540" comment="libxslt-tools-1.1.43-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030541" comment="libxslt1-1.1.43-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030538" comment="libexslt0-1.1.43-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030539" comment="libxslt-devel-1.1.43-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030540" comment="libxslt-tools-1.1.43-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030541" comment="libxslt1-1.1.43-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94461" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244057" ref_url="https://bugzilla.suse.com/1244057" source="BUGZILLA"/>
		<reference ref_id="1249049" ref_url="https://bugzilla.suse.com/1249049" source="BUGZILLA"/>
		<reference ref_id="1249128" ref_url="https://bugzilla.suse.com/1249128" source="BUGZILLA"/>
		<reference ref_id="1253783" ref_url="https://bugzilla.suse.com/1253783" source="BUGZILLA"/>
		<reference ref_id="1254353" ref_url="https://bugzilla.suse.com/1254353" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060/" source="CVE"/>
		<reference ref_id="CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364/" source="CVE"/>
		<reference ref_id="CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436/" source="CVE"/>
		<reference ref_id="CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Update to version 2.4.16.

Security issues fixed:

- CVE-2025-61915: local denial-of-service via cupsd.conf update and related issues (bsc#1253783).
- CVE-2025-58436: slow client communication leads to a possible DoS attack (bsc#1244057).
- CVE-2025-58364: unsafe deserialization and validation of printer attributes can cause a null dereference (bsc#1249128).
- CVE-2025-58060: authentication bypass with AuthType Negotiate (bsc#1249049).

Other updates and bugfixes:

- Version upgrade to 2.4.16:

  * 'cupsUTF8ToCharset' didn't validate 2-byte UTF-8 sequences,
    potentially reading past the end of the source string
    (Issue #1438)
  * The web interface did not support domain usernames fully
    (Issue #1441)
  * Fixed an infinite loop issue in the GTK+ print dialog
    (Issue #1439 boo#1254353)
  * Fixed stopping scheduler on unknown directive in
    configuration (Issue #1443)
  * Fixed packages for Immutable Mode (jsc#PED-14775
    from epic jsc#PED-14688)

- Version upgrade to 2.4.15:

  * Fixed potential crash in 'cups-driverd' when there are
    duplicate PPDs (Issue #1355)
  * Fixed error recovery when scanning for PPDs
    in 'cups-driverd' (Issue #1416)

- Version upgrade to 2.4.14.

- Version upgrade to 2.4.13:

  * Added 'print-as-raster' printer and job attributes
    for forcing rasterization (Issue #1282)
  * Updated documentation (Issue #1086)
  * Updated IPP backend to try a sanitized user name if the
    printer/server does not like the value (Issue #1145)
  * Updated the scheduler to send the "printer-added"
    or "printer-modified" events  whenever an IPP Everywhere PPD
    is installed (Issue #1244)
  * Updated the scheduler to send the "printer-modified" event
    whenever the system default printer is changed (Issue #1246)
  * Fixed a memory leak in 'httpClose' (Issue #1223)
  * Fixed missing commas in 'ippCreateRequestedArray'
    (Issue #1234)
  * Fixed subscription issues in the scheduler and D-Bus notifier
    (Issue #1235)
  * Fixed media-default reporting for custom sizes (Issue #1238)
  * Fixed support for IPP/PPD options with periods or underscores
    (Issue #1249)
  * Fixed parsing of real numbers in PPD compiler source files
    (Issue #1263)
  * Fixed scheduler freezing with zombie clients (Issue #1264)
  * Fixed support for the server name in the ErrorLog filename
    (Issue #1277)
  * Fixed job cleanup after daemon restart (Issue #1315)
  * Fixed handling of buggy DYMO USB printer serial numbers
   (Issue #1338)
  * Fixed unreachable block in IPP backend (Issue #1351)
  * Fixed memory leak in _cupsConvertOptions (Issue #1354)

- Version upgrade to 2.4.12:

  * GnuTLS follows system crypto policies now (Issue #1105)
  * Added `NoSystem` SSLOptions value (Issue #1130)
  * Now we raise alert for certificate issues (Issue #1194)
  * Added Kyocera USB quirk (Issue #1198)
  * The scheduler now logs a job's debugging history
    if the backend fails (Issue #1205)
  * Fixed a potential timing issue with `cupsEnumDests`
    (Issue #1084)
  * Fixed a potential "lost PPD" condition in the scheduler
    (Issue #1109)
  * Fixed a compressed file error handling bug (Issue #1070)
  * Fixed a bug in the make-and-model whitespace trimming
    code (Issue #1096)
  * Fixed a removal of IPP Everywhere permanent queue
    if installation failed (Issue #1102)
  * Fixed `ServerToken None` in scheduler (Issue #1111)
  * Fixed invalid IPP keyword values created from PPD
    option names (Issue #1118)
  * Fixed handling of "media" and "PageSize" in the same
    print request (Issue #1125)
  * Fixed client raster printing from macOS (Issue #1143)
  * Fixed the default User-Agent string.
  * Fixed a recursion issue in `ippReadIO`.
  * Fixed handling incorrect radix in `scan_ps()` (Issue #1188)
  * Fixed validation of dateTime values with time zones
    more than UTC+11 (Issue #1201)
  * Fixed attributes returned by the Create-Xxx-Subscriptions
    requests (Issue #1204)
  * Fixed `ippDateToTime` when using a non GMT/UTC timezone
    (Issue #1208)
  * Fixed `job-completed` event notifications for jobs that are
    cancelled before started (Issue #1209)
  * Fixed DNS-SD discovery with `ippfind` (Issue #1211)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-02-04"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1244057">SUSE bug 1244057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249049">SUSE bug 1249049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249128">SUSE bug 1249128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253783">SUSE bug 1253783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254353">SUSE bug 1254353</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042222" comment="cups-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042223" comment="cups-client-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042225" comment="cups-ddk-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042226" comment="cups-devel-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042228" comment="libcupsimage2-2.4.16-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042222" comment="cups-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042223" comment="cups-client-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042225" comment="cups-ddk-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042226" comment="cups-devel-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042228" comment="libcupsimage2-2.4.16-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94462" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-prometheus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255588" ref_url="https://bugzilla.suse.com/1255588" source="BUGZILLA"/>
		<reference ref_id="1257329" ref_url="https://bugzilla.suse.com/1257329" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12816" ref_url="https://www.suse.com/security/cve/CVE-2025-12816/" source="CVE"/>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024095.html" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-prometheus fixes the following issues:

Update to version 3.5.0:

Security issues fixed:

- CVE-2025-13465: prototype pollution in the _.unset and _.omit functions can lead to deletion of methods from global (bsc#1257329).
- CVE-2025-12816: interpretation conflict vulnerability allowing bypassing cryptographic verifications (bsc#1255588).

Other updates and bugfixes:

- Update to 3.5.0 (jsc#PED-13824):

  * [FEATURE] Remote-write: Add support for Azure Workload Identity
    as an authentication method for the receiver.
  * [FEATURE] PromQL: Add first_over_time(...) and
    ts_of_first_over_time(...) behind feature flag.
  * [FEATURE] Federation: Add support for native histograms with
    custom buckets (NHCB).
  * [ENHANCEMENT] PromQL: Add warn-level annotations for counter
    reset conflicts in certain histogram operations.
  * [ENHANCEMENT] UI: Add scrape interval and scrape timeout to
    targets page.

- Update to 3.4.0:

  * Add unified AWS service discovery for ec2, lightsail and ecs services.
  * [FEATURE] Native histograms are now a stable, but optional
    feature.
  * [FEATURE] UI: Show detailed relabeling steps for each
    discovered target.
  * [ENHANCEMENT] Alerting: Add "unknown" state for alerting rules
    that haven't been evaluated yet.
  * [BUGFIX] Scrape: Fix a bug where scrape cache would not be
    cleared on startup.

- Update to 3.3.0:

  * [FEATURE] Spring Boot 3.3 includes support for the Prometheus
    Client 1.x.
  * [ENHANCEMENT] Dependency management for Dropwizard Metrics has
    been removed.

- Update to 3.2.0:

  * [FEATURE] OAuth2: support jwt-bearer grant-type (RFC7523 3.1).
  * [ENHANCEMENT] PromQL: Reconcile mismatched NHCB bounds in Add
    and Sub.
  * [BUGFIX] TSDB: Native Histogram Custom Bounds with a NaN
    threshold are now rejected.

- Update to 3.1.0:

  * [FEATURE] Remote-write 2 (receiving): Update to 2.0-rc.4 spec.
    "created timestamp" (CT) is now called "start timestamp" (ST).
  * [BUGFIX] Mixin: Add static UID to the remote-write dashboard.

- Update to 3.0.1:

  * [BUGFIX] Promql: Make subqueries left open.
  * [BUGFIX] Fix memory leak when query log is enabled.
  * [BUGFIX] Support utf8 names on /v1/label/:name/values endpoint.

- Update to 3.0.0:

  * [CHANGE] Deprecated feature flags removed.
  * [FEATURE] New UI.
  * [FEATURE] Remote Write 2.0.
  * [FEATURE] OpenTelemetry Support.
  * [FEATURE] UTF-8 support is now stable and enabled by default.
  * [FEATURE] OTLP Ingestion.
  * [FEATURE] Native Histograms.
  * [BUGFIX] PromQL: Fix count_values for histograms.
  * [BUGFIX] TSDB: Fix race on stale values in headAppender.
  * [BUGFIX] UI: Fix selector / series formatting for empty metric
    names.

- Update to 2.55.0:

  * [FEATURE] PromQL: Add `last_over_time` function.
  * [FEATURE] Agent: Add `prometheus_agent_build_info` metric.
  * [ENHANCEMENT] PromQL: Optimise `group()` and `group by()`.
  * [ENHANCEMENT] TSDB: Reduce memory usage when loading blocks.
  * [BUGFIX] Scrape: Fix a bug where a target could be scraped
    multiple times.

- Update to 2.54.0:

  * [CHANGE] Remote-Write: highest_timestamp_in_seconds and
    queue_highest_sent_timestamp_seconds metrics now initialized to
    0.
  * [CHANGE] API: Split warnings from info annotations in API
    response.
  * [FEATURE] Remote-Write: Version 2.0 experimental, plus metadata
    in WAL via feature flag.
  * [FEATURE] PromQL: add limitk() and limit_ratio() aggregation
    operators.
  * [ENHANCEMENT] PromQL: Accept underscores in literal numbers.
  * [ENHANCEMENT] PromQL: float literal numbers and durations are
    now interchangeable (experimental).
  * [ENHANCEMENT] PromQL (experimental native histograms): Optimize
    histogram_count and histogram_sum functions.
  * [BUGFIX] PromQL: Fix various issues with native histograms.
  * [BUGFIX] TSDB: Fix race on stale values in headAppender.
  * [BUGFIX] OTLP receiver: Allow colons in non-standard units.

		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255588">SUSE bug 1255588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257329">SUSE bug 1257329</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-12816/">CVE-2025-12816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12816">CVE-2025-12816 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042229" comment="golang-github-prometheus-prometheus-3.5.0-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042229" comment="golang-github-prometheus-prometheus-3.5.0-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94463" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256805" ref_url="https://bugzilla.suse.com/1256805" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-0989" ref_url="https://www.suse.com/security/cve/CVE-2026-0989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024094.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2026-0989: Fixed call stack exhaustion leading to application crash
  due to RelaxNG parser not limiting the recursion depth when
  resolving `&lt;include&gt;` directives (bsc#1256805).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256805">SUSE bug 1256805</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0989/">CVE-2026-0989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0989">CVE-2026-0989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042230" comment="libxml2-2-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042231" comment="libxml2-devel-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042232" comment="libxml2-doc-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042233" comment="libxml2-tools-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042234" comment="python313-libxml2-2.13.8-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042230" comment="libxml2-2-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042231" comment="libxml2-devel-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042232" comment="libxml2-doc-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042233" comment="libxml2-tools-2.13.8-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042234" comment="python313-libxml2-2.13.8-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94464" version="1" class="patch">
	<metadata>
		<title>Security update for python-maturin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249011" ref_url="https://bugzilla.suse.com/1249011" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024263.html" source="SUSE-SU"/>
		<description>
This update for python-maturin fixes the following issues:

- CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249011)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1249011">SUSE bug 1249011</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042305" comment="python313-maturin-1.8.7-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042305" comment="python313-maturin-1.8.7-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94465" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-subscriptions (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257324" ref_url="https://bugzilla.suse.com/1257324" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024262.html" source="SUSE-SU"/>
		<description>
This update for cockpit-subscriptions fixes the following issues:

- CVE-2025-13465: prototype pollution in the _.unset and _.omit functions can lead to deletion of methods from global
  prototypes (bsc#1257324).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257324">SUSE bug 1257324</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042306" comment="cockpit-subscriptions-12.1-160000.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042306" comment="cockpit-subscriptions-12.1-160000.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94466" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257324" ref_url="https://bugzilla.suse.com/1257324" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024261.html" source="SUSE-SU"/>
		<description>
This update for cockpit fixes the following issues:

- CVE-2025-13465: prototype pollution in the _.unset and _.omit functions can lead to deletion of methods from global
  prototypes (bsc#1257324).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257324">SUSE bug 1257324</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042307" comment="cockpit-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042308" comment="cockpit-bridge-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042309" comment="cockpit-devel-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042310" comment="cockpit-doc-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042311" comment="cockpit-firewalld-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042312" comment="cockpit-kdump-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042313" comment="cockpit-networkmanager-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042314" comment="cockpit-packagekit-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042315" comment="cockpit-selinux-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042316" comment="cockpit-storaged-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042317" comment="cockpit-system-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042318" comment="cockpit-ws-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042319" comment="cockpit-ws-selinux-340-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042307" comment="cockpit-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042308" comment="cockpit-bridge-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042309" comment="cockpit-devel-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042310" comment="cockpit-doc-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042311" comment="cockpit-firewalld-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042312" comment="cockpit-kdump-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042313" comment="cockpit-networkmanager-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042314" comment="cockpit-packagekit-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042315" comment="cockpit-selinux-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042316" comment="cockpit-storaged-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042317" comment="cockpit-system-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042318" comment="cockpit-ws-340-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042319" comment="cockpit-ws-selinux-340-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94467" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-packages (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257325" ref_url="https://bugzilla.suse.com/1257325" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024260.html" source="SUSE-SU"/>
		<description>
This update for cockpit-packages fixes the following issues:

- CVE-2025-13465: prototype pollution in the _.unset and _.omit functions can lead to deletion of methods from global
  (bsc#1257325).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257325">SUSE bug 1257325</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042592" comment="cockpit-packages-3-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042592" comment="cockpit-packages-3-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94468" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257440" ref_url="https://bugzilla.suse.com/1257440" source="BUGZILLA"/>
		<reference ref_id="1257598" ref_url="https://bugzilla.suse.com/1257598" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-1536" ref_url="https://www.suse.com/security/cve/CVE-2026-1536/" source="CVE"/>
		<reference ref_id="CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024259.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

- CVE-2026-1536: HTTP header injection or response splitting via CRLF injection in the Content-Disposition header
  (bsc#1257440).
- CVE-2026-1761: incorrect length calculation when parsing of multipart HTTP responses can lead to a stack-based
  buffer overflow (bsc#1257598).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257440">SUSE bug 1257440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257598">SUSE bug 1257598</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1536/">CVE-2026-1536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1536">CVE-2026-1536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042593" comment="libsoup-3_0-0-3.6.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042594" comment="libsoup-devel-3.6.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042595" comment="libsoup-lang-3.6.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042596" comment="typelib-1_0-Soup-3_0-3.6.5-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042593" comment="libsoup-3_0-0-3.6.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042594" comment="libsoup-devel-3.6.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042595" comment="libsoup-lang-3.6.5-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042596" comment="typelib-1_0-Soup-3_0-3.6.5-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94469" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257599" ref_url="https://bugzilla.suse.com/1257599" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-1703" ref_url="https://www.suse.com/security/cve/CVE-2026-1703/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024347.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2026-1703: files may be extracted outside the installation directory when installing and extracting maliciously
  crafted wheel archives (bsc#1257599).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1257599">SUSE bug 1257599</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1703/">CVE-2026-1703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1703">CVE-2026-1703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043887" comment="python313-pip-25.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043888" comment="python313-pip-wheel-25.0.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043887" comment="python313-pip-25.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043888" comment="python313-pip-wheel-25.0.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94470" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1227412" ref_url="https://bugzilla.suse.com/1227412" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39327" ref_url="https://www.suse.com/security/cve/CVE-2023-39327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024348.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2023-39327: Fixed malicious files can cause a large loop that continuously prints warning messages on the terminal (bsc#1227412).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1227412">SUSE bug 1227412</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-39327/">CVE-2023-39327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39327">CVE-2023-39327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043889" comment="libopenjp2-7-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043890" comment="libopenjp2-7-x86-64-v3-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043891" comment="openjpeg2-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043892" comment="openjpeg2-devel-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043893" comment="openjpeg2-devel-doc-2.5.3-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043889" comment="libopenjp2-7-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043890" comment="libopenjp2-7-x86-64-v3-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043891" comment="openjpeg2-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043892" comment="openjpeg2-devel-2.5.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043893" comment="openjpeg2-devel-doc-2.5.3-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94471" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp, python-Brotli (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246517" ref_url="https://bugzilla.suse.com/1246517" source="BUGZILLA"/>
		<reference ref_id="1254867" ref_url="https://bugzilla.suse.com/1254867" source="BUGZILLA"/>
		<reference ref_id="1256017" ref_url="https://bugzilla.suse.com/1256017" source="BUGZILLA"/>
		<reference ref_id="1256018" ref_url="https://bugzilla.suse.com/1256018" source="BUGZILLA"/>
		<reference ref_id="1256019" ref_url="https://bugzilla.suse.com/1256019" source="BUGZILLA"/>
		<reference ref_id="1256020" ref_url="https://bugzilla.suse.com/1256020" source="BUGZILLA"/>
		<reference ref_id="1256021" ref_url="https://bugzilla.suse.com/1256021" source="BUGZILLA"/>
		<reference ref_id="1256022" ref_url="https://bugzilla.suse.com/1256022" source="BUGZILLA"/>
		<reference ref_id="1256023" ref_url="https://bugzilla.suse.com/1256023" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53643" ref_url="https://www.suse.com/security/cve/CVE-2025-53643/" source="CVE"/>
		<reference ref_id="CVE-2025-69223" ref_url="https://www.suse.com/security/cve/CVE-2025-69223/" source="CVE"/>
		<reference ref_id="CVE-2025-69224" ref_url="https://www.suse.com/security/cve/CVE-2025-69224/" source="CVE"/>
		<reference ref_id="CVE-2025-69225" ref_url="https://www.suse.com/security/cve/CVE-2025-69225/" source="CVE"/>
		<reference ref_id="CVE-2025-69226" ref_url="https://www.suse.com/security/cve/CVE-2025-69226/" source="CVE"/>
		<reference ref_id="CVE-2025-69227" ref_url="https://www.suse.com/security/cve/CVE-2025-69227/" source="CVE"/>
		<reference ref_id="CVE-2025-69228" ref_url="https://www.suse.com/security/cve/CVE-2025-69228/" source="CVE"/>
		<reference ref_id="CVE-2025-69229" ref_url="https://www.suse.com/security/cve/CVE-2025-69229/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp, python-Brotli fixes the following issues:

Changes in python-aiohttp:

- CVE-2025-69228: Fixed denial of service through large payloads (bsc#1256022).
- CVE-2025-69226: Fixed brute-force leak of internal static file path components (bsc#1256020).
- CVE-2025-69224: Fixed unicode processing of header values could cause parsing discrepancies (bsc#1256018).
- CVE-2025-69223: Fixed aiohttp HTTP Parser auto_decompress feature susceptible to zip bomb (bsc#1256017).
- CVE-2025-69227: Fixed DoS when bypassing asserts (bsc#1256021).
- CVE-2025-69225: Fixed unicode match groups in regexes for ASCII protocol elements (bsc#1256019).
- CVE-2025-69229: Fixed DoS through chunked messages (bsc#1256023).
- CVE-2025-53643: Fixed request smuggling due to incorrect parsing of chunked trailer section (bsc#1246517).

Changes in python-Brotli:

- Add max length decompression (bsc#1254867, bsc#1256017).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246517">SUSE bug 1246517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256017">SUSE bug 1256017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256018">SUSE bug 1256018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256019">SUSE bug 1256019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256020">SUSE bug 1256020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256021">SUSE bug 1256021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256022">SUSE bug 1256022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256023">SUSE bug 1256023</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53643/">CVE-2025-53643 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53643">CVE-2025-53643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69223/">CVE-2025-69223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69223">CVE-2025-69223 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69224/">CVE-2025-69224 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69224">CVE-2025-69224 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69225/">CVE-2025-69225 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69225">CVE-2025-69225 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69226/">CVE-2025-69226 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69226">CVE-2025-69226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69227/">CVE-2025-69227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69227">CVE-2025-69227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69228/">CVE-2025-69228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69228">CVE-2025-69228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69229/">CVE-2025-69229 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69229">CVE-2025-69229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94472" version="1" class="patch">
	<metadata>
		<title>Security update for rust1.93 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:20426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024345.html" source="SUSE-SU"/>
		<description>
This update for rust1.93 fixes the following issues:

Rust is shipped in 1.93.0 version.

Please see https://github.com/rust-lang/rust/releases/tag/1.93.0 for changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043896" comment="cargo1.93-1.93.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043897" comment="rust1.93-1.93.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043896" comment="cargo1.93-1.93.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043897" comment="rust1.93-1.93.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94473" version="1" class="patch">
	<metadata>
		<title>Security update for go1.25 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244485" ref_url="https://bugzilla.suse.com/1244485" source="BUGZILLA"/>
		<reference ref_id="1256818" ref_url="https://bugzilla.suse.com/1256818" source="BUGZILLA"/>
		<reference ref_id="1257692" ref_url="https://bugzilla.suse.com/1257692" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html" source="SUSE-SU"/>
		<description>
This update for go1.25 fixes the following issues:

Update to version 1.25.7.

Security issues fixed:

- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing  allows for C code smuggling (bsc#1257692).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does
  not account for the expiration of full certificate chain (bsc#1256818).

Other updates and bugfixes:

- version update to 1.25.7:

  * go#75844 cmd/compile: OOM killed on linux/arm64
  * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs
  * go#77425 crypto/tls: CL 737700 broke session resumption on macOS
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1244485">SUSE bug 1244485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257692">SUSE bug 1257692</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043900" comment="go1.25-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043901" comment="go1.25-doc-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043902" comment="go1.25-libstd-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043903" comment="go1.25-race-1.25.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043900" comment="go1.25-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043901" comment="go1.25-doc-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043902" comment="go1.25-libstd-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043903" comment="go1.25-race-1.25.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94474" version="1" class="patch">
	<metadata>
		<title>Security update for go1.24 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1236217" ref_url="https://bugzilla.suse.com/1236217" source="BUGZILLA"/>
		<reference ref_id="1256818" ref_url="https://bugzilla.suse.com/1256818" source="BUGZILLA"/>
		<reference ref_id="1256820" ref_url="https://bugzilla.suse.com/1256820" source="BUGZILLA"/>
		<reference ref_id="1257692" ref_url="https://bugzilla.suse.com/1257692" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html" source="SUSE-SU"/>
		<description>
This update for go1.24 fixes the following issues:

Update to version 1.24.13.

Security issues fixed:

- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing  allows for C code smuggling (bsc#1257692).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does
  not account for the expiration of full certificate chain (bsc#1256818).
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc1256820).

Other updates and bugfixes:

- version update to 1.24.13:

  * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs
  * go#77424 crypto/tls: CL 737700 broke session resumption on macOS
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1236217">SUSE bug 1236217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256820">SUSE bug 1256820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257692">SUSE bug 1257692</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044008" comment="go1.24-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044009" comment="go1.24-doc-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044010" comment="go1.24-libstd-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044011" comment="go1.24-race-1.24.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044008" comment="go1.24-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044009" comment="go1.24-doc-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044010" comment="go1.24-libstd-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044011" comment="go1.24-race-1.24.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94475" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1194037" ref_url="https://bugzilla.suse.com/1194037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45261" ref_url="https://www.suse.com/security/cve/CVE-2021-45261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024342.html" source="SUSE-SU"/>
		<description>
This update for patch fixes the following issues:

- CVE-2021-45261: invalid pointer via another_hunk function can cause a denial-of-service (bsc#1194037).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1194037">SUSE bug 1194037</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45261/">CVE-2021-45261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45261">CVE-2021-45261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044012" comment="patch-2.7.6-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044012" comment="patch-2.7.6-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94476" version="1" class="patch">
	<metadata>
		<title>Security update for openCryptoki (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256673" ref_url="https://bugzilla.suse.com/1256673" source="BUGZILLA"/>
		<reference ref_id="1257116" ref_url="https://bugzilla.suse.com/1257116" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-22791" ref_url="https://www.suse.com/security/cve/CVE-2026-22791/" source="CVE"/>
		<reference ref_id="CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024341.html" source="SUSE-SU"/>
		<description>
This update for openCryptoki fixes the following issues:

Upgrade openCryptoki to 3.26 (jsc#PED-14609)

Security fixes:

 - CVE-2026-22791: supplying malformed compressed EC public key can lead to heap corruption or denial-of-service (bsc#1256673).
 - CVE-2026-23893: Privilege Escalation or Data Exposure via Symlink Following (bsc#1257116).

Other fixes:

  * Soft: Add support for RSA keys up to 16K bits.
  * CCA: Add support for RSA keys up to 8K bits (requires CCA v8.4 or v7.6 or later).
  * p11sak: Add support for generating RSA keys up to 16K bits.
  * Soft/ICA: Add support for SHA512/224 and SHA512/256 key derivation mechanism (CKM_SHA512_224_KEY_DERIVATION and CKM_SHA512_256_KEY_DERIVATION).
  * Soft/ICA/CCA/EP11: Add support for SHA-HMAC key types CKK_SHAxxx_HMAC and key gen mechanisms CKM_SHAxxx_KEY_GEN.
  * p11sak: Add support for SHA-HMAC key types and key generation.
  * p11sak: Add support for key wrap and unwrap commands to export and import private and secret keys by means of key wrapping/unwrapping
    with various key wrapping mechanism.
  * p11kmip: Add support for using an HSM-protected TLS client key via a PKCS#11 provider.
  * p11sak: Add support for exporting non-sensitive private keys to password protected PEM files.
  * Add support for canceling an operation via NULL mechanism pointer at C_XxxInit() call as an alternative to C_SessionCancel() (PKCS#11 v3.0).
  * EP11: Add support for pairing friendly BLS12-381 EC curve for sign/verify using CKM_IBM_ECDSA_OTHER and signature/public key aggregation using CKM_IBM_EC_AGGREGATE.
  * p11sak: Add support for generating BLS12-381 EC keys.
  * EP11: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires an EP11 host library v4.2 or later, and
    a CEX8P crypto card with firmware v9.6 or later on IBM z17, and v8.39 or later on IBM z16).
  * CCA: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires CCA v8.4 or later).
  * Soft: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires OpenSSL 3.5 or later, or the OQS-provider must be configured).
  * p11sak: Add support for IBM-specific ML-DSA and ML-KEM key types.
  * Bug fixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256673">SUSE bug 1256673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257116">SUSE bug 1257116</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22791/">CVE-2026-22791 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22791">CVE-2026-22791 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044013" comment="openCryptoki-3.26.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044014" comment="openCryptoki-64bit-3.26.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044015" comment="openCryptoki-devel-3.26.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044013" comment="openCryptoki-3.26.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044014" comment="openCryptoki-64bit-3.26.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044015" comment="openCryptoki-devel-3.26.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94477" version="1" class="patch">
	<metadata>
		<title>Security update for fontforge (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252652" ref_url="https://bugzilla.suse.com/1252652" source="BUGZILLA"/>
		<reference ref_id="1256013" ref_url="https://bugzilla.suse.com/1256013" source="BUGZILLA"/>
		<reference ref_id="1256025" ref_url="https://bugzilla.suse.com/1256025" source="BUGZILLA"/>
		<reference ref_id="1256032" ref_url="https://bugzilla.suse.com/1256032" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-15269" ref_url="https://www.suse.com/security/cve/CVE-2025-15269/" source="CVE"/>
		<reference ref_id="CVE-2025-15275" ref_url="https://www.suse.com/security/cve/CVE-2025-15275/" source="CVE"/>
		<reference ref_id="CVE-2025-15279" ref_url="https://www.suse.com/security/cve/CVE-2025-15279/" source="CVE"/>
		<reference ref_id="CVE-2025-50949" ref_url="https://www.suse.com/security/cve/CVE-2025-50949/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
		<description>
This update for fontforge fixes the following issues:

Update to version 20251009.

Security issues fixed:

- CVE-2025-15279: remote code execution via heap-based buffer overflow in BMP file parsing (bsc#1256013).
- CVE-2025-15269: remote code execution via use-after-free in SFD file parsing (bsc#1256032).
- CVE-2025-15275: arbitrary code execution via SFD file parsing buffer overflow (bsc#1256025).
- CVE-2025-50949: memory leak in function DlgCreate8 (bsc#1252652).

Other updates and bugfixes:

- fix multiple crashes in Multiple Masters.
- fix crash for content over 32767 characters in GDraw multiline text field.
- fix crash on Up/Down
- fix crash in Metrics View.
- fix UFO crash for empty contours.
- fix crash issue in allmarkglyphs.

- Version update to 20251009:

  * Update documentation for py scripts (#5180)
  * Update GitHub CI runners (#5328)
  * Update po files from Croudin sources. (#5330)
  * Use consistent Python in MacOS GitHub runner (#5331)
  * Fix CI for Windows GitHub runner (#5335)
  * Fix lookup flags parsing (#5338)
  * Fixes (#5332): glyph file names uXXXXX (#5333)
  * make harmonization robust and avoid zero handles after harmonization (#5262)
  * Quiet strict prototypes warnings. (#5313)
  * Fix crash in parsegvar() due to insufficient buffer (#5339)
  * Handle failed iconv conversion. Unhandled execution path was UB, causing a segfault for me (#5329)
  * Fix CMake function _get_git_version() (#5342)
  * Don't require individual tuple encapsulation in fontforge.font.bitmapSizes setter (#5138)
  * nltransform of anchor points (#5345)
  * Fix generateFontPostHook being called instead of generateFontPreHook (#5226)
  * Always set usDefaultChar to 0 (.notdef) (#5242)
  * add font attributes, method to Python docs (#5353)
  * fix segfault triggered by Python del c[i:j] (#5352)
  * Autoselect internal WOFF2 format (#5346)
  * Fix typos in the FAQ (#5355)
  * add font.style_set_names attribute to Python API (#5354)
  * Bulk tester (#5365)
  * Fix Splinefont shell invocation (#5367)
  * Fix the lists of Windows language IDs (#5359)
  * Support suplementary planes in SFD (emojis etc.) (#5364)
  * Remove psaltnames for multi-code-point names (#5305)
  * doc: added missing sudo to installation instructions (#5300)
  * Fix data corruption on SFD reading (#5380)
  * Compare vertical metrics check when generating TTC (#5372)
  * Treat FT_PIXEL_MODE_MONO as 2 grey levels (#5379)
  * Don't attempt to copy anchors into NULL font (#5405)
  * Fix export of supplementary plane characters in font name to TTF (#5396)
  * Defer crowdin update to the end of the pipeline (#5409)
  * Fix generated feature file bugs (#5384)
  * crowdin: update to java 17 (#5447)
  * Remove assert from Python script processor (#5410)
  * Use sysconfig for Python module locations (#5423)
  * Use PyConfig API on Python 3.8 (#5404)
  * Fix resource leak in unParseTTInstrs (#5476)
  * Only install GUI-specific files if ENABLE_GUI is set (#5451)
  * add math device tables to Python API (#5348)
  * Update CI runner to macOS 13 (#5482)
  * Allow hyphen and special characters in Feature File glyph names (#5358)
  * Fix Python font.appendSFNTName() function (#5494)
  * Update mm.c (#5386)
  * Warning rollup (probably some hidden bugs!) from clang trunk (#5492)
  * Fix function PyFFFont_addSmallCaps. (#5519)
  * Make SmallCaps() create symbols (#5517)
  * Segfault fix and complete implementation of "Don't generate FFTM tables" (#5509)
  * Modernize fixed pitch flag computation (#5506)
  * fix memleak in function utf7toutf8_copy (#5495)
  * Avoid crashes in Python scripts when objects are accessed in invalid state (#5483)
  * Fix CI for Ubuntu 24 (#5531)
  * Bump GitHub CI runner to Ubuntu 22 (#5551)
  * Fix memory corruption in SFUnicodeRanges() (#5537)
  * Add contour draw option to H.Metrics. (#5496)
  * Fix scaling of references in CharView (#5558)
  * Fix TTF validation on load for fixed pitch fonts (#5562)
  * Performance fixes for GSUB/GPOS dumps (#5547)
  * Simple GTK-based dialog with CSS appearance support (#5546)
  * Support Harfbuzz in Metrics View (#5522)
  * Update po files from crowdin translations (#5575)
  * Be more clever about label text in gtextfield (#5583)
  * Add minimal support for GDEF version 1.3 (#5584)
  * Sanitize messages from python (#5589)
  * Fix a crash caused by deleting a glyph with vertical kerning pairs. (#5592)
  * THEME -&gt; GUI_THEME (#5596)
  * Update po translations from Crowdin (#5593)
  * Upgrade to Unicode 16.0.0 (#5594)
  * Fix Linux AppImage (#5599)
  * Upgrade to Unicode 17.0.0 and extend the language and script lists (#5618)
  * Remove X11 and non-Cairo drawing backends (#5612)
  * Add macOS dependency setup script (#5563)
  * Fix hotkeys in BitmapView (#5626)
  * Manually install Inno Setup 6 (#5621)
  * Remove cv-&gt;back_img_out_of_date and cv-&gt;backimgs (#5625)
  * fix spelling "bt" -&gt; "but" (#5636)
  * Fix typos in Python module docs (#5634)

- Version update to 20230101+git59.770356c9b:

  * Add contour draw option to H.Metrics. (#5496)
  * Fix memory corruption in SFUnicodeRanges() (#5537)
  * Bump GitHub CI runner to Ubuntu 22 (#5551)
  * Fix CI for Ubuntu 24 (#5531)
  * Avoid crashes in Python scripts when objects are accessed in
    invalid state (#5483)
  * fix memleak in function utf7toutf8_copy (#5495)
  * Modernize fixed pitch flag computation (#5506)
  * Segfault fix and complete implementation of "Don't generate
    FFTM tables" (#5509)
  * Make SmallCaps() translate symbols, too.  Update
    documentation accordingly. (#5517)
  * Fix function PyFFFont_addSmallCaps. (#5519)
  * Warning rollup (probably some hidden bugs!) from clang trunk
    (#5492)
  * Update mm.c (#5386)
  * fix memleak in function DlgCreate8 (#5491)
  * Fix Python font.appendSFNTName() function (#5494)
  * Allow hyphen and special characters in Feature File glyph names
    (#5358)
  * Update CI runner to macOS 13 (#5482)
  * add math device tables to Python API (#5348)
  * Only install GUI-specific files if ENABLE_GUI is set (#5451)
  * Fix resource leak in unParseTTInstrs (#5476)
  * Use PyConfig API on Python 3.8 (#5404)
  * Use sysconfig for Python module locations (#5423)
  * More crowdin fix
  * Python script shall trigger no asserts (#5410)
  * crowdin: update to java 17 (#5447)
  * try fix crowdin
  * Fix generated feature file bugs (#5384)
  * Defer crowdin update to the end of the pipeline (#5409)
  * Fix export of supplementary plane characters in font name to
    TTF (#5396)
  * Don't attempt to copy anchors into NULL font (#5405)
  * Treat FT_PIXEL_MODE_MONO as 2 grey levels (#5379)
  * Compare vertical metrics check when generating TTC (#5372)
  * Fix data corruption on SFD reading (#5380)
  * doc: added missing sudo to installation instructions (#5300)
  * Remove `psaltnames` for multi-code-point names (#5305)
  * Support suplementary planes in SFD (emojis etc.) (#5364)
  * Fix the lists of Windows language IDs (#5359)
  * fix splinefont shell command injection (#5367)
  * Bulk tester (#5365)
  * add `font.style_set_names` attribute to Python API (#5354)
  * Fix typos in the FAQ (#5355)
  * Autoselect internal WOFF2 format (#5346)
  * fix segfault triggered by Python `del c[i:j]` (#5352)
  * add `font` attributes, method to Python docs (#5353)
  * Always set `usDefaultChar` to 0 (.notdef) (#5242)
  * Fix generateFontPostHook being called instead of
    generateFontPreHook (#5226)
  * nltransform of anchor points (#5345)
  * Don't require individual tuple encapsulation in
    fontforge.font.bitmapSizes setter (#5138)
  * Fix CMake function _get_git_version() (#5342)
  * Handle failed iconv conversion. Unhandled execution path was
    UB, causing a segfault for me (#5329)
  * Fix crash in parsegvar() due to insufficient buffer (#5339)
  * Quiet strict prototypes warnings. (#5313)
  * harmonizing can now no longer produce zero handles, the
    computation of harmonization is now numerically robust (#5262)
  * Fix glyph file names uXXXXX (#5333)
  * Fix lookup flags parsing (#5338)
  * Duplicate libfontforge.dll for "py" and "pyhook" tests. (#5335)
  * Use consistent Python in MacOS GitHub runner (#5331)
  * Update po files from Croudin sources after fixing problems
  * Fix GinHub CI runners (#5328)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-14"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252652">SUSE bug 1252652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256013">SUSE bug 1256013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256025">SUSE bug 1256025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256032">SUSE bug 1256032</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15269/">CVE-2025-15269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15269">CVE-2025-15269 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15275/">CVE-2025-15275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15275">CVE-2025-15275 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15279/">CVE-2025-15279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15279">CVE-2025-15279 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50949/">CVE-2025-50949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50949">CVE-2025-50949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044190" comment="fontforge-20251009-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044191" comment="fontforge-devel-20251009-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044192" comment="fontforge-doc-20251009-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044190" comment="fontforge-20251009-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044191" comment="fontforge-devel-20251009-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044192" comment="fontforge-doc-20251009-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94478" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256569" ref_url="https://bugzilla.suse.com/1256569" source="BUGZILLA"/>
		<reference ref_id="1256570" ref_url="https://bugzilla.suse.com/1256570" source="BUGZILLA"/>
		<reference ref_id="1256571" ref_url="https://bugzilla.suse.com/1256571" source="BUGZILLA"/>
		<reference ref_id="1256573" ref_url="https://bugzilla.suse.com/1256573" source="BUGZILLA"/>
		<reference ref_id="1256574" ref_url="https://bugzilla.suse.com/1256574" source="BUGZILLA"/>
		<reference ref_id="1256576" ref_url="https://bugzilla.suse.com/1256576" source="BUGZILLA"/>
		<reference ref_id="1256848" ref_url="https://bugzilla.suse.com/1256848" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<reference ref_id="CVE-2026-22036" ref_url="https://www.suse.com/security/cve/CVE-2026-22036/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
		<description>
This update for nodejs22 fixes the following issues:

Update to 22.22.0:

- CVE-2025-55130: file system permissions bypass via crafted symlinks (bsc#1256569).
- CVE-2025-55131: timeout-based race conditions allow for allocations that contain leftover data from previous operations and lead to exposure of in-process secrets (bsc#1256570).
- CVE-2025-55132: a file's access and modification timestamps can be changed via `futimes()` even when the process has only read permissions (bsc#1256571).
- CVE-2025-59465: malformed HTTP/2 HEADERS frame with invalid HPACK data can cause a crash due to an unhandled error (bsc#1256573).
- CVE-2025-59466: uncatchable "Maximum call stack size exceeded" error when `async_hooks.createHook()` is enabled can lead to crash (bsc#1256574).
- CVE-2026-21637: synchronous exceptions thrown during certain callbacks bypass the standard TLS error handling paths and can cause a denial of service (bsc#1256576).
- CVE-2026-22036: undici: unbounded decompression chain in HTTP responses via Content-Encoding may lead to resource exhaustion (bsc#1256848).

For full changelog, please see https://nodejs.org/en/blog
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256569">SUSE bug 1256569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256570">SUSE bug 1256570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256571">SUSE bug 1256571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256573">SUSE bug 1256573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256574">SUSE bug 1256574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256576">SUSE bug 1256576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256848">SUSE bug 1256848</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22036/">CVE-2026-22036 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22036">CVE-2026-22036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94479" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249584" ref_url="https://bugzilla.suse.com/1249584" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023385.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2025-59375: Fixed large dynamic memory allocations via a small document submitted for parsing (bsc#1249584)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249584">SUSE bug 1249584</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030542" comment="expat-2.7.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030543" comment="libexpat-devel-2.7.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030544" comment="libexpat1-2.7.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030542" comment="expat-2.7.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030543" comment="libexpat-devel-2.7.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030544" comment="libexpat1-2.7.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94480" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-prometheus (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257442" ref_url="https://bugzilla.suse.com/1257442" source="BUGZILLA"/>
		<reference ref_id="1257841" ref_url="https://bugzilla.suse.com/1257841" source="BUGZILLA"/>
		<reference ref_id="1257897" ref_url="https://bugzilla.suse.com/1257897" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61140" ref_url="https://www.suse.com/security/cve/CVE-2025-61140/" source="CVE"/>
		<reference ref_id="CVE-2026-1615" ref_url="https://www.suse.com/security/cve/CVE-2026-1615/" source="CVE"/>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024627.html" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-prometheus fixes the following issues:

- CVE-2026-25547: Fixed an unbounded brace range expansion leading to excessive CPU and memory consumption. (bsc#1257841)
- CVE-2026-1615: Fixed arbitrary code injection due to unsafe evaluation of user-supplied JSON Path expressions in jsonpath. (bsc#1257897)
- CVE-2025-61140:  Fixed a function vulnerable to prototype pollution in jsonpath. (bsc#1257442)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1257442">SUSE bug 1257442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257841">SUSE bug 1257841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257897">SUSE bug 1257897</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61140/">CVE-2025-61140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61140">CVE-2025-61140 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-1615/">CVE-2026-1615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1615">CVE-2026-1615 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044293" comment="golang-github-prometheus-prometheus-3.5.0-160000.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044293" comment="golang-github-prometheus-prometheus-3.5.0-160000.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94481" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-machines, cockpit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1221342" ref_url="https://bugzilla.suse.com/1221342" source="BUGZILLA"/>
		<reference ref_id="1236149" ref_url="https://bugzilla.suse.com/1236149" source="BUGZILLA"/>
		<reference ref_id="1239759" ref_url="https://bugzilla.suse.com/1239759" source="BUGZILLA"/>
		<reference ref_id="1248250" ref_url="https://bugzilla.suse.com/1248250" source="BUGZILLA"/>
		<reference ref_id="1249828" ref_url="https://bugzilla.suse.com/1249828" source="BUGZILLA"/>
		<reference ref_id="1249830" ref_url="https://bugzilla.suse.com/1249830" source="BUGZILLA"/>
		<reference ref_id="1257324" ref_url="https://bugzilla.suse.com/1257324" source="BUGZILLA"/>
		<reference ref_id="1257325" ref_url="https://bugzilla.suse.com/1257325" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024625.html" source="SUSE-SU"/>
		<description>
This update for cockpit-machines, cockpit fixes the following issues:

- CVE-2025-13465: Update the lodash dependencie to avoid prototype pollution. (bsc#1257324)

Changes in cockpit-machines:

- Update to 346
  * 346
    - Performance improvements
    - Translation updates
  * 345
    - New virtual machines don't get SPICE graphics anymore
    - Support for network port forwarding
    - Bug fixes and translation updates

- Update to 344
  * 344
    - Port forwarding for user session VMs
    - "Shutdown and restart" action
    - Faster startup
  * 343
    - Memory usage now shows numbers reported by the guest (RHEL-116731)

- Update to 342
  * 342
    - Bug fixes and translation updates
  * 341
    - Improved UX for Disks and Network interface tables
    - Bug fixes and translation updates
  * 340
    - Use exclusive VNC connections with "Remote resizing"

- Update to 339
  * 339
    - Serial consoles now keep their content and stay alive
    - No longer copies qemu.conf values into VM definitions
  * 338
    - Translation and dependency updates
    - Detachable VNC console

- Update to 337
  * 337
    - Bug fixes and translation updates
  * 336
    - Graphical VNC and serial consoles improvements
    - Control VNC console resizing and scaling
    - Bug fixes and translation updates
  * 335
    - Bug fixes and translation updates
  * 334
    - Bug fixes and translation updates

Changes in cockpit:

- Update to 354
  * changes since 351
    - 354
      * Convert documentation to AsciiDoc
      * Work around Firefox 146/147 bug (rhbz#2422331)
      * Bug fixes
    - 353
      * Networking: Suggest prefix length and gateway address
      * Bug fixes and translation updates
    - 352
      * Shown a warning if the last shutdown/reboot was unclean
      * Bug fixes and translation updates

- Update to 351
  * Changes since 349
    - 351
      * Firewall ports can be deleted individually
    - 350
      * networking: fix renaming of bridges and other groups (RHEL-117883)
      * bridge: fix OpenSSH_10.2p1 host key detection

- Update to 349
  * Changes since 346
    - 349
      * Package manifests: add any test
      * Bug fixes and translation updates
    - 348
      * Bug fixes and translation updates
    - 347
      * Site-specific branding support

- Update to 346
  * Changes since 344
    - 346
      * Support branding Cockpit pages
      * Storage: Support for Stratis "V2" pools
    - 345
      * Translation and dependency updates
      * Shorter IPv6 addresses
      * IPv6 addresses for WireGuard

- Update to 344
  * Changes since 340
    - 344
      * Bug fixes and translation updates
    - 343
      * login: Improve error message for unsupported shells
      * cockpit: Handle file access issues with files in machines.d
      * Translation updates
    - 342
      * systemd: ensure update() is called at least once for tuned-dialog
      * Translation updates
    - 341
      * services: show link to podman page for quadlets
      * Bug fixes and translation updates
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221342">SUSE bug 1221342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236149">SUSE bug 1236149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239759">SUSE bug 1239759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248250">SUSE bug 1248250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249828">SUSE bug 1249828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249830">SUSE bug 1249830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257324">SUSE bug 1257324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257325">SUSE bug 1257325</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044370" comment="cockpit-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044371" comment="cockpit-bridge-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044372" comment="cockpit-devel-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044373" comment="cockpit-doc-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044374" comment="cockpit-firewalld-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044375" comment="cockpit-kdump-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044376" comment="cockpit-machines-346-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044377" comment="cockpit-networkmanager-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044378" comment="cockpit-packagekit-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044379" comment="cockpit-selinux-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044380" comment="cockpit-storaged-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044381" comment="cockpit-system-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044382" comment="cockpit-ws-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044383" comment="cockpit-ws-selinux-354-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044370" comment="cockpit-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044371" comment="cockpit-bridge-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044372" comment="cockpit-devel-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044373" comment="cockpit-doc-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044374" comment="cockpit-firewalld-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044375" comment="cockpit-kdump-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044376" comment="cockpit-machines-346-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044377" comment="cockpit-networkmanager-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044378" comment="cockpit-packagekit-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044379" comment="cockpit-selinux-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044380" comment="cockpit-storaged-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044381" comment="cockpit-system-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044382" comment="cockpit-ws-354-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044383" comment="cockpit-ws-selinux-354-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94482" version="1" class="patch">
	<metadata>
		<title>Security update for wicked2nm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257911" ref_url="https://bugzilla.suse.com/1257911" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024626.html" source="SUSE-SU"/>
		<description>
This update for wicked2nm fixes the following issues:

- Update to version 1.4.1
- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257908).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257911">SUSE bug 1257911</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044384" comment="wicked2nm-1.4.1-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044384" comment="wicked2nm-1.4.1-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94483" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253904" ref_url="https://bugzilla.suse.com/1253904" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024624.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

- CVE-2025-58181: not validating the number of mechanisms can cause unlimited memory consumption (bsc#1253904).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1253904">SUSE bug 1253904</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044571" comment="docker-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044572" comment="docker-bash-completion-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044573" comment="docker-buildx-0.29.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044574" comment="docker-fish-completion-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044575" comment="docker-rootless-extras-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044576" comment="docker-zsh-completion-28.5.1_ce-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044571" comment="docker-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044572" comment="docker-bash-completion-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044573" comment="docker-buildx-0.29.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044574" comment="docker-fish-completion-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044575" comment="docker-rootless-extras-28.5.1_ce-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044576" comment="docker-zsh-completion-28.5.1_ce-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94484" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-repos (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255425" ref_url="https://bugzilla.suse.com/1255425" source="BUGZILLA"/>
		<reference ref_id="1257325" ref_url="https://bugzilla.suse.com/1257325" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<reference ref_id="CVE-2025-64718" ref_url="https://www.suse.com/security/cve/CVE-2025-64718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024623.html" source="SUSE-SU"/>
		<description>
This update for cockpit-repos fixes the following issues:

Update to version 4.7.

Security issues fixed:

- CVE-2025-13465: prototype pollution in the _.unset and _.omit functions can lead to deletion of methods from global
  (bsc#1257325).
- CVE-2025-64718: js-yaml prototype pollution in merge (bsc#1255425).

Other updates and bugfixes:

- version update to 4.7

  * Translation updates

- version update to 4.6:

  * Translation updates
  * Dependency updates
  * Fix translations pot file not being update

- version update to 4.5:

  * Dependency updates

- version update to 4.4:

  * Translation updates
  * Dependency updates
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255425">SUSE bug 1255425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257325">SUSE bug 1257325</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64718/">CVE-2025-64718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718">CVE-2025-64718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044577" comment="cockpit-repos-4.7-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044577" comment="cockpit-repos-4.7-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94485" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253439" ref_url="https://bugzilla.suse.com/1253439" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40186" ref_url="https://www.suse.com/security/cve/CVE-2025-40186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024610.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.6.1 fixes one security issue

The following security issue was fixed:

- CVE-2025-40186: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request() (bsc#1253439).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253439">SUSE bug 1253439</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40186/">CVE-2025-40186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40186">CVE-2025-40186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010044578" comment="kernel-livepatch-6_12_0-160000_6-default-4-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010044578" comment="kernel-livepatch-6_12_0-160000_6-default-4-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94486" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3-livepatches (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250410" ref_url="https://bugzilla.suse.com/1250410" source="BUGZILLA"/>
		<reference ref_id="1256876" ref_url="https://bugzilla.suse.com/1256876" source="BUGZILLA"/>
		<reference ref_id="1256878" ref_url="https://bugzilla.suse.com/1256878" source="BUGZILLA"/>
		<reference ref_id="1256880" ref_url="https://bugzilla.suse.com/1256880" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11187" ref_url="https://www.suse.com/security/cve/CVE-2025-11187/" source="CVE"/>
		<reference ref_id="CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467/" source="CVE"/>
		<reference ref_id="CVE-2025-15468" ref_url="https://www.suse.com/security/cve/CVE-2025-15468/" source="CVE"/>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
		<description>
This update for openssl-3-livepatches fixes the following issues:

- CVE-2025-11187: Fixed improper validation of PBMAC1 parameters in PKCS#12 MAC verification  (bsc#1256878).
- CVE-2025-15467: Fixed stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256876).
- CVE-2025-15468: Fixed NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (bsc#1256880).
- CVE-2025-9230: Fixed out-of-bounds read &amp; write in RFC 3211 KEK Unwrap (bsc#1250410).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1250410">SUSE bug 1250410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256876">SUSE bug 1256876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256878">SUSE bug 1256878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256880">SUSE bug 1256880</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11187/">CVE-2025-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15468/">CVE-2025-15468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047375" comment="openssl-3-livepatches-0.3-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047375" comment="openssl-3-livepatches-0.3-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94487" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258231" ref_url="https://bugzilla.suse.com/1258231" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024621.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Changes in MozillaFirefox:

Firefox Extended Support Release 140.7.1 ESR was released:

  * Fixed: Security fix.

MFSA 2026-10 (bsc#1258231):

  * CVE-2026-2447: Heap buffer overflow in libvpx.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1258231">SUSE bug 1258231</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044579" comment="MozillaFirefox-140.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044581" comment="MozillaFirefox-devel-140.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044582" comment="MozillaFirefox-translations-common-140.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044583" comment="MozillaFirefox-translations-other-140.7.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044579" comment="MozillaFirefox-140.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044581" comment="MozillaFirefox-devel-140.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044582" comment="MozillaFirefox-translations-common-140.7.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044583" comment="MozillaFirefox-translations-other-140.7.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94488" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253233" ref_url="https://bugzilla.suse.com/1253233" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-64181" ref_url="https://www.suse.com/security/cve/CVE-2025-64181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023382.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2025-64181: Fixed use of uninitialized memory in function generic_unpack() (bsc#1253233)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1253233">SUSE bug 1253233</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64181/">CVE-2025-64181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64181">CVE-2025-64181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030545" comment="libIex-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030546" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030547" comment="libIlmThread-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030548" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030549" comment="libOpenEXR-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030550" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030551" comment="libOpenEXRCore-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030552" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030553" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030554" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030555" comment="openexr-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030557" comment="openexr-doc-3.2.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030545" comment="libIex-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030546" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030547" comment="libIlmThread-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030548" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030549" comment="libOpenEXR-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030550" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030551" comment="libOpenEXRCore-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030552" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030553" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030554" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030555" comment="openexr-3.2.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030557" comment="openexr-doc-3.2.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94489" version="1" class="patch">
	<metadata>
		<title>Security update for python313 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257029" ref_url="https://bugzilla.suse.com/1257029" source="BUGZILLA"/>
		<reference ref_id="1257031" ref_url="https://bugzilla.suse.com/1257031" source="BUGZILLA"/>
		<reference ref_id="1257042" ref_url="https://bugzilla.suse.com/1257042" source="BUGZILLA"/>
		<reference ref_id="1257046" ref_url="https://bugzilla.suse.com/1257046" source="BUGZILLA"/>
		<reference ref_id="1257181" ref_url="https://bugzilla.suse.com/1257181" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<description>
This update for python313 fixes the following issues:

Update to version 3.13.12.

Security issues fixed:

- CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable
  characters (bsc#1257029).
- CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046).
- CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel
  (bsc#1257031).
- CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042).
- CVE-2026-1299: header injection when an email is serialized due to improper newline quoting in `BytesGenerator`
  (bsc#1257181).

Other updates and bugfixes:

- Update to version 3.13.12.

  - Library

    - gh-144380: Improve performance of io.BufferedReader line
      iteration by ~49%.
    - gh-144169: Fix three crashes when non-string keyword
      arguments are supplied to objects in the ast module.
    - gh-144100: Fixed a crash in ctypes when using a deprecated
      POINTER(str) type in argtypes. Instead of aborting, ctypes
      now raises a proper Python exception when the pointer
      target type is unresolved.
    - gh-144050: Fix stat.filemode() in the pure-Python
      implementation to avoid misclassifying invalid mode values
      as block devices.
    - gh-144023: Fixed validation of file descriptor 0 in posix
      functions when used with follow_symlinks parameter.
    - gh-143999: Fix an issue where inspect.getgeneratorstate()
      and inspect.getcoroutinestate() could fail for generators
      wrapped by types.coroutine() in the suspended state.
    - gh-143706: Fix multiprocessing forkserver so that sys.argv
      is correctly set before __main__ is preloaded. Previously,
      sys.argv was empty during main module import in forkserver
      child processes. This fixes a regression introduced in
      3.13.8 and 3.14.1. Root caused by Aaron Wieczorek, test
      provided by Thomas Watson, thanks!
    - gh-143638: Forbid reentrant calls of the pickle.Pickler and
      pickle.Unpickler methods for the C implementation.
      Previously, this could cause crash or data corruption, now
      concurrent calls of methods of the same object raise
      RuntimeError.
    - gh-78724: Raise RuntimeError's when user attempts to call
      methods on half-initialized Struct objects, For example,
      created by Struct.__new__(Struct). Patch by Sergey
      B Kirpichev.
    - gh-143602: Fix a inconsistency issue in write() that leads
      to unexpected buffer overwrite by deduplicating the buffer
      exports.
    - gh-143547: Fix sys.unraisablehook() when the hook raises an
      exception and changes sys.unraisablehook(): hold a strong
      reference to the old hook. Patch by Victor Stinner.
    - gh-143378: Fix use-after-free crashes when a BytesIO object
      is concurrently mutated during write() or writelines().
    - gh-143346: Fix incorrect wrapping of the Base64 data in
      plistlib._PlistWriter when the indent contains a mix of
      tabs and spaces.
    - gh-143310: tkinter: fix a crash when a Python list is
      mutated during the conversion to a Tcl object (e.g., when
      setting a Tcl variable). Patch by Benedikt Tran.
    - gh-143309: Fix a crash in os.execve() on non-Windows
      platforms when given a custom environment mapping which is
      then mutated during parsing. Patch by Benedikt Tran.
    - gh-143308: pickle: fix use-after-free crashes when
      a PickleBuffer is concurrently mutated by a custom buffer
      callback during pickling. Patch by Benedikt Tran and Aaron
      Wieczorek.
    - gh-143237: Fix support of named pipes in the rotating
      logging handlers.
    - gh-143249: Fix possible buffer leaks in Windows overlapped
      I/O on error handling.
    - gh-143241: zoneinfo: fix infinite loop in
      ZoneInfo.from_file when parsing a malformed TZif file.
      Patch by Fatih Celik.
    - gh-142830: sqlite3: fix use-after-free crashes when the
      connection's callbacks are mutated during a callback
      execution. Patch by Benedikt Tran.
    - gh-143200: xml.etree.ElementTree: fix use-after-free
      crashes in __getitem__() and __setitem__() methods of
      Element when the element is concurrently mutated. Patch by
      Benedikt Tran.
    - gh-142195: Updated timeout evaluation logic in subprocess
      to be compatible with deterministic environments like
      Shadow where time moves exactly as requested.
    - gh-143145: Fixed a possible reference leak in ctypes when
      constructing results with multiple output parameters on
      error.
    - gh-122431: Corrected the error message in
      readline.append_history_file() to state that nelements must
      be non-negative instead of positive.
    - gh-143004: Fix a potential use-after-free in
      collections.Counter.update() when user code mutates the
      Counter during an update.
    - gh-143046: The asyncio REPL no longer prints copyright and
      version messages in the quiet mode (-q). Patch by Bartosz
      Slawecki.
    - gh-140648: The asyncio REPL now respects the -I flag
      (isolated mode). Previously, it would load and execute
      PYTHONSTARTUP even if the flag was set. Contributed by
      Bartosz Slawecki.
    - gh-142991: Fixed socket operations such as recvfrom() and
      sendto() for FreeBSD divert(4) socket.
    - gh-143010: Fixed a bug in mailbox where the precise timing
      of an external event could result in the library opening an
      existing file instead of a file it expected to create.
    - gh-142881: Fix concurrent and reentrant call of
      atexit.unregister().
    - gh-112127: Fix possible use-after-free in
      atexit.unregister() when the callback is unregistered
      during comparison.
    - gh-142783: Fix zoneinfo use-after-free with descriptor
      _weak_cache. a descriptor as _weak_cache could cause
      crashes during object creation. The fix ensures proper
      reference counting for descriptor-provided objects.
    - gh-142754: Add the ownerDocument attribute to
      xml.dom.minidom elements and attributes created by directly
      instantiating the Element or Attr class. Note that this way
      of creating nodes is not supported; creator functions like
      xml.dom.Document.documentElement() should be used instead.
    - gh-142784: The asyncio REPL now properly closes the loop
      upon the end of interactive session. Previously, it could
      cause surprising warnings. Contributed by Bartosz Slawecki.
    - gh-142555: array: fix a crash in a[i] = v when converting
      i to an index via i.__index__ or i.__float__ mutates the
      array.
    - gh-142594: Fix crash in TextIOWrapper.close() when the
      underlying buffer's closed property calls detach().
    - gh-142451: hmac: Ensure that the HMAC.block_size attribute
      is correctly copied by HMAC.copy. Patch by Benedikt Tran.
    - gh-142495: collections.defaultdict now prioritizes
      __setitem__() when inserting default values from
      default_factory. This prevents race conditions where
      a default value would overwrite a value set before
      default_factory returns.
    - gh-142651: unittest.mock: fix a thread safety issue where
      Mock.call_count may return inaccurate values when the mock
      is called concurrently from multiple threads.
    - gh-142595: Added type check during initialization of the
      decimal module to prevent a crash in case of broken stdlib.
      Patch by Sergey B Kirpichev.
    - gh-142517: The non-compat32 email policies now correctly
      handle refolding encoded words that contain bytes that can
      not be decoded in their specified character set. Previously
      this resulted in an encoding exception during folding.
    - gh-112527: The help text for required options in argparse
      no longer extended with "(default: None)".
    - gh-142315: Pdb can now run scripts from anonymous pipes
      used in process substitution. Patch by Bartosz Slawecki.
    - gh-142282: Fix winreg.QueryValueEx() to not accidentally
      read garbage buffer under race condition.
    - gh-75949: Fix argparse to preserve | separators in mutually
      exclusive groups when the usage line wraps due to length.
    - gh-68552: MisplacedEnvelopeHeaderDefect and Missing header
      name defects are now correctly passed to the handle_defect
      method of policy in FeedParser.
    - gh-142006: Fix a bug in the email.policy.default folding
      algorithm which incorrectly resulted in a doubled newline
      when a line ending at exactly max_line_length was followed
      by an unfoldable token.
    - gh-105836: Fix asyncio.run_coroutine_threadsafe() leaving
      underlying cancelled asyncio task running.
    - gh-139971: pydoc: Ensure that the link to the online
      documentation of a stdlib module is correct.
    - gh-139262: Some keystrokes can be swallowed in the new
      PyREPL on Windows, especially when used together with the
      ALT key. Fix by Chris Eibl.
    - gh-138897: Improved license/copyright/credits display in
      the REPL: now uses a pager.
    - gh-79986: Add parsing for References and In-Reply-To
      headers to the email library that parses the header content
      as lists of message id tokens. This prevents them from
      being folded incorrectly.
    - gh-109263: Starting a process from spawn context in
      multiprocessing no longer sets the start method globally.
    - gh-90871: Fixed an off by one error concerning the backlog
      parameter in create_unix_server(). Contributed by Christian
      Harries.
    - gh-133253: Fix thread-safety issues in linecache.
    - gh-132715: Skip writing objects during marshalling once
      a failure has occurred.
    - gh-127529: Correct behavior of
      asyncio.selector_events.BaseSelectorEventLoop._accept_connection()
      in handling ConnectionAbortedError in a loop. This improves
      performance on OpenBSD.

  - IDLE

    - gh-143774: Better explain the operation of Format / Format
      Paragraph.

  - Core and Builtins

    - gh-144307: Prevent a reference leak in module teardown at
      interpreter finalization.
    - gh-144194: Fix error handling in perf jitdump
      initialization on memory allocation failure.
    - gh-141805: Fix crash in set when objects with the same hash
      are concurrently added to the set after removing an element
      with the same hash while the set still contains elements
      with the same hash.
    - gh-143670: Fixes a crash in ga_repr_items_list function.
    - gh-143377: Fix a crash in _interpreters.capture_exception()
      when the exception is incorrectly formatted. Patch by
      Benedikt Tran.
    - gh-143189: Fix crash when inserting a non-str key into
      a split table dictionary when the key matches an existing
      key in the split table but has no corresponding value in
      the dict.
    - gh-143228: Fix use-after-free in perf trampoline when
      toggling profiling while threads are running or during
      interpreter finalization with daemon threads active. The
      fix uses reference counting to ensure trampolines are not
      freed while any code object could still reference them.
      Pach by Pablo Galindo
    - gh-142664: Fix a use-after-free crash in
      memoryview.__hash__ when the __hash__ method of the
      referenced object mutates that object or the view. Patch by
      Benedikt Tran.
    - gh-142557: Fix a use-after-free crash in bytearray.__mod__
      when the bytearray is mutated while formatting the %-style
      arguments. Patch by Benedikt Tran.
    - gh-143195: Fix use-after-free crashes in bytearray.hex()
      and memoryview.hex() when the separator's __len__() mutates
      the original object. Patch by Benedikt Tran.
    - gh-143135: Set sys.flags.inspect to 1 when PYTHONINSPECT is
      0. Previously, it was set to 0 in this case.
    - gh-143003: Fix an overflow of the shared empty buffer in
      bytearray.extend() when __length_hint__() returns 0 for
      non-empty iterator.
    - gh-143006: Fix a possible assertion error when comparing
      negative non-integer float and int with the same number of
      bits in the integer part.
    - gh-142776: Fix a file descriptor leak in import.c
    - gh-142829: Fix a use-after-free crash in
      contextvars.Context comparison when a custom __eq__ method
      modifies the context via set().
    - gh-142766: Clear the frame of a generator when
      generator.close() is called.
    - gh-142737: Tracebacks will be displayed in fallback mode
      even if io.open() is lost. Previously, this would crash the
      interpreter. Patch by Bartosz Slawecki.
    - gh-142554: Fix a crash in divmod() when
      _pylong.int_divmod() does not return a tuple of length two
      exactly. Patch by Benedikt Tran.
    - gh-142560: Fix use-after-free in bytearray search-like
      methods (find(), count(), index(), rindex(), and rfind())
      by marking the storage as exported which causes
      reallocation attempts to raise BufferError. For contains(),
      split(), and rsplit() the buffer protocol is used for this.
    - gh-142343: Fix SIGILL crash on m68k due to incorrect
      assembly constraint.
    - gh-141732: Ensure the __repr__() for ExceptionGroup and
      BaseExceptionGroup does not change when the exception
      sequence that was original passed in to its constructor is
      subsequently mutated.
    - gh-100964: Fix reference cycle in exhausted generator
      frames. Patch by Savannah Ostrowski.
    - gh-140373: Correctly emit PY_UNWIND event when generator
      object is closed. Patch by Mikhail Efimov.
    - gh-138568: Adjusted the built-in help() function so that
      empty inputs are ignored in interactive mode.
    - gh-127773: Do not use the type attribute cache for types
      with incompatible MRO.

  - C API

    - gh-142571: PyUnstable_CopyPerfMapFile() now checks that
      opening the file succeeded before flushing.

  - Build

    - gh-142454: When calculating the digest of the JIT stencils
      input, sort the hashed files by filenames before adding
      their content to the hasher. This ensures deterministic
      hash input and hence deterministic hash, independent on
      filesystem order.
    - gh-141808: When running make clean-retain-profile, keep the
      generated JIT stencils. That way, the stencils are not
      generated twice when Profile-guided optimization (PGO) is
      used. It also allows distributors to supply their own
      pre-built JIT stencils.
    - gh-138061: Ensure reproducible builds by making JIT stencil
      header generation deterministic.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257029">SUSE bug 1257029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257031">SUSE bug 1257031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257042">SUSE bug 1257042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257046">SUSE bug 1257046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257181">SUSE bug 1257181</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044585" comment="libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044589" comment="python313-base-x86-64-v3-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044591" comment="python313-dbm-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044592" comment="python313-devel-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044593" comment="python313-doc-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044594" comment="python313-doc-devhelp-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044595" comment="python313-idle-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044606" comment="python313-tk-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044607" comment="python313-tools-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044608" comment="python313-x86-64-v3-3.13.12-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044585" comment="libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044589" comment="python313-base-x86-64-v3-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044591" comment="python313-dbm-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044592" comment="python313-devel-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044593" comment="python313-doc-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044594" comment="python313-doc-devhelp-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044595" comment="python313-idle-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044606" comment="python313-tk-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044607" comment="python313-tools-3.13.12-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044608" comment="python313-x86-64-v3-3.13.12-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94490" version="1" class="patch">
	<metadata>
		<title>Security update for glibc-livepatches (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1226501" ref_url="https://bugzilla.suse.com/1226501" source="BUGZILLA"/>
		<reference ref_id="1228879" ref_url="https://bugzilla.suse.com/1228879" source="BUGZILLA"/>
		<reference ref_id="1256913" ref_url="https://bugzilla.suse.com/1256913" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-0861" ref_url="https://www.suse.com/security/cve/CVE-2026-0861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024608.html" source="SUSE-SU"/>
		<description>
This update for glibc-livepatches fixes the following issues:

Changes in glibc-livepatches:

- CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256913)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226501">SUSE bug 1226501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228879">SUSE bug 1228879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256913">SUSE bug 1256913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0861/">CVE-2026-0861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0861">CVE-2026-0861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047376" comment="glibc-livepatches-0.3-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047376" comment="glibc-livepatches-0.3-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94491" version="1" class="patch">
	<metadata>
		<title>Security update for docker-stable (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250508" ref_url="https://bugzilla.suse.com/1250508" source="BUGZILLA"/>
		<reference ref_id="1250596" ref_url="https://bugzilla.suse.com/1250596" source="BUGZILLA"/>
		<reference ref_id="1252290" ref_url="https://bugzilla.suse.com/1252290" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2026:20585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024620.html" source="SUSE-SU"/>
		<description>
This update for docker-stable fixes the following issues:

- Enable SELinux in default daemon.json config (--selinux-enabled).
  This has no practical impact on non-SELinux systems (bsc#1252290).
- Remove git-core recommends on SLE. Most SLE systems have installRecommends=yes
  by default and thus end up installing git with Docker (bsc#1250508).
- Include historical changelog data from before the docker-stable fork.
  This includes CVE numbers for security tracking reasons (bsc#1250596).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250508">SUSE bug 1250508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250596">SUSE bug 1250596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252290">SUSE bug 1252290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045656" comment="docker-stable-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045657" comment="docker-stable-bash-completion-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045658" comment="docker-stable-buildx-0.25.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045659" comment="docker-stable-fish-completion-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045660" comment="docker-stable-rootless-extras-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045661" comment="docker-stable-zsh-completion-24.0.9_ce-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045656" comment="docker-stable-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045657" comment="docker-stable-bash-completion-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045658" comment="docker-stable-buildx-0.25.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045659" comment="docker-stable-fish-completion-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045660" comment="docker-stable-rootless-extras-24.0.9_ce-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045661" comment="docker-stable-zsh-completion-24.0.9_ce-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94492" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253332" ref_url="https://bugzilla.suse.com/1253332" source="BUGZILLA"/>
		<reference ref_id="1253333" ref_url="https://bugzilla.suse.com/1253333" source="BUGZILLA"/>
		<reference ref_id="1258008" ref_url="https://bugzilla.suse.com/1258008" source="BUGZILLA"/>
		<reference ref_id="1258009" ref_url="https://bugzilla.suse.com/1258009" source="BUGZILLA"/>
		<reference ref_id="1258010" ref_url="https://bugzilla.suse.com/1258010" source="BUGZILLA"/>
		<reference ref_id="1258011" ref_url="https://bugzilla.suse.com/1258011" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:

Update to version 14.21.

Security issues fixed:

- CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008).
- CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code
  execution (bsc#1258009).
- CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution
  (bsc#1258010).
- CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution
  (bsc#1258011).
- CVE-2025-12817: missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332).
- CVE-2025-12818: integer overflow in allocation-size calculations within libpq (bsc#1253333).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253332">SUSE bug 1253332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253333">SUSE bug 1253333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258008">SUSE bug 1258008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258009">SUSE bug 1258009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258010">SUSE bug 1258010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258011">SUSE bug 1258011</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94493" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253332" ref_url="https://bugzilla.suse.com/1253332" source="BUGZILLA"/>
		<reference ref_id="1253333" ref_url="https://bugzilla.suse.com/1253333" source="BUGZILLA"/>
		<reference ref_id="1258008" ref_url="https://bugzilla.suse.com/1258008" source="BUGZILLA"/>
		<reference ref_id="1258009" ref_url="https://bugzilla.suse.com/1258009" source="BUGZILLA"/>
		<reference ref_id="1258010" ref_url="https://bugzilla.suse.com/1258010" source="BUGZILLA"/>
		<reference ref_id="1258011" ref_url="https://bugzilla.suse.com/1258011" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

Update to version 15.16.

Security issues fixed:

- CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008).
- CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code
  execution (bsc#1258009).
- CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution
  (bsc#1258010).
- CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution
  (bsc#1258011).
- CVE-2025-12817: missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332).
- CVE-2025-12818: integer overflow in allocation-size calculations within libpq (bsc#1253333).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253332">SUSE bug 1253332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253333">SUSE bug 1253333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258008">SUSE bug 1258008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258009">SUSE bug 1258009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258010">SUSE bug 1258010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258011">SUSE bug 1258011</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94494" version="1" class="patch">
	<metadata>
		<title>Security update for autogen (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247921" ref_url="https://bugzilla.suse.com/1247921" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8746" ref_url="https://www.suse.com/security/cve/CVE-2025-8746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024617.html" source="SUSE-SU"/>
		<description>
This update for autogen fixes the following issues:

- CVE-2025-8746: Fixed improper input validation and memory bounds checking
  when processing certain malformed configuration files (bsc#1247921)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1247921">SUSE bug 1247921</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8746/">CVE-2025-8746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8746">CVE-2025-8746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045686" comment="autogen-5.18.16-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045687" comment="autoopts-5.18.16-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045688" comment="libopts25-5.18.16-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045686" comment="autogen-5.18.16-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045687" comment="autoopts-5.18.16-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045688" comment="libopts25-5.18.16-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94495" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254866" ref_url="https://bugzilla.suse.com/1254866" source="BUGZILLA"/>
		<reference ref_id="1254867" ref_url="https://bugzilla.suse.com/1254867" source="BUGZILLA"/>
		<reference ref_id="1256331" ref_url="https://bugzilla.suse.com/1256331" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3_1 fixes the following issues:

- CVE-2025-66471: excessive resource consumption via decompression of highly compressed data in Streaming API (bsc#1254867).
- CVE-2025-66418: resource exhaustion via unbounded number of links in the decompression chain (bsc#1254866).
- CVE-2026-21441: excessive resource consumption during decompression of data in HTTP redirect responses (bsc#1256331).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254866">SUSE bug 1254866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256331">SUSE bug 1256331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045689" comment="python313-urllib3_1-1.26.20-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045689" comment="python313-urllib3_1-1.26.20-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94496" version="1" class="patch">
	<metadata>
		<title>Security update for 7zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246706" ref_url="https://bugzilla.suse.com/1246706" source="BUGZILLA"/>
		<reference ref_id="1246707" ref_url="https://bugzilla.suse.com/1246707" source="BUGZILLA"/>
		<reference ref_id="1249130" ref_url="https://bugzilla.suse.com/1249130" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53816" ref_url="https://www.suse.com/security/cve/CVE-2025-53816/" source="CVE"/>
		<reference ref_id="CVE-2025-53817" ref_url="https://www.suse.com/security/cve/CVE-2025-53817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024615.html" source="SUSE-SU"/>
		<description>
This update for 7zip fixes the following issues:

- Update to 25.01 (boo#1249130)
  * The code for handling symbolic links has been changed to
    provide greater security when extracting files from archives
  * Command line switch -snld20 can be used to bypass default
    security checks when creating symbolic links.

- Update to 25.00:
  * bzip2 compression speed was increased by 15-40%.
  * deflate (zip/gz) compression speed was increased by 1-3%.
  * improved support for zip, cpio and fat archives.
  * CVE-2025-53816: Fixed input manipulation leading
    to heap buffer overflow (bsc#1246706)
  * CVE-2025-53817: Fixed null pointer dereference leading
    to denial of service (bsc#1246707)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246706">SUSE bug 1246706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246707">SUSE bug 1246707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249130">SUSE bug 1249130</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53816/">CVE-2025-53816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53816">CVE-2025-53816 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53817/">CVE-2025-53817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53817">CVE-2025-53817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045690" comment="7zip-25.01-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045690" comment="7zip-25.01-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94497" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1241772" ref_url="https://bugzilla.suse.com/1241772" source="BUGZILLA"/>
		<reference ref_id="1253181" ref_url="https://bugzilla.suse.com/1253181" source="BUGZILLA"/>
		<reference ref_id="1253185" ref_url="https://bugzilla.suse.com/1253185" source="BUGZILLA"/>
		<reference ref_id="1253186" ref_url="https://bugzilla.suse.com/1253186" source="BUGZILLA"/>
		<reference ref_id="1253189" ref_url="https://bugzilla.suse.com/1253189" source="BUGZILLA"/>
		<reference ref_id="1253194" ref_url="https://bugzilla.suse.com/1253194" source="BUGZILLA"/>
		<reference ref_id="1253748" ref_url="https://bugzilla.suse.com/1253748" source="BUGZILLA"/>
		<reference ref_id="1257128" ref_url="https://bugzilla.suse.com/1257128" source="BUGZILLA"/>
		<reference ref_id="1257422" ref_url="https://bugzilla.suse.com/1257422" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="CVE-2025-64324" ref_url="https://www.suse.com/security/cve/CVE-2025-64324/" source="CVE"/>
		<reference ref_id="CVE-2025-64432" ref_url="https://www.suse.com/security/cve/CVE-2025-64432/" source="CVE"/>
		<reference ref_id="CVE-2025-64433" ref_url="https://www.suse.com/security/cve/CVE-2025-64433/" source="CVE"/>
		<reference ref_id="CVE-2025-64434" ref_url="https://www.suse.com/security/cve/CVE-2025-64434/" source="CVE"/>
		<reference ref_id="CVE-2025-64435" ref_url="https://www.suse.com/security/cve/CVE-2025-64435/" source="CVE"/>
		<reference ref_id="CVE-2025-64437" ref_url="https://www.suse.com/security/cve/CVE-2025-64437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
		<description>
This update for kubevirt fixes the following issues:

Update to version 1.7.0 (bsc#1257128).

Security issues fixed:

  - CVE-2025-64435: logic flaw in the virt-controller can lead to incorrect status updates and potentially causing a DoS
    (bsc#1253189).
  - CVE-2024-45310: kubevirt vendored github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into
    creating empty files/directories on host (bsc#1257422).
  - CVE-2025-22872: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction
    (bsc#1241772).
  - CVE-2025-64432: fail to correctly validate certain fields in the client TLS certificate may allow an attacker to
    bypass existing RBAC controls (bsc#1253181).
  - CVE-2025-64433: improper symlink handling can allow to read arbitrary files (bsc#1253185).
  - CVE-2025-64434: compromising virt-handler instance can lead to impersonate virt-api and execute privileged operations
    (bsc#1253186).
  - CVE-2025-64437: mishandling of symlinks can lead to compromising the CIA (bsc#1253194).
  - CVE-2025-64324: a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users
    (bsc#1253748).

Other updates and bugfixes:

  - Upstream now uses stateless firmware for CoCo VMs.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1241772">SUSE bug 1241772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253181">SUSE bug 1253181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253185">SUSE bug 1253185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253186">SUSE bug 1253186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253189">SUSE bug 1253189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253194">SUSE bug 1253194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253748">SUSE bug 1253748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257128">SUSE bug 1257128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257422">SUSE bug 1257422</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-64324/">CVE-2025-64324 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64324">CVE-2025-64324 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64432/">CVE-2025-64432 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64432">CVE-2025-64432 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64433/">CVE-2025-64433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64433">CVE-2025-64433 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64434/">CVE-2025-64434 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64434">CVE-2025-64434 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64435/">CVE-2025-64435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64435">CVE-2025-64435 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64437/">CVE-2025-64437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64437">CVE-2025-64437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94498" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1215199" ref_url="https://bugzilla.suse.com/1215199" source="BUGZILLA"/>
		<reference ref_id="1235905" ref_url="https://bugzilla.suse.com/1235905" source="BUGZILLA"/>
		<reference ref_id="1242505" ref_url="https://bugzilla.suse.com/1242505" source="BUGZILLA"/>
		<reference ref_id="1242974" ref_url="https://bugzilla.suse.com/1242974" source="BUGZILLA"/>
		<reference ref_id="1242986" ref_url="https://bugzilla.suse.com/1242986" source="BUGZILLA"/>
		<reference ref_id="1243452" ref_url="https://bugzilla.suse.com/1243452" source="BUGZILLA"/>
		<reference ref_id="1243507" ref_url="https://bugzilla.suse.com/1243507" source="BUGZILLA"/>
		<reference ref_id="1243662" ref_url="https://bugzilla.suse.com/1243662" source="BUGZILLA"/>
		<reference ref_id="1246184" ref_url="https://bugzilla.suse.com/1246184" source="BUGZILLA"/>
		<reference ref_id="1246282" ref_url="https://bugzilla.suse.com/1246282" source="BUGZILLA"/>
		<reference ref_id="1247030" ref_url="https://bugzilla.suse.com/1247030" source="BUGZILLA"/>
		<reference ref_id="1247292" ref_url="https://bugzilla.suse.com/1247292" source="BUGZILLA"/>
		<reference ref_id="1247712" ref_url="https://bugzilla.suse.com/1247712" source="BUGZILLA"/>
		<reference ref_id="1248166" ref_url="https://bugzilla.suse.com/1248166" source="BUGZILLA"/>
		<reference ref_id="1248175" ref_url="https://bugzilla.suse.com/1248175" source="BUGZILLA"/>
		<reference ref_id="1248178" ref_url="https://bugzilla.suse.com/1248178" source="BUGZILLA"/>
		<reference ref_id="1248179" ref_url="https://bugzilla.suse.com/1248179" source="BUGZILLA"/>
		<reference ref_id="1248185" ref_url="https://bugzilla.suse.com/1248185" source="BUGZILLA"/>
		<reference ref_id="1248188" ref_url="https://bugzilla.suse.com/1248188" source="BUGZILLA"/>
		<reference ref_id="1248196" ref_url="https://bugzilla.suse.com/1248196" source="BUGZILLA"/>
		<reference ref_id="1248206" ref_url="https://bugzilla.suse.com/1248206" source="BUGZILLA"/>
		<reference ref_id="1248208" ref_url="https://bugzilla.suse.com/1248208" source="BUGZILLA"/>
		<reference ref_id="1248209" ref_url="https://bugzilla.suse.com/1248209" source="BUGZILLA"/>
		<reference ref_id="1248211" ref_url="https://bugzilla.suse.com/1248211" source="BUGZILLA"/>
		<reference ref_id="1248212" ref_url="https://bugzilla.suse.com/1248212" source="BUGZILLA"/>
		<reference ref_id="1248213" ref_url="https://bugzilla.suse.com/1248213" source="BUGZILLA"/>
		<reference ref_id="1248214" ref_url="https://bugzilla.suse.com/1248214" source="BUGZILLA"/>
		<reference ref_id="1248216" ref_url="https://bugzilla.suse.com/1248216" source="BUGZILLA"/>
		<reference ref_id="1248217" ref_url="https://bugzilla.suse.com/1248217" source="BUGZILLA"/>
		<reference ref_id="1248222" ref_url="https://bugzilla.suse.com/1248222" source="BUGZILLA"/>
		<reference ref_id="1248227" ref_url="https://bugzilla.suse.com/1248227" source="BUGZILLA"/>
		<reference ref_id="1248228" ref_url="https://bugzilla.suse.com/1248228" source="BUGZILLA"/>
		<reference ref_id="1248229" ref_url="https://bugzilla.suse.com/1248229" source="BUGZILLA"/>
		<reference ref_id="1248232" ref_url="https://bugzilla.suse.com/1248232" source="BUGZILLA"/>
		<reference ref_id="1248234" ref_url="https://bugzilla.suse.com/1248234" source="BUGZILLA"/>
		<reference ref_id="1248240" ref_url="https://bugzilla.suse.com/1248240" source="BUGZILLA"/>
		<reference ref_id="1248360" ref_url="https://bugzilla.suse.com/1248360" source="BUGZILLA"/>
		<reference ref_id="1248366" ref_url="https://bugzilla.suse.com/1248366" source="BUGZILLA"/>
		<reference ref_id="1248384" ref_url="https://bugzilla.suse.com/1248384" source="BUGZILLA"/>
		<reference ref_id="1248626" ref_url="https://bugzilla.suse.com/1248626" source="BUGZILLA"/>
		<reference ref_id="1249307" ref_url="https://bugzilla.suse.com/1249307" source="BUGZILLA"/>
		<reference ref_id="1249609" ref_url="https://bugzilla.suse.com/1249609" source="BUGZILLA"/>
		<reference ref_id="1249895" ref_url="https://bugzilla.suse.com/1249895" source="BUGZILLA"/>
		<reference ref_id="1249998" ref_url="https://bugzilla.suse.com/1249998" source="BUGZILLA"/>
		<reference ref_id="1250032" ref_url="https://bugzilla.suse.com/1250032" source="BUGZILLA"/>
		<reference ref_id="1250082" ref_url="https://bugzilla.suse.com/1250082" source="BUGZILLA"/>
		<reference ref_id="1250388" ref_url="https://bugzilla.suse.com/1250388" source="BUGZILLA"/>
		<reference ref_id="1250705" ref_url="https://bugzilla.suse.com/1250705" source="BUGZILLA"/>
		<reference ref_id="1250738" ref_url="https://bugzilla.suse.com/1250738" source="BUGZILLA"/>
		<reference ref_id="1250748" ref_url="https://bugzilla.suse.com/1250748" source="BUGZILLA"/>
		<reference ref_id="1252712" ref_url="https://bugzilla.suse.com/1252712" source="BUGZILLA"/>
		<reference ref_id="1252773" ref_url="https://bugzilla.suse.com/1252773" source="BUGZILLA"/>
		<reference ref_id="1252784" ref_url="https://bugzilla.suse.com/1252784" source="BUGZILLA"/>
		<reference ref_id="1252891" ref_url="https://bugzilla.suse.com/1252891" source="BUGZILLA"/>
		<reference ref_id="1252900" ref_url="https://bugzilla.suse.com/1252900" source="BUGZILLA"/>
		<reference ref_id="1253049" ref_url="https://bugzilla.suse.com/1253049" source="BUGZILLA"/>
		<reference ref_id="1253078" ref_url="https://bugzilla.suse.com/1253078" source="BUGZILLA"/>
		<reference ref_id="1253079" ref_url="https://bugzilla.suse.com/1253079" source="BUGZILLA"/>
		<reference ref_id="1253087" ref_url="https://bugzilla.suse.com/1253087" source="BUGZILLA"/>
		<reference ref_id="1253344" ref_url="https://bugzilla.suse.com/1253344" source="BUGZILLA"/>
		<reference ref_id="1253500" ref_url="https://bugzilla.suse.com/1253500" source="BUGZILLA"/>
		<reference ref_id="1253739" ref_url="https://bugzilla.suse.com/1253739" source="BUGZILLA"/>
		<reference ref_id="1254244" ref_url="https://bugzilla.suse.com/1254244" source="BUGZILLA"/>
		<reference ref_id="1254308" ref_url="https://bugzilla.suse.com/1254308" source="BUGZILLA"/>
		<reference ref_id="1254447" ref_url="https://bugzilla.suse.com/1254447" source="BUGZILLA"/>
		<reference ref_id="1254839" ref_url="https://bugzilla.suse.com/1254839" source="BUGZILLA"/>
		<reference ref_id="1254842" ref_url="https://bugzilla.suse.com/1254842" source="BUGZILLA"/>
		<reference ref_id="1254845" ref_url="https://bugzilla.suse.com/1254845" source="BUGZILLA"/>
		<reference ref_id="1254977" ref_url="https://bugzilla.suse.com/1254977" source="BUGZILLA"/>
		<reference ref_id="1255102" ref_url="https://bugzilla.suse.com/1255102" source="BUGZILLA"/>
		<reference ref_id="1255128" ref_url="https://bugzilla.suse.com/1255128" source="BUGZILLA"/>
		<reference ref_id="1255157" ref_url="https://bugzilla.suse.com/1255157" source="BUGZILLA"/>
		<reference ref_id="1255164" ref_url="https://bugzilla.suse.com/1255164" source="BUGZILLA"/>
		<reference ref_id="1255172" ref_url="https://bugzilla.suse.com/1255172" source="BUGZILLA"/>
		<reference ref_id="1255216" ref_url="https://bugzilla.suse.com/1255216" source="BUGZILLA"/>
		<reference ref_id="1255232" ref_url="https://bugzilla.suse.com/1255232" source="BUGZILLA"/>
		<reference ref_id="1255241" ref_url="https://bugzilla.suse.com/1255241" source="BUGZILLA"/>
		<reference ref_id="1255245" ref_url="https://bugzilla.suse.com/1255245" source="BUGZILLA"/>
		<reference ref_id="1255266" ref_url="https://bugzilla.suse.com/1255266" source="BUGZILLA"/>
		<reference ref_id="1255268" ref_url="https://bugzilla.suse.com/1255268" source="BUGZILLA"/>
		<reference ref_id="1255269" ref_url="https://bugzilla.suse.com/1255269" source="BUGZILLA"/>
		<reference ref_id="1255319" ref_url="https://bugzilla.suse.com/1255319" source="BUGZILLA"/>
		<reference ref_id="1255327" ref_url="https://bugzilla.suse.com/1255327" source="BUGZILLA"/>
		<reference ref_id="1255346" ref_url="https://bugzilla.suse.com/1255346" source="BUGZILLA"/>
		<reference ref_id="1255403" ref_url="https://bugzilla.suse.com/1255403" source="BUGZILLA"/>
		<reference ref_id="1255417" ref_url="https://bugzilla.suse.com/1255417" source="BUGZILLA"/>
		<reference ref_id="1255459" ref_url="https://bugzilla.suse.com/1255459" source="BUGZILLA"/>
		<reference ref_id="1255482" ref_url="https://bugzilla.suse.com/1255482" source="BUGZILLA"/>
		<reference ref_id="1255506" ref_url="https://bugzilla.suse.com/1255506" source="BUGZILLA"/>
		<reference ref_id="1255526" ref_url="https://bugzilla.suse.com/1255526" source="BUGZILLA"/>
		<reference ref_id="1255527" ref_url="https://bugzilla.suse.com/1255527" source="BUGZILLA"/>
		<reference ref_id="1255529" ref_url="https://bugzilla.suse.com/1255529" source="BUGZILLA"/>
		<reference ref_id="1255530" ref_url="https://bugzilla.suse.com/1255530" source="BUGZILLA"/>
		<reference ref_id="1255536" ref_url="https://bugzilla.suse.com/1255536" source="BUGZILLA"/>
		<reference ref_id="1255537" ref_url="https://bugzilla.suse.com/1255537" source="BUGZILLA"/>
		<reference ref_id="1255542" ref_url="https://bugzilla.suse.com/1255542" source="BUGZILLA"/>
		<reference ref_id="1255544" ref_url="https://bugzilla.suse.com/1255544" source="BUGZILLA"/>
		<reference ref_id="1255547" ref_url="https://bugzilla.suse.com/1255547" source="BUGZILLA"/>
		<reference ref_id="1255569" ref_url="https://bugzilla.suse.com/1255569" source="BUGZILLA"/>
		<reference ref_id="1255593" ref_url="https://bugzilla.suse.com/1255593" source="BUGZILLA"/>
		<reference ref_id="1255622" ref_url="https://bugzilla.suse.com/1255622" source="BUGZILLA"/>
		<reference ref_id="1255694" ref_url="https://bugzilla.suse.com/1255694" source="BUGZILLA"/>
		<reference ref_id="1255695" ref_url="https://bugzilla.suse.com/1255695" source="BUGZILLA"/>
		<reference ref_id="1255703" ref_url="https://bugzilla.suse.com/1255703" source="BUGZILLA"/>
		<reference ref_id="1255708" ref_url="https://bugzilla.suse.com/1255708" source="BUGZILLA"/>
		<reference ref_id="1255811" ref_url="https://bugzilla.suse.com/1255811" source="BUGZILLA"/>
		<reference ref_id="1255930" ref_url="https://bugzilla.suse.com/1255930" source="BUGZILLA"/>
		<reference ref_id="1256579" ref_url="https://bugzilla.suse.com/1256579" source="BUGZILLA"/>
		<reference ref_id="1256582" ref_url="https://bugzilla.suse.com/1256582" source="BUGZILLA"/>
		<reference ref_id="1256584" ref_url="https://bugzilla.suse.com/1256584" source="BUGZILLA"/>
		<reference ref_id="1256586" ref_url="https://bugzilla.suse.com/1256586" source="BUGZILLA"/>
		<reference ref_id="1256591" ref_url="https://bugzilla.suse.com/1256591" source="BUGZILLA"/>
		<reference ref_id="1256592" ref_url="https://bugzilla.suse.com/1256592" source="BUGZILLA"/>
		<reference ref_id="1256593" ref_url="https://bugzilla.suse.com/1256593" source="BUGZILLA"/>
		<reference ref_id="1256594" ref_url="https://bugzilla.suse.com/1256594" source="BUGZILLA"/>
		<reference ref_id="1256597" ref_url="https://bugzilla.suse.com/1256597" source="BUGZILLA"/>
		<reference ref_id="1256605" ref_url="https://bugzilla.suse.com/1256605" source="BUGZILLA"/>
		<reference ref_id="1256607" ref_url="https://bugzilla.suse.com/1256607" source="BUGZILLA"/>
		<reference ref_id="1256608" ref_url="https://bugzilla.suse.com/1256608" source="BUGZILLA"/>
		<reference ref_id="1256609" ref_url="https://bugzilla.suse.com/1256609" source="BUGZILLA"/>
		<reference ref_id="1256610" ref_url="https://bugzilla.suse.com/1256610" source="BUGZILLA"/>
		<reference ref_id="1256611" ref_url="https://bugzilla.suse.com/1256611" source="BUGZILLA"/>
		<reference ref_id="1256612" ref_url="https://bugzilla.suse.com/1256612" source="BUGZILLA"/>
		<reference ref_id="1256613" ref_url="https://bugzilla.suse.com/1256613" source="BUGZILLA"/>
		<reference ref_id="1256616" ref_url="https://bugzilla.suse.com/1256616" source="BUGZILLA"/>
		<reference ref_id="1256617" ref_url="https://bugzilla.suse.com/1256617" source="BUGZILLA"/>
		<reference ref_id="1256619" ref_url="https://bugzilla.suse.com/1256619" source="BUGZILLA"/>
		<reference ref_id="1256622" ref_url="https://bugzilla.suse.com/1256622" source="BUGZILLA"/>
		<reference ref_id="1256623" ref_url="https://bugzilla.suse.com/1256623" source="BUGZILLA"/>
		<reference ref_id="1256625" ref_url="https://bugzilla.suse.com/1256625" source="BUGZILLA"/>
		<reference ref_id="1256627" ref_url="https://bugzilla.suse.com/1256627" source="BUGZILLA"/>
		<reference ref_id="1256628" ref_url="https://bugzilla.suse.com/1256628" source="BUGZILLA"/>
		<reference ref_id="1256630" ref_url="https://bugzilla.suse.com/1256630" source="BUGZILLA"/>
		<reference ref_id="1256632" ref_url="https://bugzilla.suse.com/1256632" source="BUGZILLA"/>
		<reference ref_id="1256638" ref_url="https://bugzilla.suse.com/1256638" source="BUGZILLA"/>
		<reference ref_id="1256641" ref_url="https://bugzilla.suse.com/1256641" source="BUGZILLA"/>
		<reference ref_id="1256643" ref_url="https://bugzilla.suse.com/1256643" source="BUGZILLA"/>
		<reference ref_id="1256645" ref_url="https://bugzilla.suse.com/1256645" source="BUGZILLA"/>
		<reference ref_id="1256646" ref_url="https://bugzilla.suse.com/1256646" source="BUGZILLA"/>
		<reference ref_id="1256650" ref_url="https://bugzilla.suse.com/1256650" source="BUGZILLA"/>
		<reference ref_id="1256651" ref_url="https://bugzilla.suse.com/1256651" source="BUGZILLA"/>
		<reference ref_id="1256653" ref_url="https://bugzilla.suse.com/1256653" source="BUGZILLA"/>
		<reference ref_id="1256654" ref_url="https://bugzilla.suse.com/1256654" source="BUGZILLA"/>
		<reference ref_id="1256655" ref_url="https://bugzilla.suse.com/1256655" source="BUGZILLA"/>
		<reference ref_id="1256656" ref_url="https://bugzilla.suse.com/1256656" source="BUGZILLA"/>
		<reference ref_id="1256659" ref_url="https://bugzilla.suse.com/1256659" source="BUGZILLA"/>
		<reference ref_id="1256660" ref_url="https://bugzilla.suse.com/1256660" source="BUGZILLA"/>
		<reference ref_id="1256661" ref_url="https://bugzilla.suse.com/1256661" source="BUGZILLA"/>
		<reference ref_id="1256664" ref_url="https://bugzilla.suse.com/1256664" source="BUGZILLA"/>
		<reference ref_id="1256665" ref_url="https://bugzilla.suse.com/1256665" source="BUGZILLA"/>
		<reference ref_id="1256667" ref_url="https://bugzilla.suse.com/1256667" source="BUGZILLA"/>
		<reference ref_id="1256668" ref_url="https://bugzilla.suse.com/1256668" source="BUGZILLA"/>
		<reference ref_id="1256674" ref_url="https://bugzilla.suse.com/1256674" source="BUGZILLA"/>
		<reference ref_id="1256677" ref_url="https://bugzilla.suse.com/1256677" source="BUGZILLA"/>
		<reference ref_id="1256680" ref_url="https://bugzilla.suse.com/1256680" source="BUGZILLA"/>
		<reference ref_id="1256682" ref_url="https://bugzilla.suse.com/1256682" source="BUGZILLA"/>
		<reference ref_id="1256683" ref_url="https://bugzilla.suse.com/1256683" source="BUGZILLA"/>
		<reference ref_id="1256688" ref_url="https://bugzilla.suse.com/1256688" source="BUGZILLA"/>
		<reference ref_id="1256689" ref_url="https://bugzilla.suse.com/1256689" source="BUGZILLA"/>
		<reference ref_id="1256716" ref_url="https://bugzilla.suse.com/1256716" source="BUGZILLA"/>
		<reference ref_id="1256726" ref_url="https://bugzilla.suse.com/1256726" source="BUGZILLA"/>
		<reference ref_id="1256728" ref_url="https://bugzilla.suse.com/1256728" source="BUGZILLA"/>
		<reference ref_id="1256730" ref_url="https://bugzilla.suse.com/1256730" source="BUGZILLA"/>
		<reference ref_id="1256733" ref_url="https://bugzilla.suse.com/1256733" source="BUGZILLA"/>
		<reference ref_id="1256737" ref_url="https://bugzilla.suse.com/1256737" source="BUGZILLA"/>
		<reference ref_id="1256741" ref_url="https://bugzilla.suse.com/1256741" source="BUGZILLA"/>
		<reference ref_id="1256742" ref_url="https://bugzilla.suse.com/1256742" source="BUGZILLA"/>
		<reference ref_id="1256744" ref_url="https://bugzilla.suse.com/1256744" source="BUGZILLA"/>
		<reference ref_id="1256748" ref_url="https://bugzilla.suse.com/1256748" source="BUGZILLA"/>
		<reference ref_id="1256749" ref_url="https://bugzilla.suse.com/1256749" source="BUGZILLA"/>
		<reference ref_id="1256752" ref_url="https://bugzilla.suse.com/1256752" source="BUGZILLA"/>
		<reference ref_id="1256754" ref_url="https://bugzilla.suse.com/1256754" source="BUGZILLA"/>
		<reference ref_id="1256755" ref_url="https://bugzilla.suse.com/1256755" source="BUGZILLA"/>
		<reference ref_id="1256756" ref_url="https://bugzilla.suse.com/1256756" source="BUGZILLA"/>
		<reference ref_id="1256757" ref_url="https://bugzilla.suse.com/1256757" source="BUGZILLA"/>
		<reference ref_id="1256759" ref_url="https://bugzilla.suse.com/1256759" source="BUGZILLA"/>
		<reference ref_id="1256760" ref_url="https://bugzilla.suse.com/1256760" source="BUGZILLA"/>
		<reference ref_id="1256761" ref_url="https://bugzilla.suse.com/1256761" source="BUGZILLA"/>
		<reference ref_id="1256763" ref_url="https://bugzilla.suse.com/1256763" source="BUGZILLA"/>
		<reference ref_id="1256770" ref_url="https://bugzilla.suse.com/1256770" source="BUGZILLA"/>
		<reference ref_id="1256773" ref_url="https://bugzilla.suse.com/1256773" source="BUGZILLA"/>
		<reference ref_id="1256774" ref_url="https://bugzilla.suse.com/1256774" source="BUGZILLA"/>
		<reference ref_id="1256777" ref_url="https://bugzilla.suse.com/1256777" source="BUGZILLA"/>
		<reference ref_id="1256779" ref_url="https://bugzilla.suse.com/1256779" source="BUGZILLA"/>
		<reference ref_id="1256781" ref_url="https://bugzilla.suse.com/1256781" source="BUGZILLA"/>
		<reference ref_id="1256785" ref_url="https://bugzilla.suse.com/1256785" source="BUGZILLA"/>
		<reference ref_id="1256792" ref_url="https://bugzilla.suse.com/1256792" source="BUGZILLA"/>
		<reference ref_id="1256793" ref_url="https://bugzilla.suse.com/1256793" source="BUGZILLA"/>
		<reference ref_id="1256794" ref_url="https://bugzilla.suse.com/1256794" source="BUGZILLA"/>
		<reference ref_id="1256864" ref_url="https://bugzilla.suse.com/1256864" source="BUGZILLA"/>
		<reference ref_id="1256865" ref_url="https://bugzilla.suse.com/1256865" source="BUGZILLA"/>
		<reference ref_id="1256867" ref_url="https://bugzilla.suse.com/1256867" source="BUGZILLA"/>
		<reference ref_id="1256975" ref_url="https://bugzilla.suse.com/1256975" source="BUGZILLA"/>
		<reference ref_id="1257015" ref_url="https://bugzilla.suse.com/1257015" source="BUGZILLA"/>
		<reference ref_id="1257035" ref_url="https://bugzilla.suse.com/1257035" source="BUGZILLA"/>
		<reference ref_id="1257053" ref_url="https://bugzilla.suse.com/1257053" source="BUGZILLA"/>
		<reference ref_id="1257154" ref_url="https://bugzilla.suse.com/1257154" source="BUGZILLA"/>
		<reference ref_id="1257155" ref_url="https://bugzilla.suse.com/1257155" source="BUGZILLA"/>
		<reference ref_id="1257158" ref_url="https://bugzilla.suse.com/1257158" source="BUGZILLA"/>
		<reference ref_id="1257159" ref_url="https://bugzilla.suse.com/1257159" source="BUGZILLA"/>
		<reference ref_id="1257163" ref_url="https://bugzilla.suse.com/1257163" source="BUGZILLA"/>
		<reference ref_id="1257164" ref_url="https://bugzilla.suse.com/1257164" source="BUGZILLA"/>
		<reference ref_id="1257167" ref_url="https://bugzilla.suse.com/1257167" source="BUGZILLA"/>
		<reference ref_id="1257168" ref_url="https://bugzilla.suse.com/1257168" source="BUGZILLA"/>
		<reference ref_id="1257179" ref_url="https://bugzilla.suse.com/1257179" source="BUGZILLA"/>
		<reference ref_id="1257180" ref_url="https://bugzilla.suse.com/1257180" source="BUGZILLA"/>
		<reference ref_id="1257202" ref_url="https://bugzilla.suse.com/1257202" source="BUGZILLA"/>
		<reference ref_id="1257204" ref_url="https://bugzilla.suse.com/1257204" source="BUGZILLA"/>
		<reference ref_id="1257207" ref_url="https://bugzilla.suse.com/1257207" source="BUGZILLA"/>
		<reference ref_id="1257208" ref_url="https://bugzilla.suse.com/1257208" source="BUGZILLA"/>
		<reference ref_id="1257215" ref_url="https://bugzilla.suse.com/1257215" source="BUGZILLA"/>
		<reference ref_id="1257217" ref_url="https://bugzilla.suse.com/1257217" source="BUGZILLA"/>
		<reference ref_id="1257218" ref_url="https://bugzilla.suse.com/1257218" source="BUGZILLA"/>
		<reference ref_id="1257220" ref_url="https://bugzilla.suse.com/1257220" source="BUGZILLA"/>
		<reference ref_id="1257221" ref_url="https://bugzilla.suse.com/1257221" source="BUGZILLA"/>
		<reference ref_id="1257225" ref_url="https://bugzilla.suse.com/1257225" source="BUGZILLA"/>
		<reference ref_id="1257227" ref_url="https://bugzilla.suse.com/1257227" source="BUGZILLA"/>
		<reference ref_id="1257232" ref_url="https://bugzilla.suse.com/1257232" source="BUGZILLA"/>
		<reference ref_id="1257234" ref_url="https://bugzilla.suse.com/1257234" source="BUGZILLA"/>
		<reference ref_id="1257236" ref_url="https://bugzilla.suse.com/1257236" source="BUGZILLA"/>
		<reference ref_id="1257243" ref_url="https://bugzilla.suse.com/1257243" source="BUGZILLA"/>
		<reference ref_id="1257245" ref_url="https://bugzilla.suse.com/1257245" source="BUGZILLA"/>
		<reference ref_id="1257276" ref_url="https://bugzilla.suse.com/1257276" source="BUGZILLA"/>
		<reference ref_id="1257277" ref_url="https://bugzilla.suse.com/1257277" source="BUGZILLA"/>
		<reference ref_id="1257279" ref_url="https://bugzilla.suse.com/1257279" source="BUGZILLA"/>
		<reference ref_id="1257282" ref_url="https://bugzilla.suse.com/1257282" source="BUGZILLA"/>
		<reference ref_id="1257296" ref_url="https://bugzilla.suse.com/1257296" source="BUGZILLA"/>
		<reference ref_id="1257309" ref_url="https://bugzilla.suse.com/1257309" source="BUGZILLA"/>
		<reference ref_id="1257473" ref_url="https://bugzilla.suse.com/1257473" source="BUGZILLA"/>
		<reference ref_id="1257504" ref_url="https://bugzilla.suse.com/1257504" source="BUGZILLA"/>
		<reference ref_id="1257603" ref_url="https://bugzilla.suse.com/1257603" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-54031" ref_url="https://www.suse.com/security/cve/CVE-2024-54031/" source="CVE"/>
		<reference ref_id="CVE-2025-37744" ref_url="https://www.suse.com/security/cve/CVE-2025-37744/" source="CVE"/>
		<reference ref_id="CVE-2025-37751" ref_url="https://www.suse.com/security/cve/CVE-2025-37751/" source="CVE"/>
		<reference ref_id="CVE-2025-37841" ref_url="https://www.suse.com/security/cve/CVE-2025-37841/" source="CVE"/>
		<reference ref_id="CVE-2025-37845" ref_url="https://www.suse.com/security/cve/CVE-2025-37845/" source="CVE"/>
		<reference ref_id="CVE-2025-37904" ref_url="https://www.suse.com/security/cve/CVE-2025-37904/" source="CVE"/>
		<reference ref_id="CVE-2025-37955" ref_url="https://www.suse.com/security/cve/CVE-2025-37955/" source="CVE"/>
		<reference ref_id="CVE-2025-38243" ref_url="https://www.suse.com/security/cve/CVE-2025-38243/" source="CVE"/>
		<reference ref_id="CVE-2025-38262" ref_url="https://www.suse.com/security/cve/CVE-2025-38262/" source="CVE"/>
		<reference ref_id="CVE-2025-38297" ref_url="https://www.suse.com/security/cve/CVE-2025-38297/" source="CVE"/>
		<reference ref_id="CVE-2025-38298" ref_url="https://www.suse.com/security/cve/CVE-2025-38298/" source="CVE"/>
		<reference ref_id="CVE-2025-38379" ref_url="https://www.suse.com/security/cve/CVE-2025-38379/" source="CVE"/>
		<reference ref_id="CVE-2025-38423" ref_url="https://www.suse.com/security/cve/CVE-2025-38423/" source="CVE"/>
		<reference ref_id="CVE-2025-38505" ref_url="https://www.suse.com/security/cve/CVE-2025-38505/" source="CVE"/>
		<reference ref_id="CVE-2025-38507" ref_url="https://www.suse.com/security/cve/CVE-2025-38507/" source="CVE"/>
		<reference ref_id="CVE-2025-38510" ref_url="https://www.suse.com/security/cve/CVE-2025-38510/" source="CVE"/>
		<reference ref_id="CVE-2025-38511" ref_url="https://www.suse.com/security/cve/CVE-2025-38511/" source="CVE"/>
		<reference ref_id="CVE-2025-38512" ref_url="https://www.suse.com/security/cve/CVE-2025-38512/" source="CVE"/>
		<reference ref_id="CVE-2025-38513" ref_url="https://www.suse.com/security/cve/CVE-2025-38513/" source="CVE"/>
		<reference ref_id="CVE-2025-38515" ref_url="https://www.suse.com/security/cve/CVE-2025-38515/" source="CVE"/>
		<reference ref_id="CVE-2025-38516" ref_url="https://www.suse.com/security/cve/CVE-2025-38516/" source="CVE"/>
		<reference ref_id="CVE-2025-38520" ref_url="https://www.suse.com/security/cve/CVE-2025-38520/" source="CVE"/>
		<reference ref_id="CVE-2025-38521" ref_url="https://www.suse.com/security/cve/CVE-2025-38521/" source="CVE"/>
		<reference ref_id="CVE-2025-38529" ref_url="https://www.suse.com/security/cve/CVE-2025-38529/" source="CVE"/>
		<reference ref_id="CVE-2025-38530" ref_url="https://www.suse.com/security/cve/CVE-2025-38530/" source="CVE"/>
		<reference ref_id="CVE-2025-38535" ref_url="https://www.suse.com/security/cve/CVE-2025-38535/" source="CVE"/>
		<reference ref_id="CVE-2025-38537" ref_url="https://www.suse.com/security/cve/CVE-2025-38537/" source="CVE"/>
		<reference ref_id="CVE-2025-38538" ref_url="https://www.suse.com/security/cve/CVE-2025-38538/" source="CVE"/>
		<reference ref_id="CVE-2025-38539" ref_url="https://www.suse.com/security/cve/CVE-2025-38539/" source="CVE"/>
		<reference ref_id="CVE-2025-38540" ref_url="https://www.suse.com/security/cve/CVE-2025-38540/" source="CVE"/>
		<reference ref_id="CVE-2025-38541" ref_url="https://www.suse.com/security/cve/CVE-2025-38541/" source="CVE"/>
		<reference ref_id="CVE-2025-38543" ref_url="https://www.suse.com/security/cve/CVE-2025-38543/" source="CVE"/>
		<reference ref_id="CVE-2025-38547" ref_url="https://www.suse.com/security/cve/CVE-2025-38547/" source="CVE"/>
		<reference ref_id="CVE-2025-38548" ref_url="https://www.suse.com/security/cve/CVE-2025-38548/" source="CVE"/>
		<reference ref_id="CVE-2025-38550" ref_url="https://www.suse.com/security/cve/CVE-2025-38550/" source="CVE"/>
		<reference ref_id="CVE-2025-38551" ref_url="https://www.suse.com/security/cve/CVE-2025-38551/" source="CVE"/>
		<reference ref_id="CVE-2025-38569" ref_url="https://www.suse.com/security/cve/CVE-2025-38569/" source="CVE"/>
		<reference ref_id="CVE-2025-38589" ref_url="https://www.suse.com/security/cve/CVE-2025-38589/" source="CVE"/>
		<reference ref_id="CVE-2025-38590" ref_url="https://www.suse.com/security/cve/CVE-2025-38590/" source="CVE"/>
		<reference ref_id="CVE-2025-38645" ref_url="https://www.suse.com/security/cve/CVE-2025-38645/" source="CVE"/>
		<reference ref_id="CVE-2025-39689" ref_url="https://www.suse.com/security/cve/CVE-2025-39689/" source="CVE"/>
		<reference ref_id="CVE-2025-39795" ref_url="https://www.suse.com/security/cve/CVE-2025-39795/" source="CVE"/>
		<reference ref_id="CVE-2025-39813" ref_url="https://www.suse.com/security/cve/CVE-2025-39813/" source="CVE"/>
		<reference ref_id="CVE-2025-39814" ref_url="https://www.suse.com/security/cve/CVE-2025-39814/" source="CVE"/>
		<reference ref_id="CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817/" source="CVE"/>
		<reference ref_id="CVE-2025-39829" ref_url="https://www.suse.com/security/cve/CVE-2025-39829/" source="CVE"/>
		<reference ref_id="CVE-2025-39880" ref_url="https://www.suse.com/security/cve/CVE-2025-39880/" source="CVE"/>
		<reference ref_id="CVE-2025-39913" ref_url="https://www.suse.com/security/cve/CVE-2025-39913/" source="CVE"/>
		<reference ref_id="CVE-2025-39927" ref_url="https://www.suse.com/security/cve/CVE-2025-39927/" source="CVE"/>
		<reference ref_id="CVE-2025-40030" ref_url="https://www.suse.com/security/cve/CVE-2025-40030/" source="CVE"/>
		<reference ref_id="CVE-2025-40045" ref_url="https://www.suse.com/security/cve/CVE-2025-40045/" source="CVE"/>
		<reference ref_id="CVE-2025-40097" ref_url="https://www.suse.com/security/cve/CVE-2025-40097/" source="CVE"/>
		<reference ref_id="CVE-2025-40106" ref_url="https://www.suse.com/security/cve/CVE-2025-40106/" source="CVE"/>
		<reference ref_id="CVE-2025-40147" ref_url="https://www.suse.com/security/cve/CVE-2025-40147/" source="CVE"/>
		<reference ref_id="CVE-2025-40195" ref_url="https://www.suse.com/security/cve/CVE-2025-40195/" source="CVE"/>
		<reference ref_id="CVE-2025-40257" ref_url="https://www.suse.com/security/cve/CVE-2025-40257/" source="CVE"/>
		<reference ref_id="CVE-2025-40259" ref_url="https://www.suse.com/security/cve/CVE-2025-40259/" source="CVE"/>
		<reference ref_id="CVE-2025-40261" ref_url="https://www.suse.com/security/cve/CVE-2025-40261/" source="CVE"/>
		<reference ref_id="CVE-2025-40363" ref_url="https://www.suse.com/security/cve/CVE-2025-40363/" source="CVE"/>
		<reference ref_id="CVE-2025-68174" ref_url="https://www.suse.com/security/cve/CVE-2025-68174/" source="CVE"/>
		<reference ref_id="CVE-2025-68178" ref_url="https://www.suse.com/security/cve/CVE-2025-68178/" source="CVE"/>
		<reference ref_id="CVE-2025-68188" ref_url="https://www.suse.com/security/cve/CVE-2025-68188/" source="CVE"/>
		<reference ref_id="CVE-2025-68200" ref_url="https://www.suse.com/security/cve/CVE-2025-68200/" source="CVE"/>
		<reference ref_id="CVE-2025-68211" ref_url="https://www.suse.com/security/cve/CVE-2025-68211/" source="CVE"/>
		<reference ref_id="CVE-2025-68218" ref_url="https://www.suse.com/security/cve/CVE-2025-68218/" source="CVE"/>
		<reference ref_id="CVE-2025-68227" ref_url="https://www.suse.com/security/cve/CVE-2025-68227/" source="CVE"/>
		<reference ref_id="CVE-2025-68241" ref_url="https://www.suse.com/security/cve/CVE-2025-68241/" source="CVE"/>
		<reference ref_id="CVE-2025-68245" ref_url="https://www.suse.com/security/cve/CVE-2025-68245/" source="CVE"/>
		<reference ref_id="CVE-2025-68261" ref_url="https://www.suse.com/security/cve/CVE-2025-68261/" source="CVE"/>
		<reference ref_id="CVE-2025-68296" ref_url="https://www.suse.com/security/cve/CVE-2025-68296/" source="CVE"/>
		<reference ref_id="CVE-2025-68297" ref_url="https://www.suse.com/security/cve/CVE-2025-68297/" source="CVE"/>
		<reference ref_id="CVE-2025-68320" ref_url="https://www.suse.com/security/cve/CVE-2025-68320/" source="CVE"/>
		<reference ref_id="CVE-2025-68325" ref_url="https://www.suse.com/security/cve/CVE-2025-68325/" source="CVE"/>
		<reference ref_id="CVE-2025-68337" ref_url="https://www.suse.com/security/cve/CVE-2025-68337/" source="CVE"/>
		<reference ref_id="CVE-2025-68341" ref_url="https://www.suse.com/security/cve/CVE-2025-68341/" source="CVE"/>
		<reference ref_id="CVE-2025-68348" ref_url="https://www.suse.com/security/cve/CVE-2025-68348/" source="CVE"/>
		<reference ref_id="CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349/" source="CVE"/>
		<reference ref_id="CVE-2025-68356" ref_url="https://www.suse.com/security/cve/CVE-2025-68356/" source="CVE"/>
		<reference ref_id="CVE-2025-68359" ref_url="https://www.suse.com/security/cve/CVE-2025-68359/" source="CVE"/>
		<reference ref_id="CVE-2025-68360" ref_url="https://www.suse.com/security/cve/CVE-2025-68360/" source="CVE"/>
		<reference ref_id="CVE-2025-68361" ref_url="https://www.suse.com/security/cve/CVE-2025-68361/" source="CVE"/>
		<reference ref_id="CVE-2025-68366" ref_url="https://www.suse.com/security/cve/CVE-2025-68366/" source="CVE"/>
		<reference ref_id="CVE-2025-68367" ref_url="https://www.suse.com/security/cve/CVE-2025-68367/" source="CVE"/>
		<reference ref_id="CVE-2025-68368" ref_url="https://www.suse.com/security/cve/CVE-2025-68368/" source="CVE"/>
		<reference ref_id="CVE-2025-68372" ref_url="https://www.suse.com/security/cve/CVE-2025-68372/" source="CVE"/>
		<reference ref_id="CVE-2025-68374" ref_url="https://www.suse.com/security/cve/CVE-2025-68374/" source="CVE"/>
		<reference ref_id="CVE-2025-68376" ref_url="https://www.suse.com/security/cve/CVE-2025-68376/" source="CVE"/>
		<reference ref_id="CVE-2025-68379" ref_url="https://www.suse.com/security/cve/CVE-2025-68379/" source="CVE"/>
		<reference ref_id="CVE-2025-68725" ref_url="https://www.suse.com/security/cve/CVE-2025-68725/" source="CVE"/>
		<reference ref_id="CVE-2025-68735" ref_url="https://www.suse.com/security/cve/CVE-2025-68735/" source="CVE"/>
		<reference ref_id="CVE-2025-68741" ref_url="https://www.suse.com/security/cve/CVE-2025-68741/" source="CVE"/>
		<reference ref_id="CVE-2025-68743" ref_url="https://www.suse.com/security/cve/CVE-2025-68743/" source="CVE"/>
		<reference ref_id="CVE-2025-68764" ref_url="https://www.suse.com/security/cve/CVE-2025-68764/" source="CVE"/>
		<reference ref_id="CVE-2025-68768" ref_url="https://www.suse.com/security/cve/CVE-2025-68768/" source="CVE"/>
		<reference ref_id="CVE-2025-68770" ref_url="https://www.suse.com/security/cve/CVE-2025-68770/" source="CVE"/>
		<reference ref_id="CVE-2025-68771" ref_url="https://www.suse.com/security/cve/CVE-2025-68771/" source="CVE"/>
		<reference ref_id="CVE-2025-68773" ref_url="https://www.suse.com/security/cve/CVE-2025-68773/" source="CVE"/>
		<reference ref_id="CVE-2025-68775" ref_url="https://www.suse.com/security/cve/CVE-2025-68775/" source="CVE"/>
		<reference ref_id="CVE-2025-68776" ref_url="https://www.suse.com/security/cve/CVE-2025-68776/" source="CVE"/>
		<reference ref_id="CVE-2025-68777" ref_url="https://www.suse.com/security/cve/CVE-2025-68777/" source="CVE"/>
		<reference ref_id="CVE-2025-68778" ref_url="https://www.suse.com/security/cve/CVE-2025-68778/" source="CVE"/>
		<reference ref_id="CVE-2025-68783" ref_url="https://www.suse.com/security/cve/CVE-2025-68783/" source="CVE"/>
		<reference ref_id="CVE-2025-68784" ref_url="https://www.suse.com/security/cve/CVE-2025-68784/" source="CVE"/>
		<reference ref_id="CVE-2025-68788" ref_url="https://www.suse.com/security/cve/CVE-2025-68788/" source="CVE"/>
		<reference ref_id="CVE-2025-68789" ref_url="https://www.suse.com/security/cve/CVE-2025-68789/" source="CVE"/>
		<reference ref_id="CVE-2025-68792" ref_url="https://www.suse.com/security/cve/CVE-2025-68792/" source="CVE"/>
		<reference ref_id="CVE-2025-68795" ref_url="https://www.suse.com/security/cve/CVE-2025-68795/" source="CVE"/>
		<reference ref_id="CVE-2025-68797" ref_url="https://www.suse.com/security/cve/CVE-2025-68797/" source="CVE"/>
		<reference ref_id="CVE-2025-68798" ref_url="https://www.suse.com/security/cve/CVE-2025-68798/" source="CVE"/>
		<reference ref_id="CVE-2025-68799" ref_url="https://www.suse.com/security/cve/CVE-2025-68799/" source="CVE"/>
		<reference ref_id="CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800/" source="CVE"/>
		<reference ref_id="CVE-2025-68801" ref_url="https://www.suse.com/security/cve/CVE-2025-68801/" source="CVE"/>
		<reference ref_id="CVE-2025-68802" ref_url="https://www.suse.com/security/cve/CVE-2025-68802/" source="CVE"/>
		<reference ref_id="CVE-2025-68803" ref_url="https://www.suse.com/security/cve/CVE-2025-68803/" source="CVE"/>
		<reference ref_id="CVE-2025-68804" ref_url="https://www.suse.com/security/cve/CVE-2025-68804/" source="CVE"/>
		<reference ref_id="CVE-2025-68808" ref_url="https://www.suse.com/security/cve/CVE-2025-68808/" source="CVE"/>
		<reference ref_id="CVE-2025-68811" ref_url="https://www.suse.com/security/cve/CVE-2025-68811/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-68814" ref_url="https://www.suse.com/security/cve/CVE-2025-68814/" source="CVE"/>
		<reference ref_id="CVE-2025-68815" ref_url="https://www.suse.com/security/cve/CVE-2025-68815/" source="CVE"/>
		<reference ref_id="CVE-2025-68816" ref_url="https://www.suse.com/security/cve/CVE-2025-68816/" source="CVE"/>
		<reference ref_id="CVE-2025-68819" ref_url="https://www.suse.com/security/cve/CVE-2025-68819/" source="CVE"/>
		<reference ref_id="CVE-2025-68820" ref_url="https://www.suse.com/security/cve/CVE-2025-68820/" source="CVE"/>
		<reference ref_id="CVE-2025-68821" ref_url="https://www.suse.com/security/cve/CVE-2025-68821/" source="CVE"/>
		<reference ref_id="CVE-2025-68822" ref_url="https://www.suse.com/security/cve/CVE-2025-68822/" source="CVE"/>
		<reference ref_id="CVE-2025-71064" ref_url="https://www.suse.com/security/cve/CVE-2025-71064/" source="CVE"/>
		<reference ref_id="CVE-2025-71066" ref_url="https://www.suse.com/security/cve/CVE-2025-71066/" source="CVE"/>
		<reference ref_id="CVE-2025-71073" ref_url="https://www.suse.com/security/cve/CVE-2025-71073/" source="CVE"/>
		<reference ref_id="CVE-2025-71076" ref_url="https://www.suse.com/security/cve/CVE-2025-71076/" source="CVE"/>
		<reference ref_id="CVE-2025-71077" ref_url="https://www.suse.com/security/cve/CVE-2025-71077/" source="CVE"/>
		<reference ref_id="CVE-2025-71078" ref_url="https://www.suse.com/security/cve/CVE-2025-71078/" source="CVE"/>
		<reference ref_id="CVE-2025-71079" ref_url="https://www.suse.com/security/cve/CVE-2025-71079/" source="CVE"/>
		<reference ref_id="CVE-2025-71080" ref_url="https://www.suse.com/security/cve/CVE-2025-71080/" source="CVE"/>
		<reference ref_id="CVE-2025-71081" ref_url="https://www.suse.com/security/cve/CVE-2025-71081/" source="CVE"/>
		<reference ref_id="CVE-2025-71082" ref_url="https://www.suse.com/security/cve/CVE-2025-71082/" source="CVE"/>
		<reference ref_id="CVE-2025-71083" ref_url="https://www.suse.com/security/cve/CVE-2025-71083/" source="CVE"/>
		<reference ref_id="CVE-2025-71084" ref_url="https://www.suse.com/security/cve/CVE-2025-71084/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="CVE-2025-71086" ref_url="https://www.suse.com/security/cve/CVE-2025-71086/" source="CVE"/>
		<reference ref_id="CVE-2025-71087" ref_url="https://www.suse.com/security/cve/CVE-2025-71087/" source="CVE"/>
		<reference ref_id="CVE-2025-71088" ref_url="https://www.suse.com/security/cve/CVE-2025-71088/" source="CVE"/>
		<reference ref_id="CVE-2025-71089" ref_url="https://www.suse.com/security/cve/CVE-2025-71089/" source="CVE"/>
		<reference ref_id="CVE-2025-71091" ref_url="https://www.suse.com/security/cve/CVE-2025-71091/" source="CVE"/>
		<reference ref_id="CVE-2025-71093" ref_url="https://www.suse.com/security/cve/CVE-2025-71093/" source="CVE"/>
		<reference ref_id="CVE-2025-71094" ref_url="https://www.suse.com/security/cve/CVE-2025-71094/" source="CVE"/>
		<reference ref_id="CVE-2025-71095" ref_url="https://www.suse.com/security/cve/CVE-2025-71095/" source="CVE"/>
		<reference ref_id="CVE-2025-71097" ref_url="https://www.suse.com/security/cve/CVE-2025-71097/" source="CVE"/>
		<reference ref_id="CVE-2025-71098" ref_url="https://www.suse.com/security/cve/CVE-2025-71098/" source="CVE"/>
		<reference ref_id="CVE-2025-71099" ref_url="https://www.suse.com/security/cve/CVE-2025-71099/" source="CVE"/>
		<reference ref_id="CVE-2025-71100" ref_url="https://www.suse.com/security/cve/CVE-2025-71100/" source="CVE"/>
		<reference ref_id="CVE-2025-71101" ref_url="https://www.suse.com/security/cve/CVE-2025-71101/" source="CVE"/>
		<reference ref_id="CVE-2025-71108" ref_url="https://www.suse.com/security/cve/CVE-2025-71108/" source="CVE"/>
		<reference ref_id="CVE-2025-71111" ref_url="https://www.suse.com/security/cve/CVE-2025-71111/" source="CVE"/>
		<reference ref_id="CVE-2025-71112" ref_url="https://www.suse.com/security/cve/CVE-2025-71112/" source="CVE"/>
		<reference ref_id="CVE-2025-71113" ref_url="https://www.suse.com/security/cve/CVE-2025-71113/" source="CVE"/>
		<reference ref_id="CVE-2025-71114" ref_url="https://www.suse.com/security/cve/CVE-2025-71114/" source="CVE"/>
		<reference ref_id="CVE-2025-71116" ref_url="https://www.suse.com/security/cve/CVE-2025-71116/" source="CVE"/>
		<reference ref_id="CVE-2025-71118" ref_url="https://www.suse.com/security/cve/CVE-2025-71118/" source="CVE"/>
		<reference ref_id="CVE-2025-71119" ref_url="https://www.suse.com/security/cve/CVE-2025-71119/" source="CVE"/>
		<reference ref_id="CVE-2025-71120" ref_url="https://www.suse.com/security/cve/CVE-2025-71120/" source="CVE"/>
		<reference ref_id="CVE-2025-71123" ref_url="https://www.suse.com/security/cve/CVE-2025-71123/" source="CVE"/>
		<reference ref_id="CVE-2025-71126" ref_url="https://www.suse.com/security/cve/CVE-2025-71126/" source="CVE"/>
		<reference ref_id="CVE-2025-71130" ref_url="https://www.suse.com/security/cve/CVE-2025-71130/" source="CVE"/>
		<reference ref_id="CVE-2025-71131" ref_url="https://www.suse.com/security/cve/CVE-2025-71131/" source="CVE"/>
		<reference ref_id="CVE-2025-71132" ref_url="https://www.suse.com/security/cve/CVE-2025-71132/" source="CVE"/>
		<reference ref_id="CVE-2025-71133" ref_url="https://www.suse.com/security/cve/CVE-2025-71133/" source="CVE"/>
		<reference ref_id="CVE-2025-71135" ref_url="https://www.suse.com/security/cve/CVE-2025-71135/" source="CVE"/>
		<reference ref_id="CVE-2025-71136" ref_url="https://www.suse.com/security/cve/CVE-2025-71136/" source="CVE"/>
		<reference ref_id="CVE-2025-71137" ref_url="https://www.suse.com/security/cve/CVE-2025-71137/" source="CVE"/>
		<reference ref_id="CVE-2025-71138" ref_url="https://www.suse.com/security/cve/CVE-2025-71138/" source="CVE"/>
		<reference ref_id="CVE-2025-71141" ref_url="https://www.suse.com/security/cve/CVE-2025-71141/" source="CVE"/>
		<reference ref_id="CVE-2025-71142" ref_url="https://www.suse.com/security/cve/CVE-2025-71142/" source="CVE"/>
		<reference ref_id="CVE-2025-71143" ref_url="https://www.suse.com/security/cve/CVE-2025-71143/" source="CVE"/>
		<reference ref_id="CVE-2025-71145" ref_url="https://www.suse.com/security/cve/CVE-2025-71145/" source="CVE"/>
		<reference ref_id="CVE-2025-71147" ref_url="https://www.suse.com/security/cve/CVE-2025-71147/" source="CVE"/>
		<reference ref_id="CVE-2025-71148" ref_url="https://www.suse.com/security/cve/CVE-2025-71148/" source="CVE"/>
		<reference ref_id="CVE-2025-71149" ref_url="https://www.suse.com/security/cve/CVE-2025-71149/" source="CVE"/>
		<reference ref_id="CVE-2025-71154" ref_url="https://www.suse.com/security/cve/CVE-2025-71154/" source="CVE"/>
		<reference ref_id="CVE-2025-71156" ref_url="https://www.suse.com/security/cve/CVE-2025-71156/" source="CVE"/>
		<reference ref_id="CVE-2025-71157" ref_url="https://www.suse.com/security/cve/CVE-2025-71157/" source="CVE"/>
		<reference ref_id="CVE-2025-71162" ref_url="https://www.suse.com/security/cve/CVE-2025-71162/" source="CVE"/>
		<reference ref_id="CVE-2025-71163" ref_url="https://www.suse.com/security/cve/CVE-2025-71163/" source="CVE"/>
		<reference ref_id="CVE-2026-22976" ref_url="https://www.suse.com/security/cve/CVE-2026-22976/" source="CVE"/>
		<reference ref_id="CVE-2026-22977" ref_url="https://www.suse.com/security/cve/CVE-2026-22977/" source="CVE"/>
		<reference ref_id="CVE-2026-22978" ref_url="https://www.suse.com/security/cve/CVE-2026-22978/" source="CVE"/>
		<reference ref_id="CVE-2026-22981" ref_url="https://www.suse.com/security/cve/CVE-2026-22981/" source="CVE"/>
		<reference ref_id="CVE-2026-22982" ref_url="https://www.suse.com/security/cve/CVE-2026-22982/" source="CVE"/>
		<reference ref_id="CVE-2026-22984" ref_url="https://www.suse.com/security/cve/CVE-2026-22984/" source="CVE"/>
		<reference ref_id="CVE-2026-22985" ref_url="https://www.suse.com/security/cve/CVE-2026-22985/" source="CVE"/>
		<reference ref_id="CVE-2026-22986" ref_url="https://www.suse.com/security/cve/CVE-2026-22986/" source="CVE"/>
		<reference ref_id="CVE-2026-22988" ref_url="https://www.suse.com/security/cve/CVE-2026-22988/" source="CVE"/>
		<reference ref_id="CVE-2026-22989" ref_url="https://www.suse.com/security/cve/CVE-2026-22989/" source="CVE"/>
		<reference ref_id="CVE-2026-22990" ref_url="https://www.suse.com/security/cve/CVE-2026-22990/" source="CVE"/>
		<reference ref_id="CVE-2026-22991" ref_url="https://www.suse.com/security/cve/CVE-2026-22991/" source="CVE"/>
		<reference ref_id="CVE-2026-22992" ref_url="https://www.suse.com/security/cve/CVE-2026-22992/" source="CVE"/>
		<reference ref_id="CVE-2026-22993" ref_url="https://www.suse.com/security/cve/CVE-2026-22993/" source="CVE"/>
		<reference ref_id="CVE-2026-22996" ref_url="https://www.suse.com/security/cve/CVE-2026-22996/" source="CVE"/>
		<reference ref_id="CVE-2026-22997" ref_url="https://www.suse.com/security/cve/CVE-2026-22997/" source="CVE"/>
		<reference ref_id="CVE-2026-22999" ref_url="https://www.suse.com/security/cve/CVE-2026-22999/" source="CVE"/>
		<reference ref_id="CVE-2026-23000" ref_url="https://www.suse.com/security/cve/CVE-2026-23000/" source="CVE"/>
		<reference ref_id="CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001/" source="CVE"/>
		<reference ref_id="CVE-2026-23002" ref_url="https://www.suse.com/security/cve/CVE-2026-23002/" source="CVE"/>
		<reference ref_id="CVE-2026-23005" ref_url="https://www.suse.com/security/cve/CVE-2026-23005/" source="CVE"/>
		<reference ref_id="CVE-2026-23006" ref_url="https://www.suse.com/security/cve/CVE-2026-23006/" source="CVE"/>
		<reference ref_id="CVE-2026-23011" ref_url="https://www.suse.com/security/cve/CVE-2026-23011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 and SL MIxro 6.2 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-40147: blk-throttle: fix access race during throttle policy activation (bsc#1253344).
- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
- CVE-2025-40261: nvme: nvme-fc: Ensure -&gt;ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839).
- CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102).
- CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327).
- CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266).
- CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269).
- CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).
- CVE-2025-68211: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item (bsc#1255319).
- CVE-2025-68218: nvme-multipath: fix lockdep WARN due to partition scan work (bsc#1255245).
- CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).
- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157).
- CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268).
- CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164).
- CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128).
- CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403).
- CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).
- CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417).
- CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482).
- CVE-2025-68341: veth: reduce XDP no_direct return section to fix race (bsc#1255506).
- CVE-2025-68348: block: fix memory leak in __blkdev_issue_zero_pages (bsc#1255694).
- CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544).
- CVE-2025-68356: gfs2: Prevent recursive memory reclaim (bsc#1255593).
- CVE-2025-68359: btrfs: fix double free of qgroup record after failure to add delayed ref head (bsc#1255542).
- CVE-2025-68360: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks (bsc#1255536).
- CVE-2025-68361: erofs: limit the level of fs stacking for file-backed mounts (bsc#1255526).
- CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
- CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547).
- CVE-2025-68368: md: init bioset in mddev_init (bsc#1255527).
- CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).
- CVE-2025-68376: coresight: ETR: Fix ETR buffer use-after-free issue (bsc#1255529).
- CVE-2025-68379: RDMA/rxe: Fix null deref on srq-&gt;rq.queue after resize failure (bsc#1255695).
- CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811).
- CVE-2025-68741: scsi: qla2xxx: Fix improper freeing of purex item (bsc#1255703).
- CVE-2025-68743: mshv: Fix create memory region overlap check (bsc#1255708).
- CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930).
- CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).
- CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).
- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).
- CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665).
- CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659).
- CVE-2025-68784: xfs: fix a UAF problem in xattr repair (bsc#1256793).
- CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638).
- CVE-2025-68792: tpm2-sessions: Fix out of range indexing in name_size (bsc#1256656).
- CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688).
- CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689).
- CVE-2025-68799: caif: fix integer underflow in cffrml_receive() (bsc#1256643).
- CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646).
- CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653).
- CVE-2025-68803: NFSD: NFSv4 file creation neglects setting ACL (bsc#1256770).
- CVE-2025-68811: svcrdma: use rc_pageoff for memcpy byte offset (bsc#1256677).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).
- CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651).
- CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680).
- CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674).
- CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754).
- CVE-2025-68821: fuse: fix readahead reclaim deadlock (bsc#1256667).
- CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654).
- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645).
- CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).
- CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608).
- CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).
- CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628).
- CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773).
- CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
- CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597).
- CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605).
- CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607).
- CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).
- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).
- CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757).
- CVE-2025-71126: mptcp: avoid deadlock on fallback while reinjecting (bsc#1256755).
- CVE-2025-71132: smc91x: fix broken irq-context in PREEMPT_RT (bsc#1256737).
- CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733).
- CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761).
- CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" (bsc#1256760).
- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).
- CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164).
- CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167).
- CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168).
- CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035).
- CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053).
- CVE-2026-22981: idpf: detach and close netdevs while handling a reset (bsc#1257225).
- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).
- CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217).
- CVE-2026-22986: gpiolib: fix race condition for gdev-&gt;srcu (bsc#1257276).
- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).
- CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220).
- CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218).
- CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180).
- CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv.
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).
- CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234).
- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).
- CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245).
- CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).

The following non security issues were fixed:

- ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).
- Add bugnumber to an existing hv_netvsc change (bsc#1257473).
- Fix locking issue introduced by a CVE backport (bsc#1256975 bsc#1254977).
- Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792)
- arm64: Update config files. Disable DEVPORT (bsc#1256792)
- bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603).
- bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569).
- btrfs: pass fs_info to btrfs_delete_ref_head() (git-fixes).
- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).
- bus: fsl-mc: Constify fsl_mc_device_match() (jsc#PED-10906 git-fixes).
- drm/imagination: Wait for FW trace update command completion (git-fixes).
- drm/msm/a6xx: fix bogus hwcg register updates (git-fixes).
- ice: use netif_get_num_default_rss_queues() (bsc#1247712).
- libbpf: Fix -Wdiscarded-qualifiers under C23 (bsc#1257309).
- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1254447 bsc#1253087).
- net: mana: Fix incorrect speed reported by debugfs (bsc#1255232).
- net: mana: Support HW link state events (bsc#1253049).
- nfsd: adjust WARN_ON_ONCE in revoke_delegation (bsc#1257015).
- nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes).
- powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).
- sched/fair: Disable scheduler feature NEXT_BUDDY (bsc#1255459).
- scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256864).
- scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256864).
- scsi: qla2xxx: Add Speed in SFP print information (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Allow recovery for tape devices (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
- selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346).
- slimbus: core: Constify slim_eaddr_equal() (jsc#PED-10906 git-fixes).
- smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748,bsc#1257154).
- smb: client: update cfid-&gt;last_access_time in open_cached_dir_by_dentry() (git-fixes).
- smb: improve directory cache reuse for readdir operations (bsc#1252712).
- tsm-mr: Add TVM Measurement Register support (bsc#1257504).
- tsm-mr: Add tsm-mr sample code (bsc#1257504).
- virt: tdx-guest: Expose TDX MRs as sysfs attributes (bsc#1257504).
- virt: tdx-guest: Refactor and streamline TDREPORT generation (bsc#1257504).
- virt: tdx-guest: Transition to scoped_cond_guard for mutex operations (bsc#1257504).
- wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).
- x86/tdx: Add tdx_mcall_extend_rtmr() interface (bsc#1257504).
- x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error (bsc#1257504).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215199">SUSE bug 1215199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235905">SUSE bug 1235905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242505">SUSE bug 1242505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242974">SUSE bug 1242974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242986">SUSE bug 1242986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243452">SUSE bug 1243452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243507">SUSE bug 1243507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243662">SUSE bug 1243662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246184">SUSE bug 1246184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246282">SUSE bug 1246282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247030">SUSE bug 1247030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247292">SUSE bug 1247292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247712">SUSE bug 1247712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248166">SUSE bug 1248166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248175">SUSE bug 1248175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248178">SUSE bug 1248178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248179">SUSE bug 1248179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248185">SUSE bug 1248185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248188">SUSE bug 1248188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248196">SUSE bug 1248196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248206">SUSE bug 1248206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248208">SUSE bug 1248208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248209">SUSE bug 1248209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248211">SUSE bug 1248211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248212">SUSE bug 1248212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248213">SUSE bug 1248213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248214">SUSE bug 1248214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248216">SUSE bug 1248216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248217">SUSE bug 1248217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248222">SUSE bug 1248222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248227">SUSE bug 1248227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248228">SUSE bug 1248228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248229">SUSE bug 1248229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248232">SUSE bug 1248232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248234">SUSE bug 1248234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248240">SUSE bug 1248240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248360">SUSE bug 1248360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248366">SUSE bug 1248366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248384">SUSE bug 1248384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248626">SUSE bug 1248626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249307">SUSE bug 1249307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249609">SUSE bug 1249609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249895">SUSE bug 1249895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249998">SUSE bug 1249998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250032">SUSE bug 1250032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250082">SUSE bug 1250082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250388">SUSE bug 1250388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250705">SUSE bug 1250705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250738">SUSE bug 1250738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250748">SUSE bug 1250748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252712">SUSE bug 1252712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252773">SUSE bug 1252773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252784">SUSE bug 1252784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252891">SUSE bug 1252891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252900">SUSE bug 1252900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253049">SUSE bug 1253049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253078">SUSE bug 1253078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253079">SUSE bug 1253079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253087">SUSE bug 1253087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253344">SUSE bug 1253344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253500">SUSE bug 1253500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253739">SUSE bug 1253739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254244">SUSE bug 1254244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254308">SUSE bug 1254308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254447">SUSE bug 1254447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254839">SUSE bug 1254839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254842">SUSE bug 1254842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254845">SUSE bug 1254845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254977">SUSE bug 1254977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255102">SUSE bug 1255102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255128">SUSE bug 1255128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255157">SUSE bug 1255157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255164">SUSE bug 1255164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255172">SUSE bug 1255172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255216">SUSE bug 1255216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255232">SUSE bug 1255232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255241">SUSE bug 1255241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255245">SUSE bug 1255245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255266">SUSE bug 1255266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255268">SUSE bug 1255268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255269">SUSE bug 1255269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255319">SUSE bug 1255319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255327">SUSE bug 1255327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255346">SUSE bug 1255346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255403">SUSE bug 1255403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255417">SUSE bug 1255417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255459">SUSE bug 1255459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255482">SUSE bug 1255482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255506">SUSE bug 1255506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255526">SUSE bug 1255526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255527">SUSE bug 1255527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255529">SUSE bug 1255529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255530">SUSE bug 1255530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255536">SUSE bug 1255536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255537">SUSE bug 1255537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255542">SUSE bug 1255542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255544">SUSE bug 1255544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255547">SUSE bug 1255547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255569">SUSE bug 1255569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255593">SUSE bug 1255593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255622">SUSE bug 1255622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255694">SUSE bug 1255694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255695">SUSE bug 1255695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255703">SUSE bug 1255703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255708">SUSE bug 1255708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255811">SUSE bug 1255811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255930">SUSE bug 1255930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256579">SUSE bug 1256579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256582">SUSE bug 1256582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256584">SUSE bug 1256584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256586">SUSE bug 1256586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256591">SUSE bug 1256591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256592">SUSE bug 1256592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256593">SUSE bug 1256593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256594">SUSE bug 1256594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256597">SUSE bug 1256597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256605">SUSE bug 1256605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256607">SUSE bug 1256607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256608">SUSE bug 1256608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256609">SUSE bug 1256609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256610">SUSE bug 1256610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256611">SUSE bug 1256611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256612">SUSE bug 1256612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256613">SUSE bug 1256613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256616">SUSE bug 1256616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256617">SUSE bug 1256617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256619">SUSE bug 1256619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256622">SUSE bug 1256622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256623">SUSE bug 1256623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256625">SUSE bug 1256625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256627">SUSE bug 1256627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256628">SUSE bug 1256628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256630">SUSE bug 1256630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256632">SUSE bug 1256632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256638">SUSE bug 1256638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256641">SUSE bug 1256641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256643">SUSE bug 1256643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256645">SUSE bug 1256645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256646">SUSE bug 1256646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256650">SUSE bug 1256650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256651">SUSE bug 1256651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256653">SUSE bug 1256653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256654">SUSE bug 1256654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256655">SUSE bug 1256655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256656">SUSE bug 1256656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256659">SUSE bug 1256659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256660">SUSE bug 1256660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256661">SUSE bug 1256661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256664">SUSE bug 1256664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256665">SUSE bug 1256665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256667">SUSE bug 1256667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256668">SUSE bug 1256668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256674">SUSE bug 1256674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256677">SUSE bug 1256677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256680">SUSE bug 1256680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256682">SUSE bug 1256682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256683">SUSE bug 1256683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256688">SUSE bug 1256688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256689">SUSE bug 1256689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256716">SUSE bug 1256716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256726">SUSE bug 1256726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256728">SUSE bug 1256728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256730">SUSE bug 1256730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256733">SUSE bug 1256733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256737">SUSE bug 1256737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256741">SUSE bug 1256741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256742">SUSE bug 1256742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256744">SUSE bug 1256744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256748">SUSE bug 1256748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256749">SUSE bug 1256749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256752">SUSE bug 1256752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256754">SUSE bug 1256754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256755">SUSE bug 1256755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256756">SUSE bug 1256756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256757">SUSE bug 1256757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256759">SUSE bug 1256759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256760">SUSE bug 1256760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256761">SUSE bug 1256761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256763">SUSE bug 1256763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256770">SUSE bug 1256770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256773">SUSE bug 1256773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256774">SUSE bug 1256774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256777">SUSE bug 1256777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256779">SUSE bug 1256779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256781">SUSE bug 1256781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256785">SUSE bug 1256785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256792">SUSE bug 1256792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256793">SUSE bug 1256793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256794">SUSE bug 1256794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256864">SUSE bug 1256864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256865">SUSE bug 1256865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256867">SUSE bug 1256867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256975">SUSE bug 1256975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257015">SUSE bug 1257015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257035">SUSE bug 1257035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257053">SUSE bug 1257053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257154">SUSE bug 1257154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257155">SUSE bug 1257155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257158">SUSE bug 1257158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257159">SUSE bug 1257159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257163">SUSE bug 1257163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257164">SUSE bug 1257164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257167">SUSE bug 1257167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257168">SUSE bug 1257168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257179">SUSE bug 1257179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257180">SUSE bug 1257180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257202">SUSE bug 1257202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257204">SUSE bug 1257204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257207">SUSE bug 1257207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257208">SUSE bug 1257208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257215">SUSE bug 1257215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257217">SUSE bug 1257217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257218">SUSE bug 1257218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257220">SUSE bug 1257220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257221">SUSE bug 1257221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257225">SUSE bug 1257225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257227">SUSE bug 1257227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257232">SUSE bug 1257232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257234">SUSE bug 1257234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257236">SUSE bug 1257236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257243">SUSE bug 1257243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257245">SUSE bug 1257245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257276">SUSE bug 1257276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257277">SUSE bug 1257277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257279">SUSE bug 1257279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257282">SUSE bug 1257282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257296">SUSE bug 1257296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257309">SUSE bug 1257309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257473">SUSE bug 1257473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257504">SUSE bug 1257504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257603">SUSE bug 1257603</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54031/">CVE-2024-54031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37744/">CVE-2025-37744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37744">CVE-2025-37744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37751/">CVE-2025-37751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37751">CVE-2025-37751 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37841/">CVE-2025-37841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37841">CVE-2025-37841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37845/">CVE-2025-37845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37845">CVE-2025-37845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37904/">CVE-2025-37904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37904">CVE-2025-37904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37955/">CVE-2025-37955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37955">CVE-2025-37955 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38243/">CVE-2025-38243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38243">CVE-2025-38243 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38262/">CVE-2025-38262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38262">CVE-2025-38262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38297/">CVE-2025-38297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38297">CVE-2025-38297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38298/">CVE-2025-38298 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38298">CVE-2025-38298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38379/">CVE-2025-38379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38379">CVE-2025-38379 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38423/">CVE-2025-38423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38423">CVE-2025-38423 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38505/">CVE-2025-38505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38505">CVE-2025-38505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38507/">CVE-2025-38507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38507">CVE-2025-38507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38510/">CVE-2025-38510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38510">CVE-2025-38510 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38511/">CVE-2025-38511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38511">CVE-2025-38511 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38512/">CVE-2025-38512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38512">CVE-2025-38512 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38513/">CVE-2025-38513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38513">CVE-2025-38513 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38515/">CVE-2025-38515 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38515">CVE-2025-38515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38516/">CVE-2025-38516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38516">CVE-2025-38516 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38520/">CVE-2025-38520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38521/">CVE-2025-38521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38521">CVE-2025-38521 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38529/">CVE-2025-38529 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38529">CVE-2025-38529 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38530/">CVE-2025-38530 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38530">CVE-2025-38530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38535/">CVE-2025-38535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38535">CVE-2025-38535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38537/">CVE-2025-38537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38537">CVE-2025-38537 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38538/">CVE-2025-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38538">CVE-2025-38538 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38539/">CVE-2025-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38540/">CVE-2025-38540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38540">CVE-2025-38540 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38541/">CVE-2025-38541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38541">CVE-2025-38541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38543/">CVE-2025-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38543">CVE-2025-38543 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38547/">CVE-2025-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38547">CVE-2025-38547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38548/">CVE-2025-38548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38548">CVE-2025-38548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38550/">CVE-2025-38550 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38551/">CVE-2025-38551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38551">CVE-2025-38551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38569/">CVE-2025-38569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38589/">CVE-2025-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38589">CVE-2025-38589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38590/">CVE-2025-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38645/">CVE-2025-38645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39689/">CVE-2025-39689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39795/">CVE-2025-39795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39813/">CVE-2025-39813 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39813">CVE-2025-39813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39814/">CVE-2025-39814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39814">CVE-2025-39814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39829/">CVE-2025-39829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39829">CVE-2025-39829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39880/">CVE-2025-39880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39913/">CVE-2025-39913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913">CVE-2025-39913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39927/">CVE-2025-39927 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927">CVE-2025-39927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40030/">CVE-2025-40030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40045/">CVE-2025-40045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40097/">CVE-2025-40097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40097">CVE-2025-40097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40106/">CVE-2025-40106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40147/">CVE-2025-40147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40147">CVE-2025-40147 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40195/">CVE-2025-40195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40195">CVE-2025-40195 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-40257/">CVE-2025-40257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40259/">CVE-2025-40259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40259">CVE-2025-40259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40261/">CVE-2025-40261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40261">CVE-2025-40261 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40363/">CVE-2025-40363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40363">CVE-2025-40363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68174/">CVE-2025-68174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68174">CVE-2025-68174 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68178/">CVE-2025-68178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68178">CVE-2025-68178 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68188/">CVE-2025-68188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68188">CVE-2025-68188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68200/">CVE-2025-68200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68200">CVE-2025-68200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68211/">CVE-2025-68211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68211">CVE-2025-68211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68218/">CVE-2025-68218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68218">CVE-2025-68218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68227/">CVE-2025-68227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68227">CVE-2025-68227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68241/">CVE-2025-68241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68241">CVE-2025-68241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68245/">CVE-2025-68245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68245">CVE-2025-68245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68261/">CVE-2025-68261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68296/">CVE-2025-68296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68296">CVE-2025-68296 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68297/">CVE-2025-68297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68297">CVE-2025-68297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68320/">CVE-2025-68320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68320">CVE-2025-68320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68325/">CVE-2025-68325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68337/">CVE-2025-68337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68341/">CVE-2025-68341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68341">CVE-2025-68341 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68348/">CVE-2025-68348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68356/">CVE-2025-68356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68359/">CVE-2025-68359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68359">CVE-2025-68359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68360/">CVE-2025-68360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68360">CVE-2025-68360 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68361/">CVE-2025-68361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68366/">CVE-2025-68366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68367/">CVE-2025-68367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68368/">CVE-2025-68368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68368">CVE-2025-68368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68372/">CVE-2025-68372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68374/">CVE-2025-68374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68376/">CVE-2025-68376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68376">CVE-2025-68376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68379/">CVE-2025-68379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68725/">CVE-2025-68725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68725">CVE-2025-68725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68735/">CVE-2025-68735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68735">CVE-2025-68735 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68741/">CVE-2025-68741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68743/">CVE-2025-68743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68743">CVE-2025-68743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68764/">CVE-2025-68764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68768/">CVE-2025-68768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68768">CVE-2025-68768 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68770/">CVE-2025-68770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68770">CVE-2025-68770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68771/">CVE-2025-68771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68771">CVE-2025-68771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68773/">CVE-2025-68773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68773">CVE-2025-68773 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68775/">CVE-2025-68775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68775">CVE-2025-68775 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68776/">CVE-2025-68776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68776">CVE-2025-68776 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68777/">CVE-2025-68777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68777">CVE-2025-68777 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68778/">CVE-2025-68778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68778">CVE-2025-68778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68783/">CVE-2025-68783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68783">CVE-2025-68783 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68784/">CVE-2025-68784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68784">CVE-2025-68784 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68788/">CVE-2025-68788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68788">CVE-2025-68788 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68789/">CVE-2025-68789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68789">CVE-2025-68789 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68792/">CVE-2025-68792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68792">CVE-2025-68792 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68795/">CVE-2025-68795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68795">CVE-2025-68795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68797/">CVE-2025-68797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68797">CVE-2025-68797 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68798/">CVE-2025-68798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68798">CVE-2025-68798 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68799/">CVE-2025-68799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68799">CVE-2025-68799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68801/">CVE-2025-68801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68801">CVE-2025-68801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68802/">CVE-2025-68802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68802">CVE-2025-68802 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68803/">CVE-2025-68803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68803">CVE-2025-68803 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68804/">CVE-2025-68804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68804">CVE-2025-68804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68808/">CVE-2025-68808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68808">CVE-2025-68808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68811/">CVE-2025-68811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68814/">CVE-2025-68814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68814">CVE-2025-68814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68815/">CVE-2025-68815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68815">CVE-2025-68815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68816/">CVE-2025-68816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68816">CVE-2025-68816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68819/">CVE-2025-68819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68819">CVE-2025-68819 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68820/">CVE-2025-68820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68820">CVE-2025-68820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68821/">CVE-2025-68821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68821">CVE-2025-68821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68822/">CVE-2025-68822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68822">CVE-2025-68822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71064/">CVE-2025-71064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71064">CVE-2025-71064 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-71066/">CVE-2025-71066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71073/">CVE-2025-71073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71073">CVE-2025-71073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71076/">CVE-2025-71076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71076">CVE-2025-71076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71077/">CVE-2025-71077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71077">CVE-2025-71077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71078/">CVE-2025-71078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71078">CVE-2025-71078 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71079/">CVE-2025-71079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71079">CVE-2025-71079 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71080/">CVE-2025-71080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71080">CVE-2025-71080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71081/">CVE-2025-71081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71081">CVE-2025-71081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71082/">CVE-2025-71082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71082">CVE-2025-71082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71083/">CVE-2025-71083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71083">CVE-2025-71083 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71084/">CVE-2025-71084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71084">CVE-2025-71084 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71086/">CVE-2025-71086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71086">CVE-2025-71086 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71087/">CVE-2025-71087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71087">CVE-2025-71087 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71088/">CVE-2025-71088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71088">CVE-2025-71088 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71089/">CVE-2025-71089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71091/">CVE-2025-71091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71091">CVE-2025-71091 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71093/">CVE-2025-71093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71093">CVE-2025-71093 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71094/">CVE-2025-71094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71094">CVE-2025-71094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71095/">CVE-2025-71095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71095">CVE-2025-71095 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71097/">CVE-2025-71097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71097">CVE-2025-71097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71098/">CVE-2025-71098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71098">CVE-2025-71098 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71099/">CVE-2025-71099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71099">CVE-2025-71099 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71100/">CVE-2025-71100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71100">CVE-2025-71100 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71101/">CVE-2025-71101 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71101">CVE-2025-71101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71108/">CVE-2025-71108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71108">CVE-2025-71108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71111/">CVE-2025-71111 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71111">CVE-2025-71111 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71112/">CVE-2025-71112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71113/">CVE-2025-71113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71113">CVE-2025-71113 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71114/">CVE-2025-71114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71114">CVE-2025-71114 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71116/">CVE-2025-71116 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71118/">CVE-2025-71118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71118">CVE-2025-71118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71119/">CVE-2025-71119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71119">CVE-2025-71119 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71120/">CVE-2025-71120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71123/">CVE-2025-71123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71123">CVE-2025-71123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71126/">CVE-2025-71126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71126">CVE-2025-71126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71130/">CVE-2025-71130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71130">CVE-2025-71130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71131/">CVE-2025-71131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71131">CVE-2025-71131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71132/">CVE-2025-71132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71132">CVE-2025-71132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71133/">CVE-2025-71133 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71133">CVE-2025-71133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71135/">CVE-2025-71135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71135">CVE-2025-71135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71136/">CVE-2025-71136 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71136">CVE-2025-71136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71137/">CVE-2025-71137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71137">CVE-2025-71137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71138/">CVE-2025-71138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71138">CVE-2025-71138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71141/">CVE-2025-71141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71141">CVE-2025-71141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71142/">CVE-2025-71142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71142">CVE-2025-71142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71143/">CVE-2025-71143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71143">CVE-2025-71143 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71145/">CVE-2025-71145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71145">CVE-2025-71145 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71147/">CVE-2025-71147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71147">CVE-2025-71147 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71148/">CVE-2025-71148 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71148">CVE-2025-71148 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71149/">CVE-2025-71149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71149">CVE-2025-71149 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71154/">CVE-2025-71154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71154">CVE-2025-71154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71156/">CVE-2025-71156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71156">CVE-2025-71156 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71157/">CVE-2025-71157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71157">CVE-2025-71157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71162/">CVE-2025-71162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71162">CVE-2025-71162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71163/">CVE-2025-71163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71163">CVE-2025-71163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22976/">CVE-2026-22976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22976">CVE-2026-22976 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22977/">CVE-2026-22977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22977">CVE-2026-22977 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22978/">CVE-2026-22978 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22978">CVE-2026-22978 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22981/">CVE-2026-22981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22981">CVE-2026-22981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22982/">CVE-2026-22982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22982">CVE-2026-22982 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22984/">CVE-2026-22984 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22984">CVE-2026-22984 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22985/">CVE-2026-22985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22985">CVE-2026-22985 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22986/">CVE-2026-22986 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22986">CVE-2026-22986 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22988/">CVE-2026-22988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22988">CVE-2026-22988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22989/">CVE-2026-22989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22989">CVE-2026-22989 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22990/">CVE-2026-22990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22990">CVE-2026-22990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22991/">CVE-2026-22991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22991">CVE-2026-22991 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22992/">CVE-2026-22992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22992">CVE-2026-22992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22993/">CVE-2026-22993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22993">CVE-2026-22993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22996/">CVE-2026-22996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22996">CVE-2026-22996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22997/">CVE-2026-22997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22997">CVE-2026-22997 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22999/">CVE-2026-22999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23000/">CVE-2026-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23000">CVE-2026-23000 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23002/">CVE-2026-23002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23002">CVE-2026-23002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23005/">CVE-2026-23005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23005">CVE-2026-23005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23006/">CVE-2026-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23006">CVE-2026-23006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23011/">CVE-2026-23011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23011">CVE-2026-23011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047378" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047379" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047380" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047378" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047379" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047380" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94499" version="1" class="patch">
	<metadata>
		<title>Security update for the initial kernel livepatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:20611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024606.html" source="SUSE-SU"/>
		<description>


        This update contains initial livepatches for the SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel update.

        		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045795" comment="kernel-livepatch-6_12_0-160000_26-default-1-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045795" comment="kernel-livepatch-6_12_0-160000_26-default-1-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94500" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257521" ref_url="https://bugzilla.suse.com/1257521" source="BUGZILLA"/>
		<reference ref_id="1257976" ref_url="https://bugzilla.suse.com/1257976" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-26080" ref_url="https://www.suse.com/security/cve/CVE-2026-26080/" source="CVE"/>
		<reference ref_id="CVE-2026-26081" ref_url="https://www.suse.com/security/cve/CVE-2026-26081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024602.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- Update to version 3.2.12+git0.6011f448e
- CVE-2026-26081: Fixed a DOS vulnerability in QUIC. (bsc#1257976)
- CVE-2026-26080: Fixed a DOS vulnerability in QUIC. (bsc#1257976)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257521">SUSE bug 1257521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257976">SUSE bug 1257976</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26080/">CVE-2026-26080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26080">CVE-2026-26080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26081/">CVE-2026-26081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26081">CVE-2026-26081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047382" comment="haproxy-3.2.12+git0.6011f448e-160000.1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94501" version="1" class="patch">
	<metadata>
		<title>Security update for ongres-scram (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250399" ref_url="https://bugzilla.suse.com/1250399" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-59432" ref_url="https://www.suse.com/security/cve/CVE-2025-59432/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023381.html" source="SUSE-SU"/>
		<description>
This update for ongres-scram fixes the following issues:

- CVE-2025-59432: Fixed timing attack vulnerability in SCRAM Authentication (bsc#1250399)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250399">SUSE bug 1250399</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59432/">CVE-2025-59432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59432">CVE-2025-59432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030558" comment="ongres-scram-3.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030559" comment="ongres-scram-client-3.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030560" comment="ongres-scram-javadoc-3.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030558" comment="ongres-scram-3.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030559" comment="ongres-scram-client-3.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030560" comment="ongres-scram-javadoc-3.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94502" version="1" class="patch">
	<metadata>
		<title>Security update for python-azure-core (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257703" ref_url="https://bugzilla.suse.com/1257703" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-21226" ref_url="https://www.suse.com/security/cve/CVE-2026-21226/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024601.html" source="SUSE-SU"/>
		<description>
This update for python-azure-core fixes the following issues:

- CVE-2026-21226: Fixed deserialization of untrusted data which may allow an authorized attacker to execute code over a network. (bsc#1257703)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-01"/>
	<updated date="2026-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257703">SUSE bug 1257703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21226/">CVE-2026-21226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21226">CVE-2026-21226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046377" comment="python313-azure-core-1.32.0-160000.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94503" version="1" class="patch">
	<metadata>
		<title>Security update for cpp-httplib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246468" ref_url="https://bugzilla.suse.com/1246468" source="BUGZILLA"/>
		<reference ref_id="1246471" ref_url="https://bugzilla.suse.com/1246471" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53628" ref_url="https://www.suse.com/security/cve/CVE-2025-53628/" source="CVE"/>
		<reference ref_id="CVE-2025-53629" ref_url="https://www.suse.com/security/cve/CVE-2025-53629/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024613.html" source="SUSE-SU"/>
		<description>
This update for cpp-httplib fixes the following issues:

- CVE-2025-53629: header can allocate memory arbitrarily in the server, potentially leading to its exhaustion
  (bsc#1246471).
- CVE-2025-53628: HTTP header smuggling due to insecure trailers merge (bsc#1246468).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246468">SUSE bug 1246468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246471">SUSE bug 1246471</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53628/">CVE-2025-53628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53628">CVE-2025-53628 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53629/">CVE-2025-53629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53629">CVE-2025-53629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047303" comment="libcpp-httplib0_22-0.22.0-160000.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047303" comment="libcpp-httplib0_22-0.22.0-160000.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94504" version="1" class="patch">
	<metadata>
		<title>Security update for rhino (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254481" ref_url="https://bugzilla.suse.com/1254481" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66453" ref_url="https://www.suse.com/security/cve/CVE-2025-66453/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024612.html" source="SUSE-SU"/>
		<description>
This update for rhino fixes the following issues:

Update to 1.7.15.1:

- CVE-2025-66453: Fixed a problem with formatting of floating-point numbers to strings that may result in DoS (bsc#1254481).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254481">SUSE bug 1254481</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-66453/">CVE-2025-66453 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66453">CVE-2025-66453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047304" comment="rhino-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047305" comment="rhino-demo-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047306" comment="rhino-engine-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047307" comment="rhino-javadoc-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047308" comment="rhino-runtime-1.7.15.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047304" comment="rhino-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047305" comment="rhino-demo-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047306" comment="rhino-engine-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047307" comment="rhino-javadoc-1.7.15.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047308" comment="rhino-runtime-1.7.15.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94505" version="1" class="patch">
	<metadata>
		<title>Security update for assertj-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257293" ref_url="https://bugzilla.suse.com/1257293" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-24400" ref_url="https://www.suse.com/security/cve/CVE-2026-24400/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024611.html" source="SUSE-SU"/>
		<description>
This update for assertj-core fixes the following issues:

Upgrade to version 3.27.7:

- CVE-2026-24400: Fix XXE vulnerability in isXmlEqualTo assertion (bsc#1257293).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257293">SUSE bug 1257293</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24400/">CVE-2026-24400 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24400">CVE-2026-24400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047309" comment="assertj-core-3.27.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047310" comment="assertj-core-javadoc-3.27.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047309" comment="assertj-core-3.27.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047310" comment="assertj-core-javadoc-3.27.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94506" version="1" class="patch">
	<metadata>
		<title>Security update for go1.25-openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244485" ref_url="https://bugzilla.suse.com/1244485" source="BUGZILLA"/>
		<reference ref_id="1245878" ref_url="https://bugzilla.suse.com/1245878" source="BUGZILLA"/>
		<reference ref_id="1249985" ref_url="https://bugzilla.suse.com/1249985" source="BUGZILLA"/>
		<reference ref_id="1251253" ref_url="https://bugzilla.suse.com/1251253" source="BUGZILLA"/>
		<reference ref_id="1251254" ref_url="https://bugzilla.suse.com/1251254" source="BUGZILLA"/>
		<reference ref_id="1251255" ref_url="https://bugzilla.suse.com/1251255" source="BUGZILLA"/>
		<reference ref_id="1251256" ref_url="https://bugzilla.suse.com/1251256" source="BUGZILLA"/>
		<reference ref_id="1251257" ref_url="https://bugzilla.suse.com/1251257" source="BUGZILLA"/>
		<reference ref_id="1251258" ref_url="https://bugzilla.suse.com/1251258" source="BUGZILLA"/>
		<reference ref_id="1251259" ref_url="https://bugzilla.suse.com/1251259" source="BUGZILLA"/>
		<reference ref_id="1251260" ref_url="https://bugzilla.suse.com/1251260" source="BUGZILLA"/>
		<reference ref_id="1251261" ref_url="https://bugzilla.suse.com/1251261" source="BUGZILLA"/>
		<reference ref_id="1251262" ref_url="https://bugzilla.suse.com/1251262" source="BUGZILLA"/>
		<reference ref_id="1254227" ref_url="https://bugzilla.suse.com/1254227" source="BUGZILLA"/>
		<reference ref_id="1254430" ref_url="https://bugzilla.suse.com/1254430" source="BUGZILLA"/>
		<reference ref_id="1254431" ref_url="https://bugzilla.suse.com/1254431" source="BUGZILLA"/>
		<reference ref_id="1256816" ref_url="https://bugzilla.suse.com/1256816" source="BUGZILLA"/>
		<reference ref_id="1256817" ref_url="https://bugzilla.suse.com/1256817" source="BUGZILLA"/>
		<reference ref_id="1256818" ref_url="https://bugzilla.suse.com/1256818" source="BUGZILLA"/>
		<reference ref_id="1256819" ref_url="https://bugzilla.suse.com/1256819" source="BUGZILLA"/>
		<reference ref_id="1256820" ref_url="https://bugzilla.suse.com/1256820" source="BUGZILLA"/>
		<reference ref_id="1256821" ref_url="https://bugzilla.suse.com/1256821" source="BUGZILLA"/>
		<reference ref_id="1257486" ref_url="https://bugzilla.suse.com/1257486" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724/" source="CVE"/>
		<reference ref_id="CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725/" source="CVE"/>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-61730" ref_url="https://www.suse.com/security/cve/CVE-2025-61730/" source="CVE"/>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<description>
This update for go1.25-openssl fixes the following issues:

- Update to version 1.25.7 (jsc#SLE-18320)
- CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821)
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820)
- CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819)
- CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817)
- CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816)
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818)
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431)
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SA (bsc#1254430)
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255)
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253)
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260)
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258)
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259)
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256)
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261)
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257)
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254)
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1244485">SUSE bug 1244485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245878">SUSE bug 1245878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249985">SUSE bug 1249985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251253">SUSE bug 1251253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251254">SUSE bug 1251254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251255">SUSE bug 1251255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251256">SUSE bug 1251256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251257">SUSE bug 1251257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251258">SUSE bug 1251258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251259">SUSE bug 1251259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251260">SUSE bug 1251260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251261">SUSE bug 1251261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251262">SUSE bug 1251262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254227">SUSE bug 1254227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254430">SUSE bug 1254430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254431">SUSE bug 1254431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256816">SUSE bug 1256816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256817">SUSE bug 1256817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256819">SUSE bug 1256819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256820">SUSE bug 1256820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256821">SUSE bug 1256821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257486">SUSE bug 1257486</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61730/">CVE-2025-61730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94507" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248988" ref_url="https://bugzilla.suse.com/1248988" source="BUGZILLA"/>
		<reference ref_id="1249154" ref_url="https://bugzilla.suse.com/1249154" source="BUGZILLA"/>
		<reference ref_id="1252376" ref_url="https://bugzilla.suse.com/1252376" source="BUGZILLA"/>
		<reference ref_id="1253542" ref_url="https://bugzilla.suse.com/1253542" source="BUGZILLA"/>
		<reference ref_id="1253993" ref_url="https://bugzilla.suse.com/1253993" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

Changes in podman:

- Add symlink to catatonit in /usr/libexec/podman (bsc#1248988)

- CVE-2025-47914: Fixed golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read  (bsc#1253993)
- CVE-2025-47913: Fixed golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542):

- CVE-2025-31133,CVE-2025-52565,CVE-2025-52881: Fixed runc: Container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files  (bsc#1252376):
- CVE-2025-9566: Fixed that podman kube play command may overwrite host files (bsc#1249154):
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248988">SUSE bug 1248988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249154">SUSE bug 1249154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252376">SUSE bug 1252376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253542">SUSE bug 1253542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253993">SUSE bug 1253993</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94508" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257144" ref_url="https://bugzilla.suse.com/1257144" source="BUGZILLA"/>
		<reference ref_id="1257496" ref_url="https://bugzilla.suse.com/1257496" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-24515" ref_url="https://www.suse.com/security/cve/CVE-2026-24515/" source="CVE"/>
		<reference ref_id="CVE-2026-25210" ref_url="https://www.suse.com/security/cve/CVE-2026-25210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024647.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2026-24515: failure to copy the encoding handler data passed to XML_SetUnknownEncodingHandler may cause a NULL
  dereference (bsc#1257144).
- CVE-2026-25210: lack of buffer size check can lead to an integer overflow (bsc#1257496).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257144">SUSE bug 1257144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257496">SUSE bug 1257496</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24515/">CVE-2026-24515 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24515">CVE-2026-24515 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25210/">CVE-2026-25210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25210">CVE-2026-25210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047318" comment="expat-2.7.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047319" comment="libexpat-devel-2.7.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047320" comment="libexpat1-2.7.1-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047318" comment="expat-2.7.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047319" comment="libexpat-devel-2.7.1-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047320" comment="libexpat1-2.7.1-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94509" version="1" class="patch">
	<metadata>
		<title>Security update for go1.24-openssl (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1236217" ref_url="https://bugzilla.suse.com/1236217" source="BUGZILLA"/>
		<reference ref_id="1245878" ref_url="https://bugzilla.suse.com/1245878" source="BUGZILLA"/>
		<reference ref_id="1247816" ref_url="https://bugzilla.suse.com/1247816" source="BUGZILLA"/>
		<reference ref_id="1248082" ref_url="https://bugzilla.suse.com/1248082" source="BUGZILLA"/>
		<reference ref_id="1249985" ref_url="https://bugzilla.suse.com/1249985" source="BUGZILLA"/>
		<reference ref_id="1251253" ref_url="https://bugzilla.suse.com/1251253" source="BUGZILLA"/>
		<reference ref_id="1251254" ref_url="https://bugzilla.suse.com/1251254" source="BUGZILLA"/>
		<reference ref_id="1251255" ref_url="https://bugzilla.suse.com/1251255" source="BUGZILLA"/>
		<reference ref_id="1251256" ref_url="https://bugzilla.suse.com/1251256" source="BUGZILLA"/>
		<reference ref_id="1251257" ref_url="https://bugzilla.suse.com/1251257" source="BUGZILLA"/>
		<reference ref_id="1251258" ref_url="https://bugzilla.suse.com/1251258" source="BUGZILLA"/>
		<reference ref_id="1251259" ref_url="https://bugzilla.suse.com/1251259" source="BUGZILLA"/>
		<reference ref_id="1251260" ref_url="https://bugzilla.suse.com/1251260" source="BUGZILLA"/>
		<reference ref_id="1251261" ref_url="https://bugzilla.suse.com/1251261" source="BUGZILLA"/>
		<reference ref_id="1251262" ref_url="https://bugzilla.suse.com/1251262" source="BUGZILLA"/>
		<reference ref_id="1254430" ref_url="https://bugzilla.suse.com/1254430" source="BUGZILLA"/>
		<reference ref_id="1254431" ref_url="https://bugzilla.suse.com/1254431" source="BUGZILLA"/>
		<reference ref_id="1256816" ref_url="https://bugzilla.suse.com/1256816" source="BUGZILLA"/>
		<reference ref_id="1256817" ref_url="https://bugzilla.suse.com/1256817" source="BUGZILLA"/>
		<reference ref_id="1256818" ref_url="https://bugzilla.suse.com/1256818" source="BUGZILLA"/>
		<reference ref_id="1256819" ref_url="https://bugzilla.suse.com/1256819" source="BUGZILLA"/>
		<reference ref_id="1256820" ref_url="https://bugzilla.suse.com/1256820" source="BUGZILLA"/>
		<reference ref_id="1256821" ref_url="https://bugzilla.suse.com/1256821" source="BUGZILLA"/>
		<reference ref_id="1257692" ref_url="https://bugzilla.suse.com/1257692" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<reference ref_id="CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185/" source="CVE"/>
		<reference ref_id="CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186/" source="CVE"/>
		<reference ref_id="CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187/" source="CVE"/>
		<reference ref_id="CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188/" source="CVE"/>
		<reference ref_id="CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189/" source="CVE"/>
		<reference ref_id="CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723/" source="CVE"/>
		<reference ref_id="CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724/" source="CVE"/>
		<reference ref_id="CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725/" source="CVE"/>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-61730" ref_url="https://www.suse.com/security/cve/CVE-2025-61730/" source="CVE"/>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<reference ref_id="CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
		<description>
This update for go1.24-openssl fixes the following issues:

- Update to version 1.24.13 (jsc#SLE-18320)
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information. (bsc#1251255)
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress. (bsc#1251253)
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys. (bsc#1251260)
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion. (bsc#1251258)
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion. (bsc#1251259)
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs. (bsc#1251256)
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map. (bsc#1251261)
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames. (bsc#1251257)
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints. (bsc#1251254)
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse. (bsc#1251262)
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation. (bsc#1254431)
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN. (bsc#1254430)
- CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level. (bsc#1256821)
- CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution. (bsc#1256819)
- CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm. (bsc#1256817)
- CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives. (bsc#1256816)
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain. (bsc#1256818)
- CVE-2025-61732: cmd/go: potential code smuggling using doc comments. (bsc#1257692)
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain. (bsc#1256820)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-03-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1236217">SUSE bug 1236217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245878">SUSE bug 1245878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247816">SUSE bug 1247816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248082">SUSE bug 1248082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249985">SUSE bug 1249985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251253">SUSE bug 1251253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251254">SUSE bug 1251254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251255">SUSE bug 1251255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251256">SUSE bug 1251256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251257">SUSE bug 1251257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251258">SUSE bug 1251258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251259">SUSE bug 1251259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251260">SUSE bug 1251260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251261">SUSE bug 1251261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251262">SUSE bug 1251262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254430">SUSE bug 1254430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254431">SUSE bug 1254431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256816">SUSE bug 1256816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256817">SUSE bug 1256817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256819">SUSE bug 1256819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256820">SUSE bug 1256820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256821">SUSE bug 1256821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257692">SUSE bug 1257692</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61730/">CVE-2025-61730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94510" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257324" ref_url="https://bugzilla.suse.com/1257324" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
This update for cockpit-podman fixes the following issues:

- CVE-2025-13465: prototype pollution in the _.unset and _.omit functions can lead to deletion of methods from global
  prototypes (bsc#1257324).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-09"/>
	<updated date="2026-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257324">SUSE bug 1257324</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047931" comment="cockpit-podman-117-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047931" comment="cockpit-podman-117-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94511" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253415" ref_url="https://bugzilla.suse.com/1253415" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024644.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.7.1 fixes one security issue

The following security issue was fixed:

- CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling (bsc#1253415).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253415">SUSE bug 1253415</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039722" comment="kernel-default 6.12.0-160000.7 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010039723" comment="kernel-livepatch-6_12_0-160000_7-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047324" comment="kernel-livepatch-6_12_0-160000_7-default-3-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039722" comment="kernel-default 6.12.0-160000.7 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010039723" comment="kernel-livepatch-6_12_0-160000_7-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047324" comment="kernel-livepatch-6_12_0-160000_7-default-3-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94512" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249205" ref_url="https://bugzilla.suse.com/1249205" source="BUGZILLA"/>
		<reference ref_id="1249480" ref_url="https://bugzilla.suse.com/1249480" source="BUGZILLA"/>
		<reference ref_id="1250190" ref_url="https://bugzilla.suse.com/1250190" source="BUGZILLA"/>
		<reference ref_id="1253415" ref_url="https://bugzilla.suse.com/1253415" source="BUGZILLA"/>
		<reference ref_id="1253439" ref_url="https://bugzilla.suse.com/1253439" source="BUGZILLA"/>
		<reference ref_id="1253473" ref_url="https://bugzilla.suse.com/1253473" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<reference ref_id="CVE-2025-39698" ref_url="https://www.suse.com/security/cve/CVE-2025-39698/" source="CVE"/>
		<reference ref_id="CVE-2025-39742" ref_url="https://www.suse.com/security/cve/CVE-2025-39742/" source="CVE"/>
		<reference ref_id="CVE-2025-40129" ref_url="https://www.suse.com/security/cve/CVE-2025-40129/" source="CVE"/>
		<reference ref_id="CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130/" source="CVE"/>
		<reference ref_id="CVE-2025-40186" ref_url="https://www.suse.com/security/cve/CVE-2025-40186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.5.1 fixes various security issues

The following security issues were fixed:

- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1249205).
- CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1250190).
- CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249480).
- CVE-2025-40129: sunrpc: fix null pointer dereference on zero-length checksum (bsc#1253473).
- CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling (bsc#1253415).
- CVE-2025-40186: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request() (bsc#1253439).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249205">SUSE bug 1249205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249480">SUSE bug 1249480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250190">SUSE bug 1250190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253415">SUSE bug 1253415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253439">SUSE bug 1253439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253473">SUSE bug 1253473</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39698/">CVE-2025-39698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39742/">CVE-2025-39742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40129/">CVE-2025-40129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40129">CVE-2025-40129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40186/">CVE-2025-40186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40186">CVE-2025-40186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040504" comment="kernel-default 6.12.0-160000.5 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010040505" comment="kernel-livepatch-6_12_0-160000_5-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040504" comment="kernel-default 6.12.0-160000.5 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010040505" comment="kernel-livepatch-6_12_0-160000_5-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94513" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253415" ref_url="https://bugzilla.suse.com/1253415" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024642.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.6.1 fixes one security issue

The following security issue was fixed:

- CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling (bsc#1253415).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253415">SUSE bug 1253415</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047325" comment="kernel-livepatch-6_12_0-160000_6-default-5-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047325" comment="kernel-livepatch-6_12_0-160000_6-default-5-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94514" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2, libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247850" ref_url="https://bugzilla.suse.com/1247850" source="BUGZILLA"/>
		<reference ref_id="1247858" ref_url="https://bugzilla.suse.com/1247858" source="BUGZILLA"/>
		<reference ref_id="1250553" ref_url="https://bugzilla.suse.com/1250553" source="BUGZILLA"/>
		<reference ref_id="1256804" ref_url="https://bugzilla.suse.com/1256804" source="BUGZILLA"/>
		<reference ref_id="1256807" ref_url="https://bugzilla.suse.com/1256807" source="BUGZILLA"/>
		<reference ref_id="1256808" ref_url="https://bugzilla.suse.com/1256808" source="BUGZILLA"/>
		<reference ref_id="1256809" ref_url="https://bugzilla.suse.com/1256809" source="BUGZILLA"/>
		<reference ref_id="1256810" ref_url="https://bugzilla.suse.com/1256810" source="BUGZILLA"/>
		<reference ref_id="1256811" ref_url="https://bugzilla.suse.com/1256811" source="BUGZILLA"/>
		<reference ref_id="1256812" ref_url="https://bugzilla.suse.com/1256812" source="BUGZILLA"/>
		<reference ref_id="1257593" ref_url="https://bugzilla.suse.com/1257593" source="BUGZILLA"/>
		<reference ref_id="1257594" ref_url="https://bugzilla.suse.com/1257594" source="BUGZILLA"/>
		<reference ref_id="1257595" ref_url="https://bugzilla.suse.com/1257595" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911/" source="CVE"/>
		<reference ref_id="CVE-2025-8732" ref_url="https://www.suse.com/security/cve/CVE-2025-8732/" source="CVE"/>
		<reference ref_id="CVE-2026-0990" ref_url="https://www.suse.com/security/cve/CVE-2026-0990/" source="CVE"/>
		<reference ref_id="CVE-2026-0992" ref_url="https://www.suse.com/security/cve/CVE-2026-0992/" source="CVE"/>
		<reference ref_id="CVE-2026-1757" ref_url="https://www.suse.com/security/cve/CVE-2026-1757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<description>
This update for libxml2, libxslt fixes the following issues:

Changes in libxml2:

- CVE-2026-0990: call stack overflow may lead to application crash due to infinite recursion in
  `xmlCatalogXMLResolveURI` (bsc#1256807, bsc#1256811).
- CVE-2026-0992: excessive resource consumption when processing XML catalogs due to exponential behavior when handling
  `nextCatalog` elements (bsc#1256809, bsc#1256812).
- CVE-2025-8732: infinite recursion in catalog parsing functions when processing malformed SGML catalog files
  (bsc#1247858).
- CVE-2026-1757: memory leak in the `xmllint` interactive shell (bsc#1257594, bsc#1257595).
- CVE-2025-10911: parsing xsl nodes may lead to use-after-free with key data stored cross-RVT (bsc#1250553)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1247850">SUSE bug 1247850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247858">SUSE bug 1247858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250553">SUSE bug 1250553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256804">SUSE bug 1256804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256807">SUSE bug 1256807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256808">SUSE bug 1256808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256809">SUSE bug 1256809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256810">SUSE bug 1256810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256811">SUSE bug 1256811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256812">SUSE bug 1256812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257593">SUSE bug 1257593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257594">SUSE bug 1257594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257595">SUSE bug 1257595</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8732/">CVE-2025-8732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8732">CVE-2025-8732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0990/">CVE-2026-0990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0990">CVE-2026-0990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0992/">CVE-2026-0992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0992">CVE-2026-0992 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1757/">CVE-2026-1757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1757">CVE-2026-1757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047328" comment="libxml2-devel-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047329" comment="libxml2-doc-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047331" comment="libxslt-devel-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047332" comment="libxslt-tools-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047328" comment="libxml2-devel-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047329" comment="libxml2-doc-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047331" comment="libxslt-devel-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047332" comment="libxslt-tools-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94515" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253415" ref_url="https://bugzilla.suse.com/1253415" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024641.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise kernel 6.12.0-160000.8.1 fixes one security issue

The following security issue was fixed:

- CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling (bsc#1253415).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253415">SUSE bug 1253415</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047335" comment="kernel-default 6.12.0-160000.8 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010047336" comment="kernel-livepatch-6_12_0-160000_8-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047337" comment="kernel-livepatch-6_12_0-160000_8-default-2-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047335" comment="kernel-default 6.12.0-160000.8 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010047336" comment="kernel-livepatch-6_12_0-160000_8-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010047337" comment="kernel-livepatch-6_12_0-160000_8-default-2-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94516" version="1" class="patch">
	<metadata>
		<title>Recommended update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1205588" ref_url="https://bugzilla.suse.com/1205588" source="BUGZILLA"/>
		<reference ref_id="1247432" ref_url="https://bugzilla.suse.com/1247432" source="BUGZILLA"/>
		<reference ref_id="1254336" ref_url="https://bugzilla.suse.com/1254336" source="BUGZILLA"/>
		<reference ref_id="1254679" ref_url="https://bugzilla.suse.com/1254679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2312" ref_url="https://www.suse.com/security/cve/CVE-2024-2312/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

This update for shim fixes the following issues:

shim is updated to version 16.1:

- shim_start_image(): fix guid/handle pairing when uninstalling protocols
- Fix uncompressed ipv6 netboot
- fix test segfaults caused by uninitialized memory
- SbatLevel_Variable.txt: minor typo fix.
- Realloc() needs to allocate one more byte for sprintf()
- IPv6: Add more check to avoid multiple double colon and illegal char
- Loader proto v2
- loader-protocol: add workaround for EDK2 2025.02 page fault on FreePages
- Generate Authenticode for the entire PE file
- README: mention new loader protocol and interaction with UKIs
- shim: change automatically enable MOK_POLICY_REQUIRE_NX
- Save var info
- add SbatLevel entry 2025051000 for PSA-2025-00012-1
- Coverity fixes 20250804
- fix http boot
- Fix double free and leak in the loader protocol


shim is updated to version 16.0:


- Validate that a supplied vendor cert is not in PEM format
- sbat: Add grub.peimage,2 to latest (CVE-2024-2312)
- sbat: Also bump latest for grub,4 (and to todays date)
- undo change that limits certificate files to a single file
- shim: don't set second_stage to the empty string
- Fix SBAT.md for today's consensus about numbers
- Update Code of Conduct contact address
- make-certs: Handle missing OpenSSL installation
- Update MokVars.txt
- export DEFINES for sub makefile
- Drop unused EFI_IMAGE_SECURITY_DATABASE_GUID definition
- Null-terminate 'arguments' in fallback
- Fix "Verifiying" typo in error message
- Update Fedora CI targets
- Force gcc to produce DWARF4 so that gdb can use it
- Minor housekeeping 2024121700
- Discard load-options that start with WINDOWS
- Fix the issue that the gBS-&gt;LoadImage pointer was empty.
- shim: Allow data after the end of device path node in load options
- Handle network file not found like disks
- Update gnu-efi submodule for EFI_HTTP_ERROR
- Increase EFI file alignment
- avoid EFIv2 runtime services on Apple x86 machines
- Improve shortcut performance when comparing two boolean expressions
- Provide better error message when MokManager is not found
- tpm: Boot with a warning if the event log is full
- MokManager: remove redundant logical constraints
- Test import_mok_state() when MokListRT would be bigger than available size
- test-mok-mirror: minor bug fix
- Fix file system browser hang when enrolling MOK from disk
- Ignore a minor clang-tidy nit
- Allow fallback to default loader when encountering errors on network boot
- test.mk: don't use a temporary random.bin
- pe: Enhance debug report for update_mem_attrs
- Multiple certificate handling improvements
- Generate SbatLevel Metadata from SbatLevel_Variable.txt
- Apply EKU check with compile option
- Add configuration option to boot an alternative 2nd stage
- Loader protocol (with Device Path resolution support)
- netboot cleanup for additional files
- Document how revocations can be delivered
- post-process-pe: add tests to validate NX compliance
- regression: CopyMem() in ad8692e copies out of bounds
- Save the debug and error logs in mok-variables
- Add features for the Host Security ID program
- Mirror some more efi variables to mok-variables
- This adds DXE Services measurements to HSI and uses them for NX
- Add shim's current NX_COMPAT status to HSIStatus
- README.tpm: reflect that vendor_db is in fact logged as "vendor_db"
- Reject HTTP message with duplicate Content-Length header fields
- Disable log saving
- fallback: don't add new boot order entries backwards
- README.tpm: Update MokList entry to MokListRT
- SBAT Level update for February 2025 GRUB CVEs
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205588">SUSE bug 1205588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247432">SUSE bug 1247432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254336">SUSE bug 1254336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254679">SUSE bug 1254679</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2312/">CVE-2024-2312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2312">CVE-2024-2312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047568" comment="shim-16.1-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047568" comment="shim-16.1-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94517" version="1" class="patch">
	<metadata>
		<title>Security update for virtiofsd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257912" ref_url="https://bugzilla.suse.com/1257912" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
This update for virtiofsd fixes the following issue:

- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
  (bsc#1257912).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257912">SUSE bug 1257912</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047569" comment="virtiofsd-1.12.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047569" comment="virtiofsd-1.12.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94518" version="1" class="patch">
	<metadata>
		<title>Security update for helm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251442" ref_url="https://bugzilla.suse.com/1251442" source="BUGZILLA"/>
		<reference ref_id="1251649" ref_url="https://bugzilla.suse.com/1251649" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911/" source="CVE"/>
		<reference ref_id="CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190/" source="CVE"/>
		<description>
This update for helm fixes the following issues:

- Update to version 3.19.1:
  * CVE-2025-47911: golang.org/x/net/html: Fixed various algorithms with
    quadratic complexity when parsing HTML documents (bsc#1251442)
  * CVE-2025-58190: golang.org/x/net/html: Fixed xcessive memory
    consumption by `html.ParseFragment` when processing specially
    crafted input (bsc#1251649)
  * jsonschema: warn and ignore unresolved URN $ref to match
    v3.18.4
  * Avoid "panic: interface conversion: interface {} is nil"
  * Fix `helm pull` untar dir check with repo urls
  * Fix deprecation warning
  * Add timeout flag to repo add and update flags

- Update to version 3.19.0:
  * bump version to v3.19.0
  * fix: use username and password if provided
  * fix(helm-lint): fmt
  * fix(helm-lint): Add TLSClientConfig
  * fix(helm-lint): Add HTTP/HTTPS URL support for json schema references
  * chore(deps): bump the k8s-io group with 7 updates
  * fix: go mod tidy for v3
  * fix Chart.yaml handling
  * Handle messy index files
  * json schema fix
  * fix: k8s version parsing to match original
  * Do not explicitly set SNI in HTTPGetter
  * Disabling linter due to unknown issue
  * Updating link handling
  * fix: user username password for login
  * Update pkg/registry/transport.go
  * fix: add debug logging to oci transport
  * fix: legacy docker support broken for login
  * fix: plugin installer test with no Internet
  * Handle an empty registry config file.
  * Prevent fetching newReference again as we have in calling method
  * Prevent failure when resolving version tags in oras memory store
  * fix(client): skipnode utilization for PreCopy
  * test: Skip instead of returning early. looks more intentional
  * test: tests repo stripping functionality
  * test: include tests for Login based on different protocol prefixes
  * fix(client): layers now returns manifest - remove duplicate from descriptors
  * fix(client): return nil on non-allowed media types
  * Fix 3.18.0 regression: registry login with scheme
  * Update pkg/plugin/plugin.go
  * Wait for Helm v4 before raising when platformCommand and Command are set
  * Revert "fix (helm) : toToml` renders int as float [ backport to v3 ]"
  * build(deps): bump the k8s-io group with 7 updates
  * chore: update generalization warning message
  * fix: move warning to top of block
  * fix: govulncheck workflow
  * fix: replace fmt warning with slog
  * fix: add warning when ignore repo flag
  * feat: add httproute from gateway-api to create chart template

- Update to version 3.18.6:
  * fix(helm-lint): fmt
  * fix(helm-lint): Add TLSClientConfig
  * fix(helm-lint): Add HTTP/HTTPS URL support for json schema
    references

- Update to version 3.18.5:
  * fix Chart.yaml handling 7799b48 (Matt Farina)
  * Handle messy index files dd8502f (Matt Farina)
  * json schema fix cb8595b (Robert Sirchia)

- Fix shell completion dependencies
  * Add BuildRequires to prevent inclusion of folders owned by shells.
  * Add Requires because installing completions without appropriate
    shell is questionable.

- Fix zsh completion location
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1251442">SUSE bug 1251442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251649">SUSE bug 1251649</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047570" comment="helm-3.19.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047571" comment="helm-bash-completion-3.19.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047572" comment="helm-fish-completion-3.19.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047573" comment="helm-zsh-completion-3.19.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047570" comment="helm-3.19.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047571" comment="helm-bash-completion-3.19.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047572" comment="helm-fish-completion-3.19.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047573" comment="helm-zsh-completion-3.19.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94519" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-rtsp-server, gstreamer-plugins-ugly, gstreamer-plugins-rs, gstreamer-plugins-libav, gstreamer-plugins-good, gstreamer-plugins-base, gstreamer-plugins-bad, gstreamer-docs, gstreamer-devtools, gstreamer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1237097" ref_url="https://bugzilla.suse.com/1237097" source="BUGZILLA"/>
		<reference ref_id="1248053" ref_url="https://bugzilla.suse.com/1248053" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<description>
This update for gstreamer-rtsp-server, gstreamer-plugins-ugly, gstreamer-plugins-rs, gstreamer-plugins-libav, gstreamer-plugins-good, gstreamer-plugins-base, gstreamer-plugins-bad, gstreamer-docs, gstreamer-devtools, gstreamer fixes the following issues:

Changes in gstreamer-rtsp-server:

- Update to version 1.26.7:
  + Fix issues with G_DISABLE_CHECKS &amp; G_DISABLE_ASSERT.
  + rtsp-server: tests: Switch to fixtures to ensure pool shutdown
  + rtsp-server: tests: Fix a few memory leaks

Changes in gstreamer-plugins-ugly:

- Update to version 1.26.7:
  + No changes, stable version bump only.

Changes in gstreamer-plugins-rs:

- Update to version 1.26.7+git0.6ab75814:

  * tracers: Fix inverted append logic when writing log files
  * threadshare:

    - examples: standalone: also handle buffer lists
    - Pad push_list: downgrade Pad flushing log level
    - sinks: fix / handle query()
    - backpressure: abort pending items on flush start
    - udpsink: fix panic recalculating latency from certain
      executors
    - audiotestsrc:
      . support more Audio formats
      . use AudioInfo
      . fix latency
      . act as a pseudo live source by default
    - runtime task: execute action in downward transition
    - example cleanups
    - udpsink: distinguish sync status for latency &amp; report added
      latency
    - sink elements: implement `send_event`
    - dataqueue elements: report min and max latency

  * rtp:

    - Add linear audio (L8, L16, L24) RTP payloaders / depayloaders

  * rtp: basedepay: reuse last PTS, when possible
  * skia: Update to skia-safe 0.89
  * mp4: Update to mp4-atom 0.9
  * Update dependencies
  * webrtc: livekit: Drop connection lock after take()
  * onvifmetadatapay: copy metadata from source buffer
  * fallbacksrc: Fix custom source reuse case
  * add `rust-tls-native-roots` feature to the `reqwest` dep
  * rtpamrpay2:
    - Actually forward the frame quality indicator
    - Set frame quality indicator flag

- Add patch to fix reproducibility of package build (boo#1237097)

- Update to version 1.26.6+git20.e287e869:

  * Fix some new clippy 1.90 warnings
  * colordetect: Don't use deprecated color_name API
  * deny: Update
  * quinn: Update to web-transport-quinn 0.8
  * skia: Update to skia-safe 0.88
  * Update Cargo.lock
  * Allow windows-sys 0.61 too
  * intersink: add sync property
  * meson: Fix .pc files installation and simplify build output
    handling. This also fixes the .pc file install directory and
    ensures that the .pc files are only installed when static
    builds is enabled.
- Drop devel subpackage following upstream changes.

- Update to version 1.26.6:

  + aws: Ensure task stopping on paused-to-ready state change
  + fallbacksrc:

    - Don't panic during retries if the element was shut down in
      parallel
    - Don't restart source if the element is just being shut down
    - Fix some custom source deadlocks
    - Fix sources only being restarted once

  + gtk4: Try importing dmabufs withouth DMA_DRM caps
  + inter: Give the appsrc/appsink a name that has the parent
    element as prefix
  + mp4: Skip tests using x264enc if it does not exist
  + rtpgccbwe: avoid clamp() panic when min_bitrate &gt; max_bitrate
  + rtpmp4gdepay2: allow only constantduration with neither
    constantsize nor sizelength set
  + rtprecv: fix race condition on first buffer
  + speechmatics: Specify rustls as an explicit dependency
  + spotify: update to librespot 0.7
  + threadshare:

    - add a blocking adapter element
    - always use block_on_or_add_subtask
    - audiotestsrc: fix setting samples-per-buffer...
    - blocking_adapter: fix Since marker in docs
    - fix resources not available when preparing asynchronously
    - fix ts-inter test one_to_one_up_first
    - have: have Task log its obj
    - intersink: return from blocking tasks when stopping
    - inter: update doc example
    - runtime/pad: lower log level pushing Buffer to flushing pad
    - separate blocking &amp; throttling schedulers
    - update examples
    - Update to getifaddrs 0.5
    - Fix macOS build post getifaddrs 0.5 update
    - Bump up getiffaddrs to 0.1.5 and revert "udp: avoid
      getifaddrs in android"
    - Reapply "udp: avoid getifaddrs in android"

  + transcriberbin: Fix some deadlocks
  + Update dependencies
  + webrtc: Migrate to warp 0.4 and switch to tokio-rustls
  + webrtc/signalling: Fix setting of host address
  + ci: add script to check readme against plugins list
  + Fix various new clippy 1.89 warnings
  + Don't suggest running cargo cinstall after cargo cbuild
  + meson: Isolate built plugins from cargo target directory

- Update to version 1.26.5+git11.949807a4 (boo#1248053,
  CVE-2025-55159):

  + rtprecv: fix race condition on first buffer
  + threadshare: intersink: return from blocking tasks when
    stopping
  + threadshare: inter: store upstream latency in InterContext
  + threadshare: add a blocking adapter element
  + transcriberbin: Fix settings/state lock order violation in
    set_property()
  + transcriberbin: Don't keep state locked while querying upstream
    latency
  + threadshare: audiotestsrc: fix setting samples-per-buffer...
  + rtpgccbwe: avoid clamp() panic when min_bitrate &gt; max_bitrate
  + fallbacksrc: Don't restart source if the element is just being
    shut down
  + aws: Ensure task stopping on paused-to-ready state change
  + fallbacksrc: Don't panic during retries if the element was shut
    down in parallel
  + Update Cargo.lock.

- Update to version 1.26.5:

  + awstranscriber2, awstranslate: Handle multiple stream-start
    event
  + ceaX08overlay: support ANY caps features, allowing e.g.
    memory:GLMemory if downstream supports the overlay composition
    meta
  + hlsmultivariantsink: Fix master playlist version
  + rtprecv: Drop state lock before chaining RTCP packets from the
    RTP chain function
  + Add rtpbin2 examples
  + rtpmp4apay2: fix payload size prefix
  + rtp: threadshare: fix some property ranges
  + mpegtslivesrc: Remove leftover debug message
  + ts-audiotestsrc fixes
  + threadshare: fix flush for ts-queue ts-proxy &amp; ts-intersrc
  + threadshare: fix regression in ts-proxysrc
  + threadshare: improvements to some elements
  + threadshare: Enable windows Win32_Networking feature
  + threadshare: queue &amp; proxy: fix race condition stopping
  + threadshare: Also enable windows Win32_Networking_WinSock
    feature
  + tracers: pipeline-snapshot: reduce WebSocket connection log
    level
  + tracers: queue-levels: add support for threadshare DataQueue
    related elements
  + tracers: Update to etherparse 0.19
  + transcriberbin: Fix handling of upstream latency query
  + webrtcsink: Move videorate before videoconvert and videoscale
    to avoid processing frames that would be dropped
  + Fix various new clippy 1.89 warnings

- Update to version 1.26.4:
  + aws: s3hlssink: Write to S3 on OutputStream flush
  + cea708mux: fix clipping function
  + dav1ddec: Use video decoder base class latency reporting API
  + elevenlabssynthesizer: fix running time checks
  + gopbuffer: Push GOPs in order of time on EOS
  + gtk4: Improve color-state fallbacks for unknown values
  + gtk4: Add YCbCr memory texture formats
  + gtk4: Promote set_caps debug log to info
  + hlssink3: Fix a comment typo
  + hlssink3: Use closed fragment location in playlist generation
  + livekit: add room-timeout
  + mccparse: Convert "U" to the correct byte representation
  + mp4mux: add TAI timestamp element and muxing
  + threadshare: add a ts-rtpdtmfsrc element
  + rtp: Update to rtcp-types 0.2
  + rtpsend: Don't configure a zero min RTCP interval for senders
  + rtpbin2: Fix handling of unknown PTs and don't warn about
    incomplete RTP caps to allow for bundling
  + rtpbin2: Improve rtcp-mux support
  + rtpbin2: fix race condition on serialized Queries
  + rtpbin2: sync: fix race condition
  + rtprecv optimize src pad scheduling
  + rtprecv: fix SSRC collision event sent in wrong direction
  + skia: Add harfbuzz, freetype and fontconfig as dependencies in
    the meson build
  + tttocea{6,7}08: Disallow pango markup from input caps
  + ts-intersrc: handle dynamic inter-ctx changes
  + threadshare: src elements: don't pause the task in downward
    state transitions
  + webrtc: sink: avoid recursive locking of the session
  + webrtcsink: fix deadlock on error setting remote description
  + webrtcsink: add mitigation modes parameter and signal
  + webrtc: fix Safari addIceCandidate crash
  + webrtc-api: Set default bundle policy to max-bundle
  + WHIP client: emit shutdown after DELETE request
  + Fix various new clippy 1.88 warnings
  + Update dependencies

- Update to version 1.26.3:

  + Add new speech synthesis element around ElevenLabs API
  + cea708mux: fix another WouldOverflow case
  + cea708mux: support configuring a limit to how much data will be
    pending.
  + cea708overlay: also reset the output size on flush stop
  + gcc: handle out of order packets
  + fmp4mux: Fix panic on late GOP
  + livekit: expose a connection state property
  + mp4mux: add taic box
  + mp4mux: test the trak structure
  + pcap_writer: Make target-property and pad-path properties
    writable again
  + skia: Don't build skia plugin by default for now
  + threadshare: cleanups &amp; usability improvements
  + threadshare: sync runtime with latest async-io
  + threadshare: fix kqueue reactor
  + threadshare: Update to getifaddrs 0.2
  + threadshare: add new thread-sharing inter elements
  + threadshare: add a ts-rtpdtmfsrc element
  + transcriberbin: fix naming of subtitle pads
  + tttocea708: don't panic if a new service would overflow
  + webrtc: android: Update Gradle and migrate to
    FindGStreamerMobile
  + webrtc: add new examples for stream selection over data channel
  + webrtcsrc: the webrtcbin get-transceiver index is not
    mlineindex
  + webrtcsrc: send CustomUpstream events over control channel ..
  + webrtcsink: Don't require encoder element for pre-encoded
    streams
  + webrtcsink: Don't reject caps events if the codec_data changes
  + whip: server: pick session-id from the endpoint if specified
  + cargo: add config file to force
    CARGO_NET_GIT_FETCH_WITH_CLI=true
  + Cargo.lock, deny: Update dependencies and log duplicated
    targo-lexicon
  + Update windows-sys dependency from "&gt;=0.52, &lt;=0.59" to "&gt;=0.52,
    &lt;=0.60"
  + deny: Add override for windows-sys 0.59
  + deny: Update lints
  + cargo_wrapper: Fix backslashes being parsed as escape codes on
    Windows
  + Fixes for Clock: non-optional return types
  + Rename relationmeta plugin to analytics

Changes in gstreamer-plugins-libav:

- Update to version 1.26.7:

  + No changes, stable versionbump only.

Changes in gstreamer-plugins-good:

- Update to version 1.26.7:

  + matroskamux: Properly check if pads are EOS in find_best_pad
  + qtdemux:
    - Bad performance with GoPro videos containing FDSC metadata
      tracks
    - Fix open/seek perf for GoPro files with SOS track
    - Handle unsupported channel layout tags gracefully
    - Set channel-mask to 0 for unknown layout tags
  + rtspsrc: Send RTSP keepalives in TCP/interleaved modes
  + v4l2:
    - Add GstV4l2Error handling in gst_v4l2_get_capabilities
    - Fix memory leak for DRM caps negotiation
  + v4l2transform: reconfigure v4l2object only if respective caps
    changed
  + Fix issues with G_DISABLE_CHECKS &amp; G_DISABLE_ASSERT

- Update to version 1.26.6:

  + adaptivedemux2: fix crash due to log
  + adaptivedemux2: Crash in logging when "Dropping EOS before next
    period"
  + hlsdemux2: Fix parsing of byterange and init map directives
  + mpg123audiodec: Always break the decoding loop and relay
    downstream flow errors upstream
  + v4l2: Add support for WVC1 and WMV3
  + Monorepo: dv plugin requires explicit enablement now for a
    build using the Meson subproject fallback

- Update to version 1.26.5:

  + 4l2: fix memory leak for dynamic resolution change
  + videorate, imagefreeze: add support for JPEG XS

- Update to version 1.26.4:

  + adaptivedemux2: Fixed reverse playback
  + matroskademux: Send tags after seeking
  + qtdemux: Fix incorrect FourCC used when iterating over sbgp
    atoms
  + qtdemux: Incorrect sibling type used in sbgp iteration loop
  + rtph265pay: add profile-id, tier-flag, and level-id to output
    rtp caps
  + rtpjpeg: fix copying of quant data if it spans memory segments
  + soup: Disable range requests when talking to Python's
    http.server
  + v4l2videodec: need replace acquired_caps on set_format success
  + Fix various valgrind/test errors when GST_DEBUG is enabled
  + More valgrind and test fixes
  + Various ASAN fixes

- Update to version 1.26.3:

  + aacparse: Fix counting audio channels in program_config_element
  + adaptivedemux2: free cancellable when freeing transfer task
  + dashdemux2: Fix seeking in a stream with gaps
  + decodebin wavparse cannot pull header
  + imagefreeze: fix not negotiate log when stop
  + osxvideosink: Use gst_pad_push_event() and post navigation
    messages
  + qml6glsink: Allow configuring if the item will consume input
    events
  + qtmux: Update chunk offsets when converting stco to co64 with
    faststart
  + splitmuxsink: Only send closed message once per open fragment
  + rtph265depay: CRA_NUT can also start an (open) GOP
  + rtph265depay: fix codec_data generation
  + rtspsrc: Don't emit error during close if server is EOF
  + twcc: Fix reference timestamp wrapping (again)
  + v4l2: Fix possible internal pool leak
  + v4l2object: Add support for colorimetry bt2100-pq and 1:4:5:3
  + wavparse: Don't error out always when parsing acid chunks

Changes in gstreamer-plugins-base:

- Update to version 1.26.7:

  + discoverer: Mark gst_discoverer_stream_info_list_free() as
    transfer full
  + riff: Add channel reorder maps for 3 and 7 channel audio
  + sdp: proper usage of gst_buffer_append
  + videorate: fix assert fail due to invalid buffer duration
  + Fix build error with glib &lt; 2.68

- Update to version 1.26.6:

  + decodebin3: Update stream tags
  + rtpbasedepayload: Avoid potential use-after free
  + rtspconnection: Add get_url and get_ip return value annotation
  + gst_rtsp_connection_get_url return value transfer annotation
    missing
  + videometa: Fix valgrind warning when deserializing video meta
  + videorate: don't hold the reference to the buffer in drop-only
    mode
  + gst-device-monitor-1.0: Fix device-path regression on Windows
  + gst-device-monitor-1.0: Add quoting for powershell and cmd
  + Monorepo: opengl, vorbis, plugins require explicit enablement
    now for a build using the Meson subproject fallback

- Update to version 1.26.5:

  + audioconvert: mix-matrix causes caps negotiation failure
  + decodebin3: Don't error on an incoming ONVIF metadata stream
  + gloverlay: Recompute geometry when caps change, and load
    texture after stopping and starting again
  + uridecodebin3: Add missing locking and NULL checks when adding
    URIs to messages
  + uridecodebin3: segfault in update_message_with_uri() if no
    decoder available
  + videorate, imagefreeze: add support for JPEG XS
  + gst-device-monitor-1.0: Add shell quoting for launch lines
  + gst-device-monitor-1.0: Fix criticals, and also accept utf8 in
    launch lines
  + gst-device-monitor-1.0: Use gst_print instead of g_print

- Update to version 1.26.4:

  + Revert "streamsynchronizer: Consider streams having received
    stream-start as waiting"
  + alsa: free conf cache under valgrind
  + gst-device-monitor: Fix caps filter splitting
  + Fix various valgrind/test errors when GST_DEBUG is enabled
  + More valgrind and test fixes
  + Various ASAN fixes

- Update to version 1.26.3:

  + GstAudioAggregator: fix structure unref in peek_next_sample()
  + audioconvert: Fix setting mix-matrix when input caps changes
  + encodebasebin: Duplicate encoding profile in property setter
  + gl: simplify private
    gst_gl_gst_meta_api_type_tags_contain_only()
  + osxvideosink: Use gst_pad_push_event() and post navigation
    messages
  + playsink: Fix race condition in stream synchronizer pad cleanup
    during state changes
  + python: Fix pulling events from appsink
  + streamsynchronizer: Consider streams having received
    stream-start as waiting
  + urisourcebin: Text tracks are no longer set as sparse stream in
    urisourcebin's multiqueue

Changes in gstreamer-plugins-bad:

- Update to version 1.26.7:

  + cuda: Fix runtime kernel compile with CUDA 13.0
  + d3d12convert: Fix crop meta support
  + d3d12deinterlace: Fix passthrough handling
  + gst: Fix a few small leaks
  + matroskamux: Properly check if pads are EOS in find_best_pad
  + tsdemux: Directly forward Opus AUs without opus_control_header
  + tsmux: Write a full Opus channel configuration if no matching
    Vorbis one is found
  + unixfd: Fix case of buffer with big payload
  + vacompositor: Correct scale-method properties
  + webrtc: nice: Fix a use-after-free and a mem leak
  + Fix all compiler warnings on Fedora
  + Fix issues with G_DISABLE_CHECKS &amp; G_DISABLE_ASSERT

- Update to version 1.26.6:

  + analytics: always add GstTensorMeta
  + cccombiner: Crash fixes
  + curlsmtpsink: adapt to date formatting issue
  + decklinkvideosrc: fix decklinkvideosrc becomes unrecoverable if
    it fails to start streaming
  + decklinkvideosrc gets into unrecoverable state if device is
    busy
  + dwrite: Fix D3D12 critical warning
  + hlsdemux: Fix parsing of byterange and init map directives
  + mpegtsmux: Caps event fails with stream type change error
  + vulkanh24xdec: couple of fixes
  + vulkanh26xdec: fix discont state handling
  + waylandsink: add some error handler for event dispatch
  + zbar: tests: Handle symbol-bytes as not null-terminated
  + Monorepo: avtp, codec2json, iqa, microdns, openjpeg, qroverlay,
    soundtouch, tinyalsa plugins require explicit enablement now
    for a build using the Meson subproject fallback

- Update to version 1.26.5:

  + av1parse: Don't error out on "currently" undefined seq-level
    indices
  + av1parse: fails to parse AV1 bitstreams generated by FFmpeg
    using the av1_nvenc hardware encoder
  + d3d12screencapturedevice: Avoid false device removal on monitor
    reconfiguration
  + d3d12screencapturesrc: Fix OS handle leaks/random crash in WGC
    mode
  + meson: d3d12: Add support for MinGW DirectXMath package
  + va: Re-negotiate after FLUSH
  + vaXXXenc: calculate latency with corrected framerate
  + vaXXXenc: fix potential race condition
  + vkphysicaldevice: enable sampler ycbcr conversion,
    synchronization2 and timeline semaphore features
  + vulkan: ycbcr conversion extension got promoted in 1.1.0
  + wasapi2: Port to IMMDevice based device selection

- Fix really disabling faad when building without faad support.

- Do not build with faad in SLE16 where faad2 is not available.

- Update to version 1.26.4:

  + avtp: crf: Setup socket during state change to ensure we handle
    failure
  + d3d12screencapture: Add support for monitor add/remove in
    device provider
  + mpegtsmux: fix double free caused by shared PMT descriptor
  + openh264: Ensure src_pic is initialized before use
  + rtmp2src: various fixes to make it play back AWS medialive
    streams
  + ssdobjectdetector: Use correct tensor data index for the scores
  + v4l2codecs: h265dec: Fix zero-copy of cropped window located at
    position 0,0
  + vp9parse: Fix handling of spatial SVC decoding
  + vp9parse: Revert "Always default to super-frame"
  + vtenc: Fix negotiation failure with profile=main-422-10
  + vulkan: Fix drawing too many triangles in fullscreenquad
  + vulkanfullscreenquad: add locks for synchronisation
  + Fix various valgrind/test errors when GST_DEBUG is enabled
  + More valgrind and test fixes
  + Various ASAN fixes

- Provide and Obsolete gstreamer-1.20-plugin-openh264 too, not just
  gstreamer-plugin-openh264.

- Update to version 1.26.3:

  + amc: Overhaul hw-accelerated video codecs detection
  + bayer2rgb: Fix RGB stride calculation
  + d3d12compositor: Fix critical warnings
  + dashsink: Fix failing test
  + decklink: calculate internal using values closer to the current
    clock times
  + decklinkvideosink: show preroll frame correctly
  + decklink: clock synchronization after pause
  + h266parser: Fix overflow when parsing subpic_level_info
  + lcevcdec: Check for errors after receiving all enhanced and
    base pictures
  + meson: fix building -bad tests with disabled soundtouch
  + mpegts: handle MPEG2-TS with KLV metadata safely by preventing
    out of bounds
  + mpegtsmux: Corrections around Teletext handling
  + srtsink: Fix header buffer filtering
  + transcoder: Fix uritranscodebin reference handling
  + tsdemux: Allow access unit parsing failures
  + tsdemux: Send new-segment before GAP
  + vulkanupload: fix regression for uploading VulkanBuffer
  + vulkanupload: fix regression when uploading to single memory
    multiplaned memory images
  + webrtcbin: disconnect signal ICE handlers on dispose
  + {d3d12,d3d11}compositor: Fix negative position handling
  + {nv,d3d12,d3d11}decoder: Use interlace info in input caps

- Build with noopenh264, move plugin to main package.
- Drop conditionals for fdk-aac, explicitly build it for all
  targets.

- Move faad plugin to main package.

Changes in gstreamer-docs:

- Update to version 1.26.7:
  + No changes, stable bump only.
  + Update docs.

Changes in gstreamer-devtools:

- Update to version 1.26.7:

  + Fix issues with G_DISABLE_CHECKS &amp; G_DISABLE_ASSERT

- Update to version 1.26.6:

  + validate: http-actions: Replace GUri with GstURI for GLib 2.64
    compatibility
  + Fix memory leak and use of incorrect context

- Update to version 1.26.5:

  + No changes, stable bump only.

- Update vendored dependencies (boo#1248053, CVE-2025-55159).

- Update to version 1.26.4:

  + Update various Rust dependencies

- Update to version 1.26.3:

  + validate: More memory leaks
  + validate: Valgrind fixes

Changes in gstreamer:

- Update to version 1.26.7:

  + Highlighted bugfixes in 1.26.7:

    - cea608overlay: improve handling of non-system memory
    - cuda: Fix runtime kernel compile with CUDA 13.0
    - d3d12: Fix crop meta support in converter and passthrough
      handling in deinterlacer
    - fallbacksrc: source handling improvements; no-more-pads
      signal for streams-unaware parents
    - inter: add properties to fine tune the inner elements
    - qtdemux: surround sound channel layout handling fixes and
      performance improvements for GoPro videos
    - rtp: Add linear audio (L8, L16, L24) RTP payloaders /
      depayloaders
    - rtspsrc: Send RTSP keepalives in TCP/interleaved modes
    - rtpamrpay2: frame quality indicator flag related fixes
    - rtpbasepay2: reuse last PTS when possible, to work around
      problems with NVIDIA Jetson AV1 encoder
    - mpegtsmux, tsdemux: Opus audio handling fixes
    - threadshare: latency related improvements and many other
      fixes
    - matroskamux, tsmux, flvmux, cea608mux: Best pad determination
      fixes at EOS
    - unixfd: support buffers with a big payload
    - videorate unknown buffer duration assertion failure with
      variable framerates
    - editing services: Make GESTimeline respect
      SELECT_ELEMENT_TRACK signal discard decision; memory leak
      fixes
    - gobject-introspection annotation fixes
    - cerbero: Update meson to 1.9.0 to enable Xcode 26
      compatibility
    - Various bug fixes, build fixes, memory leak fixes, and other
      stability and reliability improvements

  + gstreamer:

    - controller: Fix get_all() return type annotation
    - gst-launch: Do not assume error messages have a src element
    - multiqueue: Fix object reference handling in signal callbacks
    - netclientclock: Fix memory leak in error paths

- Update to version 1.26.6:

  + Highlighted bugfixes in 1.26.6:

    - analytics GstTensorMeta handling changes (see note below)
    - closed caption combiner and transcriberbin stability fixes
    - decklinkvideosrc: fix unrecoverable state after failing to
      start streaming because device is busy
    - decodebin3 tag handling improvements
    - fallbacksrc: Fix sources only being restarted once, as well
      as some deadlocks and race conditions on shutdown
    - gtk4paintablesink: Try importing dmabufs withouth DMA_DRM
      caps
    - hlsdemux2: Fix parsing of byterange and init map directives
    - rtpmp4gdepay2: allow only constantduration with neither
      constantsize nor sizelength set
    - spotifysrc: update to librespot 0.7 to make work after recent
      Spotify changes
    - threadshare: new blocking adapter element for use in front of
      block elements such as sinks that sync to the clock
    - threadshare: various other threadshare element fixes and
      improvements
    - v4l2: Add support for WVC1 and WMV3
    - videorate: possible performance improvements when operating
      in drop-only mode
    - GstBaseParse fixes
    - Vulkan video decoder fixes
    - Fix gst-device-monitor-1.0 tool device-path regression on
      Windows
    - Monorepo development environment builds fewer plugins using
      subprojects by default, those require explicit enablement now
    - Python bindings: Handle buffer PTS, DTS, duration, offset,
      and offset-end as unsigned long long (regression fix)
    - Cerbero: Reduce recipe parallelism in various cases and dump
      cerbero and recipe versions into datadir during packaging
    - Various bug fixes, build fixes, memory leak fixes, and other
      stability and reliability improvements

  + Possibly breaking behavioural changes:

    - Previously it was guaranteed that there is only ever up to
      one GstTensorMeta per buffer. This is no longer true and code
      working with GstTensorMeta must be able to handle multiple
      GstTensorMeta now.

  + gstreamer:

    - baseparse: Try harder to fixate caps based on upstream in
      default negotiation
    - gst-discoverer reports 1x1 dimensions for "valid" MP4 files
    - baseparse: don't clear most sticky events after a FLUSH_STOP
      event
    - gstreamer: Disable miniobject inline functions for
      gobject-introspection for non-subprojects too
    - gstreamer: Make sure to zero-initialize the GValue before
      G_VALUE_COLLECT_INIT
    - ptp: Fix a new Rust 1.89 compiler warning on Windows
    - ptp: Fix new compiler warning with Rust 1.89
    - Segmentation fault when compiled with
      "-ftrivial-auto-var-init=pattern". Use of unitialized GValue

- Update to version 1.26.5:

  + Highlighted bugfixes:

    - audioconvert: Fix caps negotiation regression when using a
      mix matrix
    - cea608overlay, cea708overlay: Accept GPU memory buffers if
      downstream supports the overlay composition meta
    - d3d12screencapture source element and device provider fixes
    - decodebin3: Don't error on an incoming ONVIF metadata stream
    - uridecodebin3: Fix potential crash when adding URIs to
      messages, e.g. if no decoder is available
    - v4l2: Fix memory leak for dynamic resolution change
    - VA encoder fixes
    - videorate, imagefreeze: Add support for JPEG XS
    - Vulkan integration fixes
    - wasapi2 audio device monitor improvements
    - threadshare: Many improvements and fixes to the generic
      threadshare and RTP threadshare elements
    - rtpbin2 improvements and fixes
    - gst-device-monitor-1.0 command line tool improvements
    - Various bug fixes, build fixes, memory leak fixes, and other
      stability and reliability improvements

  + gstreamer:

    - aggregator: add sub_latency_min to pad queue size
    - build: Disable C5287 warning on MSVC

- Update to version 1.26.4:

  + Highlighted bugfixes in 1.26.4:

    - adaptivedemux2: Fixed reverse playback
    - d3d12screencapture: Add support for monitor add/remove in
      device provider
    - rtmp2src: various fixes to make it play back AWS medialive
      streams
    - rtph265pay: add profile-id, tier-flag, and level-id to output
      rtp caps
    - vp9parse: Fix handling of spatial SVC decoding
    - vtenc: Fix negotiation failure with profile=main-422-10
    - gtk4paintablesink: Add YCbCr memory texture formats and other
      improvements
    - livekit: add room-timeout
    - mp4mux: add TAI timestamp muxing support
    - rtpbin2: fix various race conditions, plus other bug fixes
      and performance improvements
    - threadshare: add a ts-rtpdtmfsrc element, implement run-time
      input switching in ts-intersrc
    - webrtcsink: fix deadlock on error setting remote description
      and other fixes.
    - cerbero: WiX installer: fix missing props files in the MSI
      packages
    - smaller macOS/iOS package sizes
    - Various bug fixes, build fixes, memory leak fixes, and other
      stability and reliability improvements

  + gstreamer:

    - tracers: Fix deadlock in latency tracer
    - Fix various valgrind/test errors when GST_DEBUG is enabled
    - More valgrind and test fixes
    - Various ASAN fixes

- Update to version 1.26.3:

  + Highlighted bugfixes in 1.26.3:

    - Security fix for the H.266 video parser
    - Fix regression for WAV files with acid chunks
    - Fix high memory consumption caused by a text handling
      regression in uridecodebin3 and playbin3
    - Fix panic on late GOP in fragmented MP4 muxer
    - Closed caption conversion, rendering and muxing improvements
    - Decklink video sink preroll frame rendering and clock drift
      handling fixes
    - MPEG-TS demuxing and muxing fixes
    - MP4 muxer fixes for creating very large files with faststart
      support
    - New thread-sharing 1:N inter source and sink elements, and a
      ts-rtpdtmfsrc
    - New speech synthesis element around ElevenLabs API
    - RTP H.265 depayloader fixes and improvements, as well as TWCC
      and GCC congestion control fixes
    - Seeking improvements in DASH client for streams with gaps
    - WebRTC sink and source fixes and enhancements, including to
      LiveKit and WHIP signallers
    - The macOS osxvideosink now posts navigation messages
    - QtQML6GL video sink input event handling improvements
    - Overhaul detection of hardware-accelerated video codecs on
      Android
    - Video4Linux capture source fixes and support for BT.2100 PQ
      and 1:4:5:3 colorimetry
    - Vulkan buffer upload and memory handling regression fixes
    - gst-python: fix various regressions introduced in 1.26.2
    - cerbero: fix text relocation issues on 32-bit Android and fix
      broken VisualStudio VC templates
    - packages: ship pbtypes plugin and update openssl to 3.5.0 LTS
    - Various bug fixes, build fixes, memory leak fixes, and other
      stability and reliability improvements

  + gstreamer:

    - aggregator: Do not set event seqnum to INVALID
    - baseparse: test: Fix race on test start
    - pad: Only remove TAG events on STREAM_START if the stream-id
      actually changes
    - utils: Mark times array as static to avoid symbol conflict
      with the POSIX function
    - vecdeque: Use correct index type gst_vec_deque_drop_struct()
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237097">SUSE bug 1237097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248053">SUSE bug 1248053</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047574" comment="gstreamer-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047576" comment="gstreamer-devtools-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047578" comment="gstreamer-docs-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047579" comment="gstreamer-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047580" comment="gstreamer-plugins-bad-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047583" comment="gstreamer-plugins-bad-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047584" comment="gstreamer-plugins-base-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047586" comment="gstreamer-plugins-base-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047587" comment="gstreamer-plugins-good-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047588" comment="gstreamer-plugins-good-extra-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047589" comment="gstreamer-plugins-good-gtk-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047590" comment="gstreamer-plugins-good-jack-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047591" comment="gstreamer-plugins-good-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047593" comment="gstreamer-plugins-libav-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047594" comment="gstreamer-plugins-rs-1.26.7+git0.6ab75814-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047595" comment="gstreamer-plugins-ugly-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047596" comment="gstreamer-plugins-ugly-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047598" comment="gstreamer-transcoder-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047600" comment="gstreamer-utils-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047601" comment="libgstadaptivedemux-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047602" comment="libgstallocators-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047603" comment="libgstanalytics-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047604" comment="libgstapp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047605" comment="libgstaudio-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047606" comment="libgstbadaudio-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047607" comment="libgstbasecamerabinsrc-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047608" comment="libgstcodecparsers-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047609" comment="libgstcodecs-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047610" comment="libgstcuda-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047612" comment="libgstfft-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047613" comment="libgstgl-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047614" comment="libgstinsertbin-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047615" comment="libgstisoff-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047616" comment="libgstmpegts-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047617" comment="libgstmse-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047618" comment="libgstpbutils-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047619" comment="libgstphotography-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047620" comment="libgstplay-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047621" comment="libgstplayer-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047622" comment="libgstreamer-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047623" comment="libgstriff-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047624" comment="libgstrtp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047625" comment="libgstrtsp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047626" comment="libgstrtspserver-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047627" comment="libgstsctp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047628" comment="libgstsdp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047629" comment="libgsttag-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047630" comment="libgsttranscoder-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047631" comment="libgsturidownloader-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047632" comment="libgstva-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047633" comment="libgstvalidate-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047634" comment="libgstvideo-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047635" comment="libgstvulkan-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047636" comment="libgstwayland-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047637" comment="libgstwebrtc-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047638" comment="libgstwebrtcnice-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047639" comment="typelib-1_0-CudaGst-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047640" comment="typelib-1_0-Gst-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047641" comment="typelib-1_0-GstAllocators-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047642" comment="typelib-1_0-GstAnalytics-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047643" comment="typelib-1_0-GstApp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047644" comment="typelib-1_0-GstAudio-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047645" comment="typelib-1_0-GstBadAudio-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047646" comment="typelib-1_0-GstCodecs-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047647" comment="typelib-1_0-GstCuda-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047649" comment="typelib-1_0-GstGL-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047650" comment="typelib-1_0-GstGLEGL-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047651" comment="typelib-1_0-GstGLWayland-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047652" comment="typelib-1_0-GstGLX11-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047653" comment="typelib-1_0-GstInsertBin-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047654" comment="typelib-1_0-GstMpegts-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047655" comment="typelib-1_0-GstMse-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047656" comment="typelib-1_0-GstPbutils-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047657" comment="typelib-1_0-GstPlay-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047658" comment="typelib-1_0-GstPlayer-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047659" comment="typelib-1_0-GstRtp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047660" comment="typelib-1_0-GstRtsp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047661" comment="typelib-1_0-GstRtspServer-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047662" comment="typelib-1_0-GstSdp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047663" comment="typelib-1_0-GstTag-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047664" comment="typelib-1_0-GstTranscoder-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047665" comment="typelib-1_0-GstVa-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047666" comment="typelib-1_0-GstValidate-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047667" comment="typelib-1_0-GstVideo-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047668" comment="typelib-1_0-GstVulkan-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047669" comment="typelib-1_0-GstVulkanWayland-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047670" comment="typelib-1_0-GstVulkanXCB-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047671" comment="typelib-1_0-GstWebRTC-1_0-1.26.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047574" comment="gstreamer-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047576" comment="gstreamer-devtools-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047578" comment="gstreamer-docs-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047579" comment="gstreamer-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047580" comment="gstreamer-plugins-bad-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047583" comment="gstreamer-plugins-bad-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047584" comment="gstreamer-plugins-base-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047586" comment="gstreamer-plugins-base-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047587" comment="gstreamer-plugins-good-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047588" comment="gstreamer-plugins-good-extra-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047589" comment="gstreamer-plugins-good-gtk-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047590" comment="gstreamer-plugins-good-jack-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047591" comment="gstreamer-plugins-good-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047593" comment="gstreamer-plugins-libav-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047594" comment="gstreamer-plugins-rs-1.26.7+git0.6ab75814-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047595" comment="gstreamer-plugins-ugly-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047596" comment="gstreamer-plugins-ugly-lang-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047598" comment="gstreamer-transcoder-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047600" comment="gstreamer-utils-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047601" comment="libgstadaptivedemux-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047602" comment="libgstallocators-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047603" comment="libgstanalytics-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047604" comment="libgstapp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047605" comment="libgstaudio-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047606" comment="libgstbadaudio-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047607" comment="libgstbasecamerabinsrc-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047608" comment="libgstcodecparsers-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047609" comment="libgstcodecs-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047610" comment="libgstcuda-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047612" comment="libgstfft-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047613" comment="libgstgl-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047614" comment="libgstinsertbin-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047615" comment="libgstisoff-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047616" comment="libgstmpegts-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047617" comment="libgstmse-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047618" comment="libgstpbutils-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047619" comment="libgstphotography-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047620" comment="libgstplay-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047621" comment="libgstplayer-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047622" comment="libgstreamer-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047623" comment="libgstriff-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047624" comment="libgstrtp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047625" comment="libgstrtsp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047626" comment="libgstrtspserver-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047627" comment="libgstsctp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047628" comment="libgstsdp-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047629" comment="libgsttag-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047630" comment="libgsttranscoder-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047631" comment="libgsturidownloader-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047632" comment="libgstva-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047633" comment="libgstvalidate-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047634" comment="libgstvideo-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047635" comment="libgstvulkan-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047636" comment="libgstwayland-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047637" comment="libgstwebrtc-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047638" comment="libgstwebrtcnice-1_0-0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047639" comment="typelib-1_0-CudaGst-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047640" comment="typelib-1_0-Gst-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047641" comment="typelib-1_0-GstAllocators-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047642" comment="typelib-1_0-GstAnalytics-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047643" comment="typelib-1_0-GstApp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047644" comment="typelib-1_0-GstAudio-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047645" comment="typelib-1_0-GstBadAudio-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047646" comment="typelib-1_0-GstCodecs-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047647" comment="typelib-1_0-GstCuda-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047649" comment="typelib-1_0-GstGL-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047650" comment="typelib-1_0-GstGLEGL-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047651" comment="typelib-1_0-GstGLWayland-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047652" comment="typelib-1_0-GstGLX11-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047653" comment="typelib-1_0-GstInsertBin-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047654" comment="typelib-1_0-GstMpegts-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047655" comment="typelib-1_0-GstMse-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047656" comment="typelib-1_0-GstPbutils-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047657" comment="typelib-1_0-GstPlay-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047658" comment="typelib-1_0-GstPlayer-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047659" comment="typelib-1_0-GstRtp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047660" comment="typelib-1_0-GstRtsp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047661" comment="typelib-1_0-GstRtspServer-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047662" comment="typelib-1_0-GstSdp-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047663" comment="typelib-1_0-GstTag-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047664" comment="typelib-1_0-GstTranscoder-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047665" comment="typelib-1_0-GstVa-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047666" comment="typelib-1_0-GstValidate-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047667" comment="typelib-1_0-GstVideo-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047668" comment="typelib-1_0-GstVulkan-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047669" comment="typelib-1_0-GstVulkanWayland-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047670" comment="typelib-1_0-GstVulkanXCB-1_0-1.26.7-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047671" comment="typelib-1_0-GstWebRTC-1_0-1.26.7-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94520" version="1" class="patch">
	<metadata>
		<title>Security update for python-uv (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258993" ref_url="https://bugzilla.suse.com/1258993" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13327" ref_url="https://www.suse.com/security/cve/CVE-2025-13327/" source="CVE"/>
		<description>
This update for python-uv fixes the following issue:

- CVE-2025-13327: parsing differentials when processing specially crafted ZIP archives during package installation
  can lead to arbitrary code execution (bsc#1258993).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258993">SUSE bug 1258993</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13327/">CVE-2025-13327 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13327">CVE-2025-13327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047672" comment="python313-uv-0.7.18-160000.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047672" comment="python313-uv-0.7.18-160000.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94521" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256962" ref_url="https://bugzilla.suse.com/1256962" source="BUGZILLA"/>
		<reference ref_id="1256969" ref_url="https://bugzilla.suse.com/1256969" source="BUGZILLA"/>
		<reference ref_id="1256976" ref_url="https://bugzilla.suse.com/1256976" source="BUGZILLA"/>
		<reference ref_id="1257076" ref_url="https://bugzilla.suse.com/1257076" source="BUGZILLA"/>
		<reference ref_id="1258743" ref_url="https://bugzilla.suse.com/1258743" source="BUGZILLA"/>
		<reference ref_id="1258748" ref_url="https://bugzilla.suse.com/1258748" source="BUGZILLA"/>
		<reference ref_id="1258749" ref_url="https://bugzilla.suse.com/1258749" source="BUGZILLA"/>
		<reference ref_id="1258757" ref_url="https://bugzilla.suse.com/1258757" source="BUGZILLA"/>
		<reference ref_id="1258759" ref_url="https://bugzilla.suse.com/1258759" source="BUGZILLA"/>
		<reference ref_id="1258763" ref_url="https://bugzilla.suse.com/1258763" source="BUGZILLA"/>
		<reference ref_id="1258765" ref_url="https://bugzilla.suse.com/1258765" source="BUGZILLA"/>
		<reference ref_id="1258767" ref_url="https://bugzilla.suse.com/1258767" source="BUGZILLA"/>
		<reference ref_id="1258769" ref_url="https://bugzilla.suse.com/1258769" source="BUGZILLA"/>
		<reference ref_id="1258770" ref_url="https://bugzilla.suse.com/1258770" source="BUGZILLA"/>
		<reference ref_id="1258771" ref_url="https://bugzilla.suse.com/1258771" source="BUGZILLA"/>
		<reference ref_id="1258772" ref_url="https://bugzilla.suse.com/1258772" source="BUGZILLA"/>
		<reference ref_id="1258774" ref_url="https://bugzilla.suse.com/1258774" source="BUGZILLA"/>
		<reference ref_id="1258775" ref_url="https://bugzilla.suse.com/1258775" source="BUGZILLA"/>
		<reference ref_id="1258776" ref_url="https://bugzilla.suse.com/1258776" source="BUGZILLA"/>
		<reference ref_id="1258779" ref_url="https://bugzilla.suse.com/1258779" source="BUGZILLA"/>
		<reference ref_id="1258780" ref_url="https://bugzilla.suse.com/1258780" source="BUGZILLA"/>
		<reference ref_id="1258785" ref_url="https://bugzilla.suse.com/1258785" source="BUGZILLA"/>
		<reference ref_id="1258786" ref_url="https://bugzilla.suse.com/1258786" source="BUGZILLA"/>
		<reference ref_id="1258787" ref_url="https://bugzilla.suse.com/1258787" source="BUGZILLA"/>
		<reference ref_id="1258790" ref_url="https://bugzilla.suse.com/1258790" source="BUGZILLA"/>
		<reference ref_id="1258791" ref_url="https://bugzilla.suse.com/1258791" source="BUGZILLA"/>
		<reference ref_id="1258792" ref_url="https://bugzilla.suse.com/1258792" source="BUGZILLA"/>
		<reference ref_id="1258793" ref_url="https://bugzilla.suse.com/1258793" source="BUGZILLA"/>
		<reference ref_id="1258799" ref_url="https://bugzilla.suse.com/1258799" source="BUGZILLA"/>
		<reference ref_id="1258802" ref_url="https://bugzilla.suse.com/1258802" source="BUGZILLA"/>
		<reference ref_id="1258805" ref_url="https://bugzilla.suse.com/1258805" source="BUGZILLA"/>
		<reference ref_id="1258807" ref_url="https://bugzilla.suse.com/1258807" source="BUGZILLA"/>
		<reference ref_id="1258810" ref_url="https://bugzilla.suse.com/1258810" source="BUGZILLA"/>
		<reference ref_id="1258812" ref_url="https://bugzilla.suse.com/1258812" source="BUGZILLA"/>
		<reference ref_id="1258818" ref_url="https://bugzilla.suse.com/1258818" source="BUGZILLA"/>
		<reference ref_id="1258821" ref_url="https://bugzilla.suse.com/1258821" source="BUGZILLA"/>
		<reference ref_id="1259017" ref_url="https://bugzilla.suse.com/1259017" source="BUGZILLA"/>
		<reference ref_id="1259018" ref_url="https://bugzilla.suse.com/1259018" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-22770" ref_url="https://www.suse.com/security/cve/CVE-2026-22770/" source="CVE"/>
		<reference ref_id="CVE-2026-23874" ref_url="https://www.suse.com/security/cve/CVE-2026-23874/" source="CVE"/>
		<reference ref_id="CVE-2026-23876" ref_url="https://www.suse.com/security/cve/CVE-2026-23876/" source="CVE"/>
		<reference ref_id="CVE-2026-23952" ref_url="https://www.suse.com/security/cve/CVE-2026-23952/" source="CVE"/>
		<reference ref_id="CVE-2026-24481" ref_url="https://www.suse.com/security/cve/CVE-2026-24481/" source="CVE"/>
		<reference ref_id="CVE-2026-24484" ref_url="https://www.suse.com/security/cve/CVE-2026-24484/" source="CVE"/>
		<reference ref_id="CVE-2026-24485" ref_url="https://www.suse.com/security/cve/CVE-2026-24485/" source="CVE"/>
		<reference ref_id="CVE-2026-25576" ref_url="https://www.suse.com/security/cve/CVE-2026-25576/" source="CVE"/>
		<reference ref_id="CVE-2026-25637" ref_url="https://www.suse.com/security/cve/CVE-2026-25637/" source="CVE"/>
		<reference ref_id="CVE-2026-25638" ref_url="https://www.suse.com/security/cve/CVE-2026-25638/" source="CVE"/>
		<reference ref_id="CVE-2026-25794" ref_url="https://www.suse.com/security/cve/CVE-2026-25794/" source="CVE"/>
		<reference ref_id="CVE-2026-25795" ref_url="https://www.suse.com/security/cve/CVE-2026-25795/" source="CVE"/>
		<reference ref_id="CVE-2026-25796" ref_url="https://www.suse.com/security/cve/CVE-2026-25796/" source="CVE"/>
		<reference ref_id="CVE-2026-25797" ref_url="https://www.suse.com/security/cve/CVE-2026-25797/" source="CVE"/>
		<reference ref_id="CVE-2026-25798" ref_url="https://www.suse.com/security/cve/CVE-2026-25798/" source="CVE"/>
		<reference ref_id="CVE-2026-25799" ref_url="https://www.suse.com/security/cve/CVE-2026-25799/" source="CVE"/>
		<reference ref_id="CVE-2026-25897" ref_url="https://www.suse.com/security/cve/CVE-2026-25897/" source="CVE"/>
		<reference ref_id="CVE-2026-25898" ref_url="https://www.suse.com/security/cve/CVE-2026-25898/" source="CVE"/>
		<reference ref_id="CVE-2026-25965" ref_url="https://www.suse.com/security/cve/CVE-2026-25965/" source="CVE"/>
		<reference ref_id="CVE-2026-25966" ref_url="https://www.suse.com/security/cve/CVE-2026-25966/" source="CVE"/>
		<reference ref_id="CVE-2026-25967" ref_url="https://www.suse.com/security/cve/CVE-2026-25967/" source="CVE"/>
		<reference ref_id="CVE-2026-25968" ref_url="https://www.suse.com/security/cve/CVE-2026-25968/" source="CVE"/>
		<reference ref_id="CVE-2026-25969" ref_url="https://www.suse.com/security/cve/CVE-2026-25969/" source="CVE"/>
		<reference ref_id="CVE-2026-25970" ref_url="https://www.suse.com/security/cve/CVE-2026-25970/" source="CVE"/>
		<reference ref_id="CVE-2026-25971" ref_url="https://www.suse.com/security/cve/CVE-2026-25971/" source="CVE"/>
		<reference ref_id="CVE-2026-25982" ref_url="https://www.suse.com/security/cve/CVE-2026-25982/" source="CVE"/>
		<reference ref_id="CVE-2026-25983" ref_url="https://www.suse.com/security/cve/CVE-2026-25983/" source="CVE"/>
		<reference ref_id="CVE-2026-25985" ref_url="https://www.suse.com/security/cve/CVE-2026-25985/" source="CVE"/>
		<reference ref_id="CVE-2026-25986" ref_url="https://www.suse.com/security/cve/CVE-2026-25986/" source="CVE"/>
		<reference ref_id="CVE-2026-25987" ref_url="https://www.suse.com/security/cve/CVE-2026-25987/" source="CVE"/>
		<reference ref_id="CVE-2026-25988" ref_url="https://www.suse.com/security/cve/CVE-2026-25988/" source="CVE"/>
		<reference ref_id="CVE-2026-25989" ref_url="https://www.suse.com/security/cve/CVE-2026-25989/" source="CVE"/>
		<reference ref_id="CVE-2026-26066" ref_url="https://www.suse.com/security/cve/CVE-2026-26066/" source="CVE"/>
		<reference ref_id="CVE-2026-26283" ref_url="https://www.suse.com/security/cve/CVE-2026-26283/" source="CVE"/>
		<reference ref_id="CVE-2026-26284" ref_url="https://www.suse.com/security/cve/CVE-2026-26284/" source="CVE"/>
		<reference ref_id="CVE-2026-26983" ref_url="https://www.suse.com/security/cve/CVE-2026-26983/" source="CVE"/>
		<reference ref_id="CVE-2026-27798" ref_url="https://www.suse.com/security/cve/CVE-2026-27798/" source="CVE"/>
		<reference ref_id="CVE-2026-27799" ref_url="https://www.suse.com/security/cve/CVE-2026-27799/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2026-22770: improper pointer initialization can cause denial of service (bsc#1256969).
- CVE-2026-23874: manipulation of digital images can lead to stack overflow (bsc#1256976).
- CVE-2026-23876: ImageMagick: maliciously crafted image can lead to heap buffer overflow (bsc#1256962).
- CVE-2026-23952: processing comment tag can cause null pointer dereference (bsc#1257076).
- CVE-2026-24481: Possible Heap Information Disclosure in PSD ZIP Decompression (bsc#1258743).
- CVE-2026-24484: denial of service vulnerability via multi-layer nested MVG to SVG conversion (bsc#1258790).
- CVE-2026-24485: denial of service via malformed PCD file processing (bsc#1258791).
- CVE-2026-25576: Out of bounds read in multiple coders that read raw pixel data (bsc#1258748).
- CVE-2026-25637: Denial of Service via crafted image due to memory leak (bsc#1258759).
- CVE-2026-25638: Denial of Service due to memory leak in image processing (bsc#1258793).
- CVE-2026-25794: Heap-buffer-overflow via signed integer overflow in `WriteUHDRImage` when writing UHDR images with
  large dimensions (bsc#1258749).
- CVE-2026-25795: Denial of Service due to NULL pointer dereference during temporary file creation failure
  (bsc#1258792).
- CVE-2026-25796: Memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths
  (bsc#1258757).
- CVE-2026-25797: Code injection in various encoders (bsc#1258770).
- CVE-2026-25798: NULL Pointer Dereference in ClonePixelCacheRepository via crafted image (bsc#1258787).
- CVE-2026-25799: Division-by-Zero in YUV sampling factor validation leads to crash (bsc#1258786).
- CVE-2026-25897: Out-of-bounds heap write via integer overflow in sun decoder (bsc#1258799).
- CVE-2026-25898: Information disclosure or denial of service via crafted image with invalid pixel index (bsc#1258807).
- CVE-2026-25965: Policy bypass through path traversal allows reading restricted content despite secured policy
  (bsc#1258785).
- CVE-2026-25966: Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to stdin/stdout access
  (bsc#1258780).
- CVE-2026-25967: Stack buffer overflow in FTXT reader via oversized integer field (bsc#1258779).
- CVE-2026-25968: MSL attribute stack buffer overflow leads to out of bounds write (bsc#1258776).
- CVE-2026-25969: Memory Leak in coders/ashlar.c (bsc#1258775).
- CVE-2026-25970: Memory corruption and denial of service via signed integer overflow in SIXEL decoder (bsc#1258802).
- CVE-2026-25971: MSL: Stack overflow in ProcessMSLScript (bsc#1258774).
- CVE-2026-25982: Heap Out-of-Bounds Read in DCM Decoder (bsc#1258772).
- CVE-2026-25983: Denial of service via crafted MSL script (bsc#1258805).
- CVE-2026-25985: Memory allocation with excessive without limits in the internal SVG decoder (bsc#1258812).
- CVE-2026-25986: Denial of Service via malicious YUV image processing (bsc#1258818).
- CVE-2026-25987: Memory disclosure and denial of service via crafted MAP files (bsc#1258821).
- CVE-2026-25988: Denial of Service due to memory leak in image processing (bsc#1258810).
- CVE-2026-25989: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG
  decoder (bsc#1258771).
- CVE-2026-26066: Infinite loop when writing IPTCTEXT leads to denial of service via crafted profile (bsc#1258769).
- CVE-2026-26283: Possible infinite loop in JPEG encoder when using `jpeg: extent` (bsc#1258767).
- CVE-2026-26284: Heap overflow in pcd decoder leads to out of bounds read (bsc#1258765).
- CVE-2026-26983: Invalid MSL &lt;map&gt; can result in a use after free (bsc#1258763).
- CVE-2026-27798: Heap Buffer Over-read in WaveletDenoise when processing small images (bsc#1259018).
- CVE-2026-27799: ImageMagick has a heap Buffer Over-read in its DJVU image format handler (bsc#1259017).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-09"/>
	<updated date="2026-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256962">SUSE bug 1256962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256969">SUSE bug 1256969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256976">SUSE bug 1256976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257076">SUSE bug 1257076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258743">SUSE bug 1258743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258748">SUSE bug 1258748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258749">SUSE bug 1258749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258757">SUSE bug 1258757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258759">SUSE bug 1258759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258763">SUSE bug 1258763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258765">SUSE bug 1258765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258767">SUSE bug 1258767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258769">SUSE bug 1258769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258770">SUSE bug 1258770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258771">SUSE bug 1258771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258772">SUSE bug 1258772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258774">SUSE bug 1258774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258775">SUSE bug 1258775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258776">SUSE bug 1258776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258779">SUSE bug 1258779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258780">SUSE bug 1258780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258785">SUSE bug 1258785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258786">SUSE bug 1258786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258787">SUSE bug 1258787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258790">SUSE bug 1258790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258791">SUSE bug 1258791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258792">SUSE bug 1258792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258793">SUSE bug 1258793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258799">SUSE bug 1258799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258802">SUSE bug 1258802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258805">SUSE bug 1258805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258807">SUSE bug 1258807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258810">SUSE bug 1258810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258812">SUSE bug 1258812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258818">SUSE bug 1258818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258821">SUSE bug 1258821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259017">SUSE bug 1259017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259018">SUSE bug 1259018</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22770/">CVE-2026-22770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22770">CVE-2026-22770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23874/">CVE-2026-23874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23874">CVE-2026-23874 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23876/">CVE-2026-23876 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23876">CVE-2026-23876 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23952/">CVE-2026-23952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23952">CVE-2026-23952 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-24481/">CVE-2026-24481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24481">CVE-2026-24481 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-24484/">CVE-2026-24484 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24484">CVE-2026-24484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-24485/">CVE-2026-24485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24485">CVE-2026-24485 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-25576/">CVE-2026-25576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25576">CVE-2026-25576 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25637/">CVE-2026-25637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25637">CVE-2026-25637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25638/">CVE-2026-25638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25638">CVE-2026-25638 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-25794/">CVE-2026-25794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25794">CVE-2026-25794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25795/">CVE-2026-25795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25795">CVE-2026-25795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-25796/">CVE-2026-25796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25796">CVE-2026-25796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-25797/">CVE-2026-25797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25797">CVE-2026-25797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25798/">CVE-2026-25798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25798">CVE-2026-25798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25799/">CVE-2026-25799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25799">CVE-2026-25799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25897/">CVE-2026-25897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25897">CVE-2026-25897 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25898/">CVE-2026-25898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25898">CVE-2026-25898 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25965/">CVE-2026-25965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25965">CVE-2026-25965 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25966/">CVE-2026-25966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25966">CVE-2026-25966 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25967/">CVE-2026-25967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25967">CVE-2026-25967 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25968/">CVE-2026-25968 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25968">CVE-2026-25968 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-25969/">CVE-2026-25969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25969">CVE-2026-25969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25970/">CVE-2026-25970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25970">CVE-2026-25970 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25971/">CVE-2026-25971 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25971">CVE-2026-25971 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25982/">CVE-2026-25982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25982">CVE-2026-25982 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25983/">CVE-2026-25983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25983">CVE-2026-25983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25985/">CVE-2026-25985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25985">CVE-2026-25985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25986/">CVE-2026-25986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25986">CVE-2026-25986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25987/">CVE-2026-25987 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25987">CVE-2026-25987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25988/">CVE-2026-25988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25988">CVE-2026-25988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25989/">CVE-2026-25989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25989">CVE-2026-25989 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26066/">CVE-2026-26066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26066">CVE-2026-26066 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26283/">CVE-2026-26283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26283">CVE-2026-26283 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26284/">CVE-2026-26284 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26284">CVE-2026-26284 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26983/">CVE-2026-26983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26983">CVE-2026-26983 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27798/">CVE-2026-27798 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27798">CVE-2026-27798 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27799/">CVE-2026-27799 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27799">CVE-2026-27799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94522" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1214869" ref_url="https://bugzilla.suse.com/1214869" source="BUGZILLA"/>
		<reference ref_id="1214870" ref_url="https://bugzilla.suse.com/1214870" source="BUGZILLA"/>
		<reference ref_id="1214871" ref_url="https://bugzilla.suse.com/1214871" source="BUGZILLA"/>
		<reference ref_id="1219049" ref_url="https://bugzilla.suse.com/1219049" source="BUGZILLA"/>
		<reference ref_id="1223293" ref_url="https://bugzilla.suse.com/1223293" source="BUGZILLA"/>
		<reference ref_id="1223294" ref_url="https://bugzilla.suse.com/1223294" source="BUGZILLA"/>
		<reference ref_id="1223295" ref_url="https://bugzilla.suse.com/1223295" source="BUGZILLA"/>
		<reference ref_id="1223296" ref_url="https://bugzilla.suse.com/1223296" source="BUGZILLA"/>
		<reference ref_id="1223297" ref_url="https://bugzilla.suse.com/1223297" source="BUGZILLA"/>
		<reference ref_id="1223298" ref_url="https://bugzilla.suse.com/1223298" source="BUGZILLA"/>
		<reference ref_id="1223346" ref_url="https://bugzilla.suse.com/1223346" source="BUGZILLA"/>
		<reference ref_id="1223347" ref_url="https://bugzilla.suse.com/1223347" source="BUGZILLA"/>
		<reference ref_id="1223348" ref_url="https://bugzilla.suse.com/1223348" source="BUGZILLA"/>
		<reference ref_id="1223353" ref_url="https://bugzilla.suse.com/1223353" source="BUGZILLA"/>
		<reference ref_id="1243109" ref_url="https://bugzilla.suse.com/1243109" source="BUGZILLA"/>
		<reference ref_id="1256717" ref_url="https://bugzilla.suse.com/1256717" source="BUGZILLA"/>
		<reference ref_id="1256718" ref_url="https://bugzilla.suse.com/1256718" source="BUGZILLA"/>
		<reference ref_id="1256719" ref_url="https://bugzilla.suse.com/1256719" source="BUGZILLA"/>
		<reference ref_id="1256720" ref_url="https://bugzilla.suse.com/1256720" source="BUGZILLA"/>
		<reference ref_id="1256721" ref_url="https://bugzilla.suse.com/1256721" source="BUGZILLA"/>
		<reference ref_id="1256722" ref_url="https://bugzilla.suse.com/1256722" source="BUGZILLA"/>
		<reference ref_id="1256723" ref_url="https://bugzilla.suse.com/1256723" source="BUGZILLA"/>
		<reference ref_id="1256724" ref_url="https://bugzilla.suse.com/1256724" source="BUGZILLA"/>
		<reference ref_id="1256725" ref_url="https://bugzilla.suse.com/1256725" source="BUGZILLA"/>
		<reference ref_id="1256940" ref_url="https://bugzilla.suse.com/1256940" source="BUGZILLA"/>
		<reference ref_id="1256941" ref_url="https://bugzilla.suse.com/1256941" source="BUGZILLA"/>
		<reference ref_id="1256942" ref_url="https://bugzilla.suse.com/1256942" source="BUGZILLA"/>
		<reference ref_id="1256943" ref_url="https://bugzilla.suse.com/1256943" source="BUGZILLA"/>
		<reference ref_id="1256944" ref_url="https://bugzilla.suse.com/1256944" source="BUGZILLA"/>
		<reference ref_id="1256945" ref_url="https://bugzilla.suse.com/1256945" source="BUGZILLA"/>
		<reference ref_id="1256946" ref_url="https://bugzilla.suse.com/1256946" source="BUGZILLA"/>
		<reference ref_id="1256947" ref_url="https://bugzilla.suse.com/1256947" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40574" ref_url="https://www.suse.com/security/cve/CVE-2023-40574/" source="CVE"/>
		<reference ref_id="CVE-2023-40575" ref_url="https://www.suse.com/security/cve/CVE-2023-40575/" source="CVE"/>
		<reference ref_id="CVE-2023-40576" ref_url="https://www.suse.com/security/cve/CVE-2023-40576/" source="CVE"/>
		<reference ref_id="CVE-2024-22211" ref_url="https://www.suse.com/security/cve/CVE-2024-22211/" source="CVE"/>
		<reference ref_id="CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039/" source="CVE"/>
		<reference ref_id="CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040/" source="CVE"/>
		<reference ref_id="CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041/" source="CVE"/>
		<reference ref_id="CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458/" source="CVE"/>
		<reference ref_id="CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459/" source="CVE"/>
		<reference ref_id="CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460/" source="CVE"/>
		<reference ref_id="CVE-2024-32658" ref_url="https://www.suse.com/security/cve/CVE-2024-32658/" source="CVE"/>
		<reference ref_id="CVE-2024-32659" ref_url="https://www.suse.com/security/cve/CVE-2024-32659/" source="CVE"/>
		<reference ref_id="CVE-2024-32660" ref_url="https://www.suse.com/security/cve/CVE-2024-32660/" source="CVE"/>
		<reference ref_id="CVE-2024-32661" ref_url="https://www.suse.com/security/cve/CVE-2024-32661/" source="CVE"/>
		<reference ref_id="CVE-2025-4478" ref_url="https://www.suse.com/security/cve/CVE-2025-4478/" source="CVE"/>
		<reference ref_id="CVE-2026-22851" ref_url="https://www.suse.com/security/cve/CVE-2026-22851/" source="CVE"/>
		<reference ref_id="CVE-2026-22852" ref_url="https://www.suse.com/security/cve/CVE-2026-22852/" source="CVE"/>
		<reference ref_id="CVE-2026-22853" ref_url="https://www.suse.com/security/cve/CVE-2026-22853/" source="CVE"/>
		<reference ref_id="CVE-2026-22854" ref_url="https://www.suse.com/security/cve/CVE-2026-22854/" source="CVE"/>
		<reference ref_id="CVE-2026-22855" ref_url="https://www.suse.com/security/cve/CVE-2026-22855/" source="CVE"/>
		<reference ref_id="CVE-2026-22856" ref_url="https://www.suse.com/security/cve/CVE-2026-22856/" source="CVE"/>
		<reference ref_id="CVE-2026-22857" ref_url="https://www.suse.com/security/cve/CVE-2026-22857/" source="CVE"/>
		<reference ref_id="CVE-2026-22858" ref_url="https://www.suse.com/security/cve/CVE-2026-22858/" source="CVE"/>
		<reference ref_id="CVE-2026-22859" ref_url="https://www.suse.com/security/cve/CVE-2026-22859/" source="CVE"/>
		<reference ref_id="CVE-2026-23530" ref_url="https://www.suse.com/security/cve/CVE-2026-23530/" source="CVE"/>
		<reference ref_id="CVE-2026-23531" ref_url="https://www.suse.com/security/cve/CVE-2026-23531/" source="CVE"/>
		<reference ref_id="CVE-2026-23532" ref_url="https://www.suse.com/security/cve/CVE-2026-23532/" source="CVE"/>
		<reference ref_id="CVE-2026-23533" ref_url="https://www.suse.com/security/cve/CVE-2026-23533/" source="CVE"/>
		<reference ref_id="CVE-2026-23534" ref_url="https://www.suse.com/security/cve/CVE-2026-23534/" source="CVE"/>
		<reference ref_id="CVE-2026-23732" ref_url="https://www.suse.com/security/cve/CVE-2026-23732/" source="CVE"/>
		<reference ref_id="CVE-2026-23883" ref_url="https://www.suse.com/security/cve/CVE-2026-23883/" source="CVE"/>
		<reference ref_id="CVE-2026-23884" ref_url="https://www.suse.com/security/cve/CVE-2026-23884/" source="CVE"/>
		<reference ref_id="CVE-2026-23948" ref_url="https://www.suse.com/security/cve/CVE-2026-23948/" source="CVE"/>
		<reference ref_id="CVE-2026-24491" ref_url="https://www.suse.com/security/cve/CVE-2026-24491/" source="CVE"/>
		<reference ref_id="CVE-2026-24675" ref_url="https://www.suse.com/security/cve/CVE-2026-24675/" source="CVE"/>
		<reference ref_id="CVE-2026-24676" ref_url="https://www.suse.com/security/cve/CVE-2026-24676/" source="CVE"/>
		<reference ref_id="CVE-2026-24677" ref_url="https://www.suse.com/security/cve/CVE-2026-24677/" source="CVE"/>
		<reference ref_id="CVE-2026-24678" ref_url="https://www.suse.com/security/cve/CVE-2026-24678/" source="CVE"/>
		<reference ref_id="CVE-2026-24679" ref_url="https://www.suse.com/security/cve/CVE-2026-24679/" source="CVE"/>
		<reference ref_id="CVE-2026-24680" ref_url="https://www.suse.com/security/cve/CVE-2026-24680/" source="CVE"/>
		<reference ref_id="CVE-2026-24681" ref_url="https://www.suse.com/security/cve/CVE-2026-24681/" source="CVE"/>
		<reference ref_id="CVE-2026-24682" ref_url="https://www.suse.com/security/cve/CVE-2026-24682/" source="CVE"/>
		<reference ref_id="CVE-2026-24683" ref_url="https://www.suse.com/security/cve/CVE-2026-24683/" source="CVE"/>
		<reference ref_id="CVE-2026-24684" ref_url="https://www.suse.com/security/cve/CVE-2026-24684/" source="CVE"/>
		<description>
This update for freerdp fixes the following issues:

Update to version 3.22.0 (jsc#PED-15526):

  + Major bugfix release:

    * Complete overhaul of SDL client
    * Introduction of new WINPR_ATTR_NODISCARD macro wrapping compiler or C language version specific [[nodiscard]] attributes
    * Addition of WINPR_ATTR_NODISCARD to (some) public API functions so usage errors are producing warnings now
    * Add some more stringify functions for logging
    * We've received CVE reports, check
      https://github.com/FreeRDP/FreeRDP/security/advisories for more details!
      @Keryer reported an issue affecting client and proxy:
      * CVE-2026-23948
      @ehdgks0627 did some more fuzzying and found quite a number of client side bugs.
      * CVE-2026-24682
      * CVE-2026-24683
      * CVE-2026-24676
      * CVE-2026-24677
      * CVE-2026-24678
      * CVE-2026-24684
      * CVE-2026-24679
      * CVE-2026-24681
      * CVE-2026-24675
      * CVE-2026-24491
      * CVE-2026-24680

- Changes from version 3.21.0

  * [core,info] fix missing NULL check (#12157)
  * [gateway,tsg] fix TSG_PACKET_RESPONSE parsing (#12161)
  * Allow querying auth identity with kerberos when running as a server (#12162)
  * Sspi krb heimdal (#12163)
  * Tsg fix idleTimeout parsing (#12167)
  * [channels,smartcard] revert 649f7de (#12166)
  * [crypto] deprecate er and der modules (#12170)
  * [channels,rdpei] lock full update, not only parts (#12175)
  * [winpr,platform] add WINPR_ATTR_NODISCARD macro (#12178)
  * Wlog cleanup (#12179)
  * new stringify functions &amp; touch API defines (#12180)
  * Add support for querying SECPKG_ATTR_PACKAGE_INFO to NTLM and Kerberos (#12171)
  * [channels,video] measure times in ns (#12184)
  * [utils] Nodiscard (#12187)
  * Error handling fixes (#12186)
  * [channels,drdynvc] check pointer before reset (#12189)
  * Winpr api def (#12190)
  * [winpr,platform] drop C23 [[nodiscard]] (#12192)
  * [gdi] add additional checks for a valid rdpGdi (#12194)
  * Sdl3 high dpiv2 (#12173)
  * peer: Disconnect if Logon() returned FALSE (#12196)
  * [channels,rdpecam] fix PROPERTY_DESCRIPTION parsing (#12197)
  * [channel,rdpsnd] only clean up thread before free (#12199)
  * [channels,rdpei] add RDPINPUT_CONTACT_FLAG_UP (#12195)

- Update to version 3.21.0:

  + Bugfix release with a few new API functions addressing shortcomings with
    regard to input data validation.
    Thanks to @ehdgks0627 we have fixed the following additional (medium)
    client side vulnerabilities:

    * CVE-2026-23530
    * CVE-2026-23531
    * CVE-2026-23532
    * CVE-2026-23533
    * CVE-2026-23534
    * CVE-2026-23732
    * CVE-2026-23883
    * CVE-2026-23884

- Changes from version 3.20.2

  * [client,sdl] fix monitor resolution (#12142)
  * [codec,progressive] fix progressive_rfx_upgrade_block (#12143)
  * Krb cache fix (#12145)
  * Rdpdr improved checks (#12141)
  * Codec advanced length checks (#12146)
  * Glyph fix length checks (#12151)
  * Wlog printf format string checks (#12150)
  * [warnings,format] fix format string warnings (#12152)
  * Double free fixes (#12153)
  * [clang-tidy] clean up code warnings (#12154)

- Update to version 3.20.2:

  + Patch release fixing a regression with gateway connections
    introduced with 3.20.1
    ## What's Changed
    * Warnings and missing enumeration types (#12137)

- Changes from version 3.20.1:

  + New years cleanup release. Fixes some issues reported and does
    a cleaning sweep to bring down warnings.
    Thanks to @ehdgks0627 doing some code review/testing we've
    uncovered the following (medium) vulnerabilities:

    * CVE-2026-22851
    * CVE-2026-22852
    * CVE-2026-22853
    * CVE-2026-22854
    * CVE-2026-22855
    * CVE-2026-22856
    * CVE-2026-22857
    * CVE-2026-22858
    * CVE-2026-22859

  + These affect FreeRDP based clients only, with the exception of
    CVE-2026-22858 also affecting FreeRDP proxy. FreeRDP based
    servers are not affected.

- Update to version 3.20.0:

  * Mingw fixes (#12070)
  * [crypto,certificate_data] add some hostname sanitation
  * [client,common]: Fix loading of rdpsnd channel
  * [client,sdl] set touch and pen hints

- Changes from version 3.19.1:

  * [core,transport] improve SSL error logging
  * [utils,helpers] fix freerdp_settings_get_legacy_config_path
  * From stdin and sdl-creds improve
  * [crypto,certificate] sanitize hostnames
  * [channels,drdynvc] propagate error in dynamic channel
  * [CMake] make Mbed-TLS and LibreSSL experimental
  * Json fix
  * rdpecam: send sample only if it's available
  * [channels,rdpecam] allow MJPEG frame skip and direct passthrough
  * [winpr,utils] explicit NULL checks in jansson WINPR_JSON_ParseWithLength

- Changes from version 3.19.0:

  * [client,common] fix retry counter
  * [cmake] fix aarch64 neon detection
  * Fix response body existence check when using RDP Gateway
  * fix line clipping issue
  * Clip coord fix
  * [core,input] Add debug log to keyboard state sync
  * Update command line usage for gateway option
  * [codec,ffmpeg] 8.0 dropped AV_PROFILE_AAC_MAIN
  * [channels,audin] fix pulse memory leak
  * [channels,drive] Small performance improvements in drive channel
  * [winpr,utils] fix command line error logging
  * [common,test] Adjust AVC and H264 expectations
  * drdynvc: implement compressed packet
  * [channels,rdpecam] improve log messages
  * Fix remote credential guard channel loading
  * Fix inverted ifdef
  * [core,nego] disable all enabled modes except the one requested
  * rdpear: handle basic NTLM commands and fix server-side
  * [smartcardlogon] Fix off-by-one error in `smartcard_hw_enumerateCerts`
  * rdpecam: fix camera sample grabbing

- Update to version 3.18.0:

  + Fix a regression reading passwords from stdin
  + Fix a timer regression (?s instead of ms)
  + Improved multitouch support
  + Fix a bug with PLANAR codec (used with /bpp:32 or sometimes with /gfx)
  + Better error handling for ARM transport (Entra)
  + Fix audio encoder lag (microphone/AAC) with FFMPEG
  + Support for janssen JSON library

- Update to version 3.17.2:

  + Minor improvements and bugfix release.
  + Most notably resource usage (file handles) has been greatly reduced and
    static build pkg-config have been fixed.
    For users of xfreerdp RAILS/RemoteApp mode the switch to DesktopSession
    mode has been fixed (working UAC screen)

- Changes from version 3.17.1

  + Minor improvements and bugfix release.
    * most notably a memory leak was addressed
    * fixed header files missing C++ guards
    * xfreerdp as well as the SDL clients now support a system wide configuration file
    * Heimdal kerberos support was improved
    * builds with [MS-RDPEAR] now properly abort at configure if Heimdal is used
      (this configuration was never supported, so ensure nobody compiles it that way)

- Enable openh264 support, we can build against the noopenh264 stub

- Update to 3.17.0:

  * [client,sdl2] fix build with webview (#11685)
  * [core,nla] use wcslen for password length (#11687)
  * Clear channel error prior to call channel init event proc (#11688)
  * Warn args (#11689)
  * [client,common] fix -mouse-motion (#11690)
  * [core,proxy] fix IPv4 and IPv6 length (#11692)
  * Regression fix2 (#11696)
  * Log fixes (#11693)
  * [common,settings] fix int casts (#11699)
  * [core,connection] fix log level of several messages (#11697)
  * [client,sdl] print current video driver (#11701)
  * [crypto,tls] print big warning for /cert:ignore (#11704)
  * [client,desktop] fix StartupWMClass setting (#11708)
  * [cmake] unify version creation (#11711)
  * [common,settings] force reallocation on caps copy (#11715)
  * [manpages] Add example of keyboard remapping (#11718)
  * Some fixes in Negotiate and NLA (#11722)
  * [client,x11] fix clipboard issues (#11724)
  * kerberos: do various tries for TGT retrieval in u2u (#11723)
  * Cmdline escape strings (#11735)
  * [winpr,utils] do not log command line arguments (#11736)
  * [api,doc] Add stylesheed for doxygen (#11738)
  * [core,proxy] fix BIO read methods (#11739)
  * [client,common] fix sso_mib_get_access_token return value in error case (#11741)
  * [crypto,tls] do not use context-&gt;settings-&gt;instance (#11749)
  * winpr: re-introduce the credentials module (#11734)
  * [winpr,timezone] ensure thread-safe initialization (#11754)
  * core/redirection: Ensure stream has enough space for the certificate (#11762)
  * [client,common] do not log success (#11766)
  * Clean up bugs exposed on systems with high core counts (#11761)
  * [cmake] add installWithRPATH (#11747)
  * [clang-tidy] fix various warnings (#11769)
  * Wlog improve type checks (#11774)
  * [client,common] fix tenantid command line parsing (#11779)
  * Proxy module static and shared linking support (#11768)
  * LoadLibrary Null fix (#11786)
  * [client,common] add freerdp_client_populate_settings_from_rdp_file_un… (#11780)
  * Fullchain support (#11787)
  * [client,x11] ignore floatbar events (#11771)
  * [winpr,credentials] prefer utf-8 over utf-16-LE #11790
  * [proxy,modules] ignore bitmap-filter skip remaining #11789

- Update to 3.16.0:
  * Lots of improvements for the SDL3 client
  * Various X11 client improvements
  * Add a timer implementation
  * Various AAD/Azure/Entra improvements
  * YUV420 primitives fixes
- Update to 3.15.0:
  * [client,sdl] fix crash on suppress output
  * [channels,remdesk] fix possible memory leak
  * [client,x11] map exit code success
  * Hidef rail checks and deprecation fixe
  * Standard rdp security network issues
  * [core,rdp] fix check for SEC_FLAGSHI_VALID
  * [core,caps] fix rdp_apply_order_capability_set
  * [core,proxy] align no_proxy to curl
  * [core,gateway] fix string reading for TSG
  * [client,sdl] refactor display update

- Update to version 3.14.0:

  + Bugfix and cleanup release. Due to some new API functions the
    minor version has been increased.

- Changes from version 3.13.0:

  + Friends of old hardware rejoice, serial port redirection got an
    update (not kidding you)
  + Android builds have been updated to be usable again
  + Mingw builds now periodically do a shared and static build
  + Fixed some bugs and regressions along the way and improved test
    coverage as well

- Changes from version 3.12.0:

  + Multimonitor backward compatibility fixes
  + Smartcard compatibility
  + Improve the [MS-RDPECAM] support
  + Improve smartcard redirection support
  + Refactor SSE optimizations: Split headers, unify load/store,
    require SSE3 for all optimized functions
  + Refactors the CMake build to better support configuration based
    builders
  + Fix a few regressions from last release (USB redirection and
    graphical glitches)

- Changes from version 3.11.0:

  + A new release with bugfixes and code cleanups as well as a few
    nifty little features

- CVE-2024-22211: In affected versions an integer overflow in
    `freerdp_bitmap_planar_context_reset` leads to heap-buffer
    overflow. (bsc#1219049)

- CVE-2024-32658: Fixedout-of-bounds read in Interleaved RLE Bitmap Codec in FreeRDP based clients (bsc#1223353)

- Multiple CVE fixes
  + CVE-2024-32659: Fixed out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`(bsc#1223346)
  + CVE-2024-32660: Fixed client crash via invalid huge allocation size (bsc#1223347)
  + CVE-2024-32661: Fixed client NULL pointer dereference (bsc#1223348)

- Multiple CVE fixes:
    * bsc#1223293, CVE-2024-32039
    * bsc#1223294, CVE-2024-32040
    * bsc#1223295, CVE-2024-32041
    * bsc#1223296, CVE-2024-32458
    * bsc#1223297, CVE-2024-32459
    * bsc#1223298, CVE-2024-32460

  * Fix CVE-2023-40574 - bsc#1214869: Out-Of-Bounds Write in general_YUV444ToRGB_8u_P3AC4R_BGRX
  * Fix CVE-2023-40575 - bsc#1214870: Out-Of-Bounds Read in general_YUV444ToRGB_8u_P3AC4R_BGRX
  * Fix CVE-2023-40576 - bsc#1214871: Out-Of-Bounds Read in RleDecompress
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-10"/>
	<updated date="2026-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214869">SUSE bug 1214869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214870">SUSE bug 1214870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214871">SUSE bug 1214871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219049">SUSE bug 1219049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223293">SUSE bug 1223293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223294">SUSE bug 1223294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223295">SUSE bug 1223295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223296">SUSE bug 1223296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223297">SUSE bug 1223297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223298">SUSE bug 1223298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223346">SUSE bug 1223346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223347">SUSE bug 1223347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223348">SUSE bug 1223348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223353">SUSE bug 1223353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243109">SUSE bug 1243109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256717">SUSE bug 1256717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256718">SUSE bug 1256718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256719">SUSE bug 1256719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256720">SUSE bug 1256720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256721">SUSE bug 1256721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256722">SUSE bug 1256722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256723">SUSE bug 1256723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256724">SUSE bug 1256724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256725">SUSE bug 1256725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256940">SUSE bug 1256940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256941">SUSE bug 1256941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256942">SUSE bug 1256942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256943">SUSE bug 1256943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256944">SUSE bug 1256944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256945">SUSE bug 1256945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256946">SUSE bug 1256946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256947">SUSE bug 1256947</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40574/">CVE-2023-40574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40574">CVE-2023-40574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40575/">CVE-2023-40575 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40575">CVE-2023-40575 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40576/">CVE-2023-40576 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40576">CVE-2023-40576 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-22211/">CVE-2024-22211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22211">CVE-2024-22211 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32658/">CVE-2024-32658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32658">CVE-2024-32658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32659/">CVE-2024-32659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32659">CVE-2024-32659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32660/">CVE-2024-32660 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32660">CVE-2024-32660 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32661/">CVE-2024-32661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32661">CVE-2024-32661 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4478/">CVE-2025-4478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4478">CVE-2025-4478 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22851/">CVE-2026-22851 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22851">CVE-2026-22851 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22852/">CVE-2026-22852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22852">CVE-2026-22852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22853/">CVE-2026-22853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22853">CVE-2026-22853 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22854/">CVE-2026-22854 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22854">CVE-2026-22854 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22855/">CVE-2026-22855 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22855">CVE-2026-22855 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22856/">CVE-2026-22856 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22856">CVE-2026-22856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22857/">CVE-2026-22857 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22857">CVE-2026-22857 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22858/">CVE-2026-22858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22858">CVE-2026-22858 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22859/">CVE-2026-22859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22859">CVE-2026-22859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23530/">CVE-2026-23530 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23530">CVE-2026-23530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23531/">CVE-2026-23531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23531">CVE-2026-23531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23532/">CVE-2026-23532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23532">CVE-2026-23532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23533/">CVE-2026-23533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23533">CVE-2026-23533 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23534/">CVE-2026-23534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23534">CVE-2026-23534 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23732/">CVE-2026-23732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23732">CVE-2026-23732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23883/">CVE-2026-23883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23883">CVE-2026-23883 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23884/">CVE-2026-23884 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23884">CVE-2026-23884 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23948/">CVE-2026-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23948">CVE-2026-23948 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24491/">CVE-2026-24491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24491">CVE-2026-24491 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24675/">CVE-2026-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24675">CVE-2026-24675 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24676/">CVE-2026-24676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24676">CVE-2026-24676 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24677/">CVE-2026-24677 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24677">CVE-2026-24677 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24678/">CVE-2026-24678 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24678">CVE-2026-24678 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24679/">CVE-2026-24679 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24679">CVE-2026-24679 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24680/">CVE-2026-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24680">CVE-2026-24680 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24681/">CVE-2026-24681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24681">CVE-2026-24681 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24682/">CVE-2026-24682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24682">CVE-2026-24682 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24683/">CVE-2026-24683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24683">CVE-2026-24683 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24684/">CVE-2026-24684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24684">CVE-2026-24684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94523" version="1" class="patch">
	<metadata>
		<title>Security update for cJSON (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1241502" ref_url="https://bugzilla.suse.com/1241502" source="BUGZILLA"/>
		<reference ref_id="1249112" ref_url="https://bugzilla.suse.com/1249112" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26819" ref_url="https://www.suse.com/security/cve/CVE-2023-26819/" source="CVE"/>
		<reference ref_id="CVE-2025-57052" ref_url="https://www.suse.com/security/cve/CVE-2025-57052/" source="CVE"/>
		<description>
This update for cJSON fixes the following issues:

- Update to version 1.7.19
  * Check for NULL in cJSON_DetachItemViaPointer.
  * Check overlap before calling strcpy in cJSON_SetValuestring.
  * Fix Max recursion depth for cJSON_Duplicate to prevent stack
    exhaustion.
  * Allocate memory for the temporary buffer when paring numbers.
    This fixes CVE-2023-26819. (bsc#1241502)
  * Fix the incorrect check in decode_array_index_from_pointer.
    This fixes CVE-2025-57052. (bsc#1249112)
- Remove not longer needed patch for NULL to deallocated pointers.

		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1241502">SUSE bug 1241502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249112">SUSE bug 1249112</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-26819/">CVE-2023-26819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-26819">CVE-2023-26819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-57052/">CVE-2025-57052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-57052">CVE-2025-57052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048392" comment="libcjson1-1.7.19-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048392" comment="libcjson1-1.7.19-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94524" version="1" class="patch">
	<metadata>
		<title>Security update for kea (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248801" ref_url="https://bugzilla.suse.com/1248801" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40779" ref_url="https://www.suse.com/security/cve/CVE-2025-40779/" source="CVE"/>
		<description>
This update for kea fixes the following issues:

Update to release 3.0.1:

- CVE-2025-40779: Fixed crash upon interaction between specific client options and subnet selection (bsc#1248801).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248801">SUSE bug 1248801</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40779/">CVE-2025-40779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40779">CVE-2025-40779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048393" comment="kea-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048394" comment="kea-devel-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048395" comment="kea-doc-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048396" comment="kea-hooks-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048397" comment="libkea-asiodns62-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048398" comment="libkea-asiolink88-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048399" comment="libkea-cc82-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048400" comment="libkea-cfgrpt3-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048401" comment="libkea-config83-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048402" comment="libkea-cryptolink64-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048403" comment="libkea-d2srv63-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048404" comment="libkea-database76-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048405" comment="libkea-dhcp109-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048406" comment="libkea-dhcp_ddns68-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048407" comment="libkea-dhcpsrv130-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048408" comment="libkea-dns71-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048409" comment="libkea-eval84-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048410" comment="libkea-exceptions45-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048411" comment="libkea-hooks119-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048412" comment="libkea-http87-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048413" comment="libkea-log-interprocess3-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048414" comment="libkea-log75-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048415" comment="libkea-mysql88-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048416" comment="libkea-pgsql88-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048417" comment="libkea-process90-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048418" comment="libkea-stats53-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048419" comment="libkea-tcp33-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048420" comment="libkea-util-io12-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048421" comment="libkea-util101-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048422" comment="python3-kea-3.0.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048393" comment="kea-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048394" comment="kea-devel-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048395" comment="kea-doc-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048396" comment="kea-hooks-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048397" comment="libkea-asiodns62-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048398" comment="libkea-asiolink88-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048399" comment="libkea-cc82-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048400" comment="libkea-cfgrpt3-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048401" comment="libkea-config83-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048402" comment="libkea-cryptolink64-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048403" comment="libkea-d2srv63-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048404" comment="libkea-database76-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048405" comment="libkea-dhcp109-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048406" comment="libkea-dhcp_ddns68-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048407" comment="libkea-dhcpsrv130-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048408" comment="libkea-dns71-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048409" comment="libkea-eval84-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048410" comment="libkea-exceptions45-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048411" comment="libkea-hooks119-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048412" comment="libkea-http87-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048413" comment="libkea-log-interprocess3-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048414" comment="libkea-log75-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048415" comment="libkea-mysql88-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048416" comment="libkea-pgsql88-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048417" comment="libkea-process90-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048418" comment="libkea-stats53-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048419" comment="libkea-tcp33-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048420" comment="libkea-util-io12-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048421" comment="libkea-util101-3.0.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048422" comment="python3-kea-3.0.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94525" version="1" class="patch">
	<metadata>
		<title>Security update for go1.26 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255111" ref_url="https://bugzilla.suse.com/1255111" source="BUGZILLA"/>
		<reference ref_id="1259264" ref_url="https://bugzilla.suse.com/1259264" source="BUGZILLA"/>
		<reference ref_id="1259265" ref_url="https://bugzilla.suse.com/1259265" source="BUGZILLA"/>
		<reference ref_id="1259266" ref_url="https://bugzilla.suse.com/1259266" source="BUGZILLA"/>
		<reference ref_id="1259267" ref_url="https://bugzilla.suse.com/1259267" source="BUGZILLA"/>
		<reference ref_id="1259268" ref_url="https://bugzilla.suse.com/1259268" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<reference ref_id="CVE-2026-27137" ref_url="https://www.suse.com/security/cve/CVE-2026-27137/" source="CVE"/>
		<reference ref_id="CVE-2026-27138" ref_url="https://www.suse.com/security/cve/CVE-2026-27138/" source="CVE"/>
		<reference ref_id="CVE-2026-27139" ref_url="https://www.suse.com/security/cve/CVE-2026-27139/" source="CVE"/>
		<reference ref_id="CVE-2026-27142" ref_url="https://www.suse.com/security/cve/CVE-2026-27142/" source="CVE"/>
		<description>
This update for go1.26 fixes the following issues:

Changes in go1.26:

go1.26.1 (released 2026-03-05) includes security fixes to the
crypto/x509, html/template, net/url, and os packages, as well as
bug fixes to the go command, the go fix command, the compiler,
and the os and reflect packages.  ( boo#1255111)

  CVE-2026-25679 CVE-2026-27142 CVE-2026-27137 CVE-2026-27138 CVE-2026-27139

  * go#77970 go#77578 boo#1259264 security: fix CVE-2026-25679 net/url: reject IPv6 literal not at start of host
  * go#77972 go#77954 boo#1259265 security: fix CVE-2026-27142 html/template: URLs in meta content attribute actions are not escaped
  * go#77973 go#77952 boo#1259266 security: fix CVE-2026-27137 crypto/x509: incorrect enforcement of email constraints
  * go#77974 go#77953 boo#1259267 security: fix CVE-2026-27138 crypto/x509: panic in name constraint checking for malformed certificates
  * go#77834 go#77827 boo#1259268 security: fix CVE-2026-27139 os: FileInfo can escape from a Root

  * go#77252 cmd/compile: miscompile of global array initialization
  * go#77407 os: Go 1.25.x regression on RemoveAll for windows
  * go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in pkg-config
  * go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing "buf.Bytes()" call
  * go#77532 net/smtp: expiry date of localhostCert for testing is too short
  * go#77536 cmd/compile: internal compiler error: 'main.func1': not lowered: v15, Load STRUCT PTR SSA
  * go#77618 strings: HasSuffix doesn't work correctly for multibyte runes in go 1.26
  * go#77623 cmd/compile: internal compiler error on : "tried to free an already free register" with generic function and type &gt;= 192 bytes
  * go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two strings.Builders
  * go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos
  * go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform's type in the range expression, breaking other platforms
  * go#77780 reflect: breaking change for reflect.Value.Interface behaviour
  * go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt
  * go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into reflect.TypeFor[untyped nil]()
  * go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements
  * go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error
  * go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple times
  * go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior
  * go#77860 cmd/go: change go mod init default go directive back to 1.N
  * go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting
  * go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration

go1.26.0 (released 2026-02-10) is a major release of Go.
go1.26.x minor releases will be provided through February 2027.
https://github.com/golang/go/wiki/Go-Release-Cycle
go1.26 arrives six months after Go 1.25. Most of its changes are
in the implementation of the toolchain, runtime, and
libraries. As always, the release maintains the Go 1 promise of
compatibility. We expect almost all Go programs to continue to
compile and run as before. (boo#1255111)

  * Language change: The built-in new function, which creates a new
    variable, now allows its operand to be an expression,
    specifying the initial value of the variable.
  * Language change: The restriction that a generic type may not
    refer to itself in its type parameter list has been lifted. It
    is now possible to specify type constraints that refer to the
    generic type being constrained.
  * go command: The venerable go fix command has been completely
    revamped and is now the home of Go’s modernizers. It provides a
    dependable, push-button way to update Go code bases to the
    latest idioms and core library APIs. The initial suite of
    modernizers includes dozens of fixers to make use of modern
    features of the Go language and library, as well a source-level
    inliner that allows users to automate their own API migrations
    using //go:fix inline directives. These fixers should not
    change the behavior of your program, so if you encounter any
    issues with a fix performed by go fix, please report it.
  * go command: The rewritten go fix command builds atop the exact
    same Go analysis framework as go vet. This means the same
    analyzers that provide diagnostics in go vet can be used to
    suggest and apply fixes in go fix. The go fix command’s
    historical fixers, all of which were obsolete, have been
    removed.
  * go command: Two upcoming Go blog posts will go into more detail
    on modernizers, the inliner, and how to get the most out of go
    fix.
  * go command: go mod init now defaults to a lower go version in
    new go.mod files. Running go mod init using a toolchain of
    version 1.N.X will create a go.mod file specifying the Go
    version go 1.(N-1).0. Pre-release versions of 1.N will create
    go.mod files specifying go 1.(N-2).0. For example, the Go 1.26
    release candidates will create go.mod files with go 1.24.0, and
    Go 1.26 and its minor releases will create go.mod files with go
    1.25.0. This is intended to encourage the creation of modules
    that are compatible with currently supported versions of
    Go. For additional control over the go version in new modules,
    go mod init can be followed up with go get go@version.
  * go command: cmd/doc, and go tool doc have been deleted. go doc
    can be used as a replacement for go tool doc: it takes the same
    flags and arguments and has the same behavior.
  * pprof: The pprof tool web UI, enabled with the -http flag, now
    defaults to the flame graph view. The previous graph view is
    available in the “View -&gt; Graph” menu, or via /ui/graph.
  * Runtime: The new Green Tea garbage collector, previously
    available as an experiment in Go 1.25, is now enabled by
    default after incorporating feedback. This garbage collector’s
    design improves the performance of marking and scanning small
    objects through better locality and CPU scalability. Benchmark
    results vary, but we expect somewhere between a 10–40%
    reduction in garbage collection overhead in real-world programs
    that heavily use the garbage collector. Further improvements,
    on the order of 10% in garbage collection overhead, are
    expected when running on newer amd64-based CPU platforms (Intel
    Ice Lake or AMD Zen 4 and newer), as the garbage collector now
    leverages vector instructions for scanning small objects when
    possible. The new garbage collector may be disabled by setting
    GOEXPERIMENT=nogreenteagc at build time. This opt-out setting
    is expected to be removed in Go 1.27. If you disable the new
    garbage collector for any reason related to its performance or
    behavior, please file an issue.
  * Runtime: cgo: The baseline runtime overhead of cgo calls has
    been reduced by ~30%.
  * Runtime: Heap base address randomization: On 64-bit platforms,
    the runtime now randomizes the heap base address at
    startup. This is a security enhancement that makes it harder
    for attackers to predict memory addresses and exploit
    vulnerabilities when using cgo. This feature may be disabled by
    setting GOEXPERIMENT=norandomizedheapbase64 at build time. This
    opt-out setting is expected to be removed in a future Go
    release.
  * Runtime: Experimental goroutine leak profile: A new profile
    type that reports leaked goroutines is now available as an
    experiment. The new profile type, named goroutineleak in the
    runtime/pprof package, may be enabled by setting
    GOEXPERIMENT=goroutineleakprofile at build time. Enabling the
    experiment also makes the profile available as a net/http/pprof
    endpoint, /debug/pprof/goroutineleak. A leaked goroutine is a
    goroutine blocked on some concurrency primitive (channels,
    sync.Mutex, sync.Cond, etc) that cannot possibly become
    unblocked. The runtime detects leaked goroutines using the
    garbage collector: if a goroutine G is blocked on concurrency
    primitive P, and P is unreachable from any runnable goroutine
    or any goroutine that those could unblock, then P cannot be
    unblocked, so goroutine G can never wake up. While it is
    impossible to detect permanently blocked goroutines in all
    cases, this approach detects a large class of such
    leaks. Because this technique builds on reachability, the
    runtime may fail to identify leaks caused by blocking on
    concurrency primitives reachable through global variables or
    the local variables of runnable goroutines. Special thanks to
    Vlad Saioc at Uber for contributing this work. The underlying
    theory is presented in detail in a publication by Saioc et
    al. The implementation is production-ready, and is only
    considered an experiment for the purposes of collecting
    feedback on the API, specifically the choice to make it a new
    profile. The feature is also designed to not incur any
    additional run-time overhead unless it is actively in-use. We
    encourage users to try out the new feature in the Go
    playground, in tests, in continuous integration, and in
    production. We welcome additional feedback on the proposal
    issue. We aim to enable goroutine leak profiles by default in
    Go 1.27.
  * Compiler: The compiler can now allocate the backing store for
    slices on the stack in more situations, which improves
    performance. If this change is causing trouble, the bisect tool
    can be used to find the allocation causing trouble using the
    -compile=variablemake flag. All such new stack allocations can
    also be turned off using -gcflags=all=-d=variablemakehash=n. If
    you encounter issues with this optimization, please file an
    issue.
  * Linker: On 64-bit ARM-based Windows (the windows/arm64 port),
    the linker now supports internal linking mode of cgo programs,
    which can be requested with the -ldflags=-linkmode=internal
    flag.
  * Linker: There are several minor changes to executable
    files. These changes do not affect running Go programs. They
    may affect programs that analyze Go executables, and they may
    affect people who use external linking mode with custom linker
    scripts.
  * Linker: The moduledata structure is now in its own section,
    named .go.module.
  * Linker: The moduledata cutab field, which is a slice, now has
    the correct length; previously the length was four times too
    large.
  * Linker: The pcHeader found at the start of the .gopclntab
    section no longer records the start of the text section. That
    field is now always zero.
  * Linker: That pcHeader change was made so that the .gopclntab
    section no longer contains any relocations. On platforms that
    support relro, the section has moved from the relro segment to
    the rodata segment.
  * Linker: The funcdata symbols and the findfunctab have moved
    from the .rodata section to the .gopclntab section.
  * Linker: The .gosymtab section has been removed. It was
    previously always present but empty.
  * Linker: When using internal linking, ELF sections now appear in
    the section header list sorted by address. The previous order
    was somewhat unpredictable.
  * Linker: The references to section names here use the ELF names
    as seen on Linux and other systems. The Mach-O names as seen on
    Darwin start with a double underscore and do not contain any
    dots.
  * Bootstrap: As mentioned in the Go 1.24 release notes, Go 1.26
    now requires Go 1.24.6 or later for bootstrap. We expect that
    Go 1.28 will require a minor release of Go 1.26 or later for
    bootstrap.
  * Standard Library: New crypto/hpke package: The new crypto/hpke
    package implements Hybrid Public Key Encryption (HPKE) as
    specified in RFC 9180, including support for post-quantum
    hybrid KEMs.
  * Standard Library: New experimental simd/archsimd package: Go
    1.26 introduces a new experimental simd/archsimd package, which
    can be enabled by setting the environment variable
    GOEXPERIMENT=simd at build time. This package provides access
    to architecture-specific SIMD operations. It is currently
    available on the amd64 architecture and supports 128-bit,
    256-bit, and 512-bit vector types, such as Int8x16 and
    Float64x8, with operations such as Int8x16.Add. The API is not
    yet considered stable. We intend to provide support for other
    architectures in future versions, but the API intentionally
    architecture-specific and thus non-portable. In addition, we
    plan to develop a high-level portable SIMD package in the
    future.
  * Standard Library: New experimental runtime/secret package: The
    new runtime/secret package is available as an experiment, which
    can be enabled by setting the environment variable
    GOEXPERIMENT=runtimesecret at build time. It provides a
    facility for securely erasing temporaries used in code that
    manipulates secret information—typically cryptographic in
    nature—such as registers, stack, new heap allocations. This
    package is intended to make it easier to ensure forward
    secrecy. It currently supports the amd64 and arm64
    architectures on Linux.
  * bytes: The new Buffer.Peek method returns the next n bytes from
    the buffer without advancing it.
  * crypto: The new Encapsulator and Decapsulator interfaces allow
    accepting abstract KEM encapsulation or decapsulation keys.
  * crypto/dsa: The random parameter to GenerateKey is now
    ignored. Instead, it now always uses a secure source of
    cryptographically random bytes. For deterministic testing, use
    the new testing/cryptotest.SetGlobalRandom function. The new
    GODEBUG setting cryptocustomrand=1 temporarily restores the old
    behavior.
  * crypto/ecdh: The random parameter to Curve.GenerateKey is now
    ignored. Instead, it now always uses a secure source of
    cryptographically random bytes. For deterministic testing, use
    the new testing/cryptotest.SetGlobalRandom function. The new
    GODEBUG setting cryptocustomrand=1 temporarily restores the old
    behavior. The new KeyExchanger interface, implemented by
    PrivateKey, makes it possible to accept abstract ECDH private
    keys, e.g. those implemented in hardware.
  * crypto/ecdsa: The big.Int fields of PublicKey and PrivateKey
    are now deprecated. The random parameter to GenerateKey,
    SignASN1, Sign, and PrivateKey.Sign is now ignored. Instead,
    they now always use a secure source of cryptographically random
    bytes. For deterministic testing, use the new
    testing/cryptotest.SetGlobalRandom function. The new GODEBUG
    setting cryptocustomrand=1 temporarily restores the old
    behavior.
  * crypto/ed25519: If the random parameter to GenerateKey is nil,
    GenerateKey now always uses a secure source of
    cryptographically random bytes, instead of crypto/rand.Reader
    (which could have been overridden). The new GODEBUG setting
    cryptocustomrand=1 temporarily restores the old behavior.
  * crypto/fips140: The new WithoutEnforcement and Enforced
    functions now allow running in GODEBUG=fips140=only mode while
    selectively disabling the strict FIPS 140-3 checks. Version
    returns the resolved FIPS 140-3 Go Cryptographic Module version
    when building against a frozen module with GOFIPS140.
  * crypto/mlkem: The new DecapsulationKey768.Encapsulator and
    DecapsulationKey1024.Encapsulator methods implement the new
    crypto.Decapsulator interface.
  * crypto/mlkem/mlkemtest: The new crypto/mlkem/mlkemtest package
    exposes the Encapsulate768 and Encapsulate1024 functions which
    implement derandomized ML-KEM encapsulation, for use with
    known-answer tests.
  * crypto/rand: The random parameter to Prime is now
    ignored. Instead, it now always uses a secure source of
    cryptographically random bytes. For deterministic testing, use
    the new testing/cryptotest.SetGlobalRandom function. The new
    GODEBUG setting cryptocustomrand=1 temporarily restores the old
    behavior.
  * crypto/rsa: The new EncryptOAEPWithOptions function allows
    specifying different hash functions for OAEP padding and MGF1
    mask generation.
  * crypto/rsa: The random parameter to GenerateKey,
    GenerateMultiPrimeKey, and EncryptPKCS1v15 is now
    ignored. Instead, they now always use a secure source of
    cryptographically random bytes. For deterministic testing, use
    the new testing/cryptotest.SetGlobalRandom function. The new
    GODEBUG setting cryptocustomrand=1 temporarily restores the old
    behavior.
  * crypto/rsa: If PrivateKey fields are modified after calling
    PrivateKey.Precompute, PrivateKey.Validate now fails.
  * crypto/rsa: PrivateKey.D is now checked for consistency with
    precomputed values, even if it is not used.
  * crypto/rsa: Unsafe PKCS #1 v1.5 encryption padding (implemented
    by EncryptPKCS1v15, DecryptPKCS1v15, and
    DecryptPKCS1v15SessionKey) is now deprecated.
  * crypto/subtle: The WithDataIndependentTiming function no longer
    locks the calling goroutine to the OS thread while executing
    the passed function. Additionally, any goroutines which are
    spawned during the execution of the passed function and their
    descendants now inherit the properties of
    WithDataIndependentTiming for their lifetime. This change also
    affects cgo in the following ways:
  * crypto/subtle: Any C code called via cgo from within the
    function passed to WithDataIndependentTiming, or from a
    goroutine spawned by the function passed to
    WithDataIndependentTiming and its descendants, will also have
    data independent timing enabled for the duration of the
    call. If the C code disables data independent timing, it will
    be re-enabled on return to Go.
  * crypto/subtle: If C code called via cgo, from the function
    passed to WithDataIndependentTiming or elsewhere, enables or
    disables data independent timing then calling into Go will
    preserve that state for the duration of the call.
  * crypto/tls: The hybrid SecP256r1MLKEM768 and SecP384r1MLKEM1024
    post-quantum key exchanges are now enabled by default. They can
    be disabled by setting Config.CurvePreferences or with the
    tlssecpmlkem=0 GODEBUG setting.
  * crypto/tls: The new ClientHelloInfo.HelloRetryRequest field
    indicates if the ClientHello was sent in response to a
    HelloRetryRequest message. The new
    ConnectionState.HelloRetryRequest field indicates if the server
    sent a HelloRetryRequest, or if the client received a
    HelloRetryRequest, depending on connection role.
  * crypto/tls: The QUICConn type used by QUIC implementations
    includes a new event for reporting TLS handshake errors.
  * crypto/tls: If Certificate.PrivateKey implements
    crypto.MessageSigner, its SignMessage method is used instead of
    Sign in TLS 1.2 and later.
  * crypto/tls: The following GODEBUG settings introduced in Go
    1.22 and Go 1.23 will be removed in the next major Go
    release. Starting in Go 1.27, the new behavior will apply
    regardless of GODEBUG setting or go.mod language version.
  * crypto/tls: GODEBUG tlsunsafeekm:
    ConnectionState.ExportKeyingMaterial will require TLS 1.3 or
    Extended Master Secret.
  * crypto/tls: GODEBUG tlsrsakex: legacy RSA-only key exchanges
    without ECDH won’t be enabled by default.
  * crypto/tls: GODEBUG tls10server: the default minimum TLS
    version for both clients and servers will be TLS 1.2.
  * crypto/tls: GODEBUG tls3des: the default cipher suites will not
    include 3DES.
  * crypto/tls: GODEBUG x509keypairleaf: X509KeyPair and
    LoadX509KeyPair will always populate the Certificate.Leaf
    field.
  * crypto/x509: The ExtKeyUsage and KeyUsage types now have String
    methods that return the corresponding OID names as defined in
    RFC 5280 and other registries.
  * crypto/x509: The ExtKeyUsage type now has an OID method that
    returns the corresponding OID for the EKU.
  * crypto/x509: The new OIDFromASN1OID function allows converting
    an encoding/asn1.ObjectIdentifier into an OID.
  * debug/elf: Additional R_LARCH_* constants from LoongArch ELF
    psABI v20250521 (global version v2.40) are defined for use with
    LoongArch systems.
  * errors: The new AsType function is a generic version of As. It
    is type-safe, faster, and, in most cases, easier to use.
  * fmt: For unformatted strings, fmt.Errorf("x") now allocates
    less and generally matches the allocations for errors.New("x").
  * go/ast: The new ParseDirective function parses directive
    comments, which are comments such as //go:generate. Source code
    tools can support their own directive comments and this new API
    should help them implement the conventional syntax.
  * go/ast: The new BasicLit.ValueEnd field records the precise end
    position of a literal so that the BasicLit.End method can now
    always return the correct answer. (Previously it was computed
    using a heuristic that was incorrect for multi-line raw string
    literals in Windows source files, due to removal of carriage
    returns.)
  * go/ast: Programs that update the ValuePos field of BasicLits
    produced by the parser may need to also update or clear the
    ValueEnd field to avoid minor differences in formatted output.
  * go/token: The new File.End convenience method returns the
    file’s end position.
  * go/types: The gotypesalias GODEBUG setting introduced in Go
    1.22 will be removed in the next major Go release. Starting in
    Go 1.27, the go/types package will always produce an Alias type
    for the representation of type aliases regardless of GODEBUG
    setting or go.mod language version.
  * image/jpeg: The JPEG encoder and decoder have been replaced
    with new, faster, more accurate implementations. Code that
    expects specific bit-for-bit outputs from the encoder or
    decoder may need to be updated.
  * io: ReadAll now allocates less intermediate memory and returns
    a minimally sized final slice. It is often about two times
    faster while typically allocating around half as much total
    memory, with more benefit for larger inputs.
  * log/slog: The NewMultiHandler function creates a MultiHandler
    that invokes all the given Handlers. Its Enabled method reports
    whether any of the handlers’ Enabled methods return true. Its
    Handle, WithAttrs and WithGroup methods call the corresponding
    method on each of the enabled handlers.
  * net: The new Dialer methods DialIP, DialTCP, DialUDP, and
    DialUnix permit dialing specific network types with context
    values.
  * net/http: The new HTTP2Config.StrictMaxConcurrentRequests field
    controls whether a new connection should be opened if an
    existing HTTP/2 connection has exceeded its stream limit.
  * net/http: The new Transport.NewClientConn method returns a
    client connection to an HTTP server. Most users should continue
    to use Transport.RoundTrip to make requests, which manages a
    pool of connections. NewClientConn is useful for users who need
    to implement their own connection management.
  * net/http: Client now uses and sets cookies scoped to URLs with
    the host portion matching Request.Host when
    available. Previously, the connection address host was always
    used.
  * net/http/httptest: The HTTP client returned by Server.Client
    will now redirect requests for example.com and any subdomains
    to the server being tested.
  * net/http/httputil: The ReverseProxy.Director configuration
    field is deprecated in favor of ReverseProxy.Rewrite.
  * net/http/httputil: A malicious client can remove headers added
    by a Director function by designating those headers as
    hop-by-hop. Since there is no way to address this problem
    within the scope of the Director API, we added a new Rewrite
    hook in Go 1.20. Rewrite hooks are provided with both the
    unmodified inbound request received by the proxy and the
    outbound request which will be sent by the proxy. Since the
    Director hook is fundamentally unsafe, we are now deprecating
    it.
  * net/netip: The new Prefix.Compare method compares two prefixes.
  * net/url: Parse now rejects malformed URLs containing colons in
    the host subcomponent, such as http://::1/ or
    http://localhost:80:80/. URLs containing bracketed IPv6
    addresses, such as http://[::1]/ are still accepted. The new
    GODEBUG setting urlstrictcolons=0 restores the old behavior.
  * os: The new Process.WithHandle method provides access to an
    internal process handle on supported platforms (pidfd on Linux
    5.4 or later, Handle on Windows).
  * os: On Windows, the OpenFile flag parameter can now contain any
    combination of Windows-specific file flags, such as
    FILE_FLAG_OVERLAPPED and FILE_FLAG_SEQUENTIAL_SCAN, for control
    of file or device caching behavior, access modes, and other
    special-purpose flags.
  * os/signal: NotifyContext now cancels the returned context with
    context.CancelCauseFunc and an error indicating which signal
    was received.
  * reflect: The new methods Type.Fields, Type.Methods, Type.Ins
    and Type.Outs return iterators for a type’s fields (for a
    struct type), methods, inputs and outputs parameters (for a
    function type), respectively. Similarly, the new methods
    Value.Fields and Value.Methods return iterators over a value’s
    fields or methods, respectively. Each iteration yields the type
    information (StructField or Method) of a field or method, along
    with the field or method Value.
  * runtime/metrics: Several new scheduler metrics have been added,
    including counts of goroutines in various states (waiting,
    runnable, etc.) under the /sched/goroutines prefix, the number
    of OS threads the runtime is aware of with
    /sched/threads:threads, and the total number of goroutines
    created by the program with
    /sched/goroutines-created:goroutines.
  * testing: The new methods T.ArtifactDir, B.ArtifactDir, and
    F.ArtifactDir return a directory in which to write test output
    files (artifacts).
  * testing: When the -artifacts flag is provided to go test, this
    directory will be located under the output directory (specified
    with -outputdir, or the current directory by
    default). Otherwise, artifacts are stored in a temporary
    directory which is removed after the test completes.
  * testing: The first call to ArtifactDir when -artifacts is
    provided writes the location of the directory to the test log.
  * testing: The B.Loop method no longer prevents inlining in the
    loop body, which could lead to unanticipated allocation and
    slower benchmarks. With this fix, we expect that all benchmarks
    can be converted from the old B.N style to the new B.Loop style
    with no ill effects. Within the body of a for b.Loop() { ... }
    loop, function call parameters, results, and assigned variables
    are still kept alive, preventing the compiler from optimizing
    away entire parts of the benchmark.
  * testing/cryptotest: The new SetGlobalRandom function configures
    a global, deterministic cryptographic randomness source for the
    duration of the test. It affects crypto/rand, and all implicit
    sources of cryptographic randomness in the crypto/... packages.
  * time: The asynctimerchan GODEBUG setting introduced in Go 1.23
    will be removed in the next major Go release. Starting in Go
    1.27, the time package will always use unbuffered (synchronous)
    channels for timers regardless of GODEBUG setting or go.mod
    language version.
  * Ports: Darwin: Go 1.26 is the last release that will run on
    macOS 12 Monterey. Go 1.27 will require macOS 13 Ventura or
    later.
  * Ports: FreeBSD: The freebsd/riscv64 port (GOOS=freebsd
    GOARCH=riscv64) has been marked broken. See issue 76475 for
    details.
  * Ports: Windows: As announced in the Go 1.25 release notes, the
    broken 32-bit windows/arm port (GOOS=windows GOARCH=arm) has
    been removed.
  * Ports: PowerPC: Go 1.26 is the last release that supports the
    ELFv1 ABI on the big-endian 64-bit PowerPC port on Linux
    (GOOS=linux GOARCH=ppc64). It will switch to the ELFv2 ABI in
    Go 1.27. As the port does not currently support linking against
    other ELF objects, we expect this change to be transparent to
    users.
  * Ports: RISC-V: The linux/riscv64 port now supports the race
    detector.
  * Ports: S390X: The s390x port now supports passing function
    arguments and results using registers.
  * Ports: WebAssembly: The compiler now unconditionally makes use
    of the sign extension and non-trapping floating-point to
    integer conversion instructions. These features have been
    standardized since at least Wasm 2.0. The corresponding GOWASM
    settings, signext and satconv, are now ignored.
  * Ports: WebAssembly: For WebAssembly applications, the runtime
    now manages chunks of heap memory in much smaller increments,
    leading to significantly reduced memory usage for applications
    with heaps less than around 16 MiB in size.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255111">SUSE bug 1255111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259264">SUSE bug 1259264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259265">SUSE bug 1259265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259266">SUSE bug 1259266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259267">SUSE bug 1259267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259268">SUSE bug 1259268</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27137/">CVE-2026-27137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27137">CVE-2026-27137 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27138/">CVE-2026-27138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27138">CVE-2026-27138 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27139/">CVE-2026-27139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27139">CVE-2026-27139 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27142/">CVE-2026-27142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27142">CVE-2026-27142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048423" comment="go1.26-1.26.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048424" comment="go1.26-doc-1.26.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048425" comment="go1.26-libstd-1.26.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048426" comment="go1.26-race-1.26.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048423" comment="go1.26-1.26.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048424" comment="go1.26-doc-1.26.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048425" comment="go1.26-libstd-1.26.1-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048426" comment="go1.26-race-1.26.1-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94526" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253460" ref_url="https://bugzilla.suse.com/1253460" source="BUGZILLA"/>
		<reference ref_id="1258371" ref_url="https://bugzilla.suse.com/1258371" source="BUGZILLA"/>
		<reference ref_id="1258385" ref_url="https://bugzilla.suse.com/1258385" source="BUGZILLA"/>
		<reference ref_id="1258387" ref_url="https://bugzilla.suse.com/1258387" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66614" ref_url="https://www.suse.com/security/cve/CVE-2025-66614/" source="CVE"/>
		<reference ref_id="CVE-2026-24733" ref_url="https://www.suse.com/security/cve/CVE-2026-24733/" source="CVE"/>
		<reference ref_id="CVE-2026-24734" ref_url="https://www.suse.com/security/cve/CVE-2026-24734/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

Update to Tomcat 9.0.115:

- CVE-2025-66614: client certificate verification bypass due to virtual host mapping (bsc#1258371).
- CVE-2026-24733: improper input validation on HTTP/0.9 requests (bsc#1258385).
- CVE-2026-24734: certificate revocation bypass due to incomplete OCSP verification checks (bsc#1258387).
 * Catalina
 + Fix: 69623: Additional fix for the long standing regression that meant
 that calls to ClassLoader.getResource().getContent() failed when made from
 within a web application with resource caching enabled if the target
 resource was packaged in a JAR file. (markt)
 + Fix: Pull request #923: Avoid adding multiple CSRF tokens to a URL in the
 CsrfPreventionFilter. (schultz)
 + Fix: 69918: Ensure request parameters are correctly parsed for HTTP/2
 requests when the content-length header is not set. (dsoumis)
 + Update: Update the minimum and recommended versions for Tomcat Native to
 1.3.4. (markt)
 + Add: Add a new ssoReauthenticationMode to the Tomcat provided
 Authenticators that provides a per Authenticator override of the SSO Valve
 requireReauthentication attribute. (markt)
 + Fix: Ensure URL encoding errors in the Rewrite Valve trigger an exception
 rather than silently using a replacement character. (markt)
 + Fix: 69871: Increase log level to INFO for missing configuration for the
 rewrite valve. (remm)
 + Fix: Add log warnings for additional Host appBase suspicious values.
 (remm)
 + Fix: Remove hard dependency on tomcat-jni.jar for catalina.jar.
 org.apache.catalina.Connector no longer requires
 org.apache.tomcat.jni.AprStatus to be present. (markt)
 + Add: Add the ability to use a custom function to generate the client
 identifier in the CrawlerSessionManagerValve. This is only available
 programmatically. Pull request #902 by Brian Matzon. (markt)
 + Fix: Change the SSO reauthentication behaviour for SPNEGO authentication
 so that a normal SPNEGO authentication is performed if the SSL Valve is
 configured with reauthentication enabled. This is so that the delegated
 credentials will be available to the web application. (markt)
 + Fix: When generating the class path in the Loader, re-order the check on
 individual class path components to avoid a potential
 NullPointerException. Identified by Coverity Scan. (markt)
 + Fix: Fix SSL socket factory configuration in the JNDI realm. Based on pull
 request #915 by Joshua Rogers. (remm)
 + Update: Add an attribute, digestInRfc3112Order, to
 MessageDigestCredentialHandler to control the order in which the
 credential and salt are digested. By default, the current, non-RFC 3112
 compliant, order of salt then credential will be used. This default will
 change in Tomcat 12 to the RFC 3112 compliant order of credential then
 salt. (markt)
 * Cluster
 + Add: 62814: Document that human-readable names maybe used for
 mapSendOptions and align documentation with channelSendOptions. Based on
 pull request #929 by archan0621. (markt)
 * Clustering
 + Fix: Correct a regression introduced in 9.0.109 that broke some clustering
 configurations. (markt)
 * Coyote
 + Fix: Prevent concurrent release of OpenSSLEngine resources and the
 termination of the Tomcat Native library as it can cause crashes during
 Tomcat shutdown. (markt)
 + Fix: Avoid possible NPEs when using a TLS enabled custom connector. (remm)
 + Fix: Improve warnings when setting ciphers lists in the FFM code,
 mirroring the tomcat-native changes. (remm)
 + Fix: 69910: Dereference TLS objects right after closing a socket to
 improve memory efficiency. (remm)
 + Fix: Relax the JSSE vs OpenSSL configuration style checks on SSLHostConfig
 to reflect the existing implementation that allows one configuration style
 to be used for the trust attributes and a different style for all the
 other attributes. (markt)
 + Fix: Better warning message when OpenSSLConf configuration elements are
 used with a JSSE TLS implementation. (markt)
 + Fix: When using OpenSSL via FFM, don't log a warning about missing CA
 certificates unless CA certificates were configured and the configuration
 failed. (markt)
 + Add: For configuration consistency between OpenSSL and JSSE TLS
 implementations, TLSv1.3 cipher suites included in the ciphers attribute
 of an SSLHostConfig are now always ignored (previously they would be
 ignored with OpenSSL implementations and used with JSSE implementations)
 and a warning is logged that the cipher suite has been ignored. (markt)
 + Add: Add the ciphersuite attribute to SSLHostConfig to configure the
 TLSv1.3 cipher suites. (markt)
 + Add: Add OCSP support to JSSE based TLS connectors and make the use of
 OCSP configurable per connector for both JSSE and OpenSSL based TLS
 implementations. Align the checks performed by OpenSSL with those
 performed by JSSE. (markt)
 + Add: Add support for soft failure of OCSP checks with soft failure support
 disabled by default. (markt)
 + Add: Add support for configuring the verification flags passed to
 OCSP_basic_verify when using an OpenSSL based TLS implementation. (markt)
 + Fix: Fix OpenSSL FFM code compatibility with LibreSSL versions below 3.5.
 + Fix: Don't log an incorrect certificate KeyStore location when creating a
 TLS connector if the KeyStore instance has been set directly on the
 connector. (markt)
 + Fix: HTTP/0.9 only allows GET as the HTTP method. (remm)
 + Add: Add strictSni attribute on the Connector to allow matching the
 SSLHostConfig configuration associated with the SNI host name to the
 SSLHostConfig configuration matched from the HTTP protocol host name. Non
 matching configurations will cause the request to be rejected. The
 attribute default value is true, enabling the matching. (remm)
 + Fix: Graceful failure for OCSP on BoringSSL in the FFM code. (remm)
 + Fix: 69866: Fix a memory leak when using a trust store with the OpenSSL
 provider. Pull request #912 by aogburn. (markt)
 + Fix: Fix AJP message length check. Pull request #916 by Joshua Rogers.
 * Jasper
 + Fix: 69333: Correct a regression in the previous fix for 69333 and ensure
 that reuse() or release() is always called for a tag. (markt)
 + Fix: 69877: Catch IllegalArgumentException when processing URIs when
 creating the classpath to handle invalid URIs. (remm)
 + Fix: Fix populating the classpath with the webapp classloader
 repositories. (remm)
 + Fix: 69862: Avoid NPE unwrapping Servlet exception which would hide some
 exception details. Patch submitted by Eric Blanquer. (remm)
 * Jdbc-pool
 + Fix: 64083: If the underlying connection has been closed, don't add it to
 the pool when it is returned. Pull request #235 by Alex Panchenko. (markt)
 * Web applications
 + Fix: Manager: Fix abrupt truncation of the HTML and JSON complete server
 status output if one or more of the web applications failed to start.
 (schultz)
 + Add: Manager: Include web application state in the HTML and JSON complete
 server status output. (markt)
 + Add: Documentation: Expand the documentation to better explain when OCSP
 is supported and when it is not. (markt)
 * Websocket
 + Fix: 69920: When attempting to write to a closed Writer or OutputStream
 obtained from a WebSocket session, throw an IOException rather than an
 IllegalStateExcpetion as required by Writer and strongly suggested by
 OutputStream. (markt)
 * Other
 + Add: Add property "gpg.sign.files" to optionally disable release artefact
 signing with GPG. (rjung)
 + Add: Add test.silent property to suppress JUnit console output during test
 execution. Useful for cleaner console output when running tests with
 multiple threads. (csutherl)
 + Update: Update the internal fork of Commons Pool to 2.13.1. (markt)
 + Update: Update the internal fork of Commons DBCP to 2.14.0. (markt)
 + Update: Update Commons Daemon to 1.5.1. (markt)
 + Update: Update ByteBuddy to 1.18.3. (markt)
 + Update: Update UnboundID to 7.0.4. (markt)
 + Update: Update Checkstyle to 12.3.1. (markt)
 + Add: Improvements to French translations. (markt)
 + Add: Improvements to Japanese translations provided by tak7iji. (markt)
 + Add: Improvements to Chinese translations provided by Yang. vincent.h and
 yong hu. (markt)
 + Update: Update Tomcat Native to 1.3.5. (markt)
 + Add: Add test profile system for selective test execution. Profiles can be
 specified via -Dtest.profile=&lt;name&gt; to run specific test subsets without
 using patterns directly. Profile patterns are defined in
 test-profiles.properties. (csutherl)
 + Update: Update file extension to media type mappings to align with the
 current list used by the Apache Web Server (httpd). (markt)
 + Update: Update Commons Daemon to 1.5.0. (markt)
 + Update: Update Byte Buddy to 1.18.2. (markt)
 + Update: Update Checkstyle to 12.2.0. (markt)
 + Add: Improvements to Spanish translations provided by White Vogel. (markt)
 + Add: Improvements to French translations. (remm)
 + Update: Update the internal fork of Apache Commons BCEL to 6.11.0. (markt)
 + Update: Update to Byte Buddy 1.17.8. (markt)
 + Update: Update to Checkstyle 12.1.1. (markt)
 + Update: Update to Jacoco 0.8.14. (markt)
 + Update: Update to SpotBugs 4.9.8. (markt)
 + Update: Update to JSign 7.4. (markt)
 + Update: Update Maven Resolver Ant Tasks to 1.6.0. (rjung)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-12"/>
	<updated date="2026-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253460">SUSE bug 1253460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258371">SUSE bug 1258371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258385">SUSE bug 1258385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258387">SUSE bug 1258387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66614/">CVE-2025-66614 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24733/">CVE-2026-24733 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-24734/">CVE-2026-24734 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048642" comment="tomcat-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048643" comment="tomcat-admin-webapps-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048644" comment="tomcat-docs-webapp-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048645" comment="tomcat-el-3_0-api-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048646" comment="tomcat-embed-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048647" comment="tomcat-javadoc-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048648" comment="tomcat-jsp-2_3-api-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048649" comment="tomcat-jsvc-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048650" comment="tomcat-lib-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048651" comment="tomcat-servlet-4_0-api-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048652" comment="tomcat-webapps-9.0.115-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048642" comment="tomcat-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048643" comment="tomcat-admin-webapps-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048644" comment="tomcat-docs-webapp-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048645" comment="tomcat-el-3_0-api-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048646" comment="tomcat-embed-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048647" comment="tomcat-javadoc-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048648" comment="tomcat-jsp-2_3-api-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048649" comment="tomcat-jsvc-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048650" comment="tomcat-lib-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048651" comment="tomcat-servlet-4_0-api-9.0.115-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048652" comment="tomcat-webapps-9.0.115-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94527" version="1" class="patch">
	<metadata>
		<title>Security update for amazon-ssm-agent (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253611" ref_url="https://bugzilla.suse.com/1253611" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<description>
This update for amazon-ssm-agent fixes the following issues:

- CVE-2025-47913: client process termination when receiving an unexpected message type in response to a key listing or
  signing request (bsc#1253611).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-12"/>
	<updated date="2026-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253611">SUSE bug 1253611</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048653" comment="amazon-ssm-agent-3.3.2299.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048653" comment="amazon-ssm-agent-3.3.2299.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94528" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255400" ref_url="https://bugzilla.suse.com/1255400" source="BUGZILLA"/>
		<reference ref_id="1256484" ref_url="https://bugzilla.suse.com/1256484" source="BUGZILLA"/>
		<reference ref_id="1257474" ref_url="https://bugzilla.suse.com/1257474" source="BUGZILLA"/>
		<reference ref_id="1257492" ref_url="https://bugzilla.suse.com/1257492" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14876" ref_url="https://www.suse.com/security/cve/CVE-2025-14876/" source="CVE"/>
		<reference ref_id="CVE-2026-0665" ref_url="https://www.suse.com/security/cve/CVE-2026-0665/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

- Update to version 10.0.8
- CVE-2025-14876: Fixed unbounded allocation in virtio-crypto. (bsc#1255400)
- CVE-2026-0665: Fixed PIRQ bounds check in xen_physdev_map_pirq. (bsc#1256484)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255400">SUSE bug 1255400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256484">SUSE bug 1256484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257474">SUSE bug 1257474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257492">SUSE bug 1257492</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14876/">CVE-2025-14876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14876">CVE-2025-14876 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0665/">CVE-2026-0665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0665">CVE-2026-0665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048658" comment="qemu-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048659" comment="qemu-SLOF-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048661" comment="qemu-arm-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048662" comment="qemu-audio-alsa-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048663" comment="qemu-audio-dbus-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048664" comment="qemu-audio-jack-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048665" comment="qemu-audio-oss-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048669" comment="qemu-block-curl-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048670" comment="qemu-block-dmg-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048671" comment="qemu-block-iscsi-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048672" comment="qemu-block-nfs-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048674" comment="qemu-block-ssh-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048677" comment="qemu-doc-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048678" comment="qemu-extra-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048679" comment="qemu-guest-agent-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048680" comment="qemu-headless-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048682" comment="qemu-hw-display-virtio-gpu-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048683" comment="qemu-hw-display-virtio-gpu-pci-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048684" comment="qemu-hw-display-virtio-vga-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048685" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048686" comment="qemu-hw-usb-host-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048687" comment="qemu-hw-usb-redirect-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048688" comment="qemu-hw-usb-smartcard-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048689" comment="qemu-img-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048690" comment="qemu-ipxe-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048691" comment="qemu-ivshmem-tools-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048692" comment="qemu-ksm-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048693" comment="qemu-lang-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048694" comment="qemu-linux-user-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048695" comment="qemu-microvm-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048696" comment="qemu-ppc-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048697" comment="qemu-pr-helper-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048698" comment="qemu-s390x-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048699" comment="qemu-seabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048700" comment="qemu-skiboot-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048702" comment="qemu-tools-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048709" comment="qemu-vgabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048710" comment="qemu-vhost-user-gpu-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048711" comment="qemu-vmsr-helper-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048712" comment="qemu-x86-10.0.8-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048658" comment="qemu-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048659" comment="qemu-SLOF-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048661" comment="qemu-arm-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048662" comment="qemu-audio-alsa-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048663" comment="qemu-audio-dbus-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048664" comment="qemu-audio-jack-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048665" comment="qemu-audio-oss-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048669" comment="qemu-block-curl-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048670" comment="qemu-block-dmg-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048671" comment="qemu-block-iscsi-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048672" comment="qemu-block-nfs-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048674" comment="qemu-block-ssh-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048677" comment="qemu-doc-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048678" comment="qemu-extra-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048679" comment="qemu-guest-agent-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048680" comment="qemu-headless-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048682" comment="qemu-hw-display-virtio-gpu-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048683" comment="qemu-hw-display-virtio-gpu-pci-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048684" comment="qemu-hw-display-virtio-vga-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048685" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048686" comment="qemu-hw-usb-host-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048687" comment="qemu-hw-usb-redirect-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048688" comment="qemu-hw-usb-smartcard-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048689" comment="qemu-img-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048690" comment="qemu-ipxe-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048691" comment="qemu-ivshmem-tools-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048692" comment="qemu-ksm-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048693" comment="qemu-lang-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048694" comment="qemu-linux-user-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048695" comment="qemu-microvm-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048696" comment="qemu-ppc-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048697" comment="qemu-pr-helper-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048698" comment="qemu-s390x-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048699" comment="qemu-seabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048700" comment="qemu-skiboot-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048702" comment="qemu-tools-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048709" comment="qemu-vgabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048710" comment="qemu-vhost-user-gpu-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048711" comment="qemu-vmsr-helper-10.0.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048712" comment="qemu-x86-10.0.8-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94529" version="1" class="patch">
	<metadata>
		<title>Security update for rust-keylime (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247193" ref_url="https://bugzilla.suse.com/1247193" source="BUGZILLA"/>
		<reference ref_id="1248006" ref_url="https://bugzilla.suse.com/1248006" source="BUGZILLA"/>
		<reference ref_id="1257908" ref_url="https://bugzilla.suse.com/1257908" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<reference ref_id="CVE-2025-58266" ref_url="https://www.suse.com/security/cve/CVE-2025-58266/" source="CVE"/>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
This update for rust-keylime fixes the following issues:

- Update to version 0.2.8+116:
- CVE-2026-25727: Update vendored crates to fix a date parser can lead to stack exhaustion in Time. (bsc#1257908)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-16"/>
	<updated date="2026-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1247193">SUSE bug 1247193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248006">SUSE bug 1248006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257908">SUSE bug 1257908</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58266/">CVE-2025-58266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58266">CVE-2025-58266 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049112" comment="keylime-ima-policy-0.2.8+116-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049112" comment="keylime-ima-policy-0.2.8+116-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94530" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258568" ref_url="https://bugzilla.suse.com/1258568" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 140.8.0 ESR (bsc#1258568)
- CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component
- CVE-2026-2758: Use-after-free in the JavaScript: GC component
- CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component
- CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component
- CVE-2026-2761: Sandbox escape in the Graphics: WebRender component
- CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component
- CVE-2026-2763: Use-after-free in the JavaScript Engine component
- CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component
- CVE-2026-2765: Use-after-free in the JavaScript Engine component
- CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component
- CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component
- CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component
- CVE-2026-2769: Use-after-free in the Storage: IndexedDB component
- CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component
- CVE-2026-2771: Undefined behavior in the DOM: Core HTML component
- CVE-2026-2772: Use-after-free in the Audio/Video: Playback component
- CVE-2026-2773: Incorrect boundary conditions in the Web Audio component
- CVE-2026-2774: Integer overflow in the Audio/Video component
- CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component
- CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software
- CVE-2026-2777: Privilege escalation in the Messaging System component
- CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core HTML component
- CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component
- CVE-2026-2780: Privilege escalation in the Netmonitor component
- CVE-2026-2781: Integer overflow in the Libraries component in NSS
- CVE-2026-2782: Privilege escalation in the Netmonitor component
- CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component
- CVE-2026-2784: Mitigation bypass in the DOM: Security component
- CVE-2026-2785: Invalid pointer in the JavaScript Engine component
- CVE-2026-2786: Use-after-free in the JavaScript Engine component
- CVE-2026-2787: Use-after-free in the DOM: Window and Location component
- CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component
- CVE-2026-2789: Use-after-free in the Graphics: ImageLib component
- CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component
- CVE-2026-2791: Mitigation bypass in the Networking: Cache component
- CVE-2026-2792: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
- CVE-2026-2793: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-16"/>
	<updated date="2026-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94531" version="1" class="patch">
	<metadata>
		<title>Security update for docker-stable (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1240513" ref_url="https://bugzilla.suse.com/1240513" source="BUGZILLA"/>
		<reference ref_id="1253904" ref_url="https://bugzilla.suse.com/1253904" source="BUGZILLA"/>
		<reference ref_id="1254206" ref_url="https://bugzilla.suse.com/1254206" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<description>
This update for docker-stable fixes the following issues:

- CVE-2025-58181: Fixed unbounded memory consumption. (bsc#1253904)
- CVE-2025-30204: Fixed a bug in jwt-go which allows excessive memory allocation during header parsing. (bsc#1240513)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-16"/>
	<updated date="2026-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1240513">SUSE bug 1240513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253904">SUSE bug 1253904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254206">SUSE bug 1254206</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049119" comment="docker-stable-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049120" comment="docker-stable-bash-completion-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049121" comment="docker-stable-buildx-0.25.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049122" comment="docker-stable-fish-completion-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049123" comment="docker-stable-rootless-extras-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049124" comment="docker-stable-zsh-completion-24.0.9_ce-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049119" comment="docker-stable-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049120" comment="docker-stable-bash-completion-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049121" comment="docker-stable-buildx-0.25.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049122" comment="docker-stable-fish-completion-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049123" comment="docker-stable-rootless-extras-24.0.9_ce-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049124" comment="docker-stable-zsh-completion-24.0.9_ce-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94532" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249391" ref_url="https://bugzilla.suse.com/1249391" source="BUGZILLA"/>
		<reference ref_id="1250452" ref_url="https://bugzilla.suse.com/1250452" source="BUGZILLA"/>
		<reference ref_id="1251263" ref_url="https://bugzilla.suse.com/1251263" source="BUGZILLA"/>
		<reference ref_id="1253188" ref_url="https://bugzilla.suse.com/1253188" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11713" ref_url="https://www.suse.com/security/cve/CVE-2025-11713/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<reference ref_id="CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012/" source="CVE"/>
		<reference ref_id="CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013/" source="CVE"/>
		<reference ref_id="CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014/" source="CVE"/>
		<reference ref_id="CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015/" source="CVE"/>
		<reference ref_id="CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016/" source="CVE"/>
		<reference ref_id="CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017/" source="CVE"/>
		<reference ref_id="CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018/" source="CVE"/>
		<reference ref_id="CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019/" source="CVE"/>
		<reference ref_id="CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Changes in MozillaFirefox:

Firefox Extended Support Release 140.5.0 ESR:

* Fixed: Various security fixes (MFSA 2025-88 bsc#1253188):

  * CVE-2025-13012
    Race condition in the Graphics component
  * CVE-2025-13016
    Incorrect boundary conditions in the JavaScript: WebAssembly
    component
  * CVE-2025-13017
    Same-origin policy bypass in the DOM: Notifications component
  * CVE-2025-13018
    Mitigation bypass in the DOM: Security component
  * CVE-2025-13019
    Same-origin policy bypass in the DOM: Workers component
  * CVE-2025-13013
    Mitigation bypass in the DOM: Core &amp; HTML component
  * CVE-2025-13020
    Use-after-free in the WebRTC: Audio/Video component
  * CVE-2025-13014
    Use-after-free in the Audio/Video component
  * CVE-2025-13015
    Spoofing issue in Firefox

- Firefox Extended Support Release 140.4.0 ESR
  * Fixed: Various security fixes.
  MFSA 2025-83 (bsc#1251263)
  * CVE-2025-11708
    Use-after-free in MediaTrackGraphImpl::GetInstance()
  * CVE-2025-11709
    Out of bounds read/write in a privileged process triggered by
    WebGL textures
  * CVE-2025-11710
    Cross-process information leaked due to malicious IPC
    messages
  * CVE-2025-11711
    Some non-writable Object properties could be modified
  * CVE-2025-11712
    An OBJECT tag type attribute overrode browser behavior on web
    resources without a content-type
  * CVE-2025-11713
    Potential user-assisted code execution in “Copy as cURL”
    command
  * CVE-2025-11714
    Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR
    140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144
  * CVE-2025-11715
    Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird
    ESR 140.4, Firefox 144 and Thunderbird 144

- Firefox Extended Support Release 140.3.1 ESR (bsc#1250452)
  * Fixed: Improved reliability when HTTP/3 connections fail:
    Firefox no longer forces HTTP/2 during fallback, allowing the
    server to choose the protocol and preventing stalls on some
    sites.

Firefox Extended Support Release 140.3.0 ESR

* Fixed: Various security fixes (MFSA 2025-75 bsc#1249391)

  * CVE-2025-10527
    Sandbox escape due to use-after-free in the Graphics:
    Canvas2D component
  * CVE-2025-10528
    Sandbox escape due to undefined behavior, invalid pointer in
    the Graphics: Canvas2D component
  * CVE-2025-10529
    Same-origin policy bypass in the Layout component
  * CVE-2025-10532
    Incorrect boundary conditions in the JavaScript: GC component
  * CVE-2025-10533
    Integer overflow in the SVG component
  * CVE-2025-10536
    Information disclosure in the Networking: Cache component
  * CVE-2025-10537
    Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird
    ESR 140.3, Firefox 143 and Thunderbird 143
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250452">SUSE bug 1250452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11713/">CVE-2025-11713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11713">CVE-2025-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94533" version="1" class="patch">
	<metadata>
		<title>Security update for python-maturin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257918" ref_url="https://bugzilla.suse.com/1257918" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
This update for python-maturin fixes the following issue:

- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
  (bsc#1257918).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257918">SUSE bug 1257918</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050011" comment="python313-maturin-1.8.7-160000.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050011" comment="python313-maturin-1.8.7-160000.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94534" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257364" ref_url="https://bugzilla.suse.com/1257364" source="BUGZILLA"/>
		<reference ref_id="1257365" ref_url="https://bugzilla.suse.com/1257365" source="BUGZILLA"/>
		<reference ref_id="1258020" ref_url="https://bugzilla.suse.com/1258020" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-28162" ref_url="https://www.suse.com/security/cve/CVE-2025-28162/" source="CVE"/>
		<reference ref_id="CVE-2025-28164" ref_url="https://www.suse.com/security/cve/CVE-2025-28164/" source="CVE"/>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
This update for libpng16 fixes the following issues:

- CVE-2026-25646: Heap buffer overflow vulnerability in png_set_dither/png_set_quantize (bsc#1258020)
- CVE-2025-28162: Fixed a memory leaks when running `pngimage`. (bsc#1257364)
- CVE-2025-28164: Fixed a memory leaks when running `pngimage`. (bsc#1257365)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257364">SUSE bug 1257364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257365">SUSE bug 1257365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258020">SUSE bug 1258020</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28162/">CVE-2025-28162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28162">CVE-2025-28162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28164/">CVE-2025-28164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28164">CVE-2025-28164 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050165" comment="libpng16-16-x86-64-v3-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050166" comment="libpng16-compat-devel-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050167" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050168" comment="libpng16-devel-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050169" comment="libpng16-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050170" comment="libpng16-tools-1.6.44-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050165" comment="libpng16-16-x86-64-v3-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050166" comment="libpng16-compat-devel-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050167" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050168" comment="libpng16-devel-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050169" comment="libpng16-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050170" comment="libpng16-tools-1.6.44-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94535" version="1" class="patch">
	<metadata>
		<title>Security update for snpguest (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257877" ref_url="https://bugzilla.suse.com/1257877" source="BUGZILLA"/>
		<reference ref_id="1257927" ref_url="https://bugzilla.suse.com/1257927" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<description>
This update for snpguest fixes the following issues:

- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257927).
- Update to version 0.10.0 (bsc#1257877):
  * chore: updating tool version to 0.10.0
  * refactor(certs): remove redundant branch in file-write logic
  * Docs: Adding verify measure, host-data, report-data to docs
  * verify: verify measurent, host data, and report data attributes from the attestation report.
  * library: Updating sev library to 7.1.0
  * ci: replace deprecated gh actions
  * feat: multi-format integer parsing for key subcommand arguments
  * chore(main): remove unused import `clap::arg`
  * feat(fetch): add fetch crl subcommand
  * .github/lint: Bump toolchain version to 1.86
  * Bump rust version to 1.86
  * feat: bumping tool to version 0.9.2
  * fix(verify): silence mismatched_lifetime_syntaxes in SnpOid::oid
  * feat: support SEV-SNP ABI Spec 1.58 (bump sev to v6.3.0)
  * docs: restore and clarify Global Options section
  * doc: fix CL argument orders + address recent changes
  * fix(hyperv): downgrade VMPL check from error to warning
  * fix(report.rs): remove conflict check between --random flag and Hyper-V
  * fix(report.rs): Decouple runtime behavior from hyperv build feature
  * refactor: clarify --platform error message
  * docs: add Azure/Hyper-V build note for --platform
  * docs: Update README.md
  * report: Writing Req Data as Binary (#101)
  * deps: bump virtee/sev to 6.2.1 (fix TCB-serialization bug) (#99)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257877">SUSE bug 1257877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257927">SUSE bug 1257927</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050171" comment="snpguest-0.10.0-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050171" comment="snpguest-0.10.0-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94536" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255491" ref_url="https://bugzilla.suse.com/1255491" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025112.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255491">SUSE bug 1255491</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050013" comment="libsnmp40-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050172" comment="net-snmp-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050173" comment="net-snmp-devel-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050174" comment="perl-SNMP-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050175" comment="python313-net-snmp-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050014" comment="snmp-mibs-5.9.4-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050013" comment="libsnmp40-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050172" comment="net-snmp-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050173" comment="net-snmp-devel-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050174" comment="perl-SNMP-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050175" comment="python313-net-snmp-5.9.4-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050014" comment="snmp-mibs-5.9.4-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94537" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1240751" ref_url="https://bugzilla.suse.com/1240751" source="BUGZILLA"/>
		<reference ref_id="1252555" ref_url="https://bugzilla.suse.com/1252555" source="BUGZILLA"/>
		<reference ref_id="1254876" ref_url="https://bugzilla.suse.com/1254876" source="BUGZILLA"/>
		<reference ref_id="1257398" ref_url="https://bugzilla.suse.com/1257398" source="BUGZILLA"/>
		<reference ref_id="1257441" ref_url="https://bugzilla.suse.com/1257441" source="BUGZILLA"/>
		<reference ref_id="1257597" ref_url="https://bugzilla.suse.com/1257597" source="BUGZILLA"/>
		<reference ref_id="1258120" ref_url="https://bugzilla.suse.com/1258120" source="BUGZILLA"/>
		<reference ref_id="1258170" ref_url="https://bugzilla.suse.com/1258170" source="BUGZILLA"/>
		<reference ref_id="1258508" ref_url="https://bugzilla.suse.com/1258508" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12105" ref_url="https://www.suse.com/security/cve/CVE-2025-12105/" source="CVE"/>
		<reference ref_id="CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523/" source="CVE"/>
		<reference ref_id="CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049/" source="CVE"/>
		<reference ref_id="CVE-2026-1467" ref_url="https://www.suse.com/security/cve/CVE-2026-1467/" source="CVE"/>
		<reference ref_id="CVE-2026-1539" ref_url="https://www.suse.com/security/cve/CVE-2026-1539/" source="CVE"/>
		<reference ref_id="CVE-2026-1760" ref_url="https://www.suse.com/security/cve/CVE-2026-1760/" source="CVE"/>
		<reference ref_id="CVE-2026-2369" ref_url="https://www.suse.com/security/cve/CVE-2026-2369/" source="CVE"/>
		<reference ref_id="CVE-2026-2443" ref_url="https://www.suse.com/security/cve/CVE-2026-2443/" source="CVE"/>
		<reference ref_id="CVE-2026-2708" ref_url="https://www.suse.com/security/cve/CVE-2026-2708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

Update to libsoup 3.6.6:

- CVE-2025-12105: heap use-after-free in message queue handling during HTTP/2 read completion (bsc#1252555).
- CVE-2025-14523: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (bsc#1254876).
- CVE-2025-32049: Denial of Service attack to websocket server (bsc#1240751).
- CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398).
- CVE-2026-1539: proxy authentication credentials leaked via the Proxy-Authorization header when handling HTTP redirects
  (bsc#1257441).
- CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request
  smuggling and potential DoS (bsc#1257597).
- CVE-2026-2369: Buffer overread due to integer underflow when handling zero-length resources (bsc#1258120).
- CVE-2026-2443: out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information
  disclosure to remote attackers (bsc#1258170).
- CVE-2026-2708: HTTP request smuggling via duplicate Content-Length headers (bsc#1258508).

Changelog:

- websocket: Fix out-of-bounds read in process_frame
- Check nulls returned by soup_date_time_new_from_http_string()
- Numerous fixes to handling of Range headers
- server: close the connection after responsing a request
containing Content-Length and Transfer-Encoding
- Use CRLF as line boundary when parsing chunked enconding data
- websocket: do not accept messages frames after closing due to
an error
- Sanitize filename of content disposition header values
- Always validate the headers value when coming from untrusted
source
- uri-utils: do host validation when checking if a GUri is valid
- multipart: check length of bytes read
soup_filter_input_stream_read_until()
- message-headers: Reject duplicate Host headers
- server: null-check soup_date_time_to_string()
- auth-digest: fix crash in
soup_auth_digest_get_protection_space()
- session: fix 'heap-use-after-free' caused by 'finishing' queue
item twice
- cookies: Avoid expires attribute if date is invalid
- http1: Set EOF flag once content-length bytes have been read
- date-utils: Add value checks for date/time parsing
- multipart: Fix multiple boundry limits
- Fixed multiple possible memory leaks
- message-headers: Correct merge of ranges
- body-input-stream: Correct chunked trailers end detection
- server-http2: Correctly validate URIs
- multipart: Fix read out of buffer bounds under
soup_multipart_new_from_message()
- headers: Ensure Request-Line comprises entire first line
- tests: Fix MSVC build error
- Fix possible deadlock on init from gmodule usage
- Updated translations.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1240751">SUSE bug 1240751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252555">SUSE bug 1252555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254876">SUSE bug 1254876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257398">SUSE bug 1257398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257441">SUSE bug 1257441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257597">SUSE bug 1257597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258120">SUSE bug 1258120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258170">SUSE bug 1258170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258508">SUSE bug 1258508</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12105/">CVE-2025-12105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12105">CVE-2025-12105 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1467/">CVE-2026-1467 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1467">CVE-2026-1467 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1539/">CVE-2026-1539 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1539">CVE-2026-1539 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1760/">CVE-2026-1760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1760">CVE-2026-1760 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2369/">CVE-2026-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2369">CVE-2026-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2443/">CVE-2026-2443 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2443">CVE-2026-2443 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2708/">CVE-2026-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2708">CVE-2026-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94538" version="1" class="patch">
	<metadata>
		<title>Security update for libjxl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258090" ref_url="https://bugzilla.suse.com/1258090" source="BUGZILLA"/>
		<reference ref_id="1258091" ref_url="https://bugzilla.suse.com/1258091" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12474" ref_url="https://www.suse.com/security/cve/CVE-2025-12474/" source="CVE"/>
		<reference ref_id="CVE-2026-1837" ref_url="https://www.suse.com/security/cve/CVE-2026-1837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025110.html" source="SUSE-SU"/>
		<description>
This update for libjxl fixes the following issues:

Update to libjxl 0.11.2:

- CVE-2025-12474: a specially crafted file can cause the decoder to read pixel data from uninitialized allocated memory
  (bsc#1258090).
- CVE-2026-1837: a specially crafted file can cause the decoder to write pixel data to uninitialized unallocated memory
  (bsc#1258091).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258090">SUSE bug 1258090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258091">SUSE bug 1258091</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12474/">CVE-2025-12474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12474">CVE-2025-12474 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1837/">CVE-2026-1837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1837">CVE-2026-1837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050179" comment="libjxl-devel-0.11.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050181" comment="libjxl0_11-0.11.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050182" comment="libjxl0_11-x86-64-v3-0.11.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050179" comment="libjxl-devel-0.11.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050181" comment="libjxl0_11-0.11.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050182" comment="libjxl0_11-x86-64-v3-0.11.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94539" version="1" class="patch">
	<metadata>
		<title>Security update for cosign (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250620" ref_url="https://bugzilla.suse.com/1250620" source="BUGZILLA"/>
		<reference ref_id="1253913" ref_url="https://bugzilla.suse.com/1253913" source="BUGZILLA"/>
		<reference ref_id="1256496" ref_url="https://bugzilla.suse.com/1256496" source="BUGZILLA"/>
		<reference ref_id="1256562" ref_url="https://bugzilla.suse.com/1256562" source="BUGZILLA"/>
		<reference ref_id="1257080" ref_url="https://bugzilla.suse.com/1257080" source="BUGZILLA"/>
		<reference ref_id="1257085" ref_url="https://bugzilla.suse.com/1257085" source="BUGZILLA"/>
		<reference ref_id="1257139" ref_url="https://bugzilla.suse.com/1257139" source="BUGZILLA"/>
		<reference ref_id="1258542" ref_url="https://bugzilla.suse.com/1258542" source="BUGZILLA"/>
		<reference ref_id="1258612" ref_url="https://bugzilla.suse.com/1258612" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11065" ref_url="https://www.suse.com/security/cve/CVE-2025-11065/" source="CVE"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="CVE-2026-22703" ref_url="https://www.suse.com/security/cve/CVE-2026-22703/" source="CVE"/>
		<reference ref_id="CVE-2026-22772" ref_url="https://www.suse.com/security/cve/CVE-2026-22772/" source="CVE"/>
		<reference ref_id="CVE-2026-23991" ref_url="https://www.suse.com/security/cve/CVE-2026-23991/" source="CVE"/>
		<reference ref_id="CVE-2026-23992" ref_url="https://www.suse.com/security/cve/CVE-2026-23992/" source="CVE"/>
		<reference ref_id="CVE-2026-24122" ref_url="https://www.suse.com/security/cve/CVE-2026-24122/" source="CVE"/>
		<reference ref_id="CVE-2026-24137" ref_url="https://www.suse.com/security/cve/CVE-2026-24137/" source="CVE"/>
		<reference ref_id="CVE-2026-26958" ref_url="https://www.suse.com/security/cve/CVE-2026-26958/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
		<description>
This update for cosign fixes the following issues:

Update to version 3.0.5:

- CVE-2026-24122: Fixed improper validation of certificates that outlive
  expired CA certificates (bsc#1258542)
- CVE-2026-26958: Fixed filippo.io/edwards25519: failure to initialize receiver
  in MultiScalarMult can produce invalid results and lead to undefined behavior
  (bsc#1258612)
- CVE-2026-24137: Fixed github.com/sigstore/sigstore/pkg/tuf: legacy TUF client
  allows for arbitrary file writes with target cache path traversal
  (bsc#1257139)
- CVE-2026-22772: Fixed github.com/sigstore/fulcio: bypass MetaIssuer URL
  validation bypass can trigger SSRF to arbitrary internal services
  (bsc#1256562)
- CVE-2026-23991: Fixed github.com/theupdateframework/go-tuf/v2: denial of
  service due to invalid TUF metadata JSON returned by TUF repository
  (bsc#1257080)
- CVE-2026-23992: Fixed github.com/theupdateframework/go-tuf/v2: unauthorized
  modification to TUF metadata files due to a compromised or misconfigured TUF
  repository (bsc#1257085)
- CVE-2025-11065: Fixed github.com/go-viper/mapstructure/v2: sensitive
  Information leak in logs (bsc#1250620)
- CVE-2026-22703: Fixed that cosign verification accepts any valid Rekor entry
  under certain conditions (bsc#1256496)
- CVE-2025-58181: Fixed golang.org/x/crypto/ssh: invalidated number of
  mechanisms can cause unbounded memory consumption (bsc#1253913)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250620">SUSE bug 1250620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253913">SUSE bug 1253913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256496">SUSE bug 1256496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256562">SUSE bug 1256562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257080">SUSE bug 1257080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257085">SUSE bug 1257085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257139">SUSE bug 1257139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258542">SUSE bug 1258542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258612">SUSE bug 1258612</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11065/">CVE-2025-11065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11065">CVE-2025-11065 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-22703/">CVE-2026-22703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22703">CVE-2026-22703 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22772/">CVE-2026-22772 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22772">CVE-2026-22772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23991/">CVE-2026-23991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23991">CVE-2026-23991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23992/">CVE-2026-23992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23992">CVE-2026-23992 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24122/">CVE-2026-24122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24122">CVE-2026-24122 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24137/">CVE-2026-24137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24137">CVE-2026-24137 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26958/">CVE-2026-26958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26958">CVE-2026-26958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94540" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258163" ref_url="https://bugzilla.suse.com/1258163" source="BUGZILLA"/>
		<reference ref_id="1258167" ref_url="https://bugzilla.suse.com/1258167" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-26157" ref_url="https://www.suse.com/security/cve/CVE-2026-26157/" source="CVE"/>
		<reference ref_id="CVE-2026-26158" ref_url="https://www.suse.com/security/cve/CVE-2026-26158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025108.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

Changes in busybox:

- CVE-2026-26157: Fixed arbitrary file overwrite and potential code execution via incomplete path sanitization. (bsc#1258163)
- CVE-2026-26158: Fixed arbitrary file modification and privilege escalation via unvalidated tar archive entries. (bsc#1258167)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258163">SUSE bug 1258163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258167">SUSE bug 1258167</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26157/">CVE-2026-26157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26157">CVE-2026-26157 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26158/">CVE-2026-26158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26158">CVE-2026-26158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050187" comment="busybox-1.37.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050188" comment="busybox-static-1.37.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050189" comment="busybox-warewulf3-1.37.0-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050187" comment="busybox-1.37.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050188" comment="busybox-static-1.37.0-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050189" comment="busybox-warewulf3-1.37.0-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94541" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258008" ref_url="https://bugzilla.suse.com/1258008" source="BUGZILLA"/>
		<reference ref_id="1258009" ref_url="https://bugzilla.suse.com/1258009" source="BUGZILLA"/>
		<reference ref_id="1258010" ref_url="https://bugzilla.suse.com/1258010" source="BUGZILLA"/>
		<reference ref_id="1258011" ref_url="https://bugzilla.suse.com/1258011" source="BUGZILLA"/>
		<reference ref_id="1258754" ref_url="https://bugzilla.suse.com/1258754" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<description>
This update for postgresql17 fixes the following issues:

- Update to version 17.9. (bsc#1258754)
- CVE-2026-2003: Guard against unexpected dimensions of oidvector/int2vector (bsc#1258008)
- CVE-2026-2004: Harden selectivity estimators against being attached to operators that accept unexpected data types. (bsc#1258009)
- CVE-2026-2005: Fix buffer overrun in contrib/pgcrypto's PGP decryption functions. (bsc#1258010)
- CVE-2026-2006: Fix inadequate validation of multibyte character lengths. (bsc#1258011)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258008">SUSE bug 1258008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258009">SUSE bug 1258009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258010">SUSE bug 1258010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258011">SUSE bug 1258011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258754">SUSE bug 1258754</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050190" comment="postgresql17-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050191" comment="postgresql17-contrib-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050192" comment="postgresql17-devel-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050193" comment="postgresql17-docs-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050196" comment="postgresql17-plperl-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050197" comment="postgresql17-plpython-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050198" comment="postgresql17-pltcl-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050199" comment="postgresql17-server-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050200" comment="postgresql17-server-devel-17.9-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050190" comment="postgresql17-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050191" comment="postgresql17-contrib-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050192" comment="postgresql17-devel-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050193" comment="postgresql17-docs-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050196" comment="postgresql17-plperl-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050197" comment="postgresql17-plpython-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050198" comment="postgresql17-pltcl-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050199" comment="postgresql17-server-17.9-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050200" comment="postgresql17-server-devel-17.9-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94542" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1244663" ref_url="https://bugzilla.suse.com/1244663" source="BUGZILLA"/>
		<reference ref_id="1244918" ref_url="https://bugzilla.suse.com/1244918" source="BUGZILLA"/>
		<reference ref_id="1257173" ref_url="https://bugzilla.suse.com/1257173" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4565" ref_url="https://www.suse.com/security/cve/CVE-2025-4565/" source="CVE"/>
		<reference ref_id="CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025106.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

Security fixes:

- CVE-2025-4565: Fixed parsing of untrusted Protocol Buffers data containing an arbitrary number of recursive
  groups or messages that could lead to crash due to RecursionError (bsc#1244663).
- CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python json_format.ParseDict (bsc#1257173).

Other fixes:

- Fixed import issues of reverse-dependency packages within the google namespace (bsc#1244918).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244663">SUSE bug 1244663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244918">SUSE bug 1244918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257173">SUSE bug 1257173</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4565/">CVE-2025-4565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4565">CVE-2025-4565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050202" comment="libprotobuf-lite28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050016" comment="libprotobuf28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050203" comment="libprotoc28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050017" comment="libutf8_range-28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050204" comment="protobuf-devel-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050205" comment="protobuf-java-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050209" comment="python313-protobuf-5.28.3-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050202" comment="libprotobuf-lite28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050016" comment="libprotobuf28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050203" comment="libprotoc28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050017" comment="libutf8_range-28_3_0-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050204" comment="protobuf-devel-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050205" comment="protobuf-java-28.3-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050209" comment="python313-protobuf-5.28.3-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94543" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1229376" ref_url="https://bugzilla.suse.com/1229376" source="BUGZILLA"/>
		<reference ref_id="1229950" ref_url="https://bugzilla.suse.com/1229950" source="BUGZILLA"/>
		<reference ref_id="1243867" ref_url="https://bugzilla.suse.com/1243867" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025105.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

Update to version 2.60.2:

- CVE-2024-12224: Fixed idna accepts Punycode labels that do not produce any non-ASCII when decoded (bsc#1243867).
- CVE-2024-43806: Fixed memory explosion in rustix (bsc#1229950).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229376">SUSE bug 1229376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229950">SUSE bug 1229950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243867">SUSE bug 1243867</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050018" comment="gdk-pixbuf-loader-rsvg-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050019" comment="librsvg-2-2-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050702" comment="librsvg-devel-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050703" comment="rsvg-convert-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050704" comment="rsvg-thumbnailer-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050705" comment="typelib-1_0-Rsvg-2_0-2.60.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050018" comment="gdk-pixbuf-loader-rsvg-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050019" comment="librsvg-2-2-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050702" comment="librsvg-devel-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050703" comment="rsvg-convert-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050704" comment="rsvg-thumbnailer-2.60.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050705" comment="typelib-1_0-Rsvg-2_0-2.60.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94544" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252337" ref_url="https://bugzilla.suse.com/1252337" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11896" ref_url="https://www.suse.com/security/cve/CVE-2025-11896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025104.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2025-11896: infinite recursion leading to stack overflow due to object loop in PDF CMap (bsc#1252337).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1252337">SUSE bug 1252337</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11896/">CVE-2025-11896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11896">CVE-2025-11896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050706" comment="libpoppler-cpp2-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050707" comment="libpoppler-devel-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050708" comment="libpoppler-glib8-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050709" comment="libpoppler-qt6-3-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050710" comment="libpoppler-qt6-devel-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050711" comment="libpoppler148-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050712" comment="poppler-tools-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050713" comment="typelib-1_0-Poppler-0_18-25.04.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050706" comment="libpoppler-cpp2-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050707" comment="libpoppler-devel-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050708" comment="libpoppler-glib8-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050709" comment="libpoppler-qt6-3-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050710" comment="libpoppler-qt6-devel-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050711" comment="libpoppler148-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050712" comment="poppler-tools-25.04.0-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050713" comment="typelib-1_0-Poppler-0_18-25.04.0-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94545" version="1" class="patch">
	<metadata>
		<title>Security update for keylime (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257895" ref_url="https://bugzilla.suse.com/1257895" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-1709" ref_url="https://www.suse.com/security/cve/CVE-2026-1709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025103.html" source="SUSE-SU"/>
		<description>
This update for keylime fixes the following issues:

- Update to version 7.14.0+0 (CVE-2026-1709, bsc#1257895):
- CVE-2026-1709: Fixed an authentication bypass which may allow unauthorized administrative operations due to missing client-side TLS authentication. (bsc#1257895)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1257895">SUSE bug 1257895</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1709/">CVE-2026-1709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1709">CVE-2026-1709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050714" comment="keylime-config-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050715" comment="keylime-firewalld-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050716" comment="keylime-logrotate-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050717" comment="keylime-registrar-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050718" comment="keylime-tenant-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050719" comment="keylime-tpm_cert_store-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050720" comment="keylime-verifier-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050721" comment="python313-keylime-7.14.0+0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050714" comment="keylime-config-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050715" comment="keylime-firewalld-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050716" comment="keylime-logrotate-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050717" comment="keylime-registrar-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050718" comment="keylime-tenant-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050719" comment="keylime-tpm_cert_store-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050720" comment="keylime-verifier-7.14.0+0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050721" comment="python313-keylime-7.14.0+0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94546" version="1" class="patch">
	<metadata>
		<title>Security update for libsodium (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256070" ref_url="https://bugzilla.suse.com/1256070" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-15444" ref_url="https://www.suse.com/security/cve/CVE-2025-15444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025102.html" source="SUSE-SU"/>
		<description>
This update for libsodium fixes the following issues:

- CVE-2025-15444: Fixed cryptographic bypass via improper elliptic curve point validation (bsc#1256070).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256070">SUSE bug 1256070</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-15444/">CVE-2025-15444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15444">CVE-2025-15444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050722" comment="libsodium-devel-1.0.20-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050020" comment="libsodium26-1.0.20-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050722" comment="libsodium-devel-1.0.20-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050020" comment="libsodium26-1.0.20-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94547" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1229129" ref_url="https://bugzilla.suse.com/1229129" source="BUGZILLA"/>
		<reference ref_id="1230400" ref_url="https://bugzilla.suse.com/1230400" source="BUGZILLA"/>
		<reference ref_id="1249138" ref_url="https://bugzilla.suse.com/1249138" source="BUGZILLA"/>
		<reference ref_id="1253319" ref_url="https://bugzilla.suse.com/1253319" source="BUGZILLA"/>
		<reference ref_id="1258046" ref_url="https://bugzilla.suse.com/1258046" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2025-31648" ref_url="https://www.suse.com/security/cve/CVE-2025-31648/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045211.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20260210 release (bsc#1258046):

  - CVE-2024-24853: Updated fix for incorrect behavior order in transition
    between executive monitor and SMI transfer monitor (STM) in some Intel(R)
    Processor may allow a privileged user to potentially enable escalation
    of privilege via local access (bsc#1229129).

  - CVE-2025-31648: Improper handling of values in the
    microcode flow for some Intel Processor Family may allow
    an escalation of privilege (bsc#1258046).

- Intel CPU Microcode was updated to the 20251111 release (bsc#1253319):

  - Update for functional issues.

- switch the supplements to use supplements + kernel to allow
  moving a installation to Intel hardware (bsc#1249138)

- Intel CPU Microcode was updated to the 20241029 release (bsc#1230400):

  - Update for functional issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230400">SUSE bug 1230400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249138">SUSE bug 1249138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253319">SUSE bug 1253319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258046">SUSE bug 1258046</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-31648/">CVE-2025-31648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31648">CVE-2025-31648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050021" comment="ucode-intel-20260210-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050021" comment="ucode-intel-20260210-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94548" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-ugly (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259367" ref_url="https://bugzilla.suse.com/1259367" source="BUGZILLA"/>
		<reference ref_id="1259370" ref_url="https://bugzilla.suse.com/1259370" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-2920" ref_url="https://www.suse.com/security/cve/CVE-2026-2920/" source="CVE"/>
		<reference ref_id="CVE-2026-2922" ref_url="https://www.suse.com/security/cve/CVE-2026-2922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025101.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-ugly fixes the following issues:

- CVE-2026-2920: GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability (bsc#1259367).
- CVE-2026-2922: GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability (bsc#1259370).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259367">SUSE bug 1259367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259370">SUSE bug 1259370</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2920/">CVE-2026-2920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2920">CVE-2026-2920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2922/">CVE-2026-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2922">CVE-2026-2922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050723" comment="gstreamer-plugins-ugly-1.26.7-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050724" comment="gstreamer-plugins-ugly-lang-1.26.7-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050723" comment="gstreamer-plugins-ugly-1.26.7-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050724" comment="gstreamer-plugins-ugly-lang-1.26.7-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94549" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246602" ref_url="https://bugzilla.suse.com/1246602" source="BUGZILLA"/>
		<reference ref_id="1258229" ref_url="https://bugzilla.suse.com/1258229" source="BUGZILLA"/>
		<reference ref_id="1259051" ref_url="https://bugzilla.suse.com/1259051" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906/" source="CVE"/>
		<reference ref_id="CVE-2026-26269" ref_url="https://www.suse.com/security/cve/CVE-2026-26269/" source="CVE"/>
		<reference ref_id="CVE-2026-28417" ref_url="https://www.suse.com/security/cve/CVE-2026-28417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- Update Vim to version 9.2.0110 that includes security fixes for:
* CVE-2026-28417: crafted URL parsed by netrw plugin can lead to execute arbitrary shell commands (bsc#1259051).
* CVE-2026-26269: stack buffer overflow in Vim's NetBeans integration when processing the specialKeys command (bsc#1258229).
* CVE-2025-53906: path traversal in Vim's zip.vim plugin (bsc#1246602).

- Other changes:
* Add wayland-client to BuildRequires and enable Wayland support.
* Add Wayland include path to CFLAGS to fix clipboard compilation.
* Package new Swedish (sv) man pages and clean up duplicate encodings (sv.ISO8859-1 and sv.UTF-8).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246602">SUSE bug 1246602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258229">SUSE bug 1258229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259051">SUSE bug 1259051</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-26269/">CVE-2026-26269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26269">CVE-2026-26269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28417/">CVE-2026-28417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28417">CVE-2026-28417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050725" comment="gvim-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050726" comment="vim-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050727" comment="vim-data-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050728" comment="xxd-9.2.0110-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050725" comment="gvim-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050726" comment="vim-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050727" comment="vim-data-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050728" comment="xxd-9.2.0110-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94550" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259362" ref_url="https://bugzilla.suse.com/1259362" source="BUGZILLA"/>
		<reference ref_id="1259363" ref_url="https://bugzilla.suse.com/1259363" source="BUGZILLA"/>
		<reference ref_id="1259364" ref_url="https://bugzilla.suse.com/1259364" source="BUGZILLA"/>
		<reference ref_id="1259365" ref_url="https://bugzilla.suse.com/1259365" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-1965" ref_url="https://www.suse.com/security/cve/CVE-2026-1965/" source="CVE"/>
		<reference ref_id="CVE-2026-3783" ref_url="https://www.suse.com/security/cve/CVE-2026-3783/" source="CVE"/>
		<reference ref_id="CVE-2026-3784" ref_url="https://www.suse.com/security/cve/CVE-2026-3784/" source="CVE"/>
		<reference ref_id="CVE-2026-3805" ref_url="https://www.suse.com/security/cve/CVE-2026-3805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2026-1965: bad reuse of HTTP Negotiate connection (bsc#1259362).
- CVE-2026-3783: token leak with redirect and netrc (bsc#1259363).
- CVE-2026-3784: wrong proxy connection reuse with credentials (bsc#1259364).
- CVE-2026-3805: use after free in SMB connection reuse (bsc#1259365).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259362">SUSE bug 1259362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259363">SUSE bug 1259363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259364">SUSE bug 1259364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259365">SUSE bug 1259365</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1965/">CVE-2026-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1965">CVE-2026-1965 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3783/">CVE-2026-3783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3783">CVE-2026-3783 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3784/">CVE-2026-3784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3784">CVE-2026-3784 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3805/">CVE-2026-3805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3805">CVE-2026-3805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050729" comment="curl-zsh-completion-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050730" comment="libcurl-devel-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050731" comment="libcurl-devel-doc-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050732" comment="libcurl-mini4-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050729" comment="curl-zsh-completion-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050730" comment="libcurl-devel-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050731" comment="libcurl-devel-doc-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050732" comment="libcurl-mini4-8.14.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94551" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258790" ref_url="https://bugzilla.suse.com/1258790" source="BUGZILLA"/>
		<reference ref_id="1259446" ref_url="https://bugzilla.suse.com/1259446" source="BUGZILLA"/>
		<reference ref_id="1259447" ref_url="https://bugzilla.suse.com/1259447" source="BUGZILLA"/>
		<reference ref_id="1259448" ref_url="https://bugzilla.suse.com/1259448" source="BUGZILLA"/>
		<reference ref_id="1259450" ref_url="https://bugzilla.suse.com/1259450" source="BUGZILLA"/>
		<reference ref_id="1259451" ref_url="https://bugzilla.suse.com/1259451" source="BUGZILLA"/>
		<reference ref_id="1259452" ref_url="https://bugzilla.suse.com/1259452" source="BUGZILLA"/>
		<reference ref_id="1259455" ref_url="https://bugzilla.suse.com/1259455" source="BUGZILLA"/>
		<reference ref_id="1259456" ref_url="https://bugzilla.suse.com/1259456" source="BUGZILLA"/>
		<reference ref_id="1259457" ref_url="https://bugzilla.suse.com/1259457" source="BUGZILLA"/>
		<reference ref_id="1259463" ref_url="https://bugzilla.suse.com/1259463" source="BUGZILLA"/>
		<reference ref_id="1259464" ref_url="https://bugzilla.suse.com/1259464" source="BUGZILLA"/>
		<reference ref_id="1259466" ref_url="https://bugzilla.suse.com/1259466" source="BUGZILLA"/>
		<reference ref_id="1259467" ref_url="https://bugzilla.suse.com/1259467" source="BUGZILLA"/>
		<reference ref_id="1259468" ref_url="https://bugzilla.suse.com/1259468" source="BUGZILLA"/>
		<reference ref_id="1259469" ref_url="https://bugzilla.suse.com/1259469" source="BUGZILLA"/>
		<reference ref_id="1259497" ref_url="https://bugzilla.suse.com/1259497" source="BUGZILLA"/>
		<reference ref_id="1259528" ref_url="https://bugzilla.suse.com/1259528" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-24484" ref_url="https://www.suse.com/security/cve/CVE-2026-24484/" source="CVE"/>
		<reference ref_id="CVE-2026-28493" ref_url="https://www.suse.com/security/cve/CVE-2026-28493/" source="CVE"/>
		<reference ref_id="CVE-2026-28494" ref_url="https://www.suse.com/security/cve/CVE-2026-28494/" source="CVE"/>
		<reference ref_id="CVE-2026-28686" ref_url="https://www.suse.com/security/cve/CVE-2026-28686/" source="CVE"/>
		<reference ref_id="CVE-2026-28687" ref_url="https://www.suse.com/security/cve/CVE-2026-28687/" source="CVE"/>
		<reference ref_id="CVE-2026-28688" ref_url="https://www.suse.com/security/cve/CVE-2026-28688/" source="CVE"/>
		<reference ref_id="CVE-2026-28689" ref_url="https://www.suse.com/security/cve/CVE-2026-28689/" source="CVE"/>
		<reference ref_id="CVE-2026-28690" ref_url="https://www.suse.com/security/cve/CVE-2026-28690/" source="CVE"/>
		<reference ref_id="CVE-2026-28691" ref_url="https://www.suse.com/security/cve/CVE-2026-28691/" source="CVE"/>
		<reference ref_id="CVE-2026-28692" ref_url="https://www.suse.com/security/cve/CVE-2026-28692/" source="CVE"/>
		<reference ref_id="CVE-2026-28693" ref_url="https://www.suse.com/security/cve/CVE-2026-28693/" source="CVE"/>
		<reference ref_id="CVE-2026-30883" ref_url="https://www.suse.com/security/cve/CVE-2026-30883/" source="CVE"/>
		<reference ref_id="CVE-2026-30929" ref_url="https://www.suse.com/security/cve/CVE-2026-30929/" source="CVE"/>
		<reference ref_id="CVE-2026-30931" ref_url="https://www.suse.com/security/cve/CVE-2026-30931/" source="CVE"/>
		<reference ref_id="CVE-2026-30935" ref_url="https://www.suse.com/security/cve/CVE-2026-30935/" source="CVE"/>
		<reference ref_id="CVE-2026-30936" ref_url="https://www.suse.com/security/cve/CVE-2026-30936/" source="CVE"/>
		<reference ref_id="CVE-2026-30937" ref_url="https://www.suse.com/security/cve/CVE-2026-30937/" source="CVE"/>
		<reference ref_id="CVE-2026-31853" ref_url="https://www.suse.com/security/cve/CVE-2026-31853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2026-24484: denial of service vulnerability via multi-layer nested MVG to SVG conversion (bsc#1258790).
- CVE-2026-28493: integer overflow in the SIXEL decoder leads to out-of-bounds write (bsc#1259446).
- CVE-2026-28494: missing bounds checks in the morphology kernel parsing functions can lead to a stack buffer overflow
  (bsc#1259447).
- CVE-2026-28686: undersized output buffer allocation in the PCL encoder can lead to a heap buffer overflow
  (bsc#1259448).
- CVE-2026-28687: heap use-after-free vulnerability in the MSL decoder via a crafted MSL file (bsc#1259450).
- CVE-2026-28688: heap use-after-free in the MSL encoder when a cloned image is destroyed twice (bsc#1259451).
- CVE-2026-28689: `domain="path"` authorization is checked before final file open/use and allows for read/write bypass
  via symlink swaps (bsc#1259452).
- CVE-2026-28690: missing bounds check in the MNG encoder can lead to a stack buffer overflow (bsc#1259456).
- CVE-2026-28691: missing check in the JBIG decoder can lead to an uninitialized pointer dereference (bsc#1259455).
- CVE-2026-28692: 32-bit integer overflow in MAT decoder can lead to a heap buffer over-read (bsc#1259457).
- CVE-2026-28693: integer overflow in the DIB coder can lead to an out-of-bounds read or write (bsc#1259466).
- CVE-2026-30883: missing bounds check when encoding a PNG image can lead to a heap buffer over-write (bsc#1259467).
- CVE-2026-30929: improper use of fixed-size stack buffer in `MagnifyImage`can lead to a stack buffer overflow
  (bsc#1259468).
- CVE-2026-30931: value truncation in the UHDR encoder can lead to a heap buffer overflow (bsc#1259469).
- CVE-2026-30935: heap-based buffer over-read in BilateralBlurImage (bsc#1259497).
- CVE-2026-30936: heap Buffer Overflow in WaveletDenoiseImage (bsc#1259464).
- CVE-2026-30937: heap buffer overflow in XWD encoder due to CARD32 arithmetic overflow (bsc#1259463).
- CVE-2026-31853: heap buffer overflow leads to crash in the SFW decoder of 32-bit systems when processing extremely
  large images (bsc#1259528).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258790">SUSE bug 1258790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259446">SUSE bug 1259446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259447">SUSE bug 1259447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259448">SUSE bug 1259448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259450">SUSE bug 1259450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259451">SUSE bug 1259451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259452">SUSE bug 1259452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259455">SUSE bug 1259455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259456">SUSE bug 1259456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259457">SUSE bug 1259457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259463">SUSE bug 1259463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259464">SUSE bug 1259464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259466">SUSE bug 1259466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259467">SUSE bug 1259467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259468">SUSE bug 1259468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259469">SUSE bug 1259469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259497">SUSE bug 1259497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259528">SUSE bug 1259528</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-24484/">CVE-2026-24484 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24484">CVE-2026-24484 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28493/">CVE-2026-28493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28493">CVE-2026-28493 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28494/">CVE-2026-28494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28494">CVE-2026-28494 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28686/">CVE-2026-28686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28686">CVE-2026-28686 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28687/">CVE-2026-28687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28687">CVE-2026-28687 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28688/">CVE-2026-28688 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28688">CVE-2026-28688 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28689/">CVE-2026-28689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28689">CVE-2026-28689 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28690/">CVE-2026-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28690">CVE-2026-28690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28691/">CVE-2026-28691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28691">CVE-2026-28691 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28692/">CVE-2026-28692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28692">CVE-2026-28692 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28693/">CVE-2026-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28693">CVE-2026-28693 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30883/">CVE-2026-30883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30883">CVE-2026-30883 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30929/">CVE-2026-30929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30929">CVE-2026-30929 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30931/">CVE-2026-30931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30931">CVE-2026-30931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30935/">CVE-2026-30935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30935">CVE-2026-30935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30936/">CVE-2026-30936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30936">CVE-2026-30936 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30937/">CVE-2026-30937 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30937">CVE-2026-30937 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31853/">CVE-2026-31853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31853">CVE-2026-31853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94552" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251940" ref_url="https://bugzilla.suse.com/1251940" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-52885" ref_url="https://www.suse.com/security/cve/CVE-2025-52885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023518.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2025-52885: Fixed raw pointers leading to dangling pointers when the vector is resized (bsc#1251940)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-20"/>
	<updated date="2025-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1251940">SUSE bug 1251940</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52885/">CVE-2025-52885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52885">CVE-2025-52885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030566" comment="libpoppler-cpp2-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030567" comment="libpoppler-devel-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030569" comment="libpoppler-glib8-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030572" comment="libpoppler-qt6-3-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030573" comment="libpoppler-qt6-devel-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030574" comment="libpoppler148-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030575" comment="poppler-tools-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030576" comment="typelib-1_0-Poppler-0_18-25.04.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030566" comment="libpoppler-cpp2-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030567" comment="libpoppler-devel-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030569" comment="libpoppler-glib8-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030572" comment="libpoppler-qt6-3-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030573" comment="libpoppler-qt6-devel-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030574" comment="libpoppler148-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030575" comment="poppler-tools-25.04.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030576" comment="typelib-1_0-Poppler-0_18-25.04.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94553" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259553" ref_url="https://bugzilla.suse.com/1259553" source="BUGZILLA"/>
		<reference ref_id="1259630" ref_url="https://bugzilla.suse.com/1259630" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-31958" ref_url="https://www.suse.com/security/cve/CVE-2026-31958/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025097.html" source="SUSE-SU"/>
		<description>
This update for python-tornado6 fixes the following issues:

- CVE-2026-31958: parsing large multipart bodies with many parts can cause a denial of service (bsc#1259553).
- incomplete validation of cookie attributes allows for injection of user-controlled values in other cookie attributes
  (bsc#1259630).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259553">SUSE bug 1259553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259630">SUSE bug 1259630</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31958/">CVE-2026-31958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31958">CVE-2026-31958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050026" comment="python313-tornado6-6.5-160000.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050026" comment="python313-tornado6-6.5-160000.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94554" version="1" class="patch">
	<metadata>
		<title>Security update for python-orjson (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1257121" ref_url="https://bugzilla.suse.com/1257121" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-67221" ref_url="https://www.suse.com/security/cve/CVE-2025-67221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025096.html" source="SUSE-SU"/>
		<description>
This update for python-orjson fixes the following issues:

- CVE-2025-67221: Fixed write outsize of allocated memory on json dump (bsc#1257121).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257121">SUSE bug 1257121</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67221/">CVE-2025-67221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67221">CVE-2025-67221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050747" comment="python313-orjson-3.10.15-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050747" comment="python313-orjson-3.10.15-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94555" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql18 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258008" ref_url="https://bugzilla.suse.com/1258008" source="BUGZILLA"/>
		<reference ref_id="1258009" ref_url="https://bugzilla.suse.com/1258009" source="BUGZILLA"/>
		<reference ref_id="1258010" ref_url="https://bugzilla.suse.com/1258010" source="BUGZILLA"/>
		<reference ref_id="1258011" ref_url="https://bugzilla.suse.com/1258011" source="BUGZILLA"/>
		<reference ref_id="1258012" ref_url="https://bugzilla.suse.com/1258012" source="BUGZILLA"/>
		<reference ref_id="1258754" ref_url="https://bugzilla.suse.com/1258754" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<reference ref_id="CVE-2026-2007" ref_url="https://www.suse.com/security/cve/CVE-2026-2007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<description>
This update for postgresql18 fixes the following issues:

- Update to version 18.3. (bsc#1258754)
- CVE-2026-2003: Guard against unexpected dimensions of oidvector/int2vector (bsc#1258008)
- CVE-2026-2004: Harden selectivity estimators against being attached to operators that accept unexpected data types. (bsc#1258009)
- CVE-2026-2005: Fix buffer overrun in contrib/pgcrypto's PGP decryption functions. (bsc#1258010)
- CVE-2026-2006: Fix inadequate validation of multibyte character lengths. (bsc#1258011)
- CVE-2026-2007: Harden contrib/pg_trgm against changes in string lowercasing behavior. (bsc#1258012)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258008">SUSE bug 1258008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258009">SUSE bug 1258009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258010">SUSE bug 1258010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258011">SUSE bug 1258011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258012">SUSE bug 1258012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258754">SUSE bug 1258754</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-2007/">CVE-2026-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2007">CVE-2026-2007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050748" comment="libecpg6-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050749" comment="libpq5-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050750" comment="postgresql18-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050751" comment="postgresql18-contrib-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050752" comment="postgresql18-devel-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050753" comment="postgresql18-docs-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050754" comment="postgresql18-plperl-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050755" comment="postgresql18-plpython-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050756" comment="postgresql18-pltcl-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050757" comment="postgresql18-server-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050758" comment="postgresql18-server-devel-18.3-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050748" comment="libecpg6-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050749" comment="libpq5-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050750" comment="postgresql18-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050751" comment="postgresql18-contrib-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050752" comment="postgresql18-devel-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050753" comment="postgresql18-docs-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050754" comment="postgresql18-plperl-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050755" comment="postgresql18-plpython-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050756" comment="postgresql18-pltcl-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050757" comment="postgresql18-server-18.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050758" comment="postgresql18-server-devel-18.3-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94556" version="1" class="patch">
	<metadata>
		<title>Security update for harfbuzz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256459" ref_url="https://bugzilla.suse.com/1256459" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-22693" ref_url="https://www.suse.com/security/cve/CVE-2026-22693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045230.html" source="SUSE-SU"/>
		<description>
This update for harfbuzz fixes the following issues:

Update to version 11.4.5:

Security fixes:

  - CVE-2026-22693: Fixed a NULL pointer dereference in SubtableUnicodesCache::create (bsc#1256459).

Other fixes:

  - Bug fixes for “AAT” shaping, and other shaping micro
    optimizations.
  - Fix a shaping regression affecting mark glyphs in certain
    fonts.
  - Fix pruning of mark filtering sets when subsetting fonts, which
    caused changes in shaping behaviour.
  - Make shaping fail much faster for certain malformed fonts
    (e.g., those that trigger infinite recursion).
  - Fix undefined behaviour introduced in 11.4.2.
  - Fix detection of the “Cambria Math” font when fonts are scaled,
    so the workaround for the bad MATH table constant is applied.
  - Various performance and memory usage improvements.
  - The hb-shape command line tool can now be built with the
    amalgamated harfbuzz.cc source.
  - Fix regression in handling version 2 of avar table.
  - Increase various buffer length limits for better handling of
    fonts that generate huge number of glyphs per codepoint (e.g.
    Noto Sans Duployan).
  - Improvements to the harfrust shaper for more accurate testing.
  - Fix clang compiler warnings.
  - General shaping and subsetting speedups.
  - Fix in Graphite shaping backend when glyph advances became
    negative.
  - Subsetting improvements, pruning empty mark-attachment lookups.
  - Don't use the macro name _S, which is reserved by system
    liberaries.
  - Build fixes and speedup.
  - Add a kbts shaping backend that calls into the kb_text_shape
    single-header shaping library. This is purely for testing and
    performance evaluation and we do NOT recommend using it for any
    other purposes.
  - Fix bug in vertical shaping of fonts without the vmtx table.
  - Fix build with non-compliant C++11 compilers that don't
    recognize the "and" keyword.
  - Fix crasher in the glyph_v_origin function introduced in
    11.3.0.
  - Speed up handling fonts with very large number of variations.
  - Speed up getting horizontal and vertical glyph advances by up
    to 24%.
  - Significantly speed up vertical text shaping.
  - Various documentation improvements.
  - Various build improvements.
  - Various subsetting improvements.
  - Various improvements to Rust font functions (fontations
    integration) and shaper (HarfRust integration).
  - Rename harfruzz option and shaper to harfrust following
    upstream rename.
  - Implement hb_face_reference_blob() for DirectWrite font
    functions.
  - Various build improvements.
  - Fix build with HB_NO_DRAW and HB_NO_PAINT.
  - Add an optional harfruzz shaper that uses HarfRuzz; an ongoing
    Rust port of HarfBuzz shaping. This shaper is mainly used for
    testing the output of the Rust implementation.
  - Fix regression that caused applying unsafe_to_break() to the
    whole buffer to be ignored.
  - Update USE data files.
  - Fix getting advances of out-of-rage glyph indices in
    DirectWrite font functions.
  - Painting of COLRv1 fonts without clip boxes is now about 10
    times faster.
  - Synthetic bold/slant of a sub font is now respected, instead of
    using the parent’s.
  - Glyph extents for fonts synthetic bold/slant are now accurately
    calculated.
  - Various build fixes.
  - Include bidi mirroring variants of the requested codepoints
    when subsetting. The new HB_SUBSET_FLAGS_NO_BIDI_CLOSURE can be
    used to disable this behaviour.
  - Various bug fixes.
  - Various build fixes and improvements.
  - Various test suite improvements.
  - The change in version 10.3.0 to apply “trak” table tracking
    values to glyph advances directly has been reverted as it
    required every font functions implementation to handle it,
    which breaks existing custom font functions. Tracking is
    instead back to being applied during shaping.
  - When directwrite integration is enabled, we now link to
    dwrite.dll instead of dynamically loading it.
  - A new experimental APIs for getting raw “CFF” and “CFF2”
    CharStrings.
  - We now provide manpages for the various command line utilities.
    Building manpages requires “help2man” and will be skipped if it
    is not present.
  - The command line utilities now set different return value for
    different kinds of failures. Details are provided in the
    manpages.
  - Various fixes and improvements to fontations font functions.
  - All shaping operations using the ot shaper have become memory
    allocation-free.
  - Glyph extents returned by hb-ot and hb-ft font functions are
    now rounded in stead of flooring/ceiling them, which also
    matches what other font libraries do.
  - Fix “AAT” deleted glyph marks interfering with fallback mark
    positioning.
  - Glyph outlines emboldening have been moved out of hb-ot and
    hb-ft font functions to the HarfBuzz font layer, so that it
    works with any font functions implementation.
  - Fix our fallback C++11 atomics integration, which seems to not
    be widely used.
  - Various testing fixes and improvements.
  - Various subsetting fixes and improvements.
  - Various other fixes and improvements.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256459">SUSE bug 1256459</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22693/">CVE-2026-22693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22693">CVE-2026-22693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050759" comment="harfbuzz-devel-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050760" comment="harfbuzz-tools-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050761" comment="libharfbuzz-cairo0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050027" comment="libharfbuzz-gobject0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050762" comment="libharfbuzz-icu0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050763" comment="libharfbuzz-subset0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050028" comment="libharfbuzz0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050029" comment="typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050759" comment="harfbuzz-devel-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050760" comment="harfbuzz-tools-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050761" comment="libharfbuzz-cairo0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050027" comment="libharfbuzz-gobject0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050762" comment="libharfbuzz-icu0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050763" comment="libharfbuzz-subset0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050028" comment="libharfbuzz0-11.4.5-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050029" comment="typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94557" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1219870" ref_url="https://bugzilla.suse.com/1219870" source="BUGZILLA"/>
		<reference ref_id="1219871" ref_url="https://bugzilla.suse.com/1219871" source="BUGZILLA"/>
		<reference ref_id="1227528" ref_url="https://bugzilla.suse.com/1227528" source="BUGZILLA"/>
		<reference ref_id="1237347" ref_url="https://bugzilla.suse.com/1237347" source="BUGZILLA"/>
		<reference ref_id="1248962" ref_url="https://bugzilla.suse.com/1248962" source="BUGZILLA"/>
		<reference ref_id="1248963" ref_url="https://bugzilla.suse.com/1248963" source="BUGZILLA"/>
		<reference ref_id="1259083" ref_url="https://bugzilla.suse.com/1259083" source="BUGZILLA"/>
		<reference ref_id="1259084" ref_url="https://bugzilla.suse.com/1259084" source="BUGZILLA"/>
		<reference ref_id="1259085" ref_url="https://bugzilla.suse.com/1259085" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24826" ref_url="https://www.suse.com/security/cve/CVE-2024-24826/" source="CVE"/>
		<reference ref_id="CVE-2024-25112" ref_url="https://www.suse.com/security/cve/CVE-2024-25112/" source="CVE"/>
		<reference ref_id="CVE-2024-39695" ref_url="https://www.suse.com/security/cve/CVE-2024-39695/" source="CVE"/>
		<reference ref_id="CVE-2025-26623" ref_url="https://www.suse.com/security/cve/CVE-2025-26623/" source="CVE"/>
		<reference ref_id="CVE-2025-54080" ref_url="https://www.suse.com/security/cve/CVE-2025-54080/" source="CVE"/>
		<reference ref_id="CVE-2025-55304" ref_url="https://www.suse.com/security/cve/CVE-2025-55304/" source="CVE"/>
		<reference ref_id="CVE-2026-25884" ref_url="https://www.suse.com/security/cve/CVE-2026-25884/" source="CVE"/>
		<reference ref_id="CVE-2026-27596" ref_url="https://www.suse.com/security/cve/CVE-2026-27596/" source="CVE"/>
		<reference ref_id="CVE-2026-27631" ref_url="https://www.suse.com/security/cve/CVE-2026-27631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

Update to exiv2 0.28.8:

- CVE-2024-24826: out-of-bounds read in QuickTimeVideo: NikonTagsDecoder (bsc#1219870).
- CVE-2024-25112: denial of service due to unbounded recursion in QuickTimeVideo: multipleEntriesDecoder (bsc#1219871).
- CVE-2024-39695: out-of-bounds read in AsfVideo: streamProperties (bsc#1227528).
- CVE-2025-26623: heap buffer overflow via writing metadata into a crafted image file (bsc#1237347).
- CVE-2025-54080: out-of-bounds read in `Exiv2: EpsImage: writeMetadata()` when writing metadata into a crafted image
  file (bsc#1248962).
- CVE-2025-55304: quadratic performance algorithm in the ICC profile parsing code of `JpegBase: readMetadata`
  (bsc#1248963).
- CVE-2026-25884: out-of-bounds read in `CrwMap: decode0x0805` (bsc#1259083).
- CVE-2026-27596: integer overflow in `LoaderNative: getData()` leads to out-of-bounds read (bsc#1259084).
- CVE-2026-27631: crash due to uncaught exception when trying to create `std: vector` larger than `max_size()`
  (bsc#1259085).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219870">SUSE bug 1219870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219871">SUSE bug 1219871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227528">SUSE bug 1227528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237347">SUSE bug 1237347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248962">SUSE bug 1248962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248963">SUSE bug 1248963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259083">SUSE bug 1259083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259084">SUSE bug 1259084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259085">SUSE bug 1259085</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24826/">CVE-2024-24826 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24826">CVE-2024-24826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25112/">CVE-2024-25112 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25112">CVE-2024-25112 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39695/">CVE-2024-39695 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39695">CVE-2024-39695 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26623/">CVE-2025-26623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26623">CVE-2025-26623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54080/">CVE-2025-54080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54080">CVE-2025-54080 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55304/">CVE-2025-55304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55304">CVE-2025-55304 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25884/">CVE-2026-25884 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25884">CVE-2026-25884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27596/">CVE-2026-27596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27596">CVE-2026-27596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27631/">CVE-2026-27631 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27631">CVE-2026-27631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94558" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259845" ref_url="https://bugzilla.suse.com/1259845" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20925-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045227.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issue:

- CVE-2026-27135: assertion failure due to missing state validation can lead to DoS (bsc#1259845).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259845">SUSE bug 1259845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051784" comment="libnghttp2-14-1.64.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051785" comment="libnghttp2-devel-1.64.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051786" comment="nghttp2-1.64.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051784" comment="libnghttp2-14-1.64.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051785" comment="libnghttp2-devel-1.64.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051786" comment="nghttp2-1.64.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94559" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253460" ref_url="https://bugzilla.suse.com/1253460" source="BUGZILLA"/>
		<reference ref_id="1258371" ref_url="https://bugzilla.suse.com/1258371" source="BUGZILLA"/>
		<reference ref_id="1258385" ref_url="https://bugzilla.suse.com/1258385" source="BUGZILLA"/>
		<reference ref_id="1258387" ref_url="https://bugzilla.suse.com/1258387" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66614" ref_url="https://www.suse.com/security/cve/CVE-2025-66614/" source="CVE"/>
		<reference ref_id="CVE-2026-24733" ref_url="https://www.suse.com/security/cve/CVE-2026-24733/" source="CVE"/>
		<reference ref_id="CVE-2026-24734" ref_url="https://www.suse.com/security/cve/CVE-2026-24734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045226.html" source="SUSE-SU"/>
		<description>
This update for tomcat11 fixes the following issues:

Update to Tomcat 11.0.18:

- CVE-2025-66614: client certificate verification bypass due to virtual host mapping (bsc#1258371).
- CVE-2026-24733: improper input validation on HTTP/0.9 requests (bsc#1258385).
- CVE-2026-24734: certificate revocation bypass due to incomplete OCSP verification checks (bsc#1258387).

Changelog:

 + Fix: 69932: Fix request end access log pattern regression, which would log
 the start time of the request instead. (remm)
 + Fix: 69623: Additional fix for the long standing regression that meant
 that calls to ClassLoader.getResource().getContent() failed when made from
 within a web application with resource caching enabled if the target
 resource was packaged in a JAR file. (markt)
 + Fix: Pull request #923: Avoid adding multiple CSRF tokens to a URL in the
 CsrfPreventionFilter. (schultz)
 + Fix: 69918: Ensure request parameters are correctly parsed for HTTP/2
 requests when the content-length header is not set. (dsoumis)
 + Update: Enable minimum and recommended Tomcat Native versions to be set
 separately for Tomcat Native 1.x and 2.x. Update the minimum and
 recommended versions for Tomcat Native 1.x to 1.3.4. Update the minimum
 and recommended versions for Tomcat Native 2.x to 2.0.12. (markt)
 + Add: Add a new ssoReauthenticationMode to the Tomcat provided
 Authenticators that provides a per Authenticator override of the SSO Valve
 requireReauthentication attribute. (markt)
 + Fix: Ensure URL encoding errors in the Rewrite Valve trigger an exception
 rather than silently using a replacement character. (markt)
 + Fix: 69871: Increase log level to INFO for missing configuration for the
 rewrite valve. (remm)
 + Fix: Add log warnings for additional Host appBase suspicious values.
 (remm)
 + Fix: Remove hard dependency on tomcat-jni.jar for catalina.jar.
 org.apache.catalina.Connector no longer requires
 org.apache.tomcat.jni.AprStatus to be present. (markt)
 + Add: Add the ability to use a custom function to generate the client
 identifier in the CrawlerSessionManagerValve. This is only available
 programmatically. Pull request #902 by Brian Matzon. (markt)
 + Fix: Change the SSO reauthentication behaviour for SPNEGO authentication
 so that a normal SPNEGO authentication is performed if the SSL Valve is
 configured with reauthentication enabled. This is so that the delegated
 credentials will be available to the web application. (markt)
 + Fix: When generating the class path in the Loader, re-order the check on
 individual class path components to avoid a potential
 NullPointerException. Identified by Coverity Scan. (markt)
 + Fix: Fix SSL socket factory configuration in the JNDI realm. Based on pull
 request #915 by Joshua Rogers. (remm)
 + Update: Add an attribute, digestInRfc3112Order, to
 MessageDigestCredentialHandler to control the order in which the
 credential and salt are digested. By default, the current, non-RFC 3112
 compliant, order of salt then credential will be used. This default will
 change in Tomcat 12 to the RFC 3112 compliant order of credential then
 salt. (markt)
 * Cluster
 + Add: 62814: Document that human-readable names may be used for
 mapSendOptions and align documentation with channelSendOptions. Based on
 pull request #929 by archan0621. (markt)
 * Clustering
 + Fix: Correct a regression introduced in 11.0.11 that broke some clustering
 configurations. (markt)
 * Coyote
 + Fix: 69936: Fix bug in previous fix for Tomcat Native crashes on shutdown
 that triggered a significant memory leak. Patch provided by Wes. (markt)
 + Fix: Prevent concurrent release of OpenSSLEngine resources and the
 termination of the Tomcat Native library as it can cause crashes during
 Tomcat shutdown. (markt)
 + Fix: Improve warnings when setting ciphers lists in the FFM code,
 mirroring the tomcat-native changes. (remm)
 + Fix: 69910: Dereference TLS objects right after closing a socket to
 improve memory efficiency. (remm)
 + Fix: Relax the JSSE vs OpenSSL configuration style checks on SSLHostConfig
 to reflect the existing implementation that allows one configuration style
 to be used for the trust attributes and a different style for all the
 other attributes. (markt)
 + Fix: Better warning message when OpenSSLConf configuration elements are
 used with a JSSE TLS implementation. (markt)
 + Fix: When using OpenSSL via FFM, don't log a warning about missing CA
 certificates unless CA certificates were configured and the configuration
 failed. (markt)
 + Add: For configuration consistency between OpenSSL and JSSE TLS
 implementations, TLSv1.3 cipher suites included in the ciphers attribute
 of an SSLHostConfig are now always ignored (previously they would be
 ignored with OpenSSL implementations and used with JSSE implementations)
 and a warning is logged that the cipher suite has been ignored. (markt)
 + Add: Add the ciphersuite attribute to SSLHostConfig to configure the
 TLSv1.3 cipher suites. (markt)
 + Add: Add OCSP support to JSSE based TLS connectors and make the use of
 OCSP configurable per connector for both JSSE and OpenSSL based TLS
 implementations. Align the checks performed by OpenSSL with those
 performed by JSSE. (markt)
 + Add: Add support for soft failure of OCSP checks with soft failure support
 disabled by default. (markt)
 + Add: Add support for configuring the verification flags passed to
 OCSP_basic_verify when using an OpenSSL based TLS implementation. (markt)
 + Fix: Fix OpenSSL FFM code compatibility with LibreSSL versions below 3.5.
 + Fix: Don't log an incorrect certificate KeyStore location when creating a
 TLS connector if the KeyStore instance has been set directly on the
 connector. (markt)
 + Fix: HTTP/0.9 only allows GET as the HTTP method. (remm)
 + Add: Add strictSni attribute on the Connector to allow matching the
 SSLHostConfig configuration associated with the SNI host name to the
 SSLHostConfig configuration matched from the HTTP protocol host name. Non
 matching configurations will cause the request to be rejected. The
 attribute default value is true, enabling the matching. (remm)
 + Fix: Graceful failure for OCSP on BoringSSL in the FFM code. (remm)
 + Fix: 69866: Fix a memory leak when using a trust store with the OpenSSL
 provider. Pull request #912 by aogburn. (markt)
 + Fix: Fix potential crash on shutdown when a Connector depends on the
 Tomcat Native library. (markt)
 + Fix: Fix AJP message length check. Pull request #916 by Joshua Rogers.
 * Jasper
 + Fix: 69333: Correct a regression in the previous fix for 69333 and ensure
 that reuse() or release() is always called for a tag. (markt)
 + Fix: 69877: Catch IllegalArgumentException when processing URIs when
 creating the classpath to handle invalid URIs. (remm)
 + Fix: Fix populating the classpath with the webapp classloader
 repositories. (remm)
 + Fix: 69862: Avoid NPE unwrapping Servlet exception which would hide some
 exception details. Patch submitted by Eric Blanquer. (remm)
 * Jdbc-pool
 + Fix: 64083: If the underlying connection has been closed, don't add it to
 the pool when it is returned. Pull request #235 by Alex Panchenko. (markt)
 * Web applications
 + Fix: Manager: Fix abrupt truncation of the HTML and JSON complete server
 status output if one or more of the web applications failed to start.
 (schultz)
 + Add: Manager: Include web application state in the HTML and JSON complete
 server status output. (markt)
 + Add: Documentation: Expand the documentation to better explain when OCSP
 is supported and when it is not. (markt)
 * Websocket
 + Fix: 69920: When attempting to write to a closed Writer or OutputStream
 obtained from a WebSocket session, throw an IOException rather than an
 IllegalStateExcpetion as required by Writer and strongly suggested by
 OutputStream. (markt)
 * Other
 + Add: Add property "gpg.sign.files" to optionally disable release artefact
 signing with GPG. (rjung)
 + Add: Add test.silent property to suppress JUnit console output during test
 execution. Useful for cleaner console output when running tests with
 multiple threads. (csutherl)
 + Update: Update the internal fork of Commons Pool to 2.13.1. (markt)
 + Update: Update the internal fork of Commons DBCP to 2.14.0. (markt)
 + Update: Update Commons Daemon to 1.5.1. (markt)
 + Update: Update to the Eclipse JDT compiler 4.37. (markt)
 + Update: Update ByteBuddy to 1.18.3. (markt)
 + Update: Update UnboundID to 7.0.4. (markt)
 + Update: Update Checkstyle to 12.3.1. (markt)
 + Add: Improvements to French translations. (markt)
 + Add: Improvements to Japanese translations provided by tak7iji. (markt)
 + Add: Improvements to Chinese translations provided by Yang. vincent.h and
 yong hu. (markt)
 + Update: Update Tomcat Native to 2.0.12. (markt)
 + Add: Add test profile system for selective test execution. Profiles can be
 specified via -Dtest.profile=&lt;name&gt; to run specific test subsets without
 using patterns directly. Profile patterns are defined in
 test-profiles.properties. (csutherl)
 + Update: Update file extension to media type mappings to align with the
 current list used by the Apache Web Server (httpd). (markt)
 + Update: Update the packaged version of the Tomcat Migration Tool for
 Jakarta EE to 1.0.10. (markt)
 + Update: Update Commons Daemon to 1.5.0. (markt)
 + Update: Update Byte Buddy to 1.18.2. (markt)
 + Update: Update Checkstyle to 12.2.0. (markt)
 + Add: Improvements to Spanish translations provided by White Vogel. (markt)
 + Add: Improvements to French translations. (remm)
 + Update: Update the internal fork of Apache Commons BCEL to 6.11.0. (markt)
 + Update: Update to Byte Buddy 1.17.8. (markt)
 + Update: Update to Checkstyle 12.1.1. (markt)
 + Update: Update to Jacoco 0.8.14. (markt)
 + Update: Update to SpotBugs 4.9.8. (markt)
 + Update: Update to JSign 7.4. (markt)
 + Update: Update Maven Resolver Ant Tasks to 1.6.0. (rjung)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253460">SUSE bug 1253460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258371">SUSE bug 1258371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258385">SUSE bug 1258385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258387">SUSE bug 1258387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66614/">CVE-2025-66614 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24733/">CVE-2026-24733 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-24734/">CVE-2026-24734 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051787" comment="tomcat11-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051788" comment="tomcat11-admin-webapps-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051789" comment="tomcat11-doc-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051790" comment="tomcat11-docs-webapp-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051791" comment="tomcat11-el-6_0-api-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051792" comment="tomcat11-embed-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051793" comment="tomcat11-jsp-4_0-api-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051794" comment="tomcat11-jsvc-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051795" comment="tomcat11-lib-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051796" comment="tomcat11-servlet-6_1-api-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051797" comment="tomcat11-webapps-11.0.18-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051787" comment="tomcat11-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051788" comment="tomcat11-admin-webapps-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051789" comment="tomcat11-doc-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051790" comment="tomcat11-docs-webapp-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051791" comment="tomcat11-el-6_0-api-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051792" comment="tomcat11-embed-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051793" comment="tomcat11-jsp-4_0-api-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051794" comment="tomcat11-jsvc-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051795" comment="tomcat11-lib-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051796" comment="tomcat11-servlet-6_1-api-11.0.18-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051797" comment="tomcat11-webapps-11.0.18-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94560" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258727" ref_url="https://bugzilla.suse.com/1258727" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14905" ref_url="https://www.suse.com/security/cve/CVE-2025-14905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20927-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045225.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issue:

Update to 389-ds 3.0.6~git249.6688af9b2:

- CVE-2025-14905: heap buffer overflow due to improper size calculation in `schema_attr_enum_callback` can lead to DoS
  and RCE (bsc#1258727).

Changelog:

 * Issue 7277 - UI - Fix Japanese translation for "Successfully updated group" in Cockpit UI (#7278)
 * Issue 7275 - UI - Improve password policy field validation in Cockpit UI (#7276)
 * Issue 7279 - UI - Fix typo in export certificate dialog (#7280)
 * Issue 7273 - In a chaining environment binding as remote user causes an invalid error in the logs
 * Issue 7271 - plugins that create threads need to update active thread count
 * Issue 5853 - Update concread to 0.5.10
 * Issue 7053 - Remove memberof_del_dn_from_groups from MemberOf plugin (#7064)
 * Issue 7223 - Remove integerOrderingMatch requirement for parentid (#7264)
 * Issue 7066/7052 - allow password history to be set to zero and remove history
 * Issue 7223 - Use lexicographical order for ancestorid (#7256)
 * Issue 7213 - (2nd) MDB_BAD_VALSIZE error while handling VLV (#7258)
 * Issue 7184 - (2nd) argparse.HelpFormatter _format_actions_usage() is deprecated (#7257)
 * Issue - CLI - dsctl db2index needs some hardening with MBD
 * Issue 7248 - CLI - attribute uniqueness - fix usage for exclude subtree option
 * Issue 7231 - Sync repl tests fail in FIPS mode due to non FIPS compliant crypto (#7232)
 * Issue 7121 - (2nd) LeakSanitizer: various leaks during replication (#7212)
 * Issue 6947 - Fix health_system_indexes_test.py
 * Issue 7076 - Fix revert_cache() never called in modrdn (#7220)
 * Issue 7076, 6992, 6784, 6214 - Fix CI test failures (#7077)
 * Issue 7096 - (2nd) During replication online total init the function idl_id_is_in_idlist is not scaling with large
   database (#7205)
 * Issue 3555 - UI - Fix audit issue with npm - @isaacs/brace-expansion (#7228)
 * Issue 7223 - Add dsctl index-check command for offline index repair
 * Issue 7223 - Detect and log index ordering mismatch during backend startup
 * Issue 7223 - Add upgrade function to remove ancestorid index config entry
 * Issue 7223 - Add upgrade function to remove nsIndexIDListScanLimit from parentid
 * Issue 7223 - Revert index scan limits for system indexes
 * Issue 6542 - RPM build errors on Fedora 42
 * Issue 7224 - CI Test - Simplify test_reserve_descriptor_validation (#7225)
 * Issue 7194 - Repl Log Analysis - Add CSN propagation details (#7195)
 * Issue 7213 - MDB_BAD_VALSIZE error while handling VLV (#7214)
 * Issue 7027 - (2nd) 389-ds-base OpenScanHub Leaks Detected (#7211)
 * Issue 7184 - argparse.HelpFormatter _format_actions_usage() is deprecated
 * Issue 7198 - Web console doesn't show sub-suffix when parent-suffix points to an entry (#7202)
 * Issue 7189 - DSBLE0007 generates incorrect remediation commands for scan limits
 * Bump lodash from 4.17.21 to 4.17.23 in /src/cockpit/389-console (#7203)
 * Issue 7172 - (2nd) Index ordering mismatch after upgrade (#7180)
 * Issue 7172 - Index ordering mismatch after upgrade (#7173)
 * Issue - Revise paged result search locking
 * Issue 7096 - During replication online total init the function idl_id_is_in_idlist is not scaling with large
   database (#7145)
 * Revert "Issue 7160 - Add lib389 version sync check to configure (#7165)"
 * Issue 7160 - Add lib389 version sync check to configure (#7165)
 * Issue 7049 - RetroCL plugin generates invalid LDIF
 * Issue 7150 - Compressed access log rotations skipped, accesslog-list out of sync (#7151)
 * Restore definition for slapi_entry_attr_get_valuearray
 * Issue 1793 - RFE - Dynamic lists - UI and CLI updates
 * Issue 7119 - Fix DNA shared config replication test (#7143)
 * Issue 7081 - Repl Log Analysis - Implement data sampling with performance and timezone fixes (#7086)
 * Issue 1793 - RFE - Implement dynamic lists
 * Issue 6753 - Port ticket tests
 * Issue 6753 - Port and fix ticket 47823 tests
 * Issue 6753 - Add 'add_exclude_subtree' and 'remove_exclude_subtree' methods to Attribute uniqueness plugin
 * Issue 6753 - Port ticket test 48026
 * Issue 7128 - memory corruption in alias entry plugin (#7131)
 * Issue 7091 - Duplicate local password policy entries listed (#7092)
 * Issue 7124 - BDB cursor race condition with transaction isolation (#7125)
 * Issue 7132 - Keep alive entry updated too soon after an offline import (#7133)
 * Issue 7121 - LeakSanitizer: various leaks during replication (#7122)
 * Issue 7115 - LeakSanitizer: leak in `slapd_bind_local_user()` (#7116)
 * Issue 7109 - AddressSanitizer: SEGV ldap/servers/slapd/csnset.c:302 in csnset_dup (#7114)
 * Issue 7056 - DSBLE0007 doesn't generate remediation steps for missing indexes
 * Issue 7119 - Harden DNA plugin locking for shared server list operations (#7120)
 * Issue 7084 - UI - schema - sorting attributes breaks expanded row
 * Issue 7007 - Improve paged result search locking
 * Issue 3555 - UI - Fix audit issue with npm - glob (#7107)
 * Issue 6846 - Attribute uniqueness is not enforced with modrdn (#7026)
 * Issue 6901 - Update changelog trimming logging - fix tests
 * Issue 6901 - Update changelog trimming logging
 * Bump js-yaml from 4.1.0 to 4.1.1 in /src/cockpit/389-console (#7097)
 * Issue 7069 - Fix error reporting in HAProxy trusted IP parsing (#7094)
 * Issue 7055 - Online initialization of consumers fails with error -23 (#7075)
 * Issue 7042 - Enable global_backend_lock when memberofallbackend is enabled (#7043)
 * Issue 7078 - audit json logging does not encode binary values
 * Issue 7069 - Add Subnet/CIDR Support for HAProxy Trusted IPs (#7070)
 * Issue 6660 - CLI, UI - Improve replication log analyzer usability (#7062)
 * Issue 7065 - A search filter containing a non normalized DN assertion does not return matching entries (#7068)
 * Issue 7071 - search filter (&amp;(cn:dn:=groups)) no longer returns results
 * Issue 7073 - Add NDN cache size configuration and enforcement tests (#7074)
 * Issue 7041 - CLI/UI - memberOf - no way to add/remove specific group filters
 * Issue 7061 - CLI/UI - Improve error messages for dsconf localpwp list
 * Issue 7059 - UI - unable to upload pem file
 * Issue 7032 - The new ipahealthcheck test ipahealthcheck.ds.backends.BackendsCheck raises CRITICAL issue (#7036)
 * Issue 7047 - MemberOf plugin logs null attribute name on fixup task completion (#7048)
 * Issue 7044 - RFE - index sudoHost by default (#7046)
 * Issue 6979 - Improve the way to detect asynchronous operations in the access logs (#6980)
 * Issue 7035 - RFE - memberOf - adding scoping for specific groups
 * Issue - CLI/UI - Add option to delete all replication conflict entries
 * Issue 7033 - lib389 - basic plugin status not in JSON
 * Issue 7023 - UI - if first instance that is loaded is stopped it breaks parts of the UI
 * Issue 7027 - 389-ds-base OpenScanHub Leaks Detected (#7028)
 * Issue 6966 - On large DB, unlimited IDL scan limit reduce the SRCH performance (#6967)
 * Issue 6660 - UI - Improve replication log analysis charts and usability (#6968)
 * Issue 6982 - UI - MemberOf shared config does not validate DN properly (#6983)
 * Issue 7021 - Units for changing MDB max size are not consistent across different tools (#7022)
 * Issue 6954 - do not delete referrals on chain_on_update backend
 * Issue 7018 - BUG - prevent stack depth being hit (#7019)
 * Issue 6928 - The parentId attribute is indexed with improper matching rule
 * Issue 6933 - When deferred memberof update is enabled after the server crashed it should not launch memberof fixup
   task by default (#6935)
 * Issue 6904 - Fix config_test.py::test_lmdb_config
 * Issue 7014 - memberOf - ignored deferred updates with LMDB
 * Issue 7012 - improve dscrl dbverify result when backend does not exists (#7013)
 * Issue 6929 - Compilation failure with rust-1.89 on Fedora ELN
 * Issue 6990 - UI - Replace deprecated Select components with new TypeaheadSelect (#6996)
 * Issue 6990 - UI - Fix typeahead Select fields losing values on Enter keypress (#6991)
 * Issue 6887 - Enhance logconv.py to add support for JSON access logs (#6889)
 * Issue 6985 - Some logconv CI tests fail with BDB (#6986)
 * Issue 6891 - JSON logging - add wrapper function that checks for NULL
 * Issue 6977 - UI - Show error message when trying to use unavailable ports (#6978)
 * Issue 6956 - More UI fixes
 * Issue 6947 - Revise time skew check in healthcheck tool and add option to exclude checks
 * Issue 6805 - RFE - Multiple backend entry cache tuning
 * Issue 6843 - Add CI tests for logconv.py (#6856)
 * Issue - UI - update Radio handlers and LDAP entries last modified time
 * Issue 6660 - UI - Fix minor typo (#6955)
 * Issue 6910 - Fix latest coverity issues
 * Issue 6919 - numSubordinates/tombstoneNumSubordinates are inconsisten... (#6920)
 * Issue 6663 - Fix NULL subsystem crash in JSON error logging (#6883)
 * Issue 6940 - dsconf monitor server fails with ldapi:// due to absent server ID (#6941)
 * Issue 6936 - Make user/subtree policy creation idempotent (#6937)
 * Issue 6865 - AddressSanitizer: leak in agmt_update_init_status
 * Issue 6848 - AddressSanitizer: leak in do_search
 * Issue 6850 - AddressSanitizer: memory leak in mdb_init
 * Issue 6778 - Memory leak in roles_cache_create_object_from_entry part 2
 * Issue 6778 - Memory leak in roles_cache_create_object_from_entry
 * Issue 6181 - RFE - Allow system to manage uid/gid at startup
 * Issues 6913, 6886, 6250 - Adjust xfail marks (#6914)
 * Issue 6768 - ns-slapd crashes when a referral is added (#6780)
 * Issue 6468 - CLI - Fix default error log level
 * Issue 6339 - Address Coverity scan issues in memberof and bdb_layer (#6353)
 * Issue 6897 - Fix disk monitoring test failures and improve test maintainability (#6898)
 * Issue 6884 - Mask password hashes in audit logs (#6885)
 * Issue 6594 - Add test for numSubordinates replication consistency with tombstones (#6862)
 * Issue 6250 - Add test for entryUSN overflow on failed add operations (#6821)
 * Issue 6895 - Crash if repl keep alive entry can not be created
 * Issue 6893 - Log user that is updated during password modify extended operation
 * Issue 6772 - dsconf - Replicas with the "consumer" role allow for viewing and modification of their
   changelog. (#6773)
 * Issue 6888 - Missing access JSON logging for TLS/Client auth
 * Issue 6680 - instance read-only mode is broken (#6681)
 * Issue 6878 - Prevent repeated disconnect logs during shutdown (#6879)
 * Issue 6872 - compressed log rotation creates files with world readable permission
 * Issue 6859 - str2filter is not fully applying matching rules
 * Issue 6868 - UI - schema attribute table expansion break after moving to a new page
 * Issue 6854 - Refactor for improved data management (#6855)
 * Issue 6756 - CLI, UI - Properly handle disabled NDN cache (#6757)
 * Issue 6857 - uiduniq: allow specifying match rules in the filter
 * Issue 6838 - lib389/replica.py is using nonexistent datetime.UTC in Python 3.9
 * Issue 6822 - Backend creation cleanup and Database UI tab error handling (#6823)
 * Issue 6782 - Improve paged result locking
 * Issue 6825 - RootDN Access Control Plugin with wildcards for IP addre... (#6826)
 * Issue 6736 - Exception thrown by dsconf instance repl get_ruv (#6742)
 * Issue 6819 - Incorrect pwdpolicysubentry returned for an entry with user password policy
 * Issue 6553 - Update concread to 0.5.6 (#6824)
 * Issue 1081 - Add a CI test (#6063)
 * Issue 6761 - Password modify extended operation should skip password policy checks when executed by root DN
 * Issue 6791 - crash in liblmdb during instance shutdown (#6793)
 * Issue 6641 - modrdn fails when a user is member of multiple groups (#6643)
 * Issue 6776 - Enabling audit log makes slapd coredump
 * Issue 6534 - CI fails with Fedora 41 and DNF5
 * Issue 6787 - Improve error message when bulk import connection is closed
 * Issue 6727 - RFE - database compaction interval should be persistent
 * Issue 6438 - Add basic dsidm organizational unit tests
 * Issue 6439 - Fix dsidm service get_dn option
 * Issue 5120 - ns-slapd doesn't start in referral mode (#6763)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258727">SUSE bug 1258727</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14905/">CVE-2025-14905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14905">CVE-2025-14905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051798" comment="389-ds-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051799" comment="389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051800" comment="389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051801" comment="lib389-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051802" comment="libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051798" comment="389-ds-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051799" comment="389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051800" comment="389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051801" comment="lib389-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051802" comment="libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94561" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1234634" ref_url="https://bugzilla.suse.com/1234634" source="BUGZILLA"/>
		<reference ref_id="1249590" ref_url="https://bugzilla.suse.com/1249590" source="BUGZILLA"/>
		<reference ref_id="1250748" ref_url="https://bugzilla.suse.com/1250748" source="BUGZILLA"/>
		<reference ref_id="1251135" ref_url="https://bugzilla.suse.com/1251135" source="BUGZILLA"/>
		<reference ref_id="1251966" ref_url="https://bugzilla.suse.com/1251966" source="BUGZILLA"/>
		<reference ref_id="1251971" ref_url="https://bugzilla.suse.com/1251971" source="BUGZILLA"/>
		<reference ref_id="1252008" ref_url="https://bugzilla.suse.com/1252008" source="BUGZILLA"/>
		<reference ref_id="1252266" ref_url="https://bugzilla.suse.com/1252266" source="BUGZILLA"/>
		<reference ref_id="1252911" ref_url="https://bugzilla.suse.com/1252911" source="BUGZILLA"/>
		<reference ref_id="1252924" ref_url="https://bugzilla.suse.com/1252924" source="BUGZILLA"/>
		<reference ref_id="1253129" ref_url="https://bugzilla.suse.com/1253129" source="BUGZILLA"/>
		<reference ref_id="1253691" ref_url="https://bugzilla.suse.com/1253691" source="BUGZILLA"/>
		<reference ref_id="1254817" ref_url="https://bugzilla.suse.com/1254817" source="BUGZILLA"/>
		<reference ref_id="1254928" ref_url="https://bugzilla.suse.com/1254928" source="BUGZILLA"/>
		<reference ref_id="1255129" ref_url="https://bugzilla.suse.com/1255129" source="BUGZILLA"/>
		<reference ref_id="1255144" ref_url="https://bugzilla.suse.com/1255144" source="BUGZILLA"/>
		<reference ref_id="1255148" ref_url="https://bugzilla.suse.com/1255148" source="BUGZILLA"/>
		<reference ref_id="1255311" ref_url="https://bugzilla.suse.com/1255311" source="BUGZILLA"/>
		<reference ref_id="1255490" ref_url="https://bugzilla.suse.com/1255490" source="BUGZILLA"/>
		<reference ref_id="1255572" ref_url="https://bugzilla.suse.com/1255572" source="BUGZILLA"/>
		<reference ref_id="1255721" ref_url="https://bugzilla.suse.com/1255721" source="BUGZILLA"/>
		<reference ref_id="1255868" ref_url="https://bugzilla.suse.com/1255868" source="BUGZILLA"/>
		<reference ref_id="1256640" ref_url="https://bugzilla.suse.com/1256640" source="BUGZILLA"/>
		<reference ref_id="1256675" ref_url="https://bugzilla.suse.com/1256675" source="BUGZILLA"/>
		<reference ref_id="1256679" ref_url="https://bugzilla.suse.com/1256679" source="BUGZILLA"/>
		<reference ref_id="1256708" ref_url="https://bugzilla.suse.com/1256708" source="BUGZILLA"/>
		<reference ref_id="1256732" ref_url="https://bugzilla.suse.com/1256732" source="BUGZILLA"/>
		<reference ref_id="1256784" ref_url="https://bugzilla.suse.com/1256784" source="BUGZILLA"/>
		<reference ref_id="1256802" ref_url="https://bugzilla.suse.com/1256802" source="BUGZILLA"/>
		<reference ref_id="1256865" ref_url="https://bugzilla.suse.com/1256865" source="BUGZILLA"/>
		<reference ref_id="1256867" ref_url="https://bugzilla.suse.com/1256867" source="BUGZILLA"/>
		<reference ref_id="1257154" ref_url="https://bugzilla.suse.com/1257154" source="BUGZILLA"/>
		<reference ref_id="1257174" ref_url="https://bugzilla.suse.com/1257174" source="BUGZILLA"/>
		<reference ref_id="1257209" ref_url="https://bugzilla.suse.com/1257209" source="BUGZILLA"/>
		<reference ref_id="1257222" ref_url="https://bugzilla.suse.com/1257222" source="BUGZILLA"/>
		<reference ref_id="1257228" ref_url="https://bugzilla.suse.com/1257228" source="BUGZILLA"/>
		<reference ref_id="1257231" ref_url="https://bugzilla.suse.com/1257231" source="BUGZILLA"/>
		<reference ref_id="1257246" ref_url="https://bugzilla.suse.com/1257246" source="BUGZILLA"/>
		<reference ref_id="1257332" ref_url="https://bugzilla.suse.com/1257332" source="BUGZILLA"/>
		<reference ref_id="1257466" ref_url="https://bugzilla.suse.com/1257466" source="BUGZILLA"/>
		<reference ref_id="1257472" ref_url="https://bugzilla.suse.com/1257472" source="BUGZILLA"/>
		<reference ref_id="1257473" ref_url="https://bugzilla.suse.com/1257473" source="BUGZILLA"/>
		<reference ref_id="1257551" ref_url="https://bugzilla.suse.com/1257551" source="BUGZILLA"/>
		<reference ref_id="1257552" ref_url="https://bugzilla.suse.com/1257552" source="BUGZILLA"/>
		<reference ref_id="1257553" ref_url="https://bugzilla.suse.com/1257553" source="BUGZILLA"/>
		<reference ref_id="1257554" ref_url="https://bugzilla.suse.com/1257554" source="BUGZILLA"/>
		<reference ref_id="1257556" ref_url="https://bugzilla.suse.com/1257556" source="BUGZILLA"/>
		<reference ref_id="1257557" ref_url="https://bugzilla.suse.com/1257557" source="BUGZILLA"/>
		<reference ref_id="1257559" ref_url="https://bugzilla.suse.com/1257559" source="BUGZILLA"/>
		<reference ref_id="1257560" ref_url="https://bugzilla.suse.com/1257560" source="BUGZILLA"/>
		<reference ref_id="1257561" ref_url="https://bugzilla.suse.com/1257561" source="BUGZILLA"/>
		<reference ref_id="1257562" ref_url="https://bugzilla.suse.com/1257562" source="BUGZILLA"/>
		<reference ref_id="1257565" ref_url="https://bugzilla.suse.com/1257565" source="BUGZILLA"/>
		<reference ref_id="1257570" ref_url="https://bugzilla.suse.com/1257570" source="BUGZILLA"/>
		<reference ref_id="1257572" ref_url="https://bugzilla.suse.com/1257572" source="BUGZILLA"/>
		<reference ref_id="1257573" ref_url="https://bugzilla.suse.com/1257573" source="BUGZILLA"/>
		<reference ref_id="1257576" ref_url="https://bugzilla.suse.com/1257576" source="BUGZILLA"/>
		<reference ref_id="1257579" ref_url="https://bugzilla.suse.com/1257579" source="BUGZILLA"/>
		<reference ref_id="1257580" ref_url="https://bugzilla.suse.com/1257580" source="BUGZILLA"/>
		<reference ref_id="1257581" ref_url="https://bugzilla.suse.com/1257581" source="BUGZILLA"/>
		<reference ref_id="1257586" ref_url="https://bugzilla.suse.com/1257586" source="BUGZILLA"/>
		<reference ref_id="1257600" ref_url="https://bugzilla.suse.com/1257600" source="BUGZILLA"/>
		<reference ref_id="1257631" ref_url="https://bugzilla.suse.com/1257631" source="BUGZILLA"/>
		<reference ref_id="1257635" ref_url="https://bugzilla.suse.com/1257635" source="BUGZILLA"/>
		<reference ref_id="1257679" ref_url="https://bugzilla.suse.com/1257679" source="BUGZILLA"/>
		<reference ref_id="1257682" ref_url="https://bugzilla.suse.com/1257682" source="BUGZILLA"/>
		<reference ref_id="1257686" ref_url="https://bugzilla.suse.com/1257686" source="BUGZILLA"/>
		<reference ref_id="1257687" ref_url="https://bugzilla.suse.com/1257687" source="BUGZILLA"/>
		<reference ref_id="1257688" ref_url="https://bugzilla.suse.com/1257688" source="BUGZILLA"/>
		<reference ref_id="1257704" ref_url="https://bugzilla.suse.com/1257704" source="BUGZILLA"/>
		<reference ref_id="1257705" ref_url="https://bugzilla.suse.com/1257705" source="BUGZILLA"/>
		<reference ref_id="1257706" ref_url="https://bugzilla.suse.com/1257706" source="BUGZILLA"/>
		<reference ref_id="1257707" ref_url="https://bugzilla.suse.com/1257707" source="BUGZILLA"/>
		<reference ref_id="1257709" ref_url="https://bugzilla.suse.com/1257709" source="BUGZILLA"/>
		<reference ref_id="1257714" ref_url="https://bugzilla.suse.com/1257714" source="BUGZILLA"/>
		<reference ref_id="1257715" ref_url="https://bugzilla.suse.com/1257715" source="BUGZILLA"/>
		<reference ref_id="1257716" ref_url="https://bugzilla.suse.com/1257716" source="BUGZILLA"/>
		<reference ref_id="1257718" ref_url="https://bugzilla.suse.com/1257718" source="BUGZILLA"/>
		<reference ref_id="1257722" ref_url="https://bugzilla.suse.com/1257722" source="BUGZILLA"/>
		<reference ref_id="1257723" ref_url="https://bugzilla.suse.com/1257723" source="BUGZILLA"/>
		<reference ref_id="1257726" ref_url="https://bugzilla.suse.com/1257726" source="BUGZILLA"/>
		<reference ref_id="1257729" ref_url="https://bugzilla.suse.com/1257729" source="BUGZILLA"/>
		<reference ref_id="1257730" ref_url="https://bugzilla.suse.com/1257730" source="BUGZILLA"/>
		<reference ref_id="1257732" ref_url="https://bugzilla.suse.com/1257732" source="BUGZILLA"/>
		<reference ref_id="1257734" ref_url="https://bugzilla.suse.com/1257734" source="BUGZILLA"/>
		<reference ref_id="1257735" ref_url="https://bugzilla.suse.com/1257735" source="BUGZILLA"/>
		<reference ref_id="1257737" ref_url="https://bugzilla.suse.com/1257737" source="BUGZILLA"/>
		<reference ref_id="1257739" ref_url="https://bugzilla.suse.com/1257739" source="BUGZILLA"/>
		<reference ref_id="1257740" ref_url="https://bugzilla.suse.com/1257740" source="BUGZILLA"/>
		<reference ref_id="1257741" ref_url="https://bugzilla.suse.com/1257741" source="BUGZILLA"/>
		<reference ref_id="1257742" ref_url="https://bugzilla.suse.com/1257742" source="BUGZILLA"/>
		<reference ref_id="1257743" ref_url="https://bugzilla.suse.com/1257743" source="BUGZILLA"/>
		<reference ref_id="1257745" ref_url="https://bugzilla.suse.com/1257745" source="BUGZILLA"/>
		<reference ref_id="1257749" ref_url="https://bugzilla.suse.com/1257749" source="BUGZILLA"/>
		<reference ref_id="1257750" ref_url="https://bugzilla.suse.com/1257750" source="BUGZILLA"/>
		<reference ref_id="1257755" ref_url="https://bugzilla.suse.com/1257755" source="BUGZILLA"/>
		<reference ref_id="1257757" ref_url="https://bugzilla.suse.com/1257757" source="BUGZILLA"/>
		<reference ref_id="1257758" ref_url="https://bugzilla.suse.com/1257758" source="BUGZILLA"/>
		<reference ref_id="1257759" ref_url="https://bugzilla.suse.com/1257759" source="BUGZILLA"/>
		<reference ref_id="1257761" ref_url="https://bugzilla.suse.com/1257761" source="BUGZILLA"/>
		<reference ref_id="1257762" ref_url="https://bugzilla.suse.com/1257762" source="BUGZILLA"/>
		<reference ref_id="1257763" ref_url="https://bugzilla.suse.com/1257763" source="BUGZILLA"/>
		<reference ref_id="1257765" ref_url="https://bugzilla.suse.com/1257765" source="BUGZILLA"/>
		<reference ref_id="1257768" ref_url="https://bugzilla.suse.com/1257768" source="BUGZILLA"/>
		<reference ref_id="1257770" ref_url="https://bugzilla.suse.com/1257770" source="BUGZILLA"/>
		<reference ref_id="1257772" ref_url="https://bugzilla.suse.com/1257772" source="BUGZILLA"/>
		<reference ref_id="1257775" ref_url="https://bugzilla.suse.com/1257775" source="BUGZILLA"/>
		<reference ref_id="1257776" ref_url="https://bugzilla.suse.com/1257776" source="BUGZILLA"/>
		<reference ref_id="1257788" ref_url="https://bugzilla.suse.com/1257788" source="BUGZILLA"/>
		<reference ref_id="1257789" ref_url="https://bugzilla.suse.com/1257789" source="BUGZILLA"/>
		<reference ref_id="1257790" ref_url="https://bugzilla.suse.com/1257790" source="BUGZILLA"/>
		<reference ref_id="1257805" ref_url="https://bugzilla.suse.com/1257805" source="BUGZILLA"/>
		<reference ref_id="1257808" ref_url="https://bugzilla.suse.com/1257808" source="BUGZILLA"/>
		<reference ref_id="1257809" ref_url="https://bugzilla.suse.com/1257809" source="BUGZILLA"/>
		<reference ref_id="1257811" ref_url="https://bugzilla.suse.com/1257811" source="BUGZILLA"/>
		<reference ref_id="1257813" ref_url="https://bugzilla.suse.com/1257813" source="BUGZILLA"/>
		<reference ref_id="1257814" ref_url="https://bugzilla.suse.com/1257814" source="BUGZILLA"/>
		<reference ref_id="1257815" ref_url="https://bugzilla.suse.com/1257815" source="BUGZILLA"/>
		<reference ref_id="1257816" ref_url="https://bugzilla.suse.com/1257816" source="BUGZILLA"/>
		<reference ref_id="1257817" ref_url="https://bugzilla.suse.com/1257817" source="BUGZILLA"/>
		<reference ref_id="1257818" ref_url="https://bugzilla.suse.com/1257818" source="BUGZILLA"/>
		<reference ref_id="1257830" ref_url="https://bugzilla.suse.com/1257830" source="BUGZILLA"/>
		<reference ref_id="1257942" ref_url="https://bugzilla.suse.com/1257942" source="BUGZILLA"/>
		<reference ref_id="1257952" ref_url="https://bugzilla.suse.com/1257952" source="BUGZILLA"/>
		<reference ref_id="1258153" ref_url="https://bugzilla.suse.com/1258153" source="BUGZILLA"/>
		<reference ref_id="1258181" ref_url="https://bugzilla.suse.com/1258181" source="BUGZILLA"/>
		<reference ref_id="1258184" ref_url="https://bugzilla.suse.com/1258184" source="BUGZILLA"/>
		<reference ref_id="1258222" ref_url="https://bugzilla.suse.com/1258222" source="BUGZILLA"/>
		<reference ref_id="1258232" ref_url="https://bugzilla.suse.com/1258232" source="BUGZILLA"/>
		<reference ref_id="1258234" ref_url="https://bugzilla.suse.com/1258234" source="BUGZILLA"/>
		<reference ref_id="1258237" ref_url="https://bugzilla.suse.com/1258237" source="BUGZILLA"/>
		<reference ref_id="1258245" ref_url="https://bugzilla.suse.com/1258245" source="BUGZILLA"/>
		<reference ref_id="1258249" ref_url="https://bugzilla.suse.com/1258249" source="BUGZILLA"/>
		<reference ref_id="1258252" ref_url="https://bugzilla.suse.com/1258252" source="BUGZILLA"/>
		<reference ref_id="1258256" ref_url="https://bugzilla.suse.com/1258256" source="BUGZILLA"/>
		<reference ref_id="1258258" ref_url="https://bugzilla.suse.com/1258258" source="BUGZILLA"/>
		<reference ref_id="1258259" ref_url="https://bugzilla.suse.com/1258259" source="BUGZILLA"/>
		<reference ref_id="1258272" ref_url="https://bugzilla.suse.com/1258272" source="BUGZILLA"/>
		<reference ref_id="1258273" ref_url="https://bugzilla.suse.com/1258273" source="BUGZILLA"/>
		<reference ref_id="1258276" ref_url="https://bugzilla.suse.com/1258276" source="BUGZILLA"/>
		<reference ref_id="1258277" ref_url="https://bugzilla.suse.com/1258277" source="BUGZILLA"/>
		<reference ref_id="1258279" ref_url="https://bugzilla.suse.com/1258279" source="BUGZILLA"/>
		<reference ref_id="1258286" ref_url="https://bugzilla.suse.com/1258286" source="BUGZILLA"/>
		<reference ref_id="1258289" ref_url="https://bugzilla.suse.com/1258289" source="BUGZILLA"/>
		<reference ref_id="1258290" ref_url="https://bugzilla.suse.com/1258290" source="BUGZILLA"/>
		<reference ref_id="1258297" ref_url="https://bugzilla.suse.com/1258297" source="BUGZILLA"/>
		<reference ref_id="1258298" ref_url="https://bugzilla.suse.com/1258298" source="BUGZILLA"/>
		<reference ref_id="1258299" ref_url="https://bugzilla.suse.com/1258299" source="BUGZILLA"/>
		<reference ref_id="1258303" ref_url="https://bugzilla.suse.com/1258303" source="BUGZILLA"/>
		<reference ref_id="1258304" ref_url="https://bugzilla.suse.com/1258304" source="BUGZILLA"/>
		<reference ref_id="1258308" ref_url="https://bugzilla.suse.com/1258308" source="BUGZILLA"/>
		<reference ref_id="1258309" ref_url="https://bugzilla.suse.com/1258309" source="BUGZILLA"/>
		<reference ref_id="1258313" ref_url="https://bugzilla.suse.com/1258313" source="BUGZILLA"/>
		<reference ref_id="1258317" ref_url="https://bugzilla.suse.com/1258317" source="BUGZILLA"/>
		<reference ref_id="1258321" ref_url="https://bugzilla.suse.com/1258321" source="BUGZILLA"/>
		<reference ref_id="1258323" ref_url="https://bugzilla.suse.com/1258323" source="BUGZILLA"/>
		<reference ref_id="1258324" ref_url="https://bugzilla.suse.com/1258324" source="BUGZILLA"/>
		<reference ref_id="1258326" ref_url="https://bugzilla.suse.com/1258326" source="BUGZILLA"/>
		<reference ref_id="1258331" ref_url="https://bugzilla.suse.com/1258331" source="BUGZILLA"/>
		<reference ref_id="1258338" ref_url="https://bugzilla.suse.com/1258338" source="BUGZILLA"/>
		<reference ref_id="1258349" ref_url="https://bugzilla.suse.com/1258349" source="BUGZILLA"/>
		<reference ref_id="1258354" ref_url="https://bugzilla.suse.com/1258354" source="BUGZILLA"/>
		<reference ref_id="1258355" ref_url="https://bugzilla.suse.com/1258355" source="BUGZILLA"/>
		<reference ref_id="1258358" ref_url="https://bugzilla.suse.com/1258358" source="BUGZILLA"/>
		<reference ref_id="1258374" ref_url="https://bugzilla.suse.com/1258374" source="BUGZILLA"/>
		<reference ref_id="1258376" ref_url="https://bugzilla.suse.com/1258376" source="BUGZILLA"/>
		<reference ref_id="1258377" ref_url="https://bugzilla.suse.com/1258377" source="BUGZILLA"/>
		<reference ref_id="1258379" ref_url="https://bugzilla.suse.com/1258379" source="BUGZILLA"/>
		<reference ref_id="1258389" ref_url="https://bugzilla.suse.com/1258389" source="BUGZILLA"/>
		<reference ref_id="1258394" ref_url="https://bugzilla.suse.com/1258394" source="BUGZILLA"/>
		<reference ref_id="1258395" ref_url="https://bugzilla.suse.com/1258395" source="BUGZILLA"/>
		<reference ref_id="1258397" ref_url="https://bugzilla.suse.com/1258397" source="BUGZILLA"/>
		<reference ref_id="1258411" ref_url="https://bugzilla.suse.com/1258411" source="BUGZILLA"/>
		<reference ref_id="1258415" ref_url="https://bugzilla.suse.com/1258415" source="BUGZILLA"/>
		<reference ref_id="1258419" ref_url="https://bugzilla.suse.com/1258419" source="BUGZILLA"/>
		<reference ref_id="1258421" ref_url="https://bugzilla.suse.com/1258421" source="BUGZILLA"/>
		<reference ref_id="1258422" ref_url="https://bugzilla.suse.com/1258422" source="BUGZILLA"/>
		<reference ref_id="1258424" ref_url="https://bugzilla.suse.com/1258424" source="BUGZILLA"/>
		<reference ref_id="1258429" ref_url="https://bugzilla.suse.com/1258429" source="BUGZILLA"/>
		<reference ref_id="1258430" ref_url="https://bugzilla.suse.com/1258430" source="BUGZILLA"/>
		<reference ref_id="1258442" ref_url="https://bugzilla.suse.com/1258442" source="BUGZILLA"/>
		<reference ref_id="1258455" ref_url="https://bugzilla.suse.com/1258455" source="BUGZILLA"/>
		<reference ref_id="1258461" ref_url="https://bugzilla.suse.com/1258461" source="BUGZILLA"/>
		<reference ref_id="1258464" ref_url="https://bugzilla.suse.com/1258464" source="BUGZILLA"/>
		<reference ref_id="1258465" ref_url="https://bugzilla.suse.com/1258465" source="BUGZILLA"/>
		<reference ref_id="1258468" ref_url="https://bugzilla.suse.com/1258468" source="BUGZILLA"/>
		<reference ref_id="1258469" ref_url="https://bugzilla.suse.com/1258469" source="BUGZILLA"/>
		<reference ref_id="1258483" ref_url="https://bugzilla.suse.com/1258483" source="BUGZILLA"/>
		<reference ref_id="1258484" ref_url="https://bugzilla.suse.com/1258484" source="BUGZILLA"/>
		<reference ref_id="1258489" ref_url="https://bugzilla.suse.com/1258489" source="BUGZILLA"/>
		<reference ref_id="1258517" ref_url="https://bugzilla.suse.com/1258517" source="BUGZILLA"/>
		<reference ref_id="1258518" ref_url="https://bugzilla.suse.com/1258518" source="BUGZILLA"/>
		<reference ref_id="1258519" ref_url="https://bugzilla.suse.com/1258519" source="BUGZILLA"/>
		<reference ref_id="1258520" ref_url="https://bugzilla.suse.com/1258520" source="BUGZILLA"/>
		<reference ref_id="1258524" ref_url="https://bugzilla.suse.com/1258524" source="BUGZILLA"/>
		<reference ref_id="1258544" ref_url="https://bugzilla.suse.com/1258544" source="BUGZILLA"/>
		<reference ref_id="1258660" ref_url="https://bugzilla.suse.com/1258660" source="BUGZILLA"/>
		<reference ref_id="1258672" ref_url="https://bugzilla.suse.com/1258672" source="BUGZILLA"/>
		<reference ref_id="1258824" ref_url="https://bugzilla.suse.com/1258824" source="BUGZILLA"/>
		<reference ref_id="1259329" ref_url="https://bugzilla.suse.com/1259329" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-39753" ref_url="https://www.suse.com/security/cve/CVE-2025-39753/" source="CVE"/>
		<reference ref_id="CVE-2025-39964" ref_url="https://www.suse.com/security/cve/CVE-2025-39964/" source="CVE"/>
		<reference ref_id="CVE-2025-40099" ref_url="https://www.suse.com/security/cve/CVE-2025-40099/" source="CVE"/>
		<reference ref_id="CVE-2025-40103" ref_url="https://www.suse.com/security/cve/CVE-2025-40103/" source="CVE"/>
		<reference ref_id="CVE-2025-40230" ref_url="https://www.suse.com/security/cve/CVE-2025-40230/" source="CVE"/>
		<reference ref_id="CVE-2025-68173" ref_url="https://www.suse.com/security/cve/CVE-2025-68173/" source="CVE"/>
		<reference ref_id="CVE-2025-68186" ref_url="https://www.suse.com/security/cve/CVE-2025-68186/" source="CVE"/>
		<reference ref_id="CVE-2025-68292" ref_url="https://www.suse.com/security/cve/CVE-2025-68292/" source="CVE"/>
		<reference ref_id="CVE-2025-68295" ref_url="https://www.suse.com/security/cve/CVE-2025-68295/" source="CVE"/>
		<reference ref_id="CVE-2025-68329" ref_url="https://www.suse.com/security/cve/CVE-2025-68329/" source="CVE"/>
		<reference ref_id="CVE-2025-68371" ref_url="https://www.suse.com/security/cve/CVE-2025-68371/" source="CVE"/>
		<reference ref_id="CVE-2025-68745" ref_url="https://www.suse.com/security/cve/CVE-2025-68745/" source="CVE"/>
		<reference ref_id="CVE-2025-68785" ref_url="https://www.suse.com/security/cve/CVE-2025-68785/" source="CVE"/>
		<reference ref_id="CVE-2025-68810" ref_url="https://www.suse.com/security/cve/CVE-2025-68810/" source="CVE"/>
		<reference ref_id="CVE-2025-68818" ref_url="https://www.suse.com/security/cve/CVE-2025-68818/" source="CVE"/>
		<reference ref_id="CVE-2025-71071" ref_url="https://www.suse.com/security/cve/CVE-2025-71071/" source="CVE"/>
		<reference ref_id="CVE-2025-71104" ref_url="https://www.suse.com/security/cve/CVE-2025-71104/" source="CVE"/>
		<reference ref_id="CVE-2025-71125" ref_url="https://www.suse.com/security/cve/CVE-2025-71125/" source="CVE"/>
		<reference ref_id="CVE-2025-71134" ref_url="https://www.suse.com/security/cve/CVE-2025-71134/" source="CVE"/>
		<reference ref_id="CVE-2025-71161" ref_url="https://www.suse.com/security/cve/CVE-2025-71161/" source="CVE"/>
		<reference ref_id="CVE-2025-71182" ref_url="https://www.suse.com/security/cve/CVE-2025-71182/" source="CVE"/>
		<reference ref_id="CVE-2025-71183" ref_url="https://www.suse.com/security/cve/CVE-2025-71183/" source="CVE"/>
		<reference ref_id="CVE-2025-71184" ref_url="https://www.suse.com/security/cve/CVE-2025-71184/" source="CVE"/>
		<reference ref_id="CVE-2025-71185" ref_url="https://www.suse.com/security/cve/CVE-2025-71185/" source="CVE"/>
		<reference ref_id="CVE-2025-71186" ref_url="https://www.suse.com/security/cve/CVE-2025-71186/" source="CVE"/>
		<reference ref_id="CVE-2025-71188" ref_url="https://www.suse.com/security/cve/CVE-2025-71188/" source="CVE"/>
		<reference ref_id="CVE-2025-71189" ref_url="https://www.suse.com/security/cve/CVE-2025-71189/" source="CVE"/>
		<reference ref_id="CVE-2025-71190" ref_url="https://www.suse.com/security/cve/CVE-2025-71190/" source="CVE"/>
		<reference ref_id="CVE-2025-71191" ref_url="https://www.suse.com/security/cve/CVE-2025-71191/" source="CVE"/>
		<reference ref_id="CVE-2025-71192" ref_url="https://www.suse.com/security/cve/CVE-2025-71192/" source="CVE"/>
		<reference ref_id="CVE-2025-71193" ref_url="https://www.suse.com/security/cve/CVE-2025-71193/" source="CVE"/>
		<reference ref_id="CVE-2025-71194" ref_url="https://www.suse.com/security/cve/CVE-2025-71194/" source="CVE"/>
		<reference ref_id="CVE-2025-71195" ref_url="https://www.suse.com/security/cve/CVE-2025-71195/" source="CVE"/>
		<reference ref_id="CVE-2025-71196" ref_url="https://www.suse.com/security/cve/CVE-2025-71196/" source="CVE"/>
		<reference ref_id="CVE-2025-71197" ref_url="https://www.suse.com/security/cve/CVE-2025-71197/" source="CVE"/>
		<reference ref_id="CVE-2025-71198" ref_url="https://www.suse.com/security/cve/CVE-2025-71198/" source="CVE"/>
		<reference ref_id="CVE-2025-71199" ref_url="https://www.suse.com/security/cve/CVE-2025-71199/" source="CVE"/>
		<reference ref_id="CVE-2025-71200" ref_url="https://www.suse.com/security/cve/CVE-2025-71200/" source="CVE"/>
		<reference ref_id="CVE-2025-71222" ref_url="https://www.suse.com/security/cve/CVE-2025-71222/" source="CVE"/>
		<reference ref_id="CVE-2025-71224" ref_url="https://www.suse.com/security/cve/CVE-2025-71224/" source="CVE"/>
		<reference ref_id="CVE-2025-71225" ref_url="https://www.suse.com/security/cve/CVE-2025-71225/" source="CVE"/>
		<reference ref_id="CVE-2025-71229" ref_url="https://www.suse.com/security/cve/CVE-2025-71229/" source="CVE"/>
		<reference ref_id="CVE-2025-71231" ref_url="https://www.suse.com/security/cve/CVE-2025-71231/" source="CVE"/>
		<reference ref_id="CVE-2025-71232" ref_url="https://www.suse.com/security/cve/CVE-2025-71232/" source="CVE"/>
		<reference ref_id="CVE-2025-71233" ref_url="https://www.suse.com/security/cve/CVE-2025-71233/" source="CVE"/>
		<reference ref_id="CVE-2025-71234" ref_url="https://www.suse.com/security/cve/CVE-2025-71234/" source="CVE"/>
		<reference ref_id="CVE-2025-71235" ref_url="https://www.suse.com/security/cve/CVE-2025-71235/" source="CVE"/>
		<reference ref_id="CVE-2025-71236" ref_url="https://www.suse.com/security/cve/CVE-2025-71236/" source="CVE"/>
		<reference ref_id="CVE-2026-22979" ref_url="https://www.suse.com/security/cve/CVE-2026-22979/" source="CVE"/>
		<reference ref_id="CVE-2026-22980" ref_url="https://www.suse.com/security/cve/CVE-2026-22980/" source="CVE"/>
		<reference ref_id="CVE-2026-22998" ref_url="https://www.suse.com/security/cve/CVE-2026-22998/" source="CVE"/>
		<reference ref_id="CVE-2026-23003" ref_url="https://www.suse.com/security/cve/CVE-2026-23003/" source="CVE"/>
		<reference ref_id="CVE-2026-23004" ref_url="https://www.suse.com/security/cve/CVE-2026-23004/" source="CVE"/>
		<reference ref_id="CVE-2026-23010" ref_url="https://www.suse.com/security/cve/CVE-2026-23010/" source="CVE"/>
		<reference ref_id="CVE-2026-23017" ref_url="https://www.suse.com/security/cve/CVE-2026-23017/" source="CVE"/>
		<reference ref_id="CVE-2026-23018" ref_url="https://www.suse.com/security/cve/CVE-2026-23018/" source="CVE"/>
		<reference ref_id="CVE-2026-23021" ref_url="https://www.suse.com/security/cve/CVE-2026-23021/" source="CVE"/>
		<reference ref_id="CVE-2026-23022" ref_url="https://www.suse.com/security/cve/CVE-2026-23022/" source="CVE"/>
		<reference ref_id="CVE-2026-23023" ref_url="https://www.suse.com/security/cve/CVE-2026-23023/" source="CVE"/>
		<reference ref_id="CVE-2026-23024" ref_url="https://www.suse.com/security/cve/CVE-2026-23024/" source="CVE"/>
		<reference ref_id="CVE-2026-23026" ref_url="https://www.suse.com/security/cve/CVE-2026-23026/" source="CVE"/>
		<reference ref_id="CVE-2026-23030" ref_url="https://www.suse.com/security/cve/CVE-2026-23030/" source="CVE"/>
		<reference ref_id="CVE-2026-23031" ref_url="https://www.suse.com/security/cve/CVE-2026-23031/" source="CVE"/>
		<reference ref_id="CVE-2026-23033" ref_url="https://www.suse.com/security/cve/CVE-2026-23033/" source="CVE"/>
		<reference ref_id="CVE-2026-23035" ref_url="https://www.suse.com/security/cve/CVE-2026-23035/" source="CVE"/>
		<reference ref_id="CVE-2026-23037" ref_url="https://www.suse.com/security/cve/CVE-2026-23037/" source="CVE"/>
		<reference ref_id="CVE-2026-23038" ref_url="https://www.suse.com/security/cve/CVE-2026-23038/" source="CVE"/>
		<reference ref_id="CVE-2026-23042" ref_url="https://www.suse.com/security/cve/CVE-2026-23042/" source="CVE"/>
		<reference ref_id="CVE-2026-23047" ref_url="https://www.suse.com/security/cve/CVE-2026-23047/" source="CVE"/>
		<reference ref_id="CVE-2026-23049" ref_url="https://www.suse.com/security/cve/CVE-2026-23049/" source="CVE"/>
		<reference ref_id="CVE-2026-23050" ref_url="https://www.suse.com/security/cve/CVE-2026-23050/" source="CVE"/>
		<reference ref_id="CVE-2026-23053" ref_url="https://www.suse.com/security/cve/CVE-2026-23053/" source="CVE"/>
		<reference ref_id="CVE-2026-23054" ref_url="https://www.suse.com/security/cve/CVE-2026-23054/" source="CVE"/>
		<reference ref_id="CVE-2026-23055" ref_url="https://www.suse.com/security/cve/CVE-2026-23055/" source="CVE"/>
		<reference ref_id="CVE-2026-23056" ref_url="https://www.suse.com/security/cve/CVE-2026-23056/" source="CVE"/>
		<reference ref_id="CVE-2026-23057" ref_url="https://www.suse.com/security/cve/CVE-2026-23057/" source="CVE"/>
		<reference ref_id="CVE-2026-23058" ref_url="https://www.suse.com/security/cve/CVE-2026-23058/" source="CVE"/>
		<reference ref_id="CVE-2026-23059" ref_url="https://www.suse.com/security/cve/CVE-2026-23059/" source="CVE"/>
		<reference ref_id="CVE-2026-23060" ref_url="https://www.suse.com/security/cve/CVE-2026-23060/" source="CVE"/>
		<reference ref_id="CVE-2026-23061" ref_url="https://www.suse.com/security/cve/CVE-2026-23061/" source="CVE"/>
		<reference ref_id="CVE-2026-23062" ref_url="https://www.suse.com/security/cve/CVE-2026-23062/" source="CVE"/>
		<reference ref_id="CVE-2026-23063" ref_url="https://www.suse.com/security/cve/CVE-2026-23063/" source="CVE"/>
		<reference ref_id="CVE-2026-23064" ref_url="https://www.suse.com/security/cve/CVE-2026-23064/" source="CVE"/>
		<reference ref_id="CVE-2026-23065" ref_url="https://www.suse.com/security/cve/CVE-2026-23065/" source="CVE"/>
		<reference ref_id="CVE-2026-23066" ref_url="https://www.suse.com/security/cve/CVE-2026-23066/" source="CVE"/>
		<reference ref_id="CVE-2026-23068" ref_url="https://www.suse.com/security/cve/CVE-2026-23068/" source="CVE"/>
		<reference ref_id="CVE-2026-23069" ref_url="https://www.suse.com/security/cve/CVE-2026-23069/" source="CVE"/>
		<reference ref_id="CVE-2026-23070" ref_url="https://www.suse.com/security/cve/CVE-2026-23070/" source="CVE"/>
		<reference ref_id="CVE-2026-23071" ref_url="https://www.suse.com/security/cve/CVE-2026-23071/" source="CVE"/>
		<reference ref_id="CVE-2026-23073" ref_url="https://www.suse.com/security/cve/CVE-2026-23073/" source="CVE"/>
		<reference ref_id="CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074/" source="CVE"/>
		<reference ref_id="CVE-2026-23076" ref_url="https://www.suse.com/security/cve/CVE-2026-23076/" source="CVE"/>
		<reference ref_id="CVE-2026-23078" ref_url="https://www.suse.com/security/cve/CVE-2026-23078/" source="CVE"/>
		<reference ref_id="CVE-2026-23080" ref_url="https://www.suse.com/security/cve/CVE-2026-23080/" source="CVE"/>
		<reference ref_id="CVE-2026-23082" ref_url="https://www.suse.com/security/cve/CVE-2026-23082/" source="CVE"/>
		<reference ref_id="CVE-2026-23083" ref_url="https://www.suse.com/security/cve/CVE-2026-23083/" source="CVE"/>
		<reference ref_id="CVE-2026-23084" ref_url="https://www.suse.com/security/cve/CVE-2026-23084/" source="CVE"/>
		<reference ref_id="CVE-2026-23085" ref_url="https://www.suse.com/security/cve/CVE-2026-23085/" source="CVE"/>
		<reference ref_id="CVE-2026-23086" ref_url="https://www.suse.com/security/cve/CVE-2026-23086/" source="CVE"/>
		<reference ref_id="CVE-2026-23088" ref_url="https://www.suse.com/security/cve/CVE-2026-23088/" source="CVE"/>
		<reference ref_id="CVE-2026-23089" ref_url="https://www.suse.com/security/cve/CVE-2026-23089/" source="CVE"/>
		<reference ref_id="CVE-2026-23090" ref_url="https://www.suse.com/security/cve/CVE-2026-23090/" source="CVE"/>
		<reference ref_id="CVE-2026-23091" ref_url="https://www.suse.com/security/cve/CVE-2026-23091/" source="CVE"/>
		<reference ref_id="CVE-2026-23094" ref_url="https://www.suse.com/security/cve/CVE-2026-23094/" source="CVE"/>
		<reference ref_id="CVE-2026-23095" ref_url="https://www.suse.com/security/cve/CVE-2026-23095/" source="CVE"/>
		<reference ref_id="CVE-2026-23096" ref_url="https://www.suse.com/security/cve/CVE-2026-23096/" source="CVE"/>
		<reference ref_id="CVE-2026-23097" ref_url="https://www.suse.com/security/cve/CVE-2026-23097/" source="CVE"/>
		<reference ref_id="CVE-2026-23099" ref_url="https://www.suse.com/security/cve/CVE-2026-23099/" source="CVE"/>
		<reference ref_id="CVE-2026-23100" ref_url="https://www.suse.com/security/cve/CVE-2026-23100/" source="CVE"/>
		<reference ref_id="CVE-2026-23101" ref_url="https://www.suse.com/security/cve/CVE-2026-23101/" source="CVE"/>
		<reference ref_id="CVE-2026-23102" ref_url="https://www.suse.com/security/cve/CVE-2026-23102/" source="CVE"/>
		<reference ref_id="CVE-2026-23104" ref_url="https://www.suse.com/security/cve/CVE-2026-23104/" source="CVE"/>
		<reference ref_id="CVE-2026-23105" ref_url="https://www.suse.com/security/cve/CVE-2026-23105/" source="CVE"/>
		<reference ref_id="CVE-2026-23107" ref_url="https://www.suse.com/security/cve/CVE-2026-23107/" source="CVE"/>
		<reference ref_id="CVE-2026-23108" ref_url="https://www.suse.com/security/cve/CVE-2026-23108/" source="CVE"/>
		<reference ref_id="CVE-2026-23110" ref_url="https://www.suse.com/security/cve/CVE-2026-23110/" source="CVE"/>
		<reference ref_id="CVE-2026-23111" ref_url="https://www.suse.com/security/cve/CVE-2026-23111/" source="CVE"/>
		<reference ref_id="CVE-2026-23112" ref_url="https://www.suse.com/security/cve/CVE-2026-23112/" source="CVE"/>
		<reference ref_id="CVE-2026-23116" ref_url="https://www.suse.com/security/cve/CVE-2026-23116/" source="CVE"/>
		<reference ref_id="CVE-2026-23119" ref_url="https://www.suse.com/security/cve/CVE-2026-23119/" source="CVE"/>
		<reference ref_id="CVE-2026-23121" ref_url="https://www.suse.com/security/cve/CVE-2026-23121/" source="CVE"/>
		<reference ref_id="CVE-2026-23123" ref_url="https://www.suse.com/security/cve/CVE-2026-23123/" source="CVE"/>
		<reference ref_id="CVE-2026-23128" ref_url="https://www.suse.com/security/cve/CVE-2026-23128/" source="CVE"/>
		<reference ref_id="CVE-2026-23129" ref_url="https://www.suse.com/security/cve/CVE-2026-23129/" source="CVE"/>
		<reference ref_id="CVE-2026-23131" ref_url="https://www.suse.com/security/cve/CVE-2026-23131/" source="CVE"/>
		<reference ref_id="CVE-2026-23133" ref_url="https://www.suse.com/security/cve/CVE-2026-23133/" source="CVE"/>
		<reference ref_id="CVE-2026-23135" ref_url="https://www.suse.com/security/cve/CVE-2026-23135/" source="CVE"/>
		<reference ref_id="CVE-2026-23136" ref_url="https://www.suse.com/security/cve/CVE-2026-23136/" source="CVE"/>
		<reference ref_id="CVE-2026-23137" ref_url="https://www.suse.com/security/cve/CVE-2026-23137/" source="CVE"/>
		<reference ref_id="CVE-2026-23139" ref_url="https://www.suse.com/security/cve/CVE-2026-23139/" source="CVE"/>
		<reference ref_id="CVE-2026-23141" ref_url="https://www.suse.com/security/cve/CVE-2026-23141/" source="CVE"/>
		<reference ref_id="CVE-2026-23142" ref_url="https://www.suse.com/security/cve/CVE-2026-23142/" source="CVE"/>
		<reference ref_id="CVE-2026-23144" ref_url="https://www.suse.com/security/cve/CVE-2026-23144/" source="CVE"/>
		<reference ref_id="CVE-2026-23145" ref_url="https://www.suse.com/security/cve/CVE-2026-23145/" source="CVE"/>
		<reference ref_id="CVE-2026-23146" ref_url="https://www.suse.com/security/cve/CVE-2026-23146/" source="CVE"/>
		<reference ref_id="CVE-2026-23148" ref_url="https://www.suse.com/security/cve/CVE-2026-23148/" source="CVE"/>
		<reference ref_id="CVE-2026-23150" ref_url="https://www.suse.com/security/cve/CVE-2026-23150/" source="CVE"/>
		<reference ref_id="CVE-2026-23151" ref_url="https://www.suse.com/security/cve/CVE-2026-23151/" source="CVE"/>
		<reference ref_id="CVE-2026-23152" ref_url="https://www.suse.com/security/cve/CVE-2026-23152/" source="CVE"/>
		<reference ref_id="CVE-2026-23154" ref_url="https://www.suse.com/security/cve/CVE-2026-23154/" source="CVE"/>
		<reference ref_id="CVE-2026-23155" ref_url="https://www.suse.com/security/cve/CVE-2026-23155/" source="CVE"/>
		<reference ref_id="CVE-2026-23156" ref_url="https://www.suse.com/security/cve/CVE-2026-23156/" source="CVE"/>
		<reference ref_id="CVE-2026-23157" ref_url="https://www.suse.com/security/cve/CVE-2026-23157/" source="CVE"/>
		<reference ref_id="CVE-2026-23158" ref_url="https://www.suse.com/security/cve/CVE-2026-23158/" source="CVE"/>
		<reference ref_id="CVE-2026-23161" ref_url="https://www.suse.com/security/cve/CVE-2026-23161/" source="CVE"/>
		<reference ref_id="CVE-2026-23163" ref_url="https://www.suse.com/security/cve/CVE-2026-23163/" source="CVE"/>
		<reference ref_id="CVE-2026-23166" ref_url="https://www.suse.com/security/cve/CVE-2026-23166/" source="CVE"/>
		<reference ref_id="CVE-2026-23167" ref_url="https://www.suse.com/security/cve/CVE-2026-23167/" source="CVE"/>
		<reference ref_id="CVE-2026-23169" ref_url="https://www.suse.com/security/cve/CVE-2026-23169/" source="CVE"/>
		<reference ref_id="CVE-2026-23170" ref_url="https://www.suse.com/security/cve/CVE-2026-23170/" source="CVE"/>
		<reference ref_id="CVE-2026-23171" ref_url="https://www.suse.com/security/cve/CVE-2026-23171/" source="CVE"/>
		<reference ref_id="CVE-2026-23172" ref_url="https://www.suse.com/security/cve/CVE-2026-23172/" source="CVE"/>
		<reference ref_id="CVE-2026-23173" ref_url="https://www.suse.com/security/cve/CVE-2026-23173/" source="CVE"/>
		<reference ref_id="CVE-2026-23176" ref_url="https://www.suse.com/security/cve/CVE-2026-23176/" source="CVE"/>
		<reference ref_id="CVE-2026-23177" ref_url="https://www.suse.com/security/cve/CVE-2026-23177/" source="CVE"/>
		<reference ref_id="CVE-2026-23178" ref_url="https://www.suse.com/security/cve/CVE-2026-23178/" source="CVE"/>
		<reference ref_id="CVE-2026-23179" ref_url="https://www.suse.com/security/cve/CVE-2026-23179/" source="CVE"/>
		<reference ref_id="CVE-2026-23182" ref_url="https://www.suse.com/security/cve/CVE-2026-23182/" source="CVE"/>
		<reference ref_id="CVE-2026-23188" ref_url="https://www.suse.com/security/cve/CVE-2026-23188/" source="CVE"/>
		<reference ref_id="CVE-2026-23189" ref_url="https://www.suse.com/security/cve/CVE-2026-23189/" source="CVE"/>
		<reference ref_id="CVE-2026-23190" ref_url="https://www.suse.com/security/cve/CVE-2026-23190/" source="CVE"/>
		<reference ref_id="CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191/" source="CVE"/>
		<reference ref_id="CVE-2026-23198" ref_url="https://www.suse.com/security/cve/CVE-2026-23198/" source="CVE"/>
		<reference ref_id="CVE-2026-23202" ref_url="https://www.suse.com/security/cve/CVE-2026-23202/" source="CVE"/>
		<reference ref_id="CVE-2026-23207" ref_url="https://www.suse.com/security/cve/CVE-2026-23207/" source="CVE"/>
		<reference ref_id="CVE-2026-23208" ref_url="https://www.suse.com/security/cve/CVE-2026-23208/" source="CVE"/>
		<reference ref_id="CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209/" source="CVE"/>
		<reference ref_id="CVE-2026-23210" ref_url="https://www.suse.com/security/cve/CVE-2026-23210/" source="CVE"/>
		<reference ref_id="CVE-2026-23213" ref_url="https://www.suse.com/security/cve/CVE-2026-23213/" source="CVE"/>
		<reference ref_id="CVE-2026-23214" ref_url="https://www.suse.com/security/cve/CVE-2026-23214/" source="CVE"/>
		<reference ref_id="CVE-2026-23221" ref_url="https://www.suse.com/security/cve/CVE-2026-23221/" source="CVE"/>
		<reference ref_id="CVE-2026-23222" ref_url="https://www.suse.com/security/cve/CVE-2026-23222/" source="CVE"/>
		<reference ref_id="CVE-2026-23223" ref_url="https://www.suse.com/security/cve/CVE-2026-23223/" source="CVE"/>
		<reference ref_id="CVE-2026-23224" ref_url="https://www.suse.com/security/cve/CVE-2026-23224/" source="CVE"/>
		<reference ref_id="CVE-2026-23229" ref_url="https://www.suse.com/security/cve/CVE-2026-23229/" source="CVE"/>
		<reference ref_id="CVE-2026-23230" ref_url="https://www.suse.com/security/cve/CVE-2026-23230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues.

The following security issues were fixed:

- CVE-2025-39753: gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops (bsc#1249590).
- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).
- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).
- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).
- CVE-2025-40230: mm: prevent poison consumption when splitting THP (bsc#1254817).
- CVE-2025-68173: ftrace: Fix softlockup in ftrace_module_enable (bsc#1255311).
- CVE-2025-68186: ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up (bsc#1255144).
- CVE-2025-68292: mm/memfd: fix information leak in hugetlb folios (bsc#1255148).
- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).
- CVE-2025-68329: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs (bsc#1255490).
- CVE-2025-68371: scsi: smartpqi: Fix device resources accessed after device removal (bsc#1255572).
- CVE-2025-68745: scsi: qla2xxx: Clear cmds after chip reset (bsc#1255721).
- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).
- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).
- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).
- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).
- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).
- CVE-2025-71134: mm/page_alloc: change all pageblocks migrate type on coalescing (bsc#1256732).
- CVE-2025-71161: dm-verity: disable recursive forward error correction (bsc#1257174).
- CVE-2025-71184: btrfs: tracepoints: use btrfs_root_id() to get the id of a root (bsc#1257635).
- CVE-2025-71193: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend (bsc#1257686).
- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).
- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).
- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).
- CVE-2026-23003: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() (bsc#1257246).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).
- CVE-2026-23022: idpf: fix memory leak in idpf_vc_core_deinit() (bsc#1257581).
- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).
- CVE-2026-23024: idpf: fix memory leak of flow steer list on rmmod (bsc#1257572).
- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).
- CVE-2026-23042: idpf: fix aux device unplugging when rdma is not supported by vport (bsc#1257705).
- CVE-2026-23047: libceph: make calc_target() set t-&gt;paused, not just clear it (bsc#1257682).
- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).
- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).
- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
- CVE-2026-23066: rxrpc: Fix recvmsg() unconditional requeue (bsc#1257726).
- CVE-2026-23068: spi: spi-sprd-adi: Fix double free in probe error path (bsc#1257805).
- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).
- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23083: tools: ynl-gen: use big-endian netlink attribute types (bsc#1257745).
- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).
- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).
- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).
- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).
- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
- CVE-2026-23097: migrate: correct lock ordering for hugetlb file folios (bsc#1257815).
- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).
- CVE-2026-23100: mm/hugetlb: fix hugetlb_pmd_shared() (bsc#1257817).
- CVE-2026-23102: arm64/fpsimd: signal: Fix restoration of SVE context (bsc#1257772).
- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).
- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).
- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).
- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).
- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).
- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).
- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).
- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).
- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).
- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).
- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).
- CVE-2026-23142: mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure (bsc#1258289).
- CVE-2026-23144: mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure (bsc#1258290).
- CVE-2026-23148: nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference (bsc#1258258).
- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).
- CVE-2026-23161: mm/shmem, swap: fix race of truncate and swap entry split (bsc#1258355).
- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).
- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).
- CVE-2026-23171: bonding: fix use-after-free due to enslave fail after slave array update (bsc#1258349).
- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).
- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).
- CVE-2026-23189: ceph: fix NULL pointer dereference in ceph_mds_auth_match() (bsc#1258308).
- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).
- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).
- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).
- CVE-2026-23223: xfs: fix UAF in xchk_btree_check_block_owner (bsc#1258483).
- CVE-2026-23224: erofs: fix UAF issue for file-backed mounts w/ directio option (bsc#1258461).

The following non security issues were fixed:

- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).
- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).
- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).
- Add bugnumber to existing mana and mana_ib changes (bsc#1251135 bsc#1251971).
- HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list (bsc#1258455).
- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).
- PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1255868).
- PCI: Add ASPEED vendor ID to pci_ids.h (bsc#1258672)
- PCI: Add PCI_BRIDGE_NO_ALIAS quirk for ASPEED AST1150 (bsc#1258672)
- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).
- Refresh and move upstreamed ath12k patch into sorted section
- Update "drm/mgag200: fix mgag200_bmc_stop_scanout()" bug number (bsc#1258153)
- add bugnumber to existing mana change (bsc#1252266).
- arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS (bsc#1259329)
- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).
- can: bcm: fix locking for bcm_op runtime updates (git-fixes).
- clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops (git-fixes).
- clocksource: Fix the CPUs' choice in the watchdog per CPU verification (bsc#1257818).
- clocksource: Print durations for sync check unconditionally (bsc#1257818).
- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1257818).
- clocksource: Use pr_info() for "Checking clocksource synchronization" message (bsc#1257818).
- dm: Fix deadlock when reloading a multipath table (bsc#1254928).
- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).
- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).
- gpiolib-acpi: Update file references in the Documentation and MAINTAINERS (git-fixes).
- i3c: master: Update hot-join flag only on success (git-fixes).
- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).
- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).
- modpost: Ensure exported symbol namespaces are not quoted (bsc#1258489).
- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).
- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).
- platform/x86/amd: amd_3d_vcache: Add AMD 3D V-Cache optimizer driver (jsc#PED-11563).
- sched/core: Avoid direct access to hrtimer clockbase (bsc#1234634).
- sched/deadline: Fix race in push_dl_task() (bsc#1234634).
- sched/deadline: Stop dl_server before CPU goes offline (bsc#1234634).
- sched/fair: Fix pelt clock sync when entering idle (bsc#1234634).
- sched/fair: Fix pelt lost idle time detection (bsc#1234634).
- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).
- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234634">SUSE bug 1234634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249590">SUSE bug 1249590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250748">SUSE bug 1250748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251135">SUSE bug 1251135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251966">SUSE bug 1251966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251971">SUSE bug 1251971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252008">SUSE bug 1252008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252266">SUSE bug 1252266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252911">SUSE bug 1252911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252924">SUSE bug 1252924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253129">SUSE bug 1253129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253691">SUSE bug 1253691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254817">SUSE bug 1254817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254928">SUSE bug 1254928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255129">SUSE bug 1255129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255144">SUSE bug 1255144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255148">SUSE bug 1255148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255311">SUSE bug 1255311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255490">SUSE bug 1255490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255572">SUSE bug 1255572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255721">SUSE bug 1255721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255868">SUSE bug 1255868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256640">SUSE bug 1256640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256675">SUSE bug 1256675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256679">SUSE bug 1256679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256708">SUSE bug 1256708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256732">SUSE bug 1256732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256784">SUSE bug 1256784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256802">SUSE bug 1256802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256865">SUSE bug 1256865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256867">SUSE bug 1256867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257154">SUSE bug 1257154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257174">SUSE bug 1257174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257209">SUSE bug 1257209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257222">SUSE bug 1257222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257228">SUSE bug 1257228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257231">SUSE bug 1257231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257246">SUSE bug 1257246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257332">SUSE bug 1257332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257466">SUSE bug 1257466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257472">SUSE bug 1257472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257473">SUSE bug 1257473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257551">SUSE bug 1257551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257552">SUSE bug 1257552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257553">SUSE bug 1257553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257554">SUSE bug 1257554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257556">SUSE bug 1257556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257557">SUSE bug 1257557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257559">SUSE bug 1257559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257560">SUSE bug 1257560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257561">SUSE bug 1257561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257562">SUSE bug 1257562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257565">SUSE bug 1257565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257570">SUSE bug 1257570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257572">SUSE bug 1257572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257573">SUSE bug 1257573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257576">SUSE bug 1257576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257579">SUSE bug 1257579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257580">SUSE bug 1257580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257581">SUSE bug 1257581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257586">SUSE bug 1257586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257600">SUSE bug 1257600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257631">SUSE bug 1257631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257635">SUSE bug 1257635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257679">SUSE bug 1257679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257682">SUSE bug 1257682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257686">SUSE bug 1257686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257687">SUSE bug 1257687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257688">SUSE bug 1257688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257704">SUSE bug 1257704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257705">SUSE bug 1257705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257706">SUSE bug 1257706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257707">SUSE bug 1257707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257709">SUSE bug 1257709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257714">SUSE bug 1257714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257715">SUSE bug 1257715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257716">SUSE bug 1257716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257718">SUSE bug 1257718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257722">SUSE bug 1257722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257723">SUSE bug 1257723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257726">SUSE bug 1257726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257729">SUSE bug 1257729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257730">SUSE bug 1257730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257732">SUSE bug 1257732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257734">SUSE bug 1257734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257735">SUSE bug 1257735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257737">SUSE bug 1257737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257739">SUSE bug 1257739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257740">SUSE bug 1257740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257741">SUSE bug 1257741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257742">SUSE bug 1257742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257743">SUSE bug 1257743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257745">SUSE bug 1257745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257750">SUSE bug 1257750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257755">SUSE bug 1257755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257757">SUSE bug 1257757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257758">SUSE bug 1257758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257759">SUSE bug 1257759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257761">SUSE bug 1257761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257762">SUSE bug 1257762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257763">SUSE bug 1257763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257765">SUSE bug 1257765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257768">SUSE bug 1257768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257770">SUSE bug 1257770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257772">SUSE bug 1257772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257775">SUSE bug 1257775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257776">SUSE bug 1257776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257788">SUSE bug 1257788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257789">SUSE bug 1257789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257790">SUSE bug 1257790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257805">SUSE bug 1257805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257808">SUSE bug 1257808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257809">SUSE bug 1257809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257811">SUSE bug 1257811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257813">SUSE bug 1257813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257814">SUSE bug 1257814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257815">SUSE bug 1257815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257816">SUSE bug 1257816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257817">SUSE bug 1257817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257818">SUSE bug 1257818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257830">SUSE bug 1257830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257942">SUSE bug 1257942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257952">SUSE bug 1257952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258153">SUSE bug 1258153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258181">SUSE bug 1258181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258184">SUSE bug 1258184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258222">SUSE bug 1258222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258232">SUSE bug 1258232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258234">SUSE bug 1258234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258237">SUSE bug 1258237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258245">SUSE bug 1258245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258249">SUSE bug 1258249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258252">SUSE bug 1258252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258256">SUSE bug 1258256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258258">SUSE bug 1258258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258259">SUSE bug 1258259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258272">SUSE bug 1258272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258273">SUSE bug 1258273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258276">SUSE bug 1258276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258277">SUSE bug 1258277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258279">SUSE bug 1258279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258286">SUSE bug 1258286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258289">SUSE bug 1258289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258290">SUSE bug 1258290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258297">SUSE bug 1258297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258298">SUSE bug 1258298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258299">SUSE bug 1258299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258303">SUSE bug 1258303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258304">SUSE bug 1258304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258308">SUSE bug 1258308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258309">SUSE bug 1258309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258313">SUSE bug 1258313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258317">SUSE bug 1258317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258321">SUSE bug 1258321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258323">SUSE bug 1258323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258324">SUSE bug 1258324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258326">SUSE bug 1258326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258331">SUSE bug 1258331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258338">SUSE bug 1258338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258349">SUSE bug 1258349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258354">SUSE bug 1258354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258355">SUSE bug 1258355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258358">SUSE bug 1258358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258374">SUSE bug 1258374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258376">SUSE bug 1258376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258377">SUSE bug 1258377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258379">SUSE bug 1258379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258389">SUSE bug 1258389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258394">SUSE bug 1258394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258397">SUSE bug 1258397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258411">SUSE bug 1258411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258415">SUSE bug 1258415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258419">SUSE bug 1258419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258421">SUSE bug 1258421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258422">SUSE bug 1258422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258424">SUSE bug 1258424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258429">SUSE bug 1258429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258430">SUSE bug 1258430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258442">SUSE bug 1258442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258455">SUSE bug 1258455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258461">SUSE bug 1258461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258464">SUSE bug 1258464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258465">SUSE bug 1258465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258468">SUSE bug 1258468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258469">SUSE bug 1258469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258483">SUSE bug 1258483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258484">SUSE bug 1258484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258489">SUSE bug 1258489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258517">SUSE bug 1258517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258518">SUSE bug 1258518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258519">SUSE bug 1258519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258520">SUSE bug 1258520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258524">SUSE bug 1258524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258544">SUSE bug 1258544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258660">SUSE bug 1258660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258672">SUSE bug 1258672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258824">SUSE bug 1258824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259329">SUSE bug 1259329</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39753/">CVE-2025-39753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39964/">CVE-2025-39964 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39964">CVE-2025-39964 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40099/">CVE-2025-40099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40103/">CVE-2025-40103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40230/">CVE-2025-40230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40230">CVE-2025-40230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68173/">CVE-2025-68173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68173">CVE-2025-68173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68186/">CVE-2025-68186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68186">CVE-2025-68186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68292/">CVE-2025-68292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68292">CVE-2025-68292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68295/">CVE-2025-68295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68295">CVE-2025-68295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68329/">CVE-2025-68329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68329">CVE-2025-68329 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68371/">CVE-2025-68371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68745/">CVE-2025-68745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68745">CVE-2025-68745 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68785/">CVE-2025-68785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68785">CVE-2025-68785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68810/">CVE-2025-68810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68810">CVE-2025-68810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68818/">CVE-2025-68818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68818">CVE-2025-68818 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71071/">CVE-2025-71071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71071">CVE-2025-71071 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-71104/">CVE-2025-71104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71104">CVE-2025-71104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71125/">CVE-2025-71125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71125">CVE-2025-71125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71134/">CVE-2025-71134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71134">CVE-2025-71134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71161/">CVE-2025-71161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71161">CVE-2025-71161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71182/">CVE-2025-71182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71182">CVE-2025-71182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71183/">CVE-2025-71183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71183">CVE-2025-71183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71184/">CVE-2025-71184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71184">CVE-2025-71184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71185/">CVE-2025-71185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71185">CVE-2025-71185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71186/">CVE-2025-71186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71186">CVE-2025-71186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71188/">CVE-2025-71188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71188">CVE-2025-71188 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71189/">CVE-2025-71189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71189">CVE-2025-71189 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71190/">CVE-2025-71190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71190">CVE-2025-71190 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71191/">CVE-2025-71191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71191">CVE-2025-71191 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71192/">CVE-2025-71192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71192">CVE-2025-71192 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71193/">CVE-2025-71193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71193">CVE-2025-71193 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71194/">CVE-2025-71194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71194">CVE-2025-71194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71195/">CVE-2025-71195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71195">CVE-2025-71195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71196/">CVE-2025-71196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71196">CVE-2025-71196 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71197/">CVE-2025-71197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71197">CVE-2025-71197 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71198/">CVE-2025-71198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71198">CVE-2025-71198 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71199/">CVE-2025-71199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71199">CVE-2025-71199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71200/">CVE-2025-71200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71200">CVE-2025-71200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71222/">CVE-2025-71222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71222">CVE-2025-71222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71224/">CVE-2025-71224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71224">CVE-2025-71224 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71225/">CVE-2025-71225 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71225">CVE-2025-71225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71229/">CVE-2025-71229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71229">CVE-2025-71229 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71231/">CVE-2025-71231 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71231">CVE-2025-71231 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71232/">CVE-2025-71232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71232">CVE-2025-71232 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71233/">CVE-2025-71233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71233">CVE-2025-71233 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71234/">CVE-2025-71234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71234">CVE-2025-71234 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71235/">CVE-2025-71235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71235">CVE-2025-71235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71236/">CVE-2025-71236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71236">CVE-2025-71236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22979/">CVE-2026-22979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22979">CVE-2026-22979 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-22980/">CVE-2026-22980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22980">CVE-2026-22980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22998/">CVE-2026-22998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23003/">CVE-2026-23003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23003">CVE-2026-23003 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23004/">CVE-2026-23004 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23004">CVE-2026-23004 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23010/">CVE-2026-23010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23010">CVE-2026-23010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23017/">CVE-2026-23017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23017">CVE-2026-23017 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23018/">CVE-2026-23018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23018">CVE-2026-23018 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23021/">CVE-2026-23021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23021">CVE-2026-23021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23022/">CVE-2026-23022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23022">CVE-2026-23022 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23023/">CVE-2026-23023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23023">CVE-2026-23023 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23024/">CVE-2026-23024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23024">CVE-2026-23024 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23026/">CVE-2026-23026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23026">CVE-2026-23026 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23030/">CVE-2026-23030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23030">CVE-2026-23030 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23031/">CVE-2026-23031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23031">CVE-2026-23031 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23033/">CVE-2026-23033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23033">CVE-2026-23033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23035/">CVE-2026-23035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23035">CVE-2026-23035 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23037/">CVE-2026-23037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23037">CVE-2026-23037 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23038/">CVE-2026-23038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23038">CVE-2026-23038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23042/">CVE-2026-23042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23042">CVE-2026-23042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23047/">CVE-2026-23047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23047">CVE-2026-23047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23049/">CVE-2026-23049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23049">CVE-2026-23049 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23050/">CVE-2026-23050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23050">CVE-2026-23050 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23053/">CVE-2026-23053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23053">CVE-2026-23053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23054/">CVE-2026-23054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23055/">CVE-2026-23055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23055">CVE-2026-23055 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23056/">CVE-2026-23056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23056">CVE-2026-23056 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23057/">CVE-2026-23057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23057">CVE-2026-23057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23058/">CVE-2026-23058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23058">CVE-2026-23058 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23059/">CVE-2026-23059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23059">CVE-2026-23059 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23060/">CVE-2026-23060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23061/">CVE-2026-23061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23061">CVE-2026-23061 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23062/">CVE-2026-23062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23062">CVE-2026-23062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23063/">CVE-2026-23063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23063">CVE-2026-23063 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23064/">CVE-2026-23064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23064">CVE-2026-23064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23065/">CVE-2026-23065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23065">CVE-2026-23065 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23066/">CVE-2026-23066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23066">CVE-2026-23066 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23068/">CVE-2026-23068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23068">CVE-2026-23068 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23069/">CVE-2026-23069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23069">CVE-2026-23069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23070/">CVE-2026-23070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23070">CVE-2026-23070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23071/">CVE-2026-23071 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23071">CVE-2026-23071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23073/">CVE-2026-23073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23073">CVE-2026-23073 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23076/">CVE-2026-23076 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23076">CVE-2026-23076 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23078/">CVE-2026-23078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23078">CVE-2026-23078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23080/">CVE-2026-23080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23080">CVE-2026-23080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23082/">CVE-2026-23082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23082">CVE-2026-23082 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23083/">CVE-2026-23083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23083">CVE-2026-23083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23084/">CVE-2026-23084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23084">CVE-2026-23084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23085/">CVE-2026-23085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23085">CVE-2026-23085 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2026-23086/">CVE-2026-23086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23086">CVE-2026-23086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23088/">CVE-2026-23088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23088">CVE-2026-23088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23089/">CVE-2026-23089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23090/">CVE-2026-23090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23090">CVE-2026-23090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23091/">CVE-2026-23091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23091">CVE-2026-23091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23094/">CVE-2026-23094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23094">CVE-2026-23094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23095/">CVE-2026-23095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23095">CVE-2026-23095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23096/">CVE-2026-23096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23096">CVE-2026-23096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23097/">CVE-2026-23097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23099/">CVE-2026-23099 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23099">CVE-2026-23099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23100/">CVE-2026-23100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23100">CVE-2026-23100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23101/">CVE-2026-23101 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23101">CVE-2026-23101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23102/">CVE-2026-23102 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23102">CVE-2026-23102 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23104/">CVE-2026-23104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23104">CVE-2026-23104 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23105/">CVE-2026-23105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23105">CVE-2026-23105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23107/">CVE-2026-23107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23107">CVE-2026-23107 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23108/">CVE-2026-23108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23108">CVE-2026-23108 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23110/">CVE-2026-23110 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23110">CVE-2026-23110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23111/">CVE-2026-23111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23112/">CVE-2026-23112 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23112">CVE-2026-23112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23116/">CVE-2026-23116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23116">CVE-2026-23116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23119/">CVE-2026-23119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23119">CVE-2026-23119 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23121/">CVE-2026-23121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23121">CVE-2026-23121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23123/">CVE-2026-23123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23123">CVE-2026-23123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23128/">CVE-2026-23128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23128">CVE-2026-23128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23129/">CVE-2026-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23129">CVE-2026-23129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23131/">CVE-2026-23131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23131">CVE-2026-23131 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23133/">CVE-2026-23133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23133">CVE-2026-23133 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23135/">CVE-2026-23135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23135">CVE-2026-23135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23136/">CVE-2026-23136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23136">CVE-2026-23136 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23137/">CVE-2026-23137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23137">CVE-2026-23137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23139/">CVE-2026-23139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23139">CVE-2026-23139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23141/">CVE-2026-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23141">CVE-2026-23141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23142/">CVE-2026-23142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23142">CVE-2026-23142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23144/">CVE-2026-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23145/">CVE-2026-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23145">CVE-2026-23145 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23146/">CVE-2026-23146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23146">CVE-2026-23146 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23148/">CVE-2026-23148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23148">CVE-2026-23148 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23150/">CVE-2026-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23150">CVE-2026-23150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23151/">CVE-2026-23151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23151">CVE-2026-23151 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23152/">CVE-2026-23152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23152">CVE-2026-23152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23154/">CVE-2026-23154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23154">CVE-2026-23154 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23155/">CVE-2026-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23155">CVE-2026-23155 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23156/">CVE-2026-23156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23156">CVE-2026-23156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23157/">CVE-2026-23157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23157">CVE-2026-23157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23158/">CVE-2026-23158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23158">CVE-2026-23158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23161/">CVE-2026-23161 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23161">CVE-2026-23161 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23163/">CVE-2026-23163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23163">CVE-2026-23163 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23166/">CVE-2026-23166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23166">CVE-2026-23166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23167/">CVE-2026-23167 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23167">CVE-2026-23167 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23169/">CVE-2026-23169 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23169">CVE-2026-23169 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23170/">CVE-2026-23170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23170">CVE-2026-23170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23171/">CVE-2026-23171 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23171">CVE-2026-23171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23172/">CVE-2026-23172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23172">CVE-2026-23172 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23173/">CVE-2026-23173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23173">CVE-2026-23173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23176/">CVE-2026-23176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23176">CVE-2026-23176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23177/">CVE-2026-23177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23177">CVE-2026-23177 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23178/">CVE-2026-23178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23178">CVE-2026-23178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23179/">CVE-2026-23179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23179">CVE-2026-23179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23182/">CVE-2026-23182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23182">CVE-2026-23182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23188/">CVE-2026-23188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23188">CVE-2026-23188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23189/">CVE-2026-23189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23189">CVE-2026-23189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23190/">CVE-2026-23190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23190">CVE-2026-23190 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23198/">CVE-2026-23198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23198">CVE-2026-23198 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23202/">CVE-2026-23202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23202">CVE-2026-23202 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23207/">CVE-2026-23207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23207">CVE-2026-23207 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23208/">CVE-2026-23208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23208">CVE-2026-23208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23210/">CVE-2026-23210 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23210">CVE-2026-23210 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23213/">CVE-2026-23213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23213">CVE-2026-23213 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23214/">CVE-2026-23214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23214">CVE-2026-23214 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23221/">CVE-2026-23221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23221">CVE-2026-23221 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23222/">CVE-2026-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23222">CVE-2026-23222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23223/">CVE-2026-23223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23223">CVE-2026-23223 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23224/">CVE-2026-23224 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23224">CVE-2026-23224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23229/">CVE-2026-23229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23229">CVE-2026-23229 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23230/">CVE-2026-23230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23230">CVE-2026-23230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052261" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052262" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052263" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052261" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052262" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052263" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94562" version="1" class="patch">
	<metadata>
		<title>Security update for the initial kernel livepatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:20942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045210.html" source="SUSE-SU"/>
		<description>


This update contains initial livepatches for the SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel update.

		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051993" comment="kernel-livepatch-6_12_0-160000_27-default-1-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051993" comment="kernel-livepatch-6_12_0-160000_27-default-1-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94563" version="1" class="patch">
	<metadata>
		<title>Security update for python-black (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259546" ref_url="https://bugzilla.suse.com/1259546" source="BUGZILLA"/>
		<reference ref_id="1259608" ref_url="https://bugzilla.suse.com/1259608" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-31900" ref_url="https://www.suse.com/security/cve/CVE-2026-31900/" source="CVE"/>
		<reference ref_id="CVE-2026-32274" ref_url="https://www.suse.com/security/cve/CVE-2026-32274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20928-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045224.html" source="SUSE-SU"/>
		<description>
This update for python-black fixes the following issues:

- CVE-2026-31900: a malicious pyproject.toml edit can lead to arbitrary code execution (bsc#1259546).
- CVE-2026-32274: arbitrary file writes from unsanitized user input in cache file name (bsc#1259608).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259546">SUSE bug 1259546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259608">SUSE bug 1259608</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31900/">CVE-2026-31900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31900">CVE-2026-31900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32274/">CVE-2026-32274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32274">CVE-2026-32274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051873" comment="python313-black-25.1.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051873" comment="python313-black-25.1.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94564" version="1" class="patch">
	<metadata>
		<title>Security update for python-pyasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259803" ref_url="https://bugzilla.suse.com/1259803" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-30922" ref_url="https://www.suse.com/security/cve/CVE-2026-30922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045223.html" source="SUSE-SU"/>
		<description>
This update for python-pyasn1 fixes the following issue:

- CVE-2026-30922: Denial of Service via Unbounded Recursion (bsc#1259803).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259803">SUSE bug 1259803</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30922/">CVE-2026-30922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30922">CVE-2026-30922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051874" comment="python313-pyasn1-0.6.1-160000.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051874" comment="python313-pyasn1-0.6.1-160000.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94565" version="1" class="patch">
	<metadata>
		<title>Security update for python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259804" ref_url="https://bugzilla.suse.com/1259804" source="BUGZILLA"/>
		<reference ref_id="1259808" ref_url="https://bugzilla.suse.com/1259808" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-27448" ref_url="https://www.suse.com/security/cve/CVE-2026-27448/" source="CVE"/>
		<reference ref_id="CVE-2026-27459" ref_url="https://www.suse.com/security/cve/CVE-2026-27459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045222.html" source="SUSE-SU"/>
		<description>
This update for python-pyOpenSSL fixes the following issues:

- CVE-2026-27448: unhandled exception can result in connection not being cancelled (bsc#1259804).
- CVE-2026-27459: large cookie value can lead to a buffer overflow (bsc#1259808).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259804">SUSE bug 1259804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259808">SUSE bug 1259808</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27448/">CVE-2026-27448 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27448">CVE-2026-27448 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27459/">CVE-2026-27459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27459">CVE-2026-27459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051875" comment="python313-pyOpenSSL-25.0.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051875" comment="python313-pyOpenSSL-25.0.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94566" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1256624" ref_url="https://bugzilla.suse.com/1256624" source="BUGZILLA"/>
		<reference ref_id="1256644" ref_url="https://bugzilla.suse.com/1256644" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045209.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise Kernel 6.12.0-160000.9.1 fixes various security issues

The following security issues were fixed:

- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256624).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256644">SUSE bug 1256644</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051995" comment="kernel-default 6.12.0-160000.9 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010051996" comment="kernel-livepatch-6_12_0-160000_9-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010051997" comment="kernel-livepatch-6_12_0-160000_9-default-2-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051995" comment="kernel-default 6.12.0-160000.9 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010051996" comment="kernel-livepatch-6_12_0-160000_9-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010051997" comment="kernel-livepatch-6_12_0-160000_9-default-2-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94567" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255052" ref_url="https://bugzilla.suse.com/1255052" source="BUGZILLA"/>
		<reference ref_id="1255053" ref_url="https://bugzilla.suse.com/1255053" source="BUGZILLA"/>
		<reference ref_id="1255378" ref_url="https://bugzilla.suse.com/1255378" source="BUGZILLA"/>
		<reference ref_id="1255402" ref_url="https://bugzilla.suse.com/1255402" source="BUGZILLA"/>
		<reference ref_id="1255895" ref_url="https://bugzilla.suse.com/1255895" source="BUGZILLA"/>
		<reference ref_id="1256624" ref_url="https://bugzilla.suse.com/1256624" source="BUGZILLA"/>
		<reference ref_id="1256644" ref_url="https://bugzilla.suse.com/1256644" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise Kernel 6.12.0-160000.8.1 fixes various security issues

The following security issues were fixed:

- CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1255052).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1255053).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255895).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255378).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255402).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256624).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255052">SUSE bug 1255052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255053">SUSE bug 1255053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255378">SUSE bug 1255378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255895">SUSE bug 1255895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256644">SUSE bug 1256644</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047335" comment="kernel-default 6.12.0-160000.8 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010047336" comment="kernel-livepatch-6_12_0-160000_8-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047335" comment="kernel-default 6.12.0-160000.8 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010047336" comment="kernel-livepatch-6_12_0-160000_8-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94568" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg-7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246790" ref_url="https://bugzilla.suse.com/1246790" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-7700" ref_url="https://www.suse.com/security/cve/CVE-2025-7700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045220.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg-7 fixes the following issues:

- Updated to version 7.1.2:
  * avcodec/librsvgdec: fix compilation with librsvg 2.50.3
  * libavfilter/af_firequalizer: Add check for av_malloc_array()
  * avcodec/libsvtav1: unbreak build with latest svtav1
  * avformat/hls: Fix Youtube AAC
  * Various bugfixes.
  * CVE-2025-7700: Fixed NULL Pointer Dereference in ALS Decoder (bsc#1246790)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246790">SUSE bug 1246790</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7700/">CVE-2025-7700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7700">CVE-2025-7700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051876" comment="ffmpeg-7-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051885" comment="libavcodec61-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051886" comment="libavdevice61-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051887" comment="libavfilter10-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051888" comment="libavformat61-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051889" comment="libavutil59-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051890" comment="libpostproc58-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051891" comment="libswresample5-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051892" comment="libswscale8-7.1.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051876" comment="ffmpeg-7-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051885" comment="libavcodec61-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051886" comment="libavdevice61-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051887" comment="libavfilter10-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051888" comment="libavformat61-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051889" comment="libavutil59-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051890" comment="libpostproc58-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051891" comment="libswresample5-7.1.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051892" comment="libswscale8-7.1.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94569" version="1" class="patch">
	<metadata>
		<title>Security update for python-ldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251912" ref_url="https://bugzilla.suse.com/1251912" source="BUGZILLA"/>
		<reference ref_id="1251913" ref_url="https://bugzilla.suse.com/1251913" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61911" ref_url="https://www.suse.com/security/cve/CVE-2025-61911/" source="CVE"/>
		<reference ref_id="CVE-2025-61912" ref_url="https://www.suse.com/security/cve/CVE-2025-61912/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045219.html" source="SUSE-SU"/>
		<description>
This update for python-ldap fixes the following issues:

- CVE-2025-61911: Enforce str for escape_filter_chars (bsc#1251912).
- CVE-2025-61912: Escape NULs as per RFC 4514 in escape_dn_chars (bsc#1251913).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1251912">SUSE bug 1251912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251913">SUSE bug 1251913</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-61911/">CVE-2025-61911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61911">CVE-2025-61911 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-61912/">CVE-2025-61912 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61912">CVE-2025-61912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051893" comment="python313-ldap-3.4.4-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051893" comment="python313-ldap-3.4.4-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94570" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyJWT (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259616" ref_url="https://bugzilla.suse.com/1259616" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-32597" ref_url="https://www.suse.com/security/cve/CVE-2026-32597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045218.html" source="SUSE-SU"/>
		<description>
This update for python-PyJWT fixes the following issue:

Update to PyJWT 2.12.1:

- CVE-2026-32597: PyJWT accepts unknown `crit` header extensions (bsc#1259616).

Changelog:

Update to 2.12.1:

 - Add missing typing_extensions dependency for Python &lt; 3.11 in
   #1150

Update to 2.12.0:

 - Annotate PyJWKSet.keys for pyright by @tamird in #1134
 - Close HTTPError response to prevent ResourceWarning on
   Python 3.14 by @veeceey in #1133
 - Do not keep algorithms dict in PyJWK instances by @akx in
   #1143
 - Use PyJWK algorithm when encoding without explicit
   algorithm in #1148
 - Docs: Add PyJWKClient API reference and document the
   two-tier caching system (JWK Set cache and signing key LRU
   cache).

Update to 2.11.0:

 - Enforce ECDSA curve validation per RFC 7518 Section 3.4.
 - Fix build system warnings by @kurtmckee in #1105
 - Validate key against allowed types for Algorithm family in
   #964
 - Add iterator for JWKSet in #1041
 - Validate iss claim is a string during encoding and decoding
   by @pachewise in #1040
 - Improve typing/logic for options in decode, decode_complete
    by @pachewise in #1045
 - Declare float supported type for lifespan and timeout by
   @nikitagashkov in #1068
 - Fix SyntaxWarnings/DeprecationWarnings caused by invalid
   escape sequences by @kurtmckee in #1103
 - Development: Build a shared wheel once to speed up test
   suite setup times by @kurtmckee in #1114
 - Development: Test type annotations across all supported
   Python versions, increase the strictness of the type
   checking, and remove the mypy pre-commit hook by @kurtmckee
   in #1112
 - Support Python 3.14, and test against PyPy 3.10 and 3.11 by
   @kurtmckee in #1104
 - Development: Migrate to build to test package building in
   CI by @kurtmckee in #1108
 - Development: Improve coverage config and eliminate unused
   test suite code by @kurtmckee in #1115
 - Docs: Standardize CHANGELOG links to PRs by @kurtmckee in
   #1110
 - Docs: Fix Read the Docs builds by @kurtmckee in #1111
 - Docs: Add example of using leeway with nbf by @djw8605 in
   #1034
 - Docs: Refactored docs with autodoc; added PyJWS and
   jwt.algorithms docs by @pachewise in #1045
 - Docs: Documentation improvements for "sub" and "jti" claims
   by @cleder in #1088
 - Development: Add pyupgrade as a pre-commit hook by
   @kurtmckee in #1109
 - Add minimum key length validation for HMAC and RSA keys
   (CWE-326). Warns by default via InsecureKeyLengthWarning
   when keys are below minimum recommended lengths per RFC
   7518 Section 3.2 (HMAC) and NIST SP 800-131A (RSA). Pass
   enforce_minimum_key_length=True in options to PyJWT or
   PyJWS to raise InvalidKeyError instead.
 - Refactor PyJWT to own an internal PyJWS instance instead of
   calling global api_jws functions.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259616">SUSE bug 1259616</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32597/">CVE-2026-32597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32597">CVE-2026-32597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051999" comment="python313-PyJWT-2.12.1-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051999" comment="python313-PyJWT-2.12.1-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94571" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247240" ref_url="https://bugzilla.suse.com/1247240" source="BUGZILLA"/>
		<reference ref_id="1255052" ref_url="https://bugzilla.suse.com/1255052" source="BUGZILLA"/>
		<reference ref_id="1255053" ref_url="https://bugzilla.suse.com/1255053" source="BUGZILLA"/>
		<reference ref_id="1255378" ref_url="https://bugzilla.suse.com/1255378" source="BUGZILLA"/>
		<reference ref_id="1255402" ref_url="https://bugzilla.suse.com/1255402" source="BUGZILLA"/>
		<reference ref_id="1255895" ref_url="https://bugzilla.suse.com/1255895" source="BUGZILLA"/>
		<reference ref_id="1256624" ref_url="https://bugzilla.suse.com/1256624" source="BUGZILLA"/>
		<reference ref_id="1256644" ref_url="https://bugzilla.suse.com/1256644" source="BUGZILLA"/>
		<reference ref_id="1257669" ref_url="https://bugzilla.suse.com/1257669" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-38488" ref_url="https://www.suse.com/security/cve/CVE-2025-38488/" source="CVE"/>
		<reference ref_id="CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40284" ref_url="https://www.suse.com/security/cve/CVE-2025-40284/" source="CVE"/>
		<reference ref_id="CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise Kernel 6.12.0-160000.5.1 fixes various security issues

The following security issues were fixed:

- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247240).
- CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1255052).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1255053).
- CVE-2025-40284: Bluetooth: MGMT: cancel mesh send timer when hdev removed (bsc#1257669).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255895).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255378).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255402).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256624).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1247240">SUSE bug 1247240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255052">SUSE bug 1255052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255053">SUSE bug 1255053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255378">SUSE bug 1255378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255895">SUSE bug 1255895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256644">SUSE bug 1256644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257669">SUSE bug 1257669</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38488/">CVE-2025-38488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40284/">CVE-2025-40284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040504" comment="kernel-default 6.12.0-160000.5 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010040505" comment="kernel-livepatch-6_12_0-160000_5-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040504" comment="kernel-default 6.12.0-160000.5 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010040505" comment="kernel-livepatch-6_12_0-160000_5-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94572" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255052" ref_url="https://bugzilla.suse.com/1255052" source="BUGZILLA"/>
		<reference ref_id="1255053" ref_url="https://bugzilla.suse.com/1255053" source="BUGZILLA"/>
		<reference ref_id="1255378" ref_url="https://bugzilla.suse.com/1255378" source="BUGZILLA"/>
		<reference ref_id="1255402" ref_url="https://bugzilla.suse.com/1255402" source="BUGZILLA"/>
		<reference ref_id="1255895" ref_url="https://bugzilla.suse.com/1255895" source="BUGZILLA"/>
		<reference ref_id="1256624" ref_url="https://bugzilla.suse.com/1256624" source="BUGZILLA"/>
		<reference ref_id="1256644" ref_url="https://bugzilla.suse.com/1256644" source="BUGZILLA"/>
		<reference ref_id="1257669" ref_url="https://bugzilla.suse.com/1257669" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40284" ref_url="https://www.suse.com/security/cve/CVE-2025-40284/" source="CVE"/>
		<reference ref_id="CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise Kernel 6.12.0-160000.6.1 fixes various security issues

The following security issues were fixed:

- CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1255052).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1255053).
- CVE-2025-40284: Bluetooth: MGMT: cancel mesh send timer when hdev removed (bsc#1257669).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255895).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255378).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255402).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256624).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255052">SUSE bug 1255052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255053">SUSE bug 1255053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255378">SUSE bug 1255378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255895">SUSE bug 1255895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256644">SUSE bug 1256644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257669">SUSE bug 1257669</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40284/">CVE-2025-40284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041336" comment="kernel-default 6.12.0-160000.6 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010041337" comment="kernel-livepatch-6_12_0-160000_6-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94573" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1255052" ref_url="https://bugzilla.suse.com/1255052" source="BUGZILLA"/>
		<reference ref_id="1255053" ref_url="https://bugzilla.suse.com/1255053" source="BUGZILLA"/>
		<reference ref_id="1255378" ref_url="https://bugzilla.suse.com/1255378" source="BUGZILLA"/>
		<reference ref_id="1255402" ref_url="https://bugzilla.suse.com/1255402" source="BUGZILLA"/>
		<reference ref_id="1255895" ref_url="https://bugzilla.suse.com/1255895" source="BUGZILLA"/>
		<reference ref_id="1256624" ref_url="https://bugzilla.suse.com/1256624" source="BUGZILLA"/>
		<reference ref_id="1256644" ref_url="https://bugzilla.suse.com/1256644" source="BUGZILLA"/>
		<reference ref_id="1257669" ref_url="https://bugzilla.suse.com/1257669" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40284" ref_url="https://www.suse.com/security/cve/CVE-2025-40284/" source="CVE"/>
		<reference ref_id="CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
		<description>

This update for the SUSE Linux Enterprise Kernel 6.12.0-160000.7.1 fixes various security issues

The following security issues were fixed:

- CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1255052).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1255053).
- CVE-2025-40284: Bluetooth: MGMT: cancel mesh send timer when hdev removed (bsc#1257669).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255895).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255378).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255402).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256624).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255052">SUSE bug 1255052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255053">SUSE bug 1255053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255378">SUSE bug 1255378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255895">SUSE bug 1255895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256644">SUSE bug 1256644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257669">SUSE bug 1257669</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40284/">CVE-2025-40284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039722" comment="kernel-default 6.12.0-160000.7 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010039723" comment="kernel-livepatch-6_12_0-160000_7-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039722" comment="kernel-default 6.12.0-160000.7 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2010039723" comment="kernel-livepatch-6_12_0-160000_7-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94574" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251194" ref_url="https://bugzilla.suse.com/1251194" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61962" ref_url="https://www.suse.com/security/cve/CVE-2025-61962/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045217.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2025-61962: Fixed denial of service (bsc#1251194)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1251194">SUSE bug 1251194</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-61962/">CVE-2025-61962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61962">CVE-2025-61962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052264" comment="fetchmail-6.5.2-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052264" comment="fetchmail-6.5.2-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94575" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259177" ref_url="https://bugzilla.suse.com/1259177" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-27622" ref_url="https://www.suse.com/security/cve/CVE-2026-27622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045216.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issue:

- CVE-2026-27622: crafted multipart deep EXR can cause an heap out-of-bound write (bsc#1259177).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259177">SUSE bug 1259177</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27622/">CVE-2026-27622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27622">CVE-2026-27622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052265" comment="libIex-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052266" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052267" comment="libIlmThread-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052268" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052269" comment="libOpenEXR-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052270" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052271" comment="libOpenEXRCore-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052272" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052273" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052274" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052275" comment="openexr-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052276" comment="openexr-doc-3.2.2-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052265" comment="libIex-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052266" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052267" comment="libIlmThread-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052268" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052269" comment="libOpenEXR-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052270" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052271" comment="libOpenEXRCore-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052272" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052273" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052274" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052275" comment="openexr-3.2.2-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052276" comment="openexr-doc-3.2.2-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94576" version="1" class="patch">
	<metadata>
		<title>Security update for net-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1243581" ref_url="https://bugzilla.suse.com/1243581" source="BUGZILLA"/>
		<reference ref_id="1248410" ref_url="https://bugzilla.suse.com/1248410" source="BUGZILLA"/>
		<reference ref_id="1248687" ref_url="https://bugzilla.suse.com/1248687" source="BUGZILLA"/>
		<reference ref_id="142461" ref_url="https://bugzilla.suse.com/142461" source="BUGZILLA"/>
		<reference ref_id="430864" ref_url="https://bugzilla.suse.com/430864" source="BUGZILLA"/>
		<reference ref_id="544339" ref_url="https://bugzilla.suse.com/544339" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-46836" ref_url="https://www.suse.com/security/cve/CVE-2025-46836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045212.html" source="SUSE-SU"/>
		<description>
This update for net-tools fixes the following issues:

- Fix stack buffer overflow in parse_hex (bsc#1248687, GHSA-h667-qrp8-gj58).
- Fix stack-based buffer overflow in proc_gen_fmt (bsc#1248687, GHSA-w7jq-cmw2-cq59).
- Avoid unsafe memcpy in ifconfig (bsc#1248687).
- Prevent overflow in ax25 and netrom (bsc#1248687)
- Keep possibility to enter long interface names, even if they are
  not accepted by the kernel, because it was always possible up to
  CVE-2025-46836 fix. But issue a warning about an interface name
  concatenation (bsc#1248410).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243581">SUSE bug 1243581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248410">SUSE bug 1248410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248687">SUSE bug 1248687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/142461">SUSE bug 142461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/430864">SUSE bug 430864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/544339">SUSE bug 544339</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46836/">CVE-2025-46836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46836">CVE-2025-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052277" comment="net-tools-2.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052278" comment="net-tools-lang-2.10-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052277" comment="net-tools-2.10-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052278" comment="net-tools-lang-2.10-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94577" version="1" class="patch">
	<metadata>
		<title>Security update for docker-compose (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252752" ref_url="https://bugzilla.suse.com/1252752" source="BUGZILLA"/>
		<reference ref_id="1253584" ref_url="https://bugzilla.suse.com/1253584" source="BUGZILLA"/>
		<reference ref_id="1254041" ref_url="https://bugzilla.suse.com/1254041" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="CVE-2025-62725" ref_url="https://www.suse.com/security/cve/CVE-2025-62725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
		<description>
This update for docker-compose fixes the following issues:

- CVE-2025-47913: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in
  response to a key listing or signing request (bsc#1253584).
- CVE-2025-47914: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds
  read (bsc#1254041).
- CVE-2025-62725: OCI compose artifacts can be used to escape the cache directory and overwrite arbitrary files
  (bsc#1252752).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252752">SUSE bug 1252752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253584">SUSE bug 1253584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254041">SUSE bug 1254041</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-62725/">CVE-2025-62725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62725">CVE-2025-62725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94578" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1260083" ref_url="https://bugzilla.suse.com/1260083" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox 140.9.0 ESR (MFSA 2026-22, bsc#1260083):

  - CVE-2026-4684: Race condition, use-after-free in the Graphics: WebRender component
  - CVE-2026-4685: Incorrect boundary conditions in the Graphics: Canvas2D component
  - CVE-2026-4686: Incorrect boundary conditions in the Graphics: Canvas2D component
  - CVE-2026-4687: Sandbox escape due to incorrect boundary conditions in the Telemetry component
  - CVE-2026-4688: Sandbox escape due to use-after-free in the Disability Access APIs component
  - CVE-2026-4689: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
  - CVE-2026-4690: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
  - CVE-2026-4691: Use-after-free in the CSS Parsing and Computation component
  - CVE-2026-4692: Sandbox escape in the Responsive Design Mode component
  - CVE-2026-4693: Incorrect boundary conditions in the Audio/Video: Playback component
  - CVE-2026-4694: Incorrect boundary conditions, integer overflow in the Graphics component
  - CVE-2026-4695: Incorrect boundary conditions in the Audio/Video: Web Codecs component
  - CVE-2026-4696: Use-after-free in the Layout: Text and Fonts component
  - CVE-2026-4697: Incorrect boundary conditions in the Audio/Video: Web Codecs component
  - CVE-2026-4698: JIT miscompilation in the JavaScript Engine: JIT component
  - CVE-2026-4699: Incorrect boundary conditions in the Layout: Text and Fonts component
  - CVE-2026-4700: Mitigation bypass in the Networking: HTTP component
  - CVE-2026-4701: Use-after-free in the JavaScript Engine component
  - CVE-2026-4702: JIT miscompilation in the JavaScript Engine component
  - CVE-2026-4704: Denial-of-service in the WebRTC: Signaling component
  - CVE-2026-4705: Undefined behavior in the WebRTC: Signaling component
  - CVE-2026-4706: Incorrect boundary conditions in the Graphics: Canvas2D component
  - CVE-2026-4707: Incorrect boundary conditions in the Graphics: Canvas2D component
  - CVE-2026-4708: Incorrect boundary conditions in the Graphics component
  - CVE-2026-4709: Incorrect boundary conditions in the Audio/Video: GMP component
  - CVE-2026-4710: Incorrect boundary conditions in the Audio/Video component
  - CVE-2026-4711: Use-after-free in the Widget: Cocoa component
  - CVE-2026-4712: Information disclosure in the Widget: Cocoa component
  - CVE-2026-4713: Incorrect boundary conditions in the Graphics component
  - CVE-2026-4714: Incorrect boundary conditions in the Audio/Video component
  - CVE-2026-4715: Uninitialized memory in the Graphics: Canvas2D component
  - CVE-2026-4716: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component
  - CVE-2026-4717: Privilege escalation in the Netmonitor component
  - CVE-2025-59375: Denial-of-service in the XML component
  - CVE-2026-4718: Undefined behavior in the WebRTC: Signaling component
  - CVE-2026-4719: Incorrect boundary conditions in the Graphics: Text component
  - CVE-2026-4720: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and
    Thunderbird 149
  - CVE-2026-4721: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9,
    Firefox 149 and Thunderbird 149
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94579" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252110" ref_url="https://bugzilla.suse.com/1252110" source="BUGZILLA"/>
		<reference ref_id="1252232" ref_url="https://bugzilla.suse.com/1252232" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

- Update to runc v1.3.3:
  * CVE-2025-31133, CVE-2025-52565, CVE-2025-52881: Fixed container breakouts by bypassing
    runc's restrictions for writing to arbitrary /proc files (bsc#1252232)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-20"/>
	<updated date="2025-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252110">SUSE bug 1252110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94580" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252753" ref_url="https://bugzilla.suse.com/1252753" source="BUGZILLA"/>
		<reference ref_id="1252756" ref_url="https://bugzilla.suse.com/1252756" source="BUGZILLA"/>
		<reference ref_id="1252905" ref_url="https://bugzilla.suse.com/1252905" source="BUGZILLA"/>
		<reference ref_id="1253460" ref_url="https://bugzilla.suse.com/1253460" source="BUGZILLA"/>
		<reference ref_id="1258371" ref_url="https://bugzilla.suse.com/1258371" source="BUGZILLA"/>
		<reference ref_id="1258385" ref_url="https://bugzilla.suse.com/1258385" source="BUGZILLA"/>
		<reference ref_id="1258387" ref_url="https://bugzilla.suse.com/1258387" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<reference ref_id="CVE-2025-55754" ref_url="https://www.suse.com/security/cve/CVE-2025-55754/" source="CVE"/>
		<reference ref_id="CVE-2025-61795" ref_url="https://www.suse.com/security/cve/CVE-2025-61795/" source="CVE"/>
		<reference ref_id="CVE-2025-66614" ref_url="https://www.suse.com/security/cve/CVE-2025-66614/" source="CVE"/>
		<reference ref_id="CVE-2026-24733" ref_url="https://www.suse.com/security/cve/CVE-2026-24733/" source="CVE"/>
		<reference ref_id="CVE-2026-24734" ref_url="https://www.suse.com/security/cve/CVE-2026-24734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
		<description>
This update for tomcat10 fixes the following issues:

Update to Tomcat 10.1.52:

- CVE-2025-55752: directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753).
- CVE-2025-55754: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat
  (bsc#1252905).
- CVE-2025-61795: temporary copies during the processing of multipart upload can lead to a denial of service
  (bsc#1252756).
- CVE-2025-66614: client certificate verification bypass due to virtual host mapping (bsc#1258371).
- CVE-2026-24733: improper input validation on HTTP/0.9 requests (bsc#1258385).
- CVE-2026-24734: certificate revocation bypass due to incomplete OCSP verification checks (bsc#1258387).

Changelog:

 + Fix: 69623: Additional fix for the long standing regression that meant
 that calls to ClassLoader.getResource().getContent() failed when made from
 within a web application with resource caching enabled if the target
 resource was packaged in a JAR file. (markt)
 + Fix: Pull request #923: Avoid adding multiple CSRF tokens to a URL in the
 CsrfPreventionFilter. (schultz)
 + Fix: 69918: Ensure request parameters are correctly parsed for HTTP/2
 requests when the content-length header is not set. (dsoumis)
 + Update: Enable minimum and recommended Tomcat Native versions to be set
 separately for Tomcat Native 1.x and 2.x. Update the minimum and
 recommended versions for Tomcat Native 1.x to 1.3.4. Update the minimum
 and recommended versions for Tomcat Native 2.x to 2.0.12. (markt)
 + Add: Add a new ssoReauthenticationMode to the Tomcat provided
 Authenticators that provides a per Authenticator override of the SSO Valve
 requireReauthentication attribute. (markt)
 + Fix: Ensure URL encoding errors in the Rewrite Valve trigger an exception
 rather than silently using a replacement character. (markt)
 + Fix: 69932: Fix request end access log pattern regression, which would log
 the start time of the request instead. (remm)
 + Fix: 69871: Increase log level to INFO for missing configuration for the
 rewrite valve. (remm)
 + Fix: Add log warnings for additional Host appBase suspicious values.
 (remm)
 + Fix: Remove hard dependency on tomcat-jni.jar for catalina.jar.
 org.apache.catalina.Connector no longer requires
 org.apache.tomcat.jni.AprStatus to be present. (markt)
 + Add: Add the ability to use a custom function to generate the client
 identifier in the CrawlerSessionManagerValve. This is only available
 programmatically. Pull request #902 by Brian Matzon. (markt)
 + Fix: Change the SSO reauthentication behaviour for SPNEGO authentication
 so that a normal SPNEGO authentication is performed if the SSL Valve is
 configured with reauthentication enabled. This is so that the delegated
 credentials will be available to the web application. (markt)
 + Fix: When generating the class path in the Loader, re-order the check on
 individual class path components to avoid a potential
 NullPointerException. Identified by Coverity Scan. (markt)
 + Fix: Fix SSL socket factory configuration in the JNDI realm. Based on pull
 request #915 by Joshua Rogers. (remm)
 + Update: Add an attribute, digestInRfc3112Order, to
 MessageDigestCredentialHandler to control the order in which the
 credential and salt are digested. By default, the current, non-RFC 3112
 compliant, order of salt then credential will be used. This default will
 change in Tomcat 12 to the RFC 3112 compliant order of credential then
 salt. (markt)
 + Fix: Log warnings when the SSO configuration does not comply with the
 documentation. (remm)
 + Update: Deprecate the RemoteAddrFilter and RemoteAddrValve in favour of
 the RemoteCIDRFilter and RemoteCIDRValve. (markt)
 + Fix: 69837: Fix corruption of the class path generated by the Loader when
 running on Windows. (markt)
 + Fix: Reject requests that map to invalid Windows file names earlier.
 (markt)
 + Fix: 69839: Ensure that changes to session IDs (typically after
 authentication) are promulgated to the SSO Valve to ensure that SSO
 entries are fully clean-up on session expiration. Patch provided by Kim
 Johan Andersson. (markt)
 + Fix: Fix a race condition in the creation of the storage location for the
 FileStore. (markt)
 * Cluster
 + Add: 62814: Document that human-readable names may be used for
 mapSendOptions and align documentation with channelSendOptions. Based on
 pull request #929 by archan0621. (markt)
 * Clustering
 + Fix: Correct a regression introduced in 10.1.45 that broke some clustering
 configurations. (markt)
 * Coyote
 + Fix: 69936: Fix bug in previous fix for Tomcat Native crashes on shutdown
 that triggered a significant memory leak. Patch provided by Wes. (markt)
 + Fix: Avoid possible NPEs when using a TLS enabled custom connector. (remm)
 + Fix: Improve warnings when setting ciphers lists in the FFM code,
 mirroring the tomcat-native changes. (remm)
 + Fix: 69910: Dereference TLS objects right after closing a socket to
 improve memory efficiency. (remm)
 + Fix: Relax the JSSE vs OpenSSL configuration style checks on SSLHostConfig
 to reflect the existing implementation that allows one configuration style
 to be used for the trust attributes and a different style for all the
 other attributes. (markt)
 + Fix: Better warning message when OpenSSLConf configuration elements are
 used with a JSSE TLS implementation. (markt)
 + Fix: When using OpenSSL via FFM, don't log a warning about missing CA
 certificates unless CA certificates were configured and the configuration
 failed. (markt)
 + Add: For configuration consistency between OpenSSL and JSSE TLS
 implementations, TLSv1.3 cipher suites included in the ciphers attribute
 of an SSLHostConfig are now always ignored (previously they would be
 ignored with OpenSSL implementations and used with JSSE implementations)
 and a warning is logged that the cipher suite has been ignored. (markt)
 + Add: Add the ciphersuite attribute to SSLHostConfig to configure the
 TLSv1.3 cipher suites. (markt)
 + Add: Add OCSP support to JSSE based TLS connectors and make the use of
 OCSP configurable per connector for both JSSE and OpenSSL based TLS
 implementations. Align the checks performed by OpenSSL with those
 performed by JSSE. (markt)
 + Add: Add support for soft failure of OCSP checks with soft failure support
 disabled by default. (markt)
 + Add: Add support for configuring the verification flags passed to
 OCSP_basic_verify when using an OpenSSL based TLS implementation. (markt)
 + Fix: Fix OpenSSL FFM code compatibility with LibreSSL versions below 3.5.
 + Fix: Prevent concurrent release of OpenSSLEngine resources and the
 termination of the Tomcat Native library as it can cause crashes during
 Tomcat shutdown. (markt)
 + Fix: Don't log an incorrect certificate KeyStore location when creating a
 TLS connector if the KeyStore instance has been set directly on the
 connector. (markt)
 + Fix: HTTP/0.9 only allows GET as the HTTP method. (remm)
 + Add: Add strictSni attribute on the Connector to allow matching the
 SSLHostConfig configuration associated with the SNI host name to the
 SSLHostConfig configuration matched from the HTTP protocol host name. Non
 matching configurations will cause the request to be rejected. The
 attribute default value is true, enabling the matching. (remm)
 + Fix: Graceful failure for OCSP on BoringSSL in the FFM code. (remm)
 + Fix: Fix use of deferAccept attribute in JMX, since it is normally only
 removed in Tomcat 11. (remm)
 + Fix: 69866: Fix a memory leak when using a trust store with the OpenSSL
 provider. Pull request #912 by aogburn. (markt)
 + Fix: Fix potential crash on shutdown when a Connector depends on the
 Tomcat Native library. (markt)
 + Fix: Fix AJP message length check. Pull request #916 by Joshua Rogers.
 + Fix: 69848: Fix copy/paste errors in 10.1.47 that meant DELETE requests
 received via the AJP connector were processed as OPTIONS requests and
 PROPFIND requests were processed as TRACE. (markt)
 + Fix: Various OCSP processing issues in the OpenSSL FFM code. (dsoumis)
 * General
 + Add: Add test.silent property to suppress JUnit console output during test
 execution. Useful for cleaner console output when running tests with
 multiple threads. (csutherl)
 * Jasper
 + Fix: 69333: Correct a regression in the previous fix for 69333 and ensure
 that reuse() or release() is always called for a tag. (markt)
 + Fix: 69877: Catch IllegalArgumentException when processing URIs when
 creating the classpath to handle invalid URIs. (remm)
 + Fix: Fix populating the classpath with the webapp classloader
 repositories. (remm)
 + Fix: 69862: Avoid NPE unwrapping Servlet exception which would hide some
 exception details. Patch submitted by Eric Blanquer. (remm)
 * Jdbc-pool
 + Fix: 64083: If the underlying connection has been closed, don't add it to
 the pool when it is returned. Pull request #235 by Alex Panchenko. (markt)
 * Web applications
 + Fix: Manager: Fix abrupt truncation of the HTML and JSON complete server
 status output if one or more of the web applications failed to start.
 (schultz)
 + Add: Manager: Include web application state in the HTML and JSON complete
 server status output. (markt)
 + Add: Documentation: Expand the documentation to better explain when OCSP
 is supported and when it is not. (markt)
 * Websocket
 + Fix: 69920: When attempting to write to a closed Writer or OutputStream
 obtained from a WebSocket session, throw an IOException rather than an
 IllegalStateExcpetion as required by Writer and strongly suggested by
 OutputStream. (markt)
 + Fix: 69845: When using permessage-deflate with Java 25 onwards, handle the
 underlying Inflater and/or Deflater throwing IllegalStateException when
 closed rather than NullPointerException as they do in Java 24 and earlier.
 * Other
 + Update: Update the internal fork of Commons Pool to 2.13.1. (markt)
 + Update: Update the internal fork of Commons DBCP to 2.14.0. (markt)
 + Update: Update Commons Daemon to 1.5.1. (markt)
 + Update: Update ByteBuddy to 1.18.3. (markt)
 + Update: Update UnboundID to 7.0.4. (markt)
 + Update: Update Checkstyle to 12.3.1. (markt)
 + Add: Improvements to French translations. (markt)
 + Add: Improvements to Japanese translations provided by tak7iji. (markt)
 + Add: Improvements to Chinese translations provided by Yang. vincent.h and
 yong hu. (markt)
 + Update: Update Tomcat Native to 2.0.12. (markt)
 + Add: Add property "gpg.sign.files" to optionally disable release artefact
 signing with GPG. (rjung)
 + Add: Add test profile system for selective test execution. Profiles can be
 specified via -Dtest.profile=&lt;name&gt; to run specific test subsets without
 using patterns directly. Profile patterns are defined in
 test-profiles.properties. (csutherl)
 + Update: Update file extension to media type mappings to align with the
 current list used by the Apache Web Server (httpd). (markt)
 + Update: Update the packaged version of the Tomcat Migration Tool for
 Jakarta EE to 1.0.10. (markt)
 + Update: Update Commons Daemon to 1.5.0. (markt)
 + Update: Update Byte Buddy to 1.18.2. (markt)
 + Update: Update Checkstyle to 12.2.0. (markt)
 + Add: Improvements to Spanish translations provided by White Vogel. (markt)
 + Add: Improvements to French translations. (remm)
 + Update: Update the internal fork of Apache Commons BCEL to 6.11.0. (markt)
 + Update: Update to Byte Buddy 1.17.8. (markt)
 + Update: Update to Checkstyle 12.1.1. (markt)
 + Update: Update to Jacoco 0.8.14. (markt)
 + Update: Update to SpotBugs 4.9.8. (markt)
 + Update: Update to JSign 7.4. (markt)
 + Update: Update Maven Resolver Ant Tasks to 1.6.0. (rjung)

Update to Tomcat 10.1.48:

 + Update: Deprecate the RemoteAddrFilter and RemoteAddValve in favour of the
 RemoteCIDRFilter and RemoteCIDRValve. (markt)
 + Fix: HTTP methods are case-sensitive so always use case sensitive
 comparisons when comparing HTTP methods. (markt)
 + Fix: 69814: Ensure that HttpSession.isNew() returns false once the client
 has joined the session. (markt)
 + Fix: Further performance improvements for ParameterMap. (jengebr/markt)
 + Code: Refactor access log time stamps to be based on the Instant request
 processing starts. (markt)
 + Fix: Fix a case-sensitivity issue in the trailer header allow list.
 + Fix: Be proactive in cleaning up temporary files after a failed multi-part
 upload rather than waiting for GC to do it. (markt)
 + Update: Change the digest used to calculate strong ETags (if enabled) for
 the default Servlet from SHA-1 to SHA-256 to align with the recommendation
 in RFC 9110 that hash functions used to generate strong ETags should be
 collision resistant. (markt)
 + Fix: Correct a regression in the fix for 69781 that broke FileStore.
 + Code: Remove a number of unnecessary packages from the
 catalina-deployer.jar. (markt)
 + Fix: 69781: Fix concurrent access issues in the session FileStore
 implementation that were causing lost sessions when the store was used
 with the PersistentValve. Based on pull request #882 by Aaron Ogburn.
 + Fix: Fix handling of QSA and QSD flags in RewriteValve. (markt)
 + Fix: Prevent the channel configuration (sender, receiver, membership
 service) from being changed unless the channel is fully stopped. (markt)
 + Fix: Handle spurious wake-ups during leader election for
 NonBlockingCoordinator. (markt)
 + Fix: Handle spurious wake-ups during sending of messages by RpcChannel.
 + Update: Add specific certificate selection code for TLS 1.3 supporting
 post quantum cryptography. Certificates defined with type MLDSA will be
 selected depending on the TLS client hello. (remm)
 + Update: Add groups attribute on SSLHostConfig allowing to restrict which
 groups can be enabled on the SSL engine. (remm)
 + Add: Optimize the conversion of HTTP method from byte form to String form.
 + Fix: Store HTTP request headers using the original case for the header
 name rather than forcing it to lower case. (markt)
 + Update: Add hybrid PQC support to OpenSSL, based on code from mod_ssl.
 Using this OpenSSL specific code path, additional PQC certificates defined
 with type MLDSA are added to contexts which use classic certificates.
 (jfclere/remm)
 + Fix: Ensure keys are handed out to OpenSSL even if PEMFile fails to
 process it, with appropriate logging. (remm)
 + Fix: Add new ML-DSA key algorithm to PEMFile and improve reporting when
 reading a key fails. (remm)
 + Fix: Fix possible early timeouts for network operations caused by a
 spurious wake-up of a waiting thread. Found by Coverity Scan. (markt)
 + Fix: Documentation. Clarify the purpose of the maxPostSize attribute of
 the Connector element. (markt)
 + Fix: Avoid NPE in manager webapp displaying certificate information.
 + Update: Update Byte Buddy to 1.17.7. (markt)
 + Update: Update Checkstyle to 11.1.0. (markt)
 + Update: Update SpotBugs to 4.9.6. (markt)
 + Update: Update Jsign to 7.2. (markt)
 + Add: Improvements to Russian translations provided by usmazat. (markt)
 + Update: Minor refactoring in JULI loggers. Patch provided by minjund.
 + Code: Review logging and include the full stack trace and exception
 message by default rather then just the exception message when logging an
 error or warning in response to an exception. (markt)
 + Add: Add escaping to log formatters to align with JSON formatter. (markt)
 + Update: Update Checkstyle to 11.0.0. (markt)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252753">SUSE bug 1252753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252756">SUSE bug 1252756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252905">SUSE bug 1252905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253460">SUSE bug 1253460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258371">SUSE bug 1258371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258385">SUSE bug 1258385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258387">SUSE bug 1258387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55754/">CVE-2025-55754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55754">CVE-2025-55754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61795/">CVE-2025-61795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61795">CVE-2025-61795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66614/">CVE-2025-66614 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24733/">CVE-2026-24733 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-24734/">CVE-2026-24734 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94581" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1254132" ref_url="https://bugzilla.suse.com/1254132" source="BUGZILLA"/>
		<reference ref_id="1257960" ref_url="https://bugzilla.suse.com/1257960" source="BUGZILLA"/>
		<reference ref_id="1258083" ref_url="https://bugzilla.suse.com/1258083" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831/" source="CVE"/>
		<reference ref_id="CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045347.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2025-14831: Fixed DoS via excessive resource consumption during certificate verification. (bsc#1257960)
- CVE-2025-9820: Fixed a buffer overflow in gnutls_pkcs11_token_init. (bsc#1254132)
- Add the functionality to allow to specify the hash algorithm for the PSK. This fixes a bug in the current implementation where the binder is always calculated with SHA256. (bsc#1258083, jsc#PED-15752, jsc#PED-15753)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254132">SUSE bug 1254132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257960">SUSE bug 1257960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258083">SUSE bug 1258083</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052615" comment="gnutls-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052616" comment="libgnutls-devel-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052618" comment="libgnutls30-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052619" comment="libgnutlsxx-devel-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052620" comment="libgnutlsxx30-3.8.10-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052615" comment="gnutls-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052616" comment="libgnutls-devel-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052618" comment="libgnutls30-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052619" comment="libgnutlsxx-devel-3.8.10-160000.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052620" comment="libgnutlsxx30-3.8.10-160000.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94582" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258008" ref_url="https://bugzilla.suse.com/1258008" source="BUGZILLA"/>
		<reference ref_id="1258009" ref_url="https://bugzilla.suse.com/1258009" source="BUGZILLA"/>
		<reference ref_id="1258010" ref_url="https://bugzilla.suse.com/1258010" source="BUGZILLA"/>
		<reference ref_id="1258011" ref_url="https://bugzilla.suse.com/1258011" source="BUGZILLA"/>
		<reference ref_id="1258754" ref_url="https://bugzilla.suse.com/1258754" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

- Update to versio 16.13. (bsc#1258754)
- CVE-2026-2003: Guard against unexpected dimensions of oidvector/int2vector (bsc#1258008)
- CVE-2026-2004: Harden selectivity estimators against being attached to operators that accept unexpected data types. (bsc#1258009)
- CVE-2026-2005: Fix buffer overrun in contrib/pgcrypto's PGP decryption functions. (bsc#1258010)
- CVE-2026-2006: Fix inadequate validation of multibyte character lengths. (bsc#1258011)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258008">SUSE bug 1258008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258009">SUSE bug 1258009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258010">SUSE bug 1258010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258011">SUSE bug 1258011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258754">SUSE bug 1258754</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052621" comment="postgresql16-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052622" comment="postgresql16-contrib-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052623" comment="postgresql16-devel-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052624" comment="postgresql16-docs-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052627" comment="postgresql16-plperl-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052628" comment="postgresql16-plpython-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052629" comment="postgresql16-pltcl-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052630" comment="postgresql16-server-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052631" comment="postgresql16-server-devel-16.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052621" comment="postgresql16-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052622" comment="postgresql16-contrib-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052623" comment="postgresql16-devel-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052624" comment="postgresql16-docs-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052627" comment="postgresql16-plperl-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052628" comment="postgresql16-plpython-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052629" comment="postgresql16-pltcl-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052630" comment="postgresql16-server-16.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052631" comment="postgresql16-server-devel-16.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94583" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259711" ref_url="https://bugzilla.suse.com/1259711" source="BUGZILLA"/>
		<reference ref_id="1259726" ref_url="https://bugzilla.suse.com/1259726" source="BUGZILLA"/>
		<reference ref_id="1259729" ref_url="https://bugzilla.suse.com/1259729" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-32776" ref_url="https://www.suse.com/security/cve/CVE-2026-32776/" source="CVE"/>
		<reference ref_id="CVE-2026-32777" ref_url="https://www.suse.com/security/cve/CVE-2026-32777/" source="CVE"/>
		<reference ref_id="CVE-2026-32778" ref_url="https://www.suse.com/security/cve/CVE-2026-32778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045346.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2026-32776: NULL pointer dereference when processing empty external parameter entities inside an entity
  declaration value (bsc#1259726).
- CVE-2026-32777: denial of service due to infinite loop in DTD content parsing (bsc#1259711).
- CVE-2026-32778: NULL pointer dereference in `setContext` on retry after an out-of-memory condition
  (bsc#1259729).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259711">SUSE bug 1259711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259726">SUSE bug 1259726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259729">SUSE bug 1259729</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32776/">CVE-2026-32776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32776">CVE-2026-32776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32777/">CVE-2026-32777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32777">CVE-2026-32777 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32778/">CVE-2026-32778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32778">CVE-2026-32778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052633" comment="expat-2.7.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052634" comment="libexpat-devel-2.7.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052633" comment="expat-2.7.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052634" comment="libexpat-devel-2.7.1-160000.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94584" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253332" ref_url="https://bugzilla.suse.com/1253332" source="BUGZILLA"/>
		<reference ref_id="1253333" ref_url="https://bugzilla.suse.com/1253333" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045345.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

Security fixes:

- CVE-2025-12817: Fixed missing check for CREATE privileges
  on the schema in CREATE STATISTICS allowed table owners to create
  statistics in any schema, potentially leading to unexpected naming
  conflicts (bsc#1253332)
- CVE-2025-12818: Fixed several places in libpq were not
  sufficiently careful about computing the required size of a memory
  allocation. Sufficiently large inputs could cause integer overflow,
  resulting in an undersized buffer, which would then lead to writing
  past the end of the buffer (bsc#1253333)

Other fixes:

- Update to 13.23

  * https://www.postgresql.org/about/news/p-3171/
  * https://www.postgresql.org/docs/release/13.23
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-30"/>
	<updated date="2026-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253332">SUSE bug 1253332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253333">SUSE bug 1253333</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052636" comment="postgresql13-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052637" comment="postgresql13-contrib-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052638" comment="postgresql13-devel-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052639" comment="postgresql13-docs-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052642" comment="postgresql13-plperl-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052643" comment="postgresql13-plpython-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052644" comment="postgresql13-pltcl-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052645" comment="postgresql13-server-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052646" comment="postgresql13-server-devel-13.23-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052636" comment="postgresql13-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052637" comment="postgresql13-contrib-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052638" comment="postgresql13-devel-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052639" comment="postgresql13-docs-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052642" comment="postgresql13-plperl-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052643" comment="postgresql13-plpython-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052644" comment="postgresql13-pltcl-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052645" comment="postgresql13-server-13.23-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052646" comment="postgresql13-server-devel-13.23-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94585" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-online-accounts, gvfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258953" ref_url="https://bugzilla.suse.com/1258953" source="BUGZILLA"/>
		<reference ref_id="1258954" ref_url="https://bugzilla.suse.com/1258954" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-28295" ref_url="https://www.suse.com/security/cve/CVE-2026-28295/" source="CVE"/>
		<reference ref_id="CVE-2026-28296" ref_url="https://www.suse.com/security/cve/CVE-2026-28296/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045343.html" source="SUSE-SU"/>
		<description>
This update for gnome-online-accounts, gvfs fixes the following issues:

Changes for gvfs:

Update gvfs to 1.59.90:

- CVE-2026-28295: information disclosure when processing untrusted PASV responses from FTP servers (bsc#1258953).
- CVE-2026-28296: arbitrary FTP command injection due to unsanitized CRLF sequences in user supplied file paths
  (bsc#1258954).

Changelog:

Update to version 1.59.90:

 + client: Fix use-after-free when creating async proxy failed
 + udisks2: Emit changed signals from update_all()
 + daemon: Fix race on subscribers list when on thread
 + ftp: Validate fe_size when parsing symlink target
 + ftp: Check localtime() return value before use
 + gphoto2: Use g_try_realloc() instead of g_realloc()
 + cdda: Reject path traversal in mount URI host
 + client: Fail when URI has invalid UTF-8 chars
 + udisks2: Fix memory corruption with duplicate mount paths
 + build: Update GOA dependency to &gt; 3.57.0
 + Some other fixes
 + ftp: Use control connection address for PASV data.
 + ftp: Reject paths containing CR/LF characters

Update to version 1.59.1:

 + mtp: replace Android extension checks with capability checks
 + dav: Add X-OC-Mtime header on push to preserve last modified
 time
 + udisks2: Use hash tables in the volume monitor to improve
 performance
 + onedrive: Check for identity instead of presentation identity
 + build: Disable google option and mark as deprecated

Update to version 1.58.2:

 + ftp: Use control connection address for PASV data
 + ftp: Reject paths containing CR/LF characters

Update to version 1.58.1:

 + cdda: Fix duration of last track for some media
 + build: Fix build when google option is disabled
 + Fix various memory leaks
 + Updated translations.

Update to version 1.58.0:

 + mtp: Allow cancelling ongoing folder enumerations
 + wsdd: Use socket-activated service if available
 + onedrive: Set emblem for remote data
 + fix: Add file rename support in MTP backend move operation
 + mtp: Fix -Wmaybe-uninitialized warning in pad_file
 + fuse: use fuse_(un)set_feature_flag for libfuse 3.17+
 + smbbrowse: Purge server cache for next auth try
 + metatree: Open files with O_CLOEXEC
 + cdda: Fix incorrect track duration for 99-track CDs
 + metadata: Fix journal file permissions inconsistency
 + dav: recognize 308 Permanent Redirect

Changes for gnome-online-accounts:

Update to version 3.58.0:

 + SMTP server without password cannot be configured
 + Remove unneeded SMTP password escaping
 + build: Disable google provider Files feature
 + MS365: Fix mail address and name
 + Google: Set mail name to presentation identity
 + Updated translations.

Update to version 3.57.1:

 + Default Microsoft 365 client is unverified
 + Microsoft 365: Make use of email for id
 + goadaemon: Allow manage system notifications
 + goamsgraphprovider: bump credentials generation
 + goaprovider: Allow to disable, instead of enable, selected
   providers

Changes from version 3.57.0:

 + Support for saving a Kerberos password to the keychain after
 the first login
 + changing expired kerberos password is not supported.
 + Provided Files URI does not override undiscovered endpoint
 + DAV client rejects 204 status in OPTIONS request handler
 + Include emblem-default-symbolic.svg
 + Connecting a Runbox CardDAV/CalDAV account hangs/freezes after
 sign in
 + i81n: fix translatable string
 + goaimapsmptprovider: fix accounts without SMTP or
   authentication-less SMTP
 + build: only install icons for the goabackend build
 + build: don't require goabackend to build documentation
 + ci: test the build without gtk4
 + DAV-client: Added short path for SOGo

Update to version 3.56.4:

 + Bugs fixed:
 - Unclear which part of "IMAP+SMTP" account test failed
 - Adding nextcloud account which has a subfolder does not work
 - goadaemon: Handle broken account configs

Update to version 3.56.3:

 - Add DAV detection and configuration for SOGo
 - DAV discovery fails when certain SRV lookups fail

Update to version 3.56.1:

 - Support for saving a Kerberos password after the first login
 - Changing expired kerberos password is not supported
 - Provided Files URI does not override undiscovered endpoint
 - DAV client rejects 204 status in OPTIONS request handler

Update to version 3.56.0:

 + Code style and logging cleanups
 + Updated translations

Update to version 3.55.2:

 + goaoauth2provider: improve error handling for auth/token
   endpoints

Update to version 3.55.1:

 - Support Webflow authentication for Nextcloud
 - Rename dconf key in gnome-online-accounts settings
 - "Account Name" GUI field is a bit ambiguous
 - Failed to generate a new POT file for the user interface of
   "gnome-online-accounts" (domain: "po") and some missing files
    from POTFILES.in

Update to version 3.55.0:

 - Add progress spinner for OAuth2 dialogs
 - Remove Windows Live! option
 - Improve goa_oauth2_provider_ensure_credentials_sync
 - Authentication failure in goa IMAP accounts
 - Missing files from POTFILES.in
 - WebDAV not detected for mail.ru
 - goaoauth2provider: fix task chaining for subclasses
 - Always lowercase domains when looking up base
 - goadavclient: check Nextcloud fallback last
 - goabackend: add a composite widget for authflow links
 - goadavclient: fix the mailbox.org preconfig

Update to version 3.54.5:

 - Adding GOA account fails with sonic.net IMAP service
 - Cannot add a ProtonMail bridge with IMAP + TLS
 - Nextcloud login does not work anymore due to OPTIONS /login
   request
 - Linked online accounts no longer work
 - Invalid URI when adding Google account
 - goamsgraphprovider: ensure a valid PresentationIdentity
 - goadaemon: complete GTasks to avoid a scary debug warning
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258953">SUSE bug 1258953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258954">SUSE bug 1258954</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28295/">CVE-2026-28295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28295">CVE-2026-28295 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28296/">CVE-2026-28296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28296">CVE-2026-28296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052651" comment="gvfs-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052656" comment="gvfs-backends-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052657" comment="gvfs-fuse-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052658" comment="gvfs-lang-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052659" comment="libgoa-1_0-0-3.58.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052660" comment="libgoa-backend-1_0-2-3.58.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052661" comment="typelib-1_0-Goa-1_0-3.58.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052651" comment="gvfs-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052656" comment="gvfs-backends-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052657" comment="gvfs-fuse-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052658" comment="gvfs-lang-1.59.90-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052659" comment="libgoa-1_0-0-3.58.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052660" comment="libgoa-backend-1_0-2-3.58.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052661" comment="typelib-1_0-Goa-1_0-3.58.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94586" version="1" class="patch">
	<metadata>
		<title>Security update for alloy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248960" ref_url="https://bugzilla.suse.com/1248960" source="BUGZILLA"/>
		<reference ref_id="1250621" ref_url="https://bugzilla.suse.com/1250621" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11065" ref_url="https://www.suse.com/security/cve/CVE-2025-11065/" source="CVE"/>
		<reference ref_id="CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023517.html" source="SUSE-SU"/>
		<description>
This update for alloy fixes the following issues:

- CVE-2025-58058: Removed dependency on vulnerable github.com/ulikunitz/xz (bsc#1248960).
- CVE-2025-11065: Fixed sensitive information leak in logs (bsc#1250621).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-20"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1248960">SUSE bug 1248960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250621">SUSE bug 1250621</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11065/">CVE-2025-11065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11065">CVE-2025-11065 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030578" comment="alloy-1.11.3-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030578" comment="alloy-1.11.3-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94587" version="1" class="patch">
	<metadata>
		<title>Security update for kea (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252863" ref_url="https://bugzilla.suse.com/1252863" source="BUGZILLA"/>
		<reference ref_id="1260380" ref_url="https://bugzilla.suse.com/1260380" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11232" ref_url="https://www.suse.com/security/cve/CVE-2025-11232/" source="CVE"/>
		<reference ref_id="CVE-2026-3608" ref_url="https://www.suse.com/security/cve/CVE-2026-3608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045342.html" source="SUSE-SU"/>
		<description>
This update for kea fixes the following issues:

Update to 3.0.3:

- CVE-2025-11232: invalid characters cause assert (bsc#1252863).
- CVE-2026-3608: stack overflow via maliciously crafted message (bsc#1260380).

Changelog:

 * A large number of bracket pairs in a JSON payload directed to
 any endpoint would result in a stack overflow, due to recursive
 calls when parsing the JSON. This has been fixed.
 (CVE-2026-3608)
 [bsc#1260380]
 * When a hostname or FQDN received from a client is reduced to an
 empty string by hostname sanitizing, kea-dhcp4 and kea-dhcp6
 will now drop the option.
 (CVE-2025-11232)
 [bsc#1252863]
 * A null dereference is now no longer possible when configuring
 the Control Agent with a socket that lacks the mandatory
 socket-name entry.
 * UNIX sockets are now created as group-writable.
 * Removed logging an error in ping check hook library if using
 lease cache treshold.
 * Fixed deadlock in ping-check hooks library.
 * Fixed a data race in ping-check hooks library.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252863">SUSE bug 1252863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260380">SUSE bug 1260380</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11232/">CVE-2025-11232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11232">CVE-2025-11232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3608/">CVE-2026-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3608">CVE-2026-3608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052662" comment="kea-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052663" comment="kea-devel-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052664" comment="kea-doc-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052665" comment="kea-hooks-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052666" comment="libkea-asiodns62-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052667" comment="libkea-asiolink88-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052668" comment="libkea-cc83-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052669" comment="libkea-cfgrpt3-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052670" comment="libkea-config84-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052671" comment="libkea-cryptolink64-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052672" comment="libkea-d2srv63-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052673" comment="libkea-database76-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052674" comment="libkea-dhcp109-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052675" comment="libkea-dhcp_ddns68-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052676" comment="libkea-dhcpsrv131-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052677" comment="libkea-dns71-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052678" comment="libkea-eval84-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052679" comment="libkea-exceptions45-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052680" comment="libkea-hooks121-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052681" comment="libkea-http87-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052682" comment="libkea-log-interprocess3-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052683" comment="libkea-log75-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052684" comment="libkea-mysql88-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052685" comment="libkea-pgsql88-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052686" comment="libkea-process91-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052687" comment="libkea-stats53-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052688" comment="libkea-tcp33-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052689" comment="libkea-util-io12-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052690" comment="libkea-util102-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052691" comment="python3-kea-3.0.3-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052662" comment="kea-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052663" comment="kea-devel-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052664" comment="kea-doc-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052665" comment="kea-hooks-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052666" comment="libkea-asiodns62-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052667" comment="libkea-asiolink88-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052668" comment="libkea-cc83-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052669" comment="libkea-cfgrpt3-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052670" comment="libkea-config84-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052671" comment="libkea-cryptolink64-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052672" comment="libkea-d2srv63-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052673" comment="libkea-database76-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052674" comment="libkea-dhcp109-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052675" comment="libkea-dhcp_ddns68-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052676" comment="libkea-dhcpsrv131-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052677" comment="libkea-dns71-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052678" comment="libkea-eval84-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052679" comment="libkea-exceptions45-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052680" comment="libkea-hooks121-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052681" comment="libkea-http87-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052682" comment="libkea-log-interprocess3-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052683" comment="libkea-log75-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052684" comment="libkea-mysql88-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052685" comment="libkea-pgsql88-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052686" comment="libkea-process91-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052687" comment="libkea-stats53-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052688" comment="libkea-tcp33-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052689" comment="libkea-util-io12-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052690" comment="libkea-util102-3.0.3-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052691" comment="python3-kea-3.0.3-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94588" version="1" class="patch">
	<metadata>
		<title>Feature update for himmelblau (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1247735" ref_url="https://bugzilla.suse.com/1247735" source="BUGZILLA"/>
		<reference ref_id="1249013" ref_url="https://bugzilla.suse.com/1249013" source="BUGZILLA"/>
		<reference ref_id="1257904" ref_url="https://bugzilla.suse.com/1257904" source="BUGZILLA"/>
		<reference ref_id="1258236" ref_url="https://bugzilla.suse.com/1258236" source="BUGZILLA"/>
		<reference ref_id="1259548" ref_url="https://bugzilla.suse.com/1259548" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-54882" ref_url="https://www.suse.com/security/cve/CVE-2025-54882/" source="CVE"/>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<reference ref_id="CVE-2026-31979" ref_url="https://www.suse.com/security/cve/CVE-2026-31979/" source="CVE"/>
		<reference ref_id="SUSE-FU-2026:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045341.html" source="SUSE-SU"/>
		<description>
This update for himmelblau fixes the following issues:

Update to himmelblau 2.3.8 (jsc#PED-14511):

Security issues:

- CVE-2025-54882: world readable cloud TGT token (bsc#1247735).
- CVE-2025-58160: tracing-subscriber: Tracing log pollution (bsc#1249013).
- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
  (bsc#1257904).
- CVE-2026-31979: race condition when accessiung /tmp/krb5cc_&lt;uid&gt; (bsc#1259548).

Non security issues:

- Fix SELinux module packaging to use standard policy macros (bsc#1258236).

Changelog:

Version 2.3.8:

 * Add PrivateTmp back to Tasks Daemon
 * Drop dead code
 * Drop krb5 ccache dir code
 * Add a TODO comment
 * Drop non working packaged krb5 snippet file
 * Write kerberos config snippet
 * Extend resolver interface to return kerberos config together with TGTs
 * Backport SELinux fixes from main
 * Use libkrimes to store TGTs

Version 2.3.7:

 * cargo vet
 * Fix AWS-LC has PKCS7_verify Certificate Chain Validation Bypass
 * Revert dependency change which broke the nightly build
 * gen_dockerfiles: only himmelblaud has tpm feature, fix all others
 * fix(build): gen_dockerfiles.py mutates shared features list mid-loop

Version 2.3.5:

 * Better handle Intune API version
 * Update make vet from main branch
 * pam_himmelblau: call split_username once in chauthtok
 * pam_himmelblau: return PAM_IGNORE in chauthtok for local users
 * Don't attempt a DAG when Hello fails with SSPR demand

Version 2.3.4:

 * deps(rust): bump the all-cargo-updates group across 1 directory with 8 updates
 * Revert sketching update (which breaks SLE16 build)

Version 2.3.3:

 * /var/cache/private/himmelblaud should not be created tmpfiles
 * Updatee python vers for dataclasses dep
 * deps(rust): bump the all-cargo-updates group across 1 directory with 3 updates
 * Generate pin init service file systemd &lt; 250
 * Checkin missing himmelblaud.if file for SELinux
 * Resolve typos in selinux package commands

Version 2.3.2:

 * Compile SELinux policy at install time for cross-distro compatibility
 * Improve PAM configuration on openSUSE/SLE
 * Fix SELinux policy
 * Add a git hook to ensure selinux policy is tested
 * Ignore generated himmelblau-hsm-pin-init service file
 * Refactor SELinux policy for cross-distro compatibility
 * Fix NSS lookup for mapped local users
 * Skip OS version compliance checks when min/max values are empty

Version 2.3.1:

 * Remove references to qrcodegen (these are 3.x features)
 * QR Greeter compatibility for old GNOME
 * Enable QR greeter automatically
 * ci: Use latest cargo-vet from git to fix CI
 * Fix HSM pin migration failure on Debian/Ubuntu upgrades from v1.4.x

Version 2.3.0:

 * Autostart the daemons on fresh install or upgrade
 * Restart sshd when installing the ssh config
 * Allow tasks daemon to write krb ccache
 * Do not enumerate mapped users in NSS
 * Update libhimmelblau to latest version
 * Fix Tumbleweed build

Version 2.2.0:

 * Update libhimmelblau to 0.8.x series
 * deps(rust): bump the all-cargo-updates group with 17 updates
 * Only use OpenSSH bug workaround for ssh service
 * Fix debug noise from removing user from sudo group
 * systemd: install files to /usr/lib/, not /etc/

Version 2.1.0:

 * Fix nightly authselect build failure
 * Generate the authselect profiles for each distro
 * Improve pam config handling in aad-tool
 * Make `aad-tool configure-pam` detect location of pam files

Version 2.0.5:

 * /var/lib/private/himmelblaud should be owned by root
 * Use tmpfiles.d to create himmelblaud private data directory
 * deps(rust): bump the all-cargo-updates group with 13 updates

Version 2.0.4:

 * Update kanidm_build_profiles mask version
 * Utilize cargo vet from main
 * Add policies cache patch via systemd-tmpfiles

 * Fix man page comments about change idmap_range
 * Stub picky-krb for osc build
 * Stub a kanidm_build_profiles which builds in osc
 * Ensure nss cache is created on Ubuntu/Debian
 * Request a user token if NSS hasn't been called

Version 2.0.3:

 * Add nss cache patch via systemd-tmpfiles

Version 2.0.2:

 * Recommend `patch` with the pam package
 * Fix passwordless FIDO authentication not being used when available
 * Git workflow updates for stable-2.x
 * Only warn on Intune failure

Version 2.0.1:

 * Force o365 desktop files to always rebuild
 * Always rebuild the o365 apps
 * Add restart on-failure to systemd services
 * Clarify `domain` SHOULD match login domain
 * Remove warning about `domain` himmelblau.conf opt
 * Pseudo eliminate multi-tenant and domains section
 * Revert "Fix Hello PIN lookup when an alias domain"
 * Comment out `KbdInteractiveAuthentication on` in sshd conf
 * Check the nxset sooner, to avoid unwanted errors
 * Recommend oddjob_mkhomedir with authselect
 * Pin libhimmelblau to 0.7.x
 * Deprecate Fedora 41
 * deps(rust): bump the all-cargo-updates group with 11 updates
 * Bump github/codeql-action from 4.30.8 to 4.31.2
 * Bump cachix/install-nix-action from 31.8.1 to 31.8.2
 * Bump actions/upload-artifact from 4.6.2 to 5.0.0
 * cargo clippy and rebase fix
 * fixup! add extra debug output to NotFound error code
 * force error output to show up in CI logs
 * wrap repeated sources of IdpError::NotFound in helper functions
 * add extra debug output to NotFound error code
 * use direnv for loading the nix devshell
 * We should still encourage mapping by name
 * Add support for Fedora 43
 * Provide a offline 'breakglass' mode
 * cargo clippy
 * Add warning about incorrect nsswitch configuration
 * Distinguish between online and offline token fail
 * Ensure user token uses original name
 * Fix alias domain in auth result causing failure
 * Resolve cargo clippy warnings
 * Only map on cn name for the primary domain
 * Install systemd in build scripts for gen service
 * Fix systemd version parsing
 * Update libhimmelblau to 0.7.19
 * Resolve SELinux build failures in nightly (part 2)
 * Rocky container image updates were failing
 * Warn instead of error when no idmap_range specified
 * deps(rust): bump the all-cargo-updates group across 1 directory with 7 updates
 * Trim whitespace from local group names
 * Fix borrowing error
 * Fix reference to local_sudo_group in condition
 * Only run sudo_groups if local_groups does not contain local_sudo_group
 * Leave SELinux in permissive mode for Himmelblau
 * Resolve SELinux build failures in nightly
 * nix: add join_type option to nixos-module settings
 * Build host configuration changes
 * Ensure that hsm_pin isn't present decrypted
 * Document Soft HSM changes to TPM bound
 * Disable SELinux by default on NixOS
 * sh doesn't have `source`
 * Encrypt hsm-pin using systemd-creds
 * Recommend uuid id mapping
 * Improve himmelblau.conf man page formatting
 * Implement Local User Mapping
 * Add o365 dependency for jq
 * Add selinux rules for gdm login
 * Narrow the scope of selinux policy with audit2allow
 * Generate the systemd service files
 * Fix selinux build for SLE16
 * Resolve SLE16 build dependency failure
 * Fix the rawhide build
 * Mask the sshkey-attest package
 * Bump cachix/install-nix-action from 31.7.0 to 31.8.1
 * cargo vet dependency updates
 * deps(rust): bump the all-cargo-updates group across 1 directory with 13 updates
 * Bump actions/dependency-review-action from 4.8.0 to 4.8.1
 * Bump cachix/install-nix-action from 31.7.0 to 31.8.0
 * Bump github/codeql-action from 3.30.5 to 4.30.8
 * Bump ossf/scorecard-action from 2.4.2 to 2.4.3
 * SELinux improvements
 * Fix a typo in package gen scripts
 * cargo fmt
 * Permit NSS response for mapped primary fake group
 * Fix Nix Error With Fuzz
 * Decrease CI fuzzer setup time
 * Document join types
 * Support for Entra registered devices
 * Run `cargo test` in a container
 * Bump cachix/install-nix-action from 31.6.2 to 31.7.0
 * deps(rust): bump the all-cargo-updates group across 1 directory with 2 updates
 * Bump github/codeql-action from 3.30.4 to 3.30.5
 * Use pastey crate instead of unmaintained paste
 * Pin unmaintained serde_cbor dep to serde_cbor_2
 * Resolve tower-http `cargo audit` warning
 * Replace unmaintained fxhash with own version
 * Resolve warning about workflow top level write permissions
 * Remove dependabot automerge
 * Resolve division by 0 in idmap code
 * [StepSecurity] ci: Harden GitHub Actions
 * Only idmap against initialized domains
 * Resolve invalid init of idmap with same domain
 * Add fuzzing of idmap code
 * Add basic fuzzing of the config options
 * Resolve error found by fuzzing
 * cargo vet prune
 * deps(rust): bump regex in the all-cargo-updates group
 * Bump actions/dependency-review-action from 4.7.3 to 4.8.0
 * Bump actions/checkout from 3.6.0 to 5.0.0
 * Bump cachix/cachix-action from 14 to 16
 * Bump ossf/scorecard-action from 2.4.0 to 2.4.2
 * Bump cachix/install-nix-action from 25 to 31
 * Add the OpenSSF Best Practices badge
 * Add scorecard badge
 * [StepSecurity] Apply security best practices
 * Fix group static mapping
 * Move aad-tool idmap cache clear to the idmap cmd
 * Resolve errant "Hello key missing." messages
 * Update flake.nix
 * Slow the dependabot update frequency
 * Audit dependabot updates
 * deps(rust): bump the all-cargo-updates group across 1 directory with 11 updates
 * feat: Add support for aarch64 on Debian-based distributions
 * Resolve possible invalid pointer dereferences
 * Avoid revealing account ids in debug log
 * Cause doc links to open in the correct apps
 * Permit opening multiple instances of Word/Excel
 * Modify systray and app close behavior
 * Don't use questionably licensed icons for o365
 * Resolve NixOS CI failure
 * Fix building w/out deprecated interactive feature
 * Update himmelblau.conf.5 sudo_groups example
 * Entra group based sudo access
 * Audited the cargo updates
 * deps(rust): bump the all-cargo-updates group with 6 updates
 * Vet libhimmelblau
 * Add `make vet` command
 * Update deny.toml
 * Remove incompatible licenses from deps
 * Fix RHEL8 package signing
 * Add SBOM generation
 * Add an IRP checklist for security incidents
 * Run the nixos build/release on the correct version
 * Add crate dependency auditing on MR
 * Add some exceptions
 * Initialize cargo vet
 * Remove in-tree kanidm dependencies
 * Fix Hello PIN lookup when an alias domain
 * Raise maximum group lookup from 100 to 999
 * Always work with lowercase account names
 * Modify FUNDING.yml for funding sources
 * Remove glib dependency
 * deps(rust): bump the all-cargo-updates group with 10 updates
 * Add CI check for licenses
 * Update dependabot.yml to target all stable branches
 * Add authselect module for Rocky/Fedora
 * Recommend packages, instead of require
 * Add a Contributing document
 * Add a Code of Conduct
 * add withSelinux flag to nix build, brings SELinux binaries into the build environment.
 * deps(rust): bump tracing-subscriber in the cargo group
 * Don't overwrite the himmelblau.conf on rpm upgrade
 * Add help output to the Makefile
 * Fix building packages with docker in root mode
 * Update to latest libhimmelblau and identity_dbus_broker
 * Make PRT SSO cookie via broker work as well for Edge
 * Make broker work for Edge
 * Generate Office 365 desktop apps
 * Update README
 * Add `make uninstall` command
 * Remove the deprecated tests suite
 * Himmelblau no longer has git submodules
 * Make install using packages
 * Add Debian 13 packages
 * Generate Dockerfiles automatically
 * Add SELinux configuration
 * Himmelblau daemon requires system tss user
 * Add cron dependency for Intune scripts
 * Do not mangle /usr/etc configuration files
 * deps(rust): bump the all-cargo-updates group with 7 updates
 * Add SLE16 (beta) build target
 * Automatically append to nsswitch.conf in postinst
 * Correct the RPM postinst script syntax
 * Fix Kerberos credential cache permissions
 * Set file owner and group before writing its content
 * Create SECURITY.md
 * Rev the dev version to 2.0.0
 * Ensure alias domains match when checking Intune device id
 * Debian 12 doesn't support ConditionPathExists and notify-reload
 * Write scripts policy to a readable directory
 * Apply Intune policies right after enrollment
 * Add more debug instrumentation
 * Provide device_id to Intune enrollment if not cached
 * Ensure nss cache directory is created during install
 * Remove /var/cache/himmelblaud access from tasks daemon
 * Resolve daemon startup absolute path warnings
 * Delay Intune enrollment on Device Auth fail
 * Do not leak the Intune IW service token in the logs

Version 1.4.2:

 * Revert libhimmelblau unstable update

Version 1.4.1:

 * Update Intune to use app version 1.2511.7

Version 1.4.0:

 * Resolve build failures
 * deps(rust): bump the all-cargo-updates group across 1 directory with 6 updates

Version 1.3.0:

 * Revert the self-hosted runner name
 * deps(rust): bump the all-cargo-updates group with 23 updates
 * Include latest branch in CI
 * Self hosted runners

Version 1.1.0:

 * Fix policy application
 * Add remaining Linux password compliance policies
 * Add custom compliance enforcement
 * deps(rust): bump the all-cargo-updates group with 3 updates
 * deps(rust): bump the all-cargo-updates group with 5 updates
 * Add SLE15SP7 build target
 * Add RHEL 10 build target
 * Fix Intermittent auth issue AADSTSError 16000
 * Remove old utf8proc dependency
 * Add `fedora42` build target
 * Handle PRT expiration and tie to offline auth
 * Correctly delete the Hello keys on bad pin count
 * Add ability to disable Hello PIN per-service
 * Update NixOS support to 25.05
 * Handle disabled device by attempting re-enrollment
 * Always attempt confidential client creds for aad-tool
 * Include HSM option defs in himmelblau.conf man page
 * Improve the aad-tool cache-clear command
 * Add `mfaSshWorkaroundFlag` configuration option to Nix Flake.
 * Add the ability to remove confidential client creds
 * If bad PIN count is exceeded, delete the Hello key
 * deps(rust): bump the all-cargo-updates group with 4 updates
 * Add instructions for creating developer builds
 * Fix GDM3 first time login password prompt
 * Default HsmType should be soft
 * Add himmelblaud to tss group for TPM startup
 * Enforce strict order for the systemd units
 * Update libhimmelblau and compact_jwt
 * Fix builds w/tpm
 * aad-tool Authentication flow improvements
 * Filter out irrelevant debug in aad-tool
 * Create a unified login experience for aad-tool
 * Utilize confidential creds for aad-tool enumerate
 * himmelblau should get posix attributes w/out delegate user access
 * Always use the Object Id for mapping Group to GID
 * Update enhancement-request.md for SPI donations
 * Update bug_report.md with SPI donation
 * Update build requires in README.md
 * Update FUNDING.yml with SPI Paypal donation button
 * Don't break from tasks loop when policies fail
 * Enroll in Intune as soon as it is enabled
 * Implement `decoupled hello` behavior
 * Cache encrypted PRT to disk for offline login SSO
 * Update to latest hsm-crypto
 * Enable tpm functionality
 * Allow altering the password and PIN prompt messages
 * Ensure Hello PIN lockout happens when online
 * Cache the build target output to improve build times
 * Easier build selection w/ Makefile
 * Revert mistaken removal from Makefile
 * Make the user wait longer with each incorrect PIN
 * Make the bad PIN count configurable
 * Improve aad-tool manpage
 * aad-tool fails if the user has FIDO2 enabled
 * Offline auth permits authentication with invalid Hello PIN
 * PIN complexity to match Windows
 * Update to latest SSSD idmap code
 * Add aad-tool options for setting posix attrs
 * Add scopes and redirect uris aad-tool application create
 * Add aad-tool commands for managaging extension attrs
 * Utilize the sidtoname call for object id mapping
 * Add commands for listing/creating App registrations
 * Potential fix for code scanning alert no. 2: Workflow does not contain permissions
 * Potential fix for code scanning alert no. 4: Workflow does not contain permissions
 * Potential fix for code scanning alert: Workflow does not contain permissions
 * Never write the app_id to the server config
 * Disable passwordless Fido by default
 * Stop using deprecated `users` crate
 * When group membership lookup fails, use cached groups
 * aad-tool command for enumerating users and groups
 * Name-Based Group Matching in `pam_allow_groups` Leads to Potential Security Bypass
 * Add the configure-pam option to aad-tool man page
 * Add static idmap cache for on-prem to cloud migration
 * Update bug_report.md with request for himmelblau.conf
 * deps(rust): bump the all-cargo-updates group with 2 updates
 * Update crates in a group
 * Update crate bumps
 * Utilize new Intune compliance enforcement via libhimmelblau
 * Correct the README regarding Intune policy compliance
 * Disable Chromium policy
 * Re-enable Intune policy and add scripts and compliance policies
 * himmelblau.conf alias `domain` as `domains`
 * Support Fido auth in pam passwd
 * Add TAP support to himmelblaud and pam passwd
 * Mixed case names should properly identify Hello Key
 * Update linux-entra-sso to latest version
 * Fix group lookup for Entra Id group name
 * Fix mixed case name lookup from PRT cache
 * Crate updates
 * Fix tasks daemon debug output
 * Remove write locks where unecessary
 * Fix deadlock in nss
 * systemd notify fixes
 * Console
 * Address Feedback
 * Order services before gdb/nss-user-target
 * deps(rust): bump rpassword from 7.3.1 to 7.4.0
 * deps(rust): bump tokio from 1.44.2 to 1.45.0
 * deps(rust): bump sha2 from 0.10.8 to 0.10.9
 * deps(rust): bump systemd-journal-logger from 2.2.0 to 2.2.2
 * deps(rust): bump clap from 4.5.31 to 4.5.38
 * Update notify-debouncer-full
 * Update opentelemetry
 * Update dependencies
 * deps(rust): bump time from 0.3.39 to 0.3.41
 * Replace source filter that blacklists files with filter that whitelists files.
 * Mark himmelblau.conf as config in rpm
 * Update README.md
 * Ensure only the base URL is printed to log
 * If unix_user_get fails, wait, and try again
 * Supplying a PRT cookie to SSO doesn't require network
 * Don't send a password prompt if the network is down
 * Auth via MFA if Hello PIN fails 3 times
 * Improve Hello PIN failed auth error
 * Fix rocky9 build
 * deps(rust): bump anyhow from 1.0.96 to 1.0.98
 * deps(rust): bump libc from 0.2.170 to 0.2.172
 * deps(rust): bump cc from 1.2.16 to 1.2.19
 * deps(rust): bump tokio from 1.43.0 to 1.44.2
 * deps(rust): bump openssl from 0.10.71 to 0.10.72 in the cargo group
 * deps(rust): bump reqwest from 0.12.12 to 0.12.15
 * Update libhimmelblau in Cargo.lock
 * Fix nss and offline checks for domain aliases
 * Report error when MS Authenticator denies authorization
 * Bail out of invalid offline auth
 * Handle AADSTS errors from BeginAuth response
 * Never dump failed reqwests to the log
 * Update sccache-action version to use new cache service
 * Permit daemon to start when network is down
 * Add an nss cache for when daemon is down
 * Additional pam info cues
 * Proceed with Hello auth even with net down
 * Indicate to the user what the password and PIN are
 * Ensure pam messages are seen
 * Display the minimum PIN length during Hello setup
 * PAM should loop, not die on error
 * Ensure prompt msg remains for confirmation
 * Update bug_report.md
 * Ignore demands for setting up MS Authenticator
 * Login fails if Entra is configured to recommend MS authenticator
 * Add pam configure command to aad-tool
 * Update README.md with pam passwd instructions
 * aad-tool authtest needs to map names
 * Update demo video in README.md
 * Sign RPM packages
 * Ensure the pam module is installed correctly for SLE
 * Improve pam error handling and messaging
 * Only push cachix builds for stable releases
 * Terminate linux-entra-sso when browser terminates
 * On deb, push pam config after install
 * Increase priority of deb PAM passwd for Himmelblau
 * Improve offline state handling
 * Specify request for Entra Id password in PAM
 * QR Greeter also supports gnome-shell 47
 * Fix profile photo loading
 * Clarify pam_allow_groups in himmelblau.conf man page
 * Don't hide debug for pam_allow_groups miss
 * Handle failures in passwordless auth
 * build all root packages
 * split config options that can be defined per-domain from those which are global only
 * configure cachix signing and upload in ci
 * deps(rust): bump serde_json from 1.0.138 to 1.0.140
 * deps(rust): bump serde from 1.0.218 to 1.0.219
 * deps(rust): bump time from 0.3.37 to 0.3.39
 * deps(rust): bump bytes from 1.10.0 to 1.10.1
 * deps(rust): bump pkg-config from 0.3.31 to 0.3.32
 * Entra Id is case insensitive, cache lookup must match
 * deps(rust): bump ring from 0.17.9 to 0.17.13 in the cargo group
 * Support CompanionAppsNotification mfa method
 * QR code for gnome-shell greeter
 * Allow tasks to start if AccountsService dir missing
 * Remove invalid python dependency from sso package
 * Fixes https://github.com/himmelblau-idm/himmelblau/issues/397
 * Clear server config when clearing cache
 * Update version in the Cargo.lock
 * deps(rust): bump async-trait from 0.1.86 to 0.1.87
 * deps(rust): bump chrono from 0.4.39 to 0.4.40
 * Fix himmelblau.conf man page cn_name_mapping entry
 * deps(rust): bump pem from 3.0.4 to 3.0.5
 * deps(rust): bump serde from 1.0.217 to 1.0.218

Version 1.0.0:

 * deps(rust): bump cc from 1.2.15 to 1.2.16
 * Update workflow versions
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1247735">SUSE bug 1247735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249013">SUSE bug 1249013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257904">SUSE bug 1257904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258236">SUSE bug 1258236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259548">SUSE bug 1259548</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54882/">CVE-2025-54882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54882">CVE-2025-54882 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31979/">CVE-2026-31979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31979">CVE-2026-31979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052692" comment="himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052693" comment="himmelblau-qr-greeter-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052694" comment="himmelblau-sshd-config-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052695" comment="himmelblau-sso-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052696" comment="libnss_himmelblau2-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052697" comment="pam-himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052692" comment="himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052693" comment="himmelblau-qr-greeter-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052694" comment="himmelblau-sshd-config-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052695" comment="himmelblau-sso-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052696" comment="libnss_himmelblau2-2.3.8+git0.dec3693-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052697" comment="pam-himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94589" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258125" ref_url="https://bugzilla.suse.com/1258125" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-25990" ref_url="https://www.suse.com/security/cve/CVE-2026-25990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045339.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2026-25990: Fixed an out-of-bounds write when opening a specially crafted PSD image. (bsc#1258125)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258125">SUSE bug 1258125</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25990/">CVE-2026-25990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25990">CVE-2026-25990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052809" comment="python313-Pillow-11.3.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052810" comment="python313-Pillow-tk-11.3.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052809" comment="python313-Pillow-11.3.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052810" comment="python313-Pillow-tk-11.3.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94590" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Parser (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1259901" ref_url="https://bugzilla.suse.com/1259901" source="BUGZILLA"/>
		<reference ref_id="1259902" ref_url="https://bugzilla.suse.com/1259902" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-10002" ref_url="https://www.suse.com/security/cve/CVE-2006-10002/" source="CVE"/>
		<reference ref_id="CVE-2006-10003" ref_url="https://www.suse.com/security/cve/CVE-2006-10003/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20993-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045338.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Parser fixes the following issues:

- CVE-2006-10002: heap buffer overflow in `parse_stream` when processing UTF-8 input streams (bsc#1259901).
- CVE-2006-10003: off-by-one heap buffer overflow in `st_serial_stack` (bsc#1259902).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259901">SUSE bug 1259901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259902">SUSE bug 1259902</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10002/">CVE-2006-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10002">CVE-2006-10002 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10003/">CVE-2006-10003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10003">CVE-2006-10003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052811" comment="perl-XML-Parser-2.470.0-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052811" comment="perl-XML-Parser-2.470.0-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94591" version="1" class="patch">
	<metadata>
		<title>Security update for dnsdist (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1250054" ref_url="https://bugzilla.suse.com/1250054" source="BUGZILLA"/>
		<reference ref_id="1253852" ref_url="https://bugzilla.suse.com/1253852" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-30187" ref_url="https://www.suse.com/security/cve/CVE-2025-30187/" source="CVE"/>
		<reference ref_id="CVE-2025-8671" ref_url="https://www.suse.com/security/cve/CVE-2025-8671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045336.html" source="SUSE-SU"/>
		<description>
This update for dnsdist fixes the following issues:

Update to dnsdist 1.9.11:

- CVE-2025-8671: add mitigations for the HTTP/2 MadeYouReset attack (bsc#1253852).
- CVE-2025-30187: denial of service via crafted DoH exchange (bsc#1250054).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-02"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1250054">SUSE bug 1250054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253852">SUSE bug 1253852</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30187/">CVE-2025-30187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30187">CVE-2025-30187 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8671/">CVE-2025-8671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8671">CVE-2025-8671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053417" comment="dnsdist-1.9.11-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053417" comment="dnsdist-1.9.11-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94592" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-repos (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1258637" ref_url="https://bugzilla.suse.com/1258637" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045334.html" source="SUSE-SU"/>
		<description>
This update for cockpit-repos fixes the following issue:

- CVE-2026-26996: minimatch: ReDoS when glob pattern contains many consecutive wildcards followed by a literal character
  that doesn't appear in the test string (bsc#1258637).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1258637">SUSE bug 1258637</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053188" comment="cockpit-repos-4.7-160000.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053188" comment="cockpit-repos-4.7-160000.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94593" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1215199" ref_url="https://bugzilla.suse.com/1215199" source="BUGZILLA"/>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1230062" ref_url="https://bugzilla.suse.com/1230062" source="BUGZILLA"/>
		<reference ref_id="1234634" ref_url="https://bugzilla.suse.com/1234634" source="BUGZILLA"/>
		<reference ref_id="1234693" ref_url="https://bugzilla.suse.com/1234693" source="BUGZILLA"/>
		<reference ref_id="1234863" ref_url="https://bugzilla.suse.com/1234863" source="BUGZILLA"/>
		<reference ref_id="1235953" ref_url="https://bugzilla.suse.com/1235953" source="BUGZILLA"/>
		<reference ref_id="1236897" ref_url="https://bugzilla.suse.com/1236897" source="BUGZILLA"/>
		<reference ref_id="1237108" ref_url="https://bugzilla.suse.com/1237108" source="BUGZILLA"/>
		<reference ref_id="1237131" ref_url="https://bugzilla.suse.com/1237131" source="BUGZILLA"/>
		<reference ref_id="1237542" ref_url="https://bugzilla.suse.com/1237542" source="BUGZILLA"/>
		<reference ref_id="1237776" ref_url="https://bugzilla.suse.com/1237776" source="BUGZILLA"/>
		<reference ref_id="1238972" ref_url="https://bugzilla.suse.com/1238972" source="BUGZILLA"/>
		<reference ref_id="1239206" ref_url="https://bugzilla.suse.com/1239206" source="BUGZILLA"/>
		<reference ref_id="1240324" ref_url="https://bugzilla.suse.com/1240324" source="BUGZILLA"/>
		<reference ref_id="1240696" ref_url="https://bugzilla.suse.com/1240696" source="BUGZILLA"/>
		<reference ref_id="1240966" ref_url="https://bugzilla.suse.com/1240966" source="BUGZILLA"/>
		<reference ref_id="1240998" ref_url="https://bugzilla.suse.com/1240998" source="BUGZILLA"/>
		<reference ref_id="1241166" ref_url="https://bugzilla.suse.com/1241166" source="BUGZILLA"/>
		<reference ref_id="1241353" ref_url="https://bugzilla.suse.com/1241353" source="BUGZILLA"/>
		<reference ref_id="1241403" ref_url="https://bugzilla.suse.com/1241403" source="BUGZILLA"/>
		<reference ref_id="1241435" ref_url="https://bugzilla.suse.com/1241435" source="BUGZILLA"/>
		<reference ref_id="1242034" ref_url="https://bugzilla.suse.com/1242034" source="BUGZILLA"/>
		<reference ref_id="1242086" ref_url="https://bugzilla.suse.com/1242086" source="BUGZILLA"/>
		<reference ref_id="1242414" ref_url="https://bugzilla.suse.com/1242414" source="BUGZILLA"/>
		<reference ref_id="1242782" ref_url="https://bugzilla.suse.com/1242782" source="BUGZILLA"/>
		<reference ref_id="1242864" ref_url="https://bugzilla.suse.com/1242864" source="BUGZILLA"/>
		<reference ref_id="1242965" ref_url="https://bugzilla.suse.com/1242965" source="BUGZILLA"/>
		<reference ref_id="1242995" ref_url="https://bugzilla.suse.com/1242995" source="BUGZILLA"/>
		<reference ref_id="1243000" ref_url="https://bugzilla.suse.com/1243000" source="BUGZILLA"/>
		<reference ref_id="1243055" ref_url="https://bugzilla.suse.com/1243055" source="BUGZILLA"/>
		<reference ref_id="1243068" ref_url="https://bugzilla.suse.com/1243068" source="BUGZILLA"/>
		<reference ref_id="1243100" ref_url="https://bugzilla.suse.com/1243100" source="BUGZILLA"/>
		<reference ref_id="1243112" ref_url="https://bugzilla.suse.com/1243112" source="BUGZILLA"/>
		<reference ref_id="1243774" ref_url="https://bugzilla.suse.com/1243774" source="BUGZILLA"/>
		<reference ref_id="1244309" ref_url="https://bugzilla.suse.com/1244309" source="BUGZILLA"/>
		<reference ref_id="1244723" ref_url="https://bugzilla.suse.com/1244723" source="BUGZILLA"/>
		<reference ref_id="1244734" ref_url="https://bugzilla.suse.com/1244734" source="BUGZILLA"/>
		<reference ref_id="1244749" ref_url="https://bugzilla.suse.com/1244749" source="BUGZILLA"/>
		<reference ref_id="1244792" ref_url="https://bugzilla.suse.com/1244792" source="BUGZILLA"/>
		<reference ref_id="1244812" ref_url="https://bugzilla.suse.com/1244812" source="BUGZILLA"/>
		<reference ref_id="1244930" ref_url="https://bugzilla.suse.com/1244930" source="BUGZILLA"/>
		<reference ref_id="1244939" ref_url="https://bugzilla.suse.com/1244939" source="BUGZILLA"/>
		<reference ref_id="1245000" ref_url="https://bugzilla.suse.com/1245000" source="BUGZILLA"/>
		<reference ref_id="1245151" ref_url="https://bugzilla.suse.com/1245151" source="BUGZILLA"/>
		<reference ref_id="1245193" ref_url="https://bugzilla.suse.com/1245193" source="BUGZILLA"/>
		<reference ref_id="1245206" ref_url="https://bugzilla.suse.com/1245206" source="BUGZILLA"/>
		<reference ref_id="1245216" ref_url="https://bugzilla.suse.com/1245216" source="BUGZILLA"/>
		<reference ref_id="1245260" ref_url="https://bugzilla.suse.com/1245260" source="BUGZILLA"/>
		<reference ref_id="1245410" ref_url="https://bugzilla.suse.com/1245410" source="BUGZILLA"/>
		<reference ref_id="1245457" ref_url="https://bugzilla.suse.com/1245457" source="BUGZILLA"/>
		<reference ref_id="1245504" ref_url="https://bugzilla.suse.com/1245504" source="BUGZILLA"/>
		<reference ref_id="1245506" ref_url="https://bugzilla.suse.com/1245506" source="BUGZILLA"/>
		<reference ref_id="1245508" ref_url="https://bugzilla.suse.com/1245508" source="BUGZILLA"/>
		<reference ref_id="1245510" ref_url="https://bugzilla.suse.com/1245510" source="BUGZILLA"/>
		<reference ref_id="1245596" ref_url="https://bugzilla.suse.com/1245596" source="BUGZILLA"/>
		<reference ref_id="1245621" ref_url="https://bugzilla.suse.com/1245621" source="BUGZILLA"/>
		<reference ref_id="1245630" ref_url="https://bugzilla.suse.com/1245630" source="BUGZILLA"/>
		<reference ref_id="1245654" ref_url="https://bugzilla.suse.com/1245654" source="BUGZILLA"/>
		<reference ref_id="1245657" ref_url="https://bugzilla.suse.com/1245657" source="BUGZILLA"/>
		<reference ref_id="1245658" ref_url="https://bugzilla.suse.com/1245658" source="BUGZILLA"/>
		<reference ref_id="1245659" ref_url="https://bugzilla.suse.com/1245659" source="BUGZILLA"/>
		<reference ref_id="1245663" ref_url="https://bugzilla.suse.com/1245663" source="BUGZILLA"/>
		<reference ref_id="1245664" ref_url="https://bugzilla.suse.com/1245664" source="BUGZILLA"/>
		<reference ref_id="1245665" ref_url="https://bugzilla.suse.com/1245665" source="BUGZILLA"/>
		<reference ref_id="1245666" ref_url="https://bugzilla.suse.com/1245666" source="BUGZILLA"/>
		<reference ref_id="1245668" ref_url="https://bugzilla.suse.com/1245668" source="BUGZILLA"/>
		<reference ref_id="1245669" ref_url="https://bugzilla.suse.com/1245669" source="BUGZILLA"/>
		<reference ref_id="1245670" ref_url="https://bugzilla.suse.com/1245670" source="BUGZILLA"/>
		<reference ref_id="1245671" ref_url="https://bugzilla.suse.com/1245671" source="BUGZILLA"/>
		<reference ref_id="1245675" ref_url="https://bugzilla.suse.com/1245675" source="BUGZILLA"/>
		<reference ref_id="1245676" ref_url="https://bugzilla.suse.com/1245676" source="BUGZILLA"/>
		<reference ref_id="1245678" ref_url="https://bugzilla.suse.com/1245678" source="BUGZILLA"/>
		<reference ref_id="1245683" ref_url="https://bugzilla.suse.com/1245683" source="BUGZILLA"/>
		<reference ref_id="1245684" ref_url="https://bugzilla.suse.com/1245684" source="BUGZILLA"/>
		<reference ref_id="1245686" ref_url="https://bugzilla.suse.com/1245686" source="BUGZILLA"/>
		<reference ref_id="1245688" ref_url="https://bugzilla.suse.com/1245688" source="BUGZILLA"/>
		<reference ref_id="1245690" ref_url="https://bugzilla.suse.com/1245690" source="BUGZILLA"/>
		<reference ref_id="1245691" ref_url="https://bugzilla.suse.com/1245691" source="BUGZILLA"/>
		<reference ref_id="1245695" ref_url="https://bugzilla.suse.com/1245695" source="BUGZILLA"/>
		<reference ref_id="1245700" ref_url="https://bugzilla.suse.com/1245700" source="BUGZILLA"/>
		<reference ref_id="1245703" ref_url="https://bugzilla.suse.com/1245703" source="BUGZILLA"/>
		<reference ref_id="1245705" ref_url="https://bugzilla.suse.com/1245705" source="BUGZILLA"/>
		<reference ref_id="1245710" ref_url="https://bugzilla.suse.com/1245710" source="BUGZILLA"/>
		<reference ref_id="1245711" ref_url="https://bugzilla.suse.com/1245711" source="BUGZILLA"/>
		<reference ref_id="1245713" ref_url="https://bugzilla.suse.com/1245713" source="BUGZILLA"/>
		<reference ref_id="1245714" ref_url="https://bugzilla.suse.com/1245714" source="BUGZILLA"/>
		<reference ref_id="1245715" ref_url="https://bugzilla.suse.com/1245715" source="BUGZILLA"/>
		<reference ref_id="1245717" ref_url="https://bugzilla.suse.com/1245717" source="BUGZILLA"/>
		<reference ref_id="1245719" ref_url="https://bugzilla.suse.com/1245719" source="BUGZILLA"/>
		<reference ref_id="1245721" ref_url="https://bugzilla.suse.com/1245721" source="BUGZILLA"/>
		<reference ref_id="1245723" ref_url="https://bugzilla.suse.com/1245723" source="BUGZILLA"/>
		<reference ref_id="1245726" ref_url="https://bugzilla.suse.com/1245726" source="BUGZILLA"/>
		<reference ref_id="1245728" ref_url="https://bugzilla.suse.com/1245728" source="BUGZILLA"/>
		<reference ref_id="1245729" ref_url="https://bugzilla.suse.com/1245729" source="BUGZILLA"/>
		<reference ref_id="1245730" ref_url="https://bugzilla.suse.com/1245730" source="BUGZILLA"/>
		<reference ref_id="1245731" ref_url="https://bugzilla.suse.com/1245731" source="BUGZILLA"/>
		<reference ref_id="1245735" ref_url="https://bugzilla.suse.com/1245735" source="BUGZILLA"/>
		<reference ref_id="1245737" ref_url="https://bugzilla.suse.com/1245737" source="BUGZILLA"/>
		<reference ref_id="1245744" ref_url="https://bugzilla.suse.com/1245744" source="BUGZILLA"/>
		<reference ref_id="1245745" ref_url="https://bugzilla.suse.com/1245745" source="BUGZILLA"/>
		<reference ref_id="1245746" ref_url="https://bugzilla.suse.com/1245746" source="BUGZILLA"/>
		<reference ref_id="1245747" ref_url="https://bugzilla.suse.com/1245747" source="BUGZILLA"/>
		<reference ref_id="1245748" ref_url="https://bugzilla.suse.com/1245748" source="BUGZILLA"/>
		<reference ref_id="1245749" ref_url="https://bugzilla.suse.com/1245749" source="BUGZILLA"/>
		<reference ref_id="1245751" ref_url="https://bugzilla.suse.com/1245751" source="BUGZILLA"/>
		<reference ref_id="1245757" ref_url="https://bugzilla.suse.com/1245757" source="BUGZILLA"/>
		<reference ref_id="1245763" ref_url="https://bugzilla.suse.com/1245763" source="BUGZILLA"/>
		<reference ref_id="1245765" ref_url="https://bugzilla.suse.com/1245765" source="BUGZILLA"/>
		<reference ref_id="1245767" ref_url="https://bugzilla.suse.com/1245767" source="BUGZILLA"/>
		<reference ref_id="1245769" ref_url="https://bugzilla.suse.com/1245769" source="BUGZILLA"/>
		<reference ref_id="1245777" ref_url="https://bugzilla.suse.com/1245777" source="BUGZILLA"/>
		<reference ref_id="1245780" ref_url="https://bugzilla.suse.com/1245780" source="BUGZILLA"/>
		<reference ref_id="1245781" ref_url="https://bugzilla.suse.com/1245781" source="BUGZILLA"/>
		<reference ref_id="1245784" ref_url="https://bugzilla.suse.com/1245784" source="BUGZILLA"/>
		<reference ref_id="1245785" ref_url="https://bugzilla.suse.com/1245785" source="BUGZILLA"/>
		<reference ref_id="1245787" ref_url="https://bugzilla.suse.com/1245787" source="BUGZILLA"/>
		<reference ref_id="1245812" ref_url="https://bugzilla.suse.com/1245812" source="BUGZILLA"/>
		<reference ref_id="1245814" ref_url="https://bugzilla.suse.com/1245814" source="BUGZILLA"/>
		<reference ref_id="1245815" ref_url="https://bugzilla.suse.com/1245815" source="BUGZILLA"/>
		<reference ref_id="1245937" ref_url="https://bugzilla.suse.com/1245937" source="BUGZILLA"/>
		<reference ref_id="1245945" ref_url="https://bugzilla.suse.com/1245945" source="BUGZILLA"/>
		<reference ref_id="1245952" ref_url="https://bugzilla.suse.com/1245952" source="BUGZILLA"/>
		<reference ref_id="1245955" ref_url="https://bugzilla.suse.com/1245955" source="BUGZILLA"/>
		<reference ref_id="1245956" ref_url="https://bugzilla.suse.com/1245956" source="BUGZILLA"/>
		<reference ref_id="1245963" ref_url="https://bugzilla.suse.com/1245963" source="BUGZILLA"/>
		<reference ref_id="1245966" ref_url="https://bugzilla.suse.com/1245966" source="BUGZILLA"/>
		<reference ref_id="1245970" ref_url="https://bugzilla.suse.com/1245970" source="BUGZILLA"/>
		<reference ref_id="1245973" ref_url="https://bugzilla.suse.com/1245973" source="BUGZILLA"/>
		<reference ref_id="1245976" ref_url="https://bugzilla.suse.com/1245976" source="BUGZILLA"/>
		<reference ref_id="1245977" ref_url="https://bugzilla.suse.com/1245977" source="BUGZILLA"/>
		<reference ref_id="1245986" ref_url="https://bugzilla.suse.com/1245986" source="BUGZILLA"/>
		<reference ref_id="1246000" ref_url="https://bugzilla.suse.com/1246000" source="BUGZILLA"/>
		<reference ref_id="1246002" ref_url="https://bugzilla.suse.com/1246002" source="BUGZILLA"/>
		<reference ref_id="1246005" ref_url="https://bugzilla.suse.com/1246005" source="BUGZILLA"/>
		<reference ref_id="1246008" ref_url="https://bugzilla.suse.com/1246008" source="BUGZILLA"/>
		<reference ref_id="1246012" ref_url="https://bugzilla.suse.com/1246012" source="BUGZILLA"/>
		<reference ref_id="1246022" ref_url="https://bugzilla.suse.com/1246022" source="BUGZILLA"/>
		<reference ref_id="1246023" ref_url="https://bugzilla.suse.com/1246023" source="BUGZILLA"/>
		<reference ref_id="1246031" ref_url="https://bugzilla.suse.com/1246031" source="BUGZILLA"/>
		<reference ref_id="1246034" ref_url="https://bugzilla.suse.com/1246034" source="BUGZILLA"/>
		<reference ref_id="1246037" ref_url="https://bugzilla.suse.com/1246037" source="BUGZILLA"/>
		<reference ref_id="1246041" ref_url="https://bugzilla.suse.com/1246041" source="BUGZILLA"/>
		<reference ref_id="1246042" ref_url="https://bugzilla.suse.com/1246042" source="BUGZILLA"/>
		<reference ref_id="1246047" ref_url="https://bugzilla.suse.com/1246047" source="BUGZILLA"/>
		<reference ref_id="1246049" ref_url="https://bugzilla.suse.com/1246049" source="BUGZILLA"/>
		<reference ref_id="1246050" ref_url="https://bugzilla.suse.com/1246050" source="BUGZILLA"/>
		<reference ref_id="1246053" ref_url="https://bugzilla.suse.com/1246053" source="BUGZILLA"/>
		<reference ref_id="1246054" ref_url="https://bugzilla.suse.com/1246054" source="BUGZILLA"/>
		<reference ref_id="1246055" ref_url="https://bugzilla.suse.com/1246055" source="BUGZILLA"/>
		<reference ref_id="1246057" ref_url="https://bugzilla.suse.com/1246057" source="BUGZILLA"/>
		<reference ref_id="1246098" ref_url="https://bugzilla.suse.com/1246098" source="BUGZILLA"/>
		<reference ref_id="1246109" ref_url="https://bugzilla.suse.com/1246109" source="BUGZILLA"/>
		<reference ref_id="1246125" ref_url="https://bugzilla.suse.com/1246125" source="BUGZILLA"/>
		<reference ref_id="1246166" ref_url="https://bugzilla.suse.com/1246166" source="BUGZILLA"/>
		<reference ref_id="1246171" ref_url="https://bugzilla.suse.com/1246171" source="BUGZILLA"/>
		<reference ref_id="1246176" ref_url="https://bugzilla.suse.com/1246176" source="BUGZILLA"/>
		<reference ref_id="1246181" ref_url="https://bugzilla.suse.com/1246181" source="BUGZILLA"/>
		<reference ref_id="1246183" ref_url="https://bugzilla.suse.com/1246183" source="BUGZILLA"/>
		<reference ref_id="1246185" ref_url="https://bugzilla.suse.com/1246185" source="BUGZILLA"/>
		<reference ref_id="1246186" ref_url="https://bugzilla.suse.com/1246186" source="BUGZILLA"/>
		<reference ref_id="1246188" ref_url="https://bugzilla.suse.com/1246188" source="BUGZILLA"/>
		<reference ref_id="1246190" ref_url="https://bugzilla.suse.com/1246190" source="BUGZILLA"/>
		<reference ref_id="1246192" ref_url="https://bugzilla.suse.com/1246192" source="BUGZILLA"/>
		<reference ref_id="1246193" ref_url="https://bugzilla.suse.com/1246193" source="BUGZILLA"/>
		<reference ref_id="1246195" ref_url="https://bugzilla.suse.com/1246195" source="BUGZILLA"/>
		<reference ref_id="1246220" ref_url="https://bugzilla.suse.com/1246220" source="BUGZILLA"/>
		<reference ref_id="1246234" ref_url="https://bugzilla.suse.com/1246234" source="BUGZILLA"/>
		<reference ref_id="1246236" ref_url="https://bugzilla.suse.com/1246236" source="BUGZILLA"/>
		<reference ref_id="1246240" ref_url="https://bugzilla.suse.com/1246240" source="BUGZILLA"/>
		<reference ref_id="1246243" ref_url="https://bugzilla.suse.com/1246243" source="BUGZILLA"/>
		<reference ref_id="1246244" ref_url="https://bugzilla.suse.com/1246244" source="BUGZILLA"/>
		<reference ref_id="1246245" ref_url="https://bugzilla.suse.com/1246245" source="BUGZILLA"/>
		<reference ref_id="1246246" ref_url="https://bugzilla.suse.com/1246246" source="BUGZILLA"/>
		<reference ref_id="1246248" ref_url="https://bugzilla.suse.com/1246248" source="BUGZILLA"/>
		<reference ref_id="1246250" ref_url="https://bugzilla.suse.com/1246250" source="BUGZILLA"/>
		<reference ref_id="1246252" ref_url="https://bugzilla.suse.com/1246252" source="BUGZILLA"/>
		<reference ref_id="1246253" ref_url="https://bugzilla.suse.com/1246253" source="BUGZILLA"/>
		<reference ref_id="1246255" ref_url="https://bugzilla.suse.com/1246255" source="BUGZILLA"/>
		<reference ref_id="1246258" ref_url="https://bugzilla.suse.com/1246258" source="BUGZILLA"/>
		<reference ref_id="1246259" ref_url="https://bugzilla.suse.com/1246259" source="BUGZILLA"/>
		<reference ref_id="1246260" ref_url="https://bugzilla.suse.com/1246260" source="BUGZILLA"/>
		<reference ref_id="1246262" ref_url="https://bugzilla.suse.com/1246262" source="BUGZILLA"/>
		<reference ref_id="1246266" ref_url="https://bugzilla.suse.com/1246266" source="BUGZILLA"/>
		<reference ref_id="1246268" ref_url="https://bugzilla.suse.com/1246268" source="BUGZILLA"/>
		<reference ref_id="1246283" ref_url="https://bugzilla.suse.com/1246283" source="BUGZILLA"/>
		<reference ref_id="1246285" ref_url="https://bugzilla.suse.com/1246285" source="BUGZILLA"/>
		<reference ref_id="1246286" ref_url="https://bugzilla.suse.com/1246286" source="BUGZILLA"/>
		<reference ref_id="1246287" ref_url="https://bugzilla.suse.com/1246287" source="BUGZILLA"/>
		<reference ref_id="1246290" ref_url="https://bugzilla.suse.com/1246290" source="BUGZILLA"/>
		<reference ref_id="1246292" ref_url="https://bugzilla.suse.com/1246292" source="BUGZILLA"/>
		<reference ref_id="1246293" ref_url="https://bugzilla.suse.com/1246293" source="BUGZILLA"/>
		<reference ref_id="1246295" ref_url="https://bugzilla.suse.com/1246295" source="BUGZILLA"/>
		<reference ref_id="1246297" ref_url="https://bugzilla.suse.com/1246297" source="BUGZILLA"/>
		<reference ref_id="1246333" ref_url="https://bugzilla.suse.com/1246333" source="BUGZILLA"/>
		<reference ref_id="1246334" ref_url="https://bugzilla.suse.com/1246334" source="BUGZILLA"/>
		<reference ref_id="1246337" ref_url="https://bugzilla.suse.com/1246337" source="BUGZILLA"/>
		<reference ref_id="1246342" ref_url="https://bugzilla.suse.com/1246342" source="BUGZILLA"/>
		<reference ref_id="1246349" ref_url="https://bugzilla.suse.com/1246349" source="BUGZILLA"/>
		<reference ref_id="1246351" ref_url="https://bugzilla.suse.com/1246351" source="BUGZILLA"/>
		<reference ref_id="1246353" ref_url="https://bugzilla.suse.com/1246353" source="BUGZILLA"/>
		<reference ref_id="1246354" ref_url="https://bugzilla.suse.com/1246354" source="BUGZILLA"/>
		<reference ref_id="1246358" ref_url="https://bugzilla.suse.com/1246358" source="BUGZILLA"/>
		<reference ref_id="1246364" ref_url="https://bugzilla.suse.com/1246364" source="BUGZILLA"/>
		<reference ref_id="1246366" ref_url="https://bugzilla.suse.com/1246366" source="BUGZILLA"/>
		<reference ref_id="1246370" ref_url="https://bugzilla.suse.com/1246370" source="BUGZILLA"/>
		<reference ref_id="1246375" ref_url="https://bugzilla.suse.com/1246375" source="BUGZILLA"/>
		<reference ref_id="1246376" ref_url="https://bugzilla.suse.com/1246376" source="BUGZILLA"/>
		<reference ref_id="1246385" ref_url="https://bugzilla.suse.com/1246385" source="BUGZILLA"/>
		<reference ref_id="1246386" ref_url="https://bugzilla.suse.com/1246386" source="BUGZILLA"/>
		<reference ref_id="1246387" ref_url="https://bugzilla.suse.com/1246387" source="BUGZILLA"/>
		<reference ref_id="1246438" ref_url="https://bugzilla.suse.com/1246438" source="BUGZILLA"/>
		<reference ref_id="1246443" ref_url="https://bugzilla.suse.com/1246443" source="BUGZILLA"/>
		<reference ref_id="1246444" ref_url="https://bugzilla.suse.com/1246444" source="BUGZILLA"/>
		<reference ref_id="1246447" ref_url="https://bugzilla.suse.com/1246447" source="BUGZILLA"/>
		<reference ref_id="1246450" ref_url="https://bugzilla.suse.com/1246450" source="BUGZILLA"/>
		<reference ref_id="1246453" ref_url="https://bugzilla.suse.com/1246453" source="BUGZILLA"/>
		<reference ref_id="1246473" ref_url="https://bugzilla.suse.com/1246473" source="BUGZILLA"/>
		<reference ref_id="1246490" ref_url="https://bugzilla.suse.com/1246490" source="BUGZILLA"/>
		<reference ref_id="1246509" ref_url="https://bugzilla.suse.com/1246509" source="BUGZILLA"/>
		<reference ref_id="1246547" ref_url="https://bugzilla.suse.com/1246547" source="BUGZILLA"/>
		<reference ref_id="1246631" ref_url="https://bugzilla.suse.com/1246631" source="BUGZILLA"/>
		<reference ref_id="1246651" ref_url="https://bugzilla.suse.com/1246651" source="BUGZILLA"/>
		<reference ref_id="1246688" ref_url="https://bugzilla.suse.com/1246688" source="BUGZILLA"/>
		<reference ref_id="1246777" ref_url="https://bugzilla.suse.com/1246777" source="BUGZILLA"/>
		<reference ref_id="1246781" ref_url="https://bugzilla.suse.com/1246781" source="BUGZILLA"/>
		<reference ref_id="1246782" ref_url="https://bugzilla.suse.com/1246782" source="BUGZILLA"/>
		<reference ref_id="1246868" ref_url="https://bugzilla.suse.com/1246868" source="BUGZILLA"/>
		<reference ref_id="1246896" ref_url="https://bugzilla.suse.com/1246896" source="BUGZILLA"/>
		<reference ref_id="1246911" ref_url="https://bugzilla.suse.com/1246911" source="BUGZILLA"/>
		<reference ref_id="1246979" ref_url="https://bugzilla.suse.com/1246979" source="BUGZILLA"/>
		<reference ref_id="1247018" ref_url="https://bugzilla.suse.com/1247018" source="BUGZILLA"/>
		<reference ref_id="1247020" ref_url="https://bugzilla.suse.com/1247020" source="BUGZILLA"/>
		<reference ref_id="1247022" ref_url="https://bugzilla.suse.com/1247022" source="BUGZILLA"/>
		<reference ref_id="1247023" ref_url="https://bugzilla.suse.com/1247023" source="BUGZILLA"/>
		<reference ref_id="1247024" ref_url="https://bugzilla.suse.com/1247024" source="BUGZILLA"/>
		<reference ref_id="1247027" ref_url="https://bugzilla.suse.com/1247027" source="BUGZILLA"/>
		<reference ref_id="1247028" ref_url="https://bugzilla.suse.com/1247028" source="BUGZILLA"/>
		<reference ref_id="1247031" ref_url="https://bugzilla.suse.com/1247031" source="BUGZILLA"/>
		<reference ref_id="1247033" ref_url="https://bugzilla.suse.com/1247033" source="BUGZILLA"/>
		<reference ref_id="1247035" ref_url="https://bugzilla.suse.com/1247035" source="BUGZILLA"/>
		<reference ref_id="1247061" ref_url="https://bugzilla.suse.com/1247061" source="BUGZILLA"/>
		<reference ref_id="1247062" ref_url="https://bugzilla.suse.com/1247062" source="BUGZILLA"/>
		<reference ref_id="1247064" ref_url="https://bugzilla.suse.com/1247064" source="BUGZILLA"/>
		<reference ref_id="1247076" ref_url="https://bugzilla.suse.com/1247076" source="BUGZILLA"/>
		<reference ref_id="1247078" ref_url="https://bugzilla.suse.com/1247078" source="BUGZILLA"/>
		<reference ref_id="1247079" ref_url="https://bugzilla.suse.com/1247079" source="BUGZILLA"/>
		<reference ref_id="1247088" ref_url="https://bugzilla.suse.com/1247088" source="BUGZILLA"/>
		<reference ref_id="1247089" ref_url="https://bugzilla.suse.com/1247089" source="BUGZILLA"/>
		<reference ref_id="1247091" ref_url="https://bugzilla.suse.com/1247091" source="BUGZILLA"/>
		<reference ref_id="1247097" ref_url="https://bugzilla.suse.com/1247097" source="BUGZILLA"/>
		<reference ref_id="1247098" ref_url="https://bugzilla.suse.com/1247098" source="BUGZILLA"/>
		<reference ref_id="1247099" ref_url="https://bugzilla.suse.com/1247099" source="BUGZILLA"/>
		<reference ref_id="1247101" ref_url="https://bugzilla.suse.com/1247101" source="BUGZILLA"/>
		<reference ref_id="1247102" ref_url="https://bugzilla.suse.com/1247102" source="BUGZILLA"/>
		<reference ref_id="1247103" ref_url="https://bugzilla.suse.com/1247103" source="BUGZILLA"/>
		<reference ref_id="1247104" ref_url="https://bugzilla.suse.com/1247104" source="BUGZILLA"/>
		<reference ref_id="1247112" ref_url="https://bugzilla.suse.com/1247112" source="BUGZILLA"/>
		<reference ref_id="1247113" ref_url="https://bugzilla.suse.com/1247113" source="BUGZILLA"/>
		<reference ref_id="1247116" ref_url="https://bugzilla.suse.com/1247116" source="BUGZILLA"/>
		<reference ref_id="1247118" ref_url="https://bugzilla.suse.com/1247118" source="BUGZILLA"/>
		<reference ref_id="1247119" ref_url="https://bugzilla.suse.com/1247119" source="BUGZILLA"/>
		<reference ref_id="1247123" ref_url="https://bugzilla.suse.com/1247123" source="BUGZILLA"/>
		<reference ref_id="1247125" ref_url="https://bugzilla.suse.com/1247125" source="BUGZILLA"/>
		<reference ref_id="1247126" ref_url="https://bugzilla.suse.com/1247126" source="BUGZILLA"/>
		<reference ref_id="1247128" ref_url="https://bugzilla.suse.com/1247128" source="BUGZILLA"/>
		<reference ref_id="1247130" ref_url="https://bugzilla.suse.com/1247130" source="BUGZILLA"/>
		<reference ref_id="1247131" ref_url="https://bugzilla.suse.com/1247131" source="BUGZILLA"/>
		<reference ref_id="1247132" ref_url="https://bugzilla.suse.com/1247132" source="BUGZILLA"/>
		<reference ref_id="1247136" ref_url="https://bugzilla.suse.com/1247136" source="BUGZILLA"/>
		<reference ref_id="1247137" ref_url="https://bugzilla.suse.com/1247137" source="BUGZILLA"/>
		<reference ref_id="1247138" ref_url="https://bugzilla.suse.com/1247138" source="BUGZILLA"/>
		<reference ref_id="1247141" ref_url="https://bugzilla.suse.com/1247141" source="BUGZILLA"/>
		<reference ref_id="1247143" ref_url="https://bugzilla.suse.com/1247143" source="BUGZILLA"/>
		<reference ref_id="1247145" ref_url="https://bugzilla.suse.com/1247145" source="BUGZILLA"/>
		<reference ref_id="1247146" ref_url="https://bugzilla.suse.com/1247146" source="BUGZILLA"/>
		<reference ref_id="1247147" ref_url="https://bugzilla.suse.com/1247147" source="BUGZILLA"/>
		<reference ref_id="1247149" ref_url="https://bugzilla.suse.com/1247149" source="BUGZILLA"/>
		<reference ref_id="1247150" ref_url="https://bugzilla.suse.com/1247150" source="BUGZILLA"/>
		<reference ref_id="1247151" ref_url="https://bugzilla.suse.com/1247151" source="BUGZILLA"/>
		<reference ref_id="1247152" ref_url="https://bugzilla.suse.com/1247152" source="BUGZILLA"/>
		<reference ref_id="1247153" ref_url="https://bugzilla.suse.com/1247153" source="BUGZILLA"/>
		<reference ref_id="1247154" ref_url="https://bugzilla.suse.com/1247154" source="BUGZILLA"/>
		<reference ref_id="1247155" ref_url="https://bugzilla.suse.com/1247155" source="BUGZILLA"/>
		<reference ref_id="1247156" ref_url="https://bugzilla.suse.com/1247156" source="BUGZILLA"/>
		<reference ref_id="1247157" ref_url="https://bugzilla.suse.com/1247157" source="BUGZILLA"/>
		<reference ref_id="1247160" ref_url="https://bugzilla.suse.com/1247160" source="BUGZILLA"/>
		<reference ref_id="1247162" ref_url="https://bugzilla.suse.com/1247162" source="BUGZILLA"/>
		<reference ref_id="1247163" ref_url="https://bugzilla.suse.com/1247163" source="BUGZILLA"/>
		<reference ref_id="1247164" ref_url="https://bugzilla.suse.com/1247164" source="BUGZILLA"/>
		<reference ref_id="1247167" ref_url="https://bugzilla.suse.com/1247167" source="BUGZILLA"/>
		<reference ref_id="1247169" ref_url="https://bugzilla.suse.com/1247169" source="BUGZILLA"/>
		<reference ref_id="1247170" ref_url="https://bugzilla.suse.com/1247170" source="BUGZILLA"/>
		<reference ref_id="1247171" ref_url="https://bugzilla.suse.com/1247171" source="BUGZILLA"/>
		<reference ref_id="1247174" ref_url="https://bugzilla.suse.com/1247174" source="BUGZILLA"/>
		<reference ref_id="1247176" ref_url="https://bugzilla.suse.com/1247176" source="BUGZILLA"/>
		<reference ref_id="1247177" ref_url="https://bugzilla.suse.com/1247177" source="BUGZILLA"/>
		<reference ref_id="1247178" ref_url="https://bugzilla.suse.com/1247178" source="BUGZILLA"/>
		<reference ref_id="1247181" ref_url="https://bugzilla.suse.com/1247181" source="BUGZILLA"/>
		<reference ref_id="1247209" ref_url="https://bugzilla.suse.com/1247209" source="BUGZILLA"/>
		<reference ref_id="1247210" ref_url="https://bugzilla.suse.com/1247210" source="BUGZILLA"/>
		<reference ref_id="1247220" ref_url="https://bugzilla.suse.com/1247220" source="BUGZILLA"/>
		<reference ref_id="1247223" ref_url="https://bugzilla.suse.com/1247223" source="BUGZILLA"/>
		<reference ref_id="1247227" ref_url="https://bugzilla.suse.com/1247227" source="BUGZILLA"/>
		<reference ref_id="1247229" ref_url="https://bugzilla.suse.com/1247229" source="BUGZILLA"/>
		<reference ref_id="1247231" ref_url="https://bugzilla.suse.com/1247231" source="BUGZILLA"/>
		<reference ref_id="1247233" ref_url="https://bugzilla.suse.com/1247233" source="BUGZILLA"/>
		<reference ref_id="1247234" ref_url="https://bugzilla.suse.com/1247234" source="BUGZILLA"/>
		<reference ref_id="1247235" ref_url="https://bugzilla.suse.com/1247235" source="BUGZILLA"/>
		<reference ref_id="1247236" ref_url="https://bugzilla.suse.com/1247236" source="BUGZILLA"/>
		<reference ref_id="1247238" ref_url="https://bugzilla.suse.com/1247238" source="BUGZILLA"/>
		<reference ref_id="1247239" ref_url="https://bugzilla.suse.com/1247239" source="BUGZILLA"/>
		<reference ref_id="1247241" ref_url="https://bugzilla.suse.com/1247241" source="BUGZILLA"/>
		<reference ref_id="1247243" ref_url="https://bugzilla.suse.com/1247243" source="BUGZILLA"/>
		<reference ref_id="1247250" ref_url="https://bugzilla.suse.com/1247250" source="BUGZILLA"/>
		<reference ref_id="1247251" ref_url="https://bugzilla.suse.com/1247251" source="BUGZILLA"/>
		<reference ref_id="1247252" ref_url="https://bugzilla.suse.com/1247252" source="BUGZILLA"/>
		<reference ref_id="1247253" ref_url="https://bugzilla.suse.com/1247253" source="BUGZILLA"/>
		<reference ref_id="1247255" ref_url="https://bugzilla.suse.com/1247255" source="BUGZILLA"/>
		<reference ref_id="1247262" ref_url="https://bugzilla.suse.com/1247262" source="BUGZILLA"/>
		<reference ref_id="1247265" ref_url="https://bugzilla.suse.com/1247265" source="BUGZILLA"/>
		<reference ref_id="1247270" ref_url="https://bugzilla.suse.com/1247270" source="BUGZILLA"/>
		<reference ref_id="1247271" ref_url="https://bugzilla.suse.com/1247271" source="BUGZILLA"/>
		<reference ref_id="1247273" ref_url="https://bugzilla.suse.com/1247273" source="BUGZILLA"/>
		<reference ref_id="1247274" ref_url="https://bugzilla.suse.com/1247274" source="BUGZILLA"/>
		<reference ref_id="1247276" ref_url="https://bugzilla.suse.com/1247276" source="BUGZILLA"/>
		<reference ref_id="1247277" ref_url="https://bugzilla.suse.com/1247277" source="BUGZILLA"/>
		<reference ref_id="1247278" ref_url="https://bugzilla.suse.com/1247278" source="BUGZILLA"/>
		<reference ref_id="1247279" ref_url="https://bugzilla.suse.com/1247279" source="BUGZILLA"/>
		<reference ref_id="1247280" ref_url="https://bugzilla.suse.com/1247280" source="BUGZILLA"/>
		<reference ref_id="1247282" ref_url="https://bugzilla.suse.com/1247282" source="BUGZILLA"/>
		<reference ref_id="1247283" ref_url="https://bugzilla.suse.com/1247283" source="BUGZILLA"/>
		<reference ref_id="1247284" ref_url="https://bugzilla.suse.com/1247284" source="BUGZILLA"/>
		<reference ref_id="1247285" ref_url="https://bugzilla.suse.com/1247285" source="BUGZILLA"/>
		<reference ref_id="1247288" ref_url="https://bugzilla.suse.com/1247288" source="BUGZILLA"/>
		<reference ref_id="1247289" ref_url="https://bugzilla.suse.com/1247289" source="BUGZILLA"/>
		<reference ref_id="1247290" ref_url="https://bugzilla.suse.com/1247290" source="BUGZILLA"/>
		<reference ref_id="1247293" ref_url="https://bugzilla.suse.com/1247293" source="BUGZILLA"/>
		<reference ref_id="1247308" ref_url="https://bugzilla.suse.com/1247308" source="BUGZILLA"/>
		<reference ref_id="1247311" ref_url="https://bugzilla.suse.com/1247311" source="BUGZILLA"/>
		<reference ref_id="1247313" ref_url="https://bugzilla.suse.com/1247313" source="BUGZILLA"/>
		<reference ref_id="1247314" ref_url="https://bugzilla.suse.com/1247314" source="BUGZILLA"/>
		<reference ref_id="1247317" ref_url="https://bugzilla.suse.com/1247317" source="BUGZILLA"/>
		<reference ref_id="1247325" ref_url="https://bugzilla.suse.com/1247325" source="BUGZILLA"/>
		<reference ref_id="1247347" ref_url="https://bugzilla.suse.com/1247347" source="BUGZILLA"/>
		<reference ref_id="1247348" ref_url="https://bugzilla.suse.com/1247348" source="BUGZILLA"/>
		<reference ref_id="1247349" ref_url="https://bugzilla.suse.com/1247349" source="BUGZILLA"/>
		<reference ref_id="1247366" ref_url="https://bugzilla.suse.com/1247366" source="BUGZILLA"/>
		<reference ref_id="1247372" ref_url="https://bugzilla.suse.com/1247372" source="BUGZILLA"/>
		<reference ref_id="1247376" ref_url="https://bugzilla.suse.com/1247376" source="BUGZILLA"/>
		<reference ref_id="1247426" ref_url="https://bugzilla.suse.com/1247426" source="BUGZILLA"/>
		<reference ref_id="1247437" ref_url="https://bugzilla.suse.com/1247437" source="BUGZILLA"/>
		<reference ref_id="1247442" ref_url="https://bugzilla.suse.com/1247442" source="BUGZILLA"/>
		<reference ref_id="1247483" ref_url="https://bugzilla.suse.com/1247483" source="BUGZILLA"/>
		<reference ref_id="1247500" ref_url="https://bugzilla.suse.com/1247500" source="BUGZILLA"/>
		<reference ref_id="1247712" ref_url="https://bugzilla.suse.com/1247712" source="BUGZILLA"/>
		<reference ref_id="1247837" ref_url="https://bugzilla.suse.com/1247837" source="BUGZILLA"/>
		<reference ref_id="1247838" ref_url="https://bugzilla.suse.com/1247838" source="BUGZILLA"/>
		<reference ref_id="1247935" ref_url="https://bugzilla.suse.com/1247935" source="BUGZILLA"/>
		<reference ref_id="1247936" ref_url="https://bugzilla.suse.com/1247936" source="BUGZILLA"/>
		<reference ref_id="1247949" ref_url="https://bugzilla.suse.com/1247949" source="BUGZILLA"/>
		<reference ref_id="1247950" ref_url="https://bugzilla.suse.com/1247950" source="BUGZILLA"/>
		<reference ref_id="1247963" ref_url="https://bugzilla.suse.com/1247963" source="BUGZILLA"/>
		<reference ref_id="1247976" ref_url="https://bugzilla.suse.com/1247976" source="BUGZILLA"/>
		<reference ref_id="1248088" ref_url="https://bugzilla.suse.com/1248088" source="BUGZILLA"/>
		<reference ref_id="1248111" ref_url="https://bugzilla.suse.com/1248111" source="BUGZILLA"/>
		<reference ref_id="1248121" ref_url="https://bugzilla.suse.com/1248121" source="BUGZILLA"/>
		<reference ref_id="1248183" ref_url="https://bugzilla.suse.com/1248183" source="BUGZILLA"/>
		<reference ref_id="1248186" ref_url="https://bugzilla.suse.com/1248186" source="BUGZILLA"/>
		<reference ref_id="1248190" ref_url="https://bugzilla.suse.com/1248190" source="BUGZILLA"/>
		<reference ref_id="1248192" ref_url="https://bugzilla.suse.com/1248192" source="BUGZILLA"/>
		<reference ref_id="1248194" ref_url="https://bugzilla.suse.com/1248194" source="BUGZILLA"/>
		<reference ref_id="1248198" ref_url="https://bugzilla.suse.com/1248198" source="BUGZILLA"/>
		<reference ref_id="1248199" ref_url="https://bugzilla.suse.com/1248199" source="BUGZILLA"/>
		<reference ref_id="1248200" ref_url="https://bugzilla.suse.com/1248200" source="BUGZILLA"/>
		<reference ref_id="1248202" ref_url="https://bugzilla.suse.com/1248202" source="BUGZILLA"/>
		<reference ref_id="1248205" ref_url="https://bugzilla.suse.com/1248205" source="BUGZILLA"/>
		<reference ref_id="1248211" ref_url="https://bugzilla.suse.com/1248211" source="BUGZILLA"/>
		<reference ref_id="1248223" ref_url="https://bugzilla.suse.com/1248223" source="BUGZILLA"/>
		<reference ref_id="1248224" ref_url="https://bugzilla.suse.com/1248224" source="BUGZILLA"/>
		<reference ref_id="1248225" ref_url="https://bugzilla.suse.com/1248225" source="BUGZILLA"/>
		<reference ref_id="1248230" ref_url="https://bugzilla.suse.com/1248230" source="BUGZILLA"/>
		<reference ref_id="1248235" ref_url="https://bugzilla.suse.com/1248235" source="BUGZILLA"/>
		<reference ref_id="1248255" ref_url="https://bugzilla.suse.com/1248255" source="BUGZILLA"/>
		<reference ref_id="1248296" ref_url="https://bugzilla.suse.com/1248296" source="BUGZILLA"/>
		<reference ref_id="1248297" ref_url="https://bugzilla.suse.com/1248297" source="BUGZILLA"/>
		<reference ref_id="1248299" ref_url="https://bugzilla.suse.com/1248299" source="BUGZILLA"/>
		<reference ref_id="1248302" ref_url="https://bugzilla.suse.com/1248302" source="BUGZILLA"/>
		<reference ref_id="1248304" ref_url="https://bugzilla.suse.com/1248304" source="BUGZILLA"/>
		<reference ref_id="1248306" ref_url="https://bugzilla.suse.com/1248306" source="BUGZILLA"/>
		<reference ref_id="1248312" ref_url="https://bugzilla.suse.com/1248312" source="BUGZILLA"/>
		<reference ref_id="1248333" ref_url="https://bugzilla.suse.com/1248333" source="BUGZILLA"/>
		<reference ref_id="1248334" ref_url="https://bugzilla.suse.com/1248334" source="BUGZILLA"/>
		<reference ref_id="1248337" ref_url="https://bugzilla.suse.com/1248337" source="BUGZILLA"/>
		<reference ref_id="1248338" ref_url="https://bugzilla.suse.com/1248338" source="BUGZILLA"/>
		<reference ref_id="1248340" ref_url="https://bugzilla.suse.com/1248340" source="BUGZILLA"/>
		<reference ref_id="1248341" ref_url="https://bugzilla.suse.com/1248341" source="BUGZILLA"/>
		<reference ref_id="1248343" ref_url="https://bugzilla.suse.com/1248343" source="BUGZILLA"/>
		<reference ref_id="1248345" ref_url="https://bugzilla.suse.com/1248345" source="BUGZILLA"/>
		<reference ref_id="1248349" ref_url="https://bugzilla.suse.com/1248349" source="BUGZILLA"/>
		<reference ref_id="1248350" ref_url="https://bugzilla.suse.com/1248350" source="BUGZILLA"/>
		<reference ref_id="1248354" ref_url="https://bugzilla.suse.com/1248354" source="BUGZILLA"/>
		<reference ref_id="1248355" ref_url="https://bugzilla.suse.com/1248355" source="BUGZILLA"/>
		<reference ref_id="1248357" ref_url="https://bugzilla.suse.com/1248357" source="BUGZILLA"/>
		<reference ref_id="1248359" ref_url="https://bugzilla.suse.com/1248359" source="BUGZILLA"/>
		<reference ref_id="1248361" ref_url="https://bugzilla.suse.com/1248361" source="BUGZILLA"/>
		<reference ref_id="1248363" ref_url="https://bugzilla.suse.com/1248363" source="BUGZILLA"/>
		<reference ref_id="1248365" ref_url="https://bugzilla.suse.com/1248365" source="BUGZILLA"/>
		<reference ref_id="1248367" ref_url="https://bugzilla.suse.com/1248367" source="BUGZILLA"/>
		<reference ref_id="1248368" ref_url="https://bugzilla.suse.com/1248368" source="BUGZILLA"/>
		<reference ref_id="1248374" ref_url="https://bugzilla.suse.com/1248374" source="BUGZILLA"/>
		<reference ref_id="1248377" ref_url="https://bugzilla.suse.com/1248377" source="BUGZILLA"/>
		<reference ref_id="1248378" ref_url="https://bugzilla.suse.com/1248378" source="BUGZILLA"/>
		<reference ref_id="1248380" ref_url="https://bugzilla.suse.com/1248380" source="BUGZILLA"/>
		<reference ref_id="1248386" ref_url="https://bugzilla.suse.com/1248386" source="BUGZILLA"/>
		<reference ref_id="1248390" ref_url="https://bugzilla.suse.com/1248390" source="BUGZILLA"/>
		<reference ref_id="1248392" ref_url="https://bugzilla.suse.com/1248392" source="BUGZILLA"/>
		<reference ref_id="1248395" ref_url="https://bugzilla.suse.com/1248395" source="BUGZILLA"/>
		<reference ref_id="1248396" ref_url="https://bugzilla.suse.com/1248396" source="BUGZILLA"/>
		<reference ref_id="1248399" ref_url="https://bugzilla.suse.com/1248399" source="BUGZILLA"/>
		<reference ref_id="1248401" ref_url="https://bugzilla.suse.com/1248401" source="BUGZILLA"/>
		<reference ref_id="1248511" ref_url="https://bugzilla.suse.com/1248511" source="BUGZILLA"/>
		<reference ref_id="1248512" ref_url="https://bugzilla.suse.com/1248512" source="BUGZILLA"/>
		<reference ref_id="1248573" ref_url="https://bugzilla.suse.com/1248573" source="BUGZILLA"/>
		<reference ref_id="1248575" ref_url="https://bugzilla.suse.com/1248575" source="BUGZILLA"/>
		<reference ref_id="1248577" ref_url="https://bugzilla.suse.com/1248577" source="BUGZILLA"/>
		<reference ref_id="1248609" ref_url="https://bugzilla.suse.com/1248609" source="BUGZILLA"/>
		<reference ref_id="1248610" ref_url="https://bugzilla.suse.com/1248610" source="BUGZILLA"/>
		<reference ref_id="1248616" ref_url="https://bugzilla.suse.com/1248616" source="BUGZILLA"/>
		<reference ref_id="1248617" ref_url="https://bugzilla.suse.com/1248617" source="BUGZILLA"/>
		<reference ref_id="1248619" ref_url="https://bugzilla.suse.com/1248619" source="BUGZILLA"/>
		<reference ref_id="1248621" ref_url="https://bugzilla.suse.com/1248621" source="BUGZILLA"/>
		<reference ref_id="1248622" ref_url="https://bugzilla.suse.com/1248622" source="BUGZILLA"/>
		<reference ref_id="1248624" ref_url="https://bugzilla.suse.com/1248624" source="BUGZILLA"/>
		<reference ref_id="1248627" ref_url="https://bugzilla.suse.com/1248627" source="BUGZILLA"/>
		<reference ref_id="1248628" ref_url="https://bugzilla.suse.com/1248628" source="BUGZILLA"/>
		<reference ref_id="1248634" ref_url="https://bugzilla.suse.com/1248634" source="BUGZILLA"/>
		<reference ref_id="1248635" ref_url="https://bugzilla.suse.com/1248635" source="BUGZILLA"/>
		<reference ref_id="1248639" ref_url="https://bugzilla.suse.com/1248639" source="BUGZILLA"/>
		<reference ref_id="1248643" ref_url="https://bugzilla.suse.com/1248643" source="BUGZILLA"/>
		<reference ref_id="1248647" ref_url="https://bugzilla.suse.com/1248647" source="BUGZILLA"/>
		<reference ref_id="1248648" ref_url="https://bugzilla.suse.com/1248648" source="BUGZILLA"/>
		<reference ref_id="1248652" ref_url="https://bugzilla.suse.com/1248652" source="BUGZILLA"/>
		<reference ref_id="1248655" ref_url="https://bugzilla.suse.com/1248655" source="BUGZILLA"/>
		<reference ref_id="1248662" ref_url="https://bugzilla.suse.com/1248662" source="BUGZILLA"/>
		<reference ref_id="1248664" ref_url="https://bugzilla.suse.com/1248664" source="BUGZILLA"/>
		<reference ref_id="1248666" ref_url="https://bugzilla.suse.com/1248666" source="BUGZILLA"/>
		<reference ref_id="1248669" ref_url="https://bugzilla.suse.com/1248669" source="BUGZILLA"/>
		<reference ref_id="1248674" ref_url="https://bugzilla.suse.com/1248674" source="BUGZILLA"/>
		<reference ref_id="1248681" ref_url="https://bugzilla.suse.com/1248681" source="BUGZILLA"/>
		<reference ref_id="1248727" ref_url="https://bugzilla.suse.com/1248727" source="BUGZILLA"/>
		<reference ref_id="1248728" ref_url="https://bugzilla.suse.com/1248728" source="BUGZILLA"/>
		<reference ref_id="1248748" ref_url="https://bugzilla.suse.com/1248748" source="BUGZILLA"/>
		<reference ref_id="1248754" ref_url="https://bugzilla.suse.com/1248754" source="BUGZILLA"/>
		<reference ref_id="1248775" ref_url="https://bugzilla.suse.com/1248775" source="BUGZILLA"/>
		<reference ref_id="1249022" ref_url="https://bugzilla.suse.com/1249022" source="BUGZILLA"/>
		<reference ref_id="1249038" ref_url="https://bugzilla.suse.com/1249038" source="BUGZILLA"/>
		<reference ref_id="1249060" ref_url="https://bugzilla.suse.com/1249060" source="BUGZILLA"/>
		<reference ref_id="1249061" ref_url="https://bugzilla.suse.com/1249061" source="BUGZILLA"/>
		<reference ref_id="1249062" ref_url="https://bugzilla.suse.com/1249062" source="BUGZILLA"/>
		<reference ref_id="1249064" ref_url="https://bugzilla.suse.com/1249064" source="BUGZILLA"/>
		<reference ref_id="1249065" ref_url="https://bugzilla.suse.com/1249065" source="BUGZILLA"/>
		<reference ref_id="1249066" ref_url="https://bugzilla.suse.com/1249066" source="BUGZILLA"/>
		<reference ref_id="1249126" ref_url="https://bugzilla.suse.com/1249126" source="BUGZILLA"/>
		<reference ref_id="1249143" ref_url="https://bugzilla.suse.com/1249143" source="BUGZILLA"/>
		<reference ref_id="1249156" ref_url="https://bugzilla.suse.com/1249156" source="BUGZILLA"/>
		<reference ref_id="1249159" ref_url="https://bugzilla.suse.com/1249159" source="BUGZILLA"/>
		<reference ref_id="1249160" ref_url="https://bugzilla.suse.com/1249160" source="BUGZILLA"/>
		<reference ref_id="1249163" ref_url="https://bugzilla.suse.com/1249163" source="BUGZILLA"/>
		<reference ref_id="1249164" ref_url="https://bugzilla.suse.com/1249164" source="BUGZILLA"/>
		<reference ref_id="1249166" ref_url="https://bugzilla.suse.com/1249166" source="BUGZILLA"/>
		<reference ref_id="1249167" ref_url="https://bugzilla.suse.com/1249167" source="BUGZILLA"/>
		<reference ref_id="1249169" ref_url="https://bugzilla.suse.com/1249169" source="BUGZILLA"/>
		<reference ref_id="1249170" ref_url="https://bugzilla.suse.com/1249170" source="BUGZILLA"/>
		<reference ref_id="1249172" ref_url="https://bugzilla.suse.com/1249172" source="BUGZILLA"/>
		<reference ref_id="1249176" ref_url="https://bugzilla.suse.com/1249176" source="BUGZILLA"/>
		<reference ref_id="1249177" ref_url="https://bugzilla.suse.com/1249177" source="BUGZILLA"/>
		<reference ref_id="1249182" ref_url="https://bugzilla.suse.com/1249182" source="BUGZILLA"/>
		<reference ref_id="1249186" ref_url="https://bugzilla.suse.com/1249186" source="BUGZILLA"/>
		<reference ref_id="1249190" ref_url="https://bugzilla.suse.com/1249190" source="BUGZILLA"/>
		<reference ref_id="1249193" ref_url="https://bugzilla.suse.com/1249193" source="BUGZILLA"/>
		<reference ref_id="1249195" ref_url="https://bugzilla.suse.com/1249195" source="BUGZILLA"/>
		<reference ref_id="1249199" ref_url="https://bugzilla.suse.com/1249199" source="BUGZILLA"/>
		<reference ref_id="1249201" ref_url="https://bugzilla.suse.com/1249201" source="BUGZILLA"/>
		<reference ref_id="1249202" ref_url="https://bugzilla.suse.com/1249202" source="BUGZILLA"/>
		<reference ref_id="1249203" ref_url="https://bugzilla.suse.com/1249203" source="BUGZILLA"/>
		<reference ref_id="1249204" ref_url="https://bugzilla.suse.com/1249204" source="BUGZILLA"/>
		<reference ref_id="1249206" ref_url="https://bugzilla.suse.com/1249206" source="BUGZILLA"/>
		<reference ref_id="1249215" ref_url="https://bugzilla.suse.com/1249215" source="BUGZILLA"/>
		<reference ref_id="1249220" ref_url="https://bugzilla.suse.com/1249220" source="BUGZILLA"/>
		<reference ref_id="1249221" ref_url="https://bugzilla.suse.com/1249221" source="BUGZILLA"/>
		<reference ref_id="1249254" ref_url="https://bugzilla.suse.com/1249254" source="BUGZILLA"/>
		<reference ref_id="1249258" ref_url="https://bugzilla.suse.com/1249258" source="BUGZILLA"/>
		<reference ref_id="1249262" ref_url="https://bugzilla.suse.com/1249262" source="BUGZILLA"/>
		<reference ref_id="1249263" ref_url="https://bugzilla.suse.com/1249263" source="BUGZILLA"/>
		<reference ref_id="1249265" ref_url="https://bugzilla.suse.com/1249265" source="BUGZILLA"/>
		<reference ref_id="1249266" ref_url="https://bugzilla.suse.com/1249266" source="BUGZILLA"/>
		<reference ref_id="1249269" ref_url="https://bugzilla.suse.com/1249269" source="BUGZILLA"/>
		<reference ref_id="1249271" ref_url="https://bugzilla.suse.com/1249271" source="BUGZILLA"/>
		<reference ref_id="1249272" ref_url="https://bugzilla.suse.com/1249272" source="BUGZILLA"/>
		<reference ref_id="1249273" ref_url="https://bugzilla.suse.com/1249273" source="BUGZILLA"/>
		<reference ref_id="1249274" ref_url="https://bugzilla.suse.com/1249274" source="BUGZILLA"/>
		<reference ref_id="1249278" ref_url="https://bugzilla.suse.com/1249278" source="BUGZILLA"/>
		<reference ref_id="1249279" ref_url="https://bugzilla.suse.com/1249279" source="BUGZILLA"/>
		<reference ref_id="1249281" ref_url="https://bugzilla.suse.com/1249281" source="BUGZILLA"/>
		<reference ref_id="1249282" ref_url="https://bugzilla.suse.com/1249282" source="BUGZILLA"/>
		<reference ref_id="1249284" ref_url="https://bugzilla.suse.com/1249284" source="BUGZILLA"/>
		<reference ref_id="1249285" ref_url="https://bugzilla.suse.com/1249285" source="BUGZILLA"/>
		<reference ref_id="1249286" ref_url="https://bugzilla.suse.com/1249286" source="BUGZILLA"/>
		<reference ref_id="1249288" ref_url="https://bugzilla.suse.com/1249288" source="BUGZILLA"/>
		<reference ref_id="1249290" ref_url="https://bugzilla.suse.com/1249290" source="BUGZILLA"/>
		<reference ref_id="1249292" ref_url="https://bugzilla.suse.com/1249292" source="BUGZILLA"/>
		<reference ref_id="1249295" ref_url="https://bugzilla.suse.com/1249295" source="BUGZILLA"/>
		<reference ref_id="1249296" ref_url="https://bugzilla.suse.com/1249296" source="BUGZILLA"/>
		<reference ref_id="1249297" ref_url="https://bugzilla.suse.com/1249297" source="BUGZILLA"/>
		<reference ref_id="1249299" ref_url="https://bugzilla.suse.com/1249299" source="BUGZILLA"/>
		<reference ref_id="1249300" ref_url="https://bugzilla.suse.com/1249300" source="BUGZILLA"/>
		<reference ref_id="1249301" ref_url="https://bugzilla.suse.com/1249301" source="BUGZILLA"/>
		<reference ref_id="1249303" ref_url="https://bugzilla.suse.com/1249303" source="BUGZILLA"/>
		<reference ref_id="1249304" ref_url="https://bugzilla.suse.com/1249304" source="BUGZILLA"/>
		<reference ref_id="1249305" ref_url="https://bugzilla.suse.com/1249305" source="BUGZILLA"/>
		<reference ref_id="1249306" ref_url="https://bugzilla.suse.com/1249306" source="BUGZILLA"/>
		<reference ref_id="1249308" ref_url="https://bugzilla.suse.com/1249308" source="BUGZILLA"/>
		<reference ref_id="1249309" ref_url="https://bugzilla.suse.com/1249309" source="BUGZILLA"/>
		<reference ref_id="1249312" ref_url="https://bugzilla.suse.com/1249312" source="BUGZILLA"/>
		<reference ref_id="1249313" ref_url="https://bugzilla.suse.com/1249313" source="BUGZILLA"/>
		<reference ref_id="1249314" ref_url="https://bugzilla.suse.com/1249314" source="BUGZILLA"/>
		<reference ref_id="1249315" ref_url="https://bugzilla.suse.com/1249315" source="BUGZILLA"/>
		<reference ref_id="1249316" ref_url="https://bugzilla.suse.com/1249316" source="BUGZILLA"/>
		<reference ref_id="1249318" ref_url="https://bugzilla.suse.com/1249318" source="BUGZILLA"/>
		<reference ref_id="1249319" ref_url="https://bugzilla.suse.com/1249319" source="BUGZILLA"/>
		<reference ref_id="1249320" ref_url="https://bugzilla.suse.com/1249320" source="BUGZILLA"/>
		<reference ref_id="1249321" ref_url="https://bugzilla.suse.com/1249321" source="BUGZILLA"/>
		<reference ref_id="1249322" ref_url="https://bugzilla.suse.com/1249322" source="BUGZILLA"/>
		<reference ref_id="1249323" ref_url="https://bugzilla.suse.com/1249323" source="BUGZILLA"/>
		<reference ref_id="1249324" ref_url="https://bugzilla.suse.com/1249324" source="BUGZILLA"/>
		<reference ref_id="1249333" ref_url="https://bugzilla.suse.com/1249333" source="BUGZILLA"/>
		<reference ref_id="1249334" ref_url="https://bugzilla.suse.com/1249334" source="BUGZILLA"/>
		<reference ref_id="1249338" ref_url="https://bugzilla.suse.com/1249338" source="BUGZILLA"/>
		<reference ref_id="1249346" ref_url="https://bugzilla.suse.com/1249346" source="BUGZILLA"/>
		<reference ref_id="1249374" ref_url="https://bugzilla.suse.com/1249374" source="BUGZILLA"/>
		<reference ref_id="1249413" ref_url="https://bugzilla.suse.com/1249413" source="BUGZILLA"/>
		<reference ref_id="1249477" ref_url="https://bugzilla.suse.com/1249477" source="BUGZILLA"/>
		<reference ref_id="1249478" ref_url="https://bugzilla.suse.com/1249478" source="BUGZILLA"/>
		<reference ref_id="1249479" ref_url="https://bugzilla.suse.com/1249479" source="BUGZILLA"/>
		<reference ref_id="1249486" ref_url="https://bugzilla.suse.com/1249486" source="BUGZILLA"/>
		<reference ref_id="1249490" ref_url="https://bugzilla.suse.com/1249490" source="BUGZILLA"/>
		<reference ref_id="1249494" ref_url="https://bugzilla.suse.com/1249494" source="BUGZILLA"/>
		<reference ref_id="1249500" ref_url="https://bugzilla.suse.com/1249500" source="BUGZILLA"/>
		<reference ref_id="1249504" ref_url="https://bugzilla.suse.com/1249504" source="BUGZILLA"/>
		<reference ref_id="1249506" ref_url="https://bugzilla.suse.com/1249506" source="BUGZILLA"/>
		<reference ref_id="1249508" ref_url="https://bugzilla.suse.com/1249508" source="BUGZILLA"/>
		<reference ref_id="1249509" ref_url="https://bugzilla.suse.com/1249509" source="BUGZILLA"/>
		<reference ref_id="1249510" ref_url="https://bugzilla.suse.com/1249510" source="BUGZILLA"/>
		<reference ref_id="1249513" ref_url="https://bugzilla.suse.com/1249513" source="BUGZILLA"/>
		<reference ref_id="1249515" ref_url="https://bugzilla.suse.com/1249515" source="BUGZILLA"/>
		<reference ref_id="1249516" ref_url="https://bugzilla.suse.com/1249516" source="BUGZILLA"/>
		<reference ref_id="1249522" ref_url="https://bugzilla.suse.com/1249522" source="BUGZILLA"/>
		<reference ref_id="1249523" ref_url="https://bugzilla.suse.com/1249523" source="BUGZILLA"/>
		<reference ref_id="1249524" ref_url="https://bugzilla.suse.com/1249524" source="BUGZILLA"/>
		<reference ref_id="1249526" ref_url="https://bugzilla.suse.com/1249526" source="BUGZILLA"/>
		<reference ref_id="1249533" ref_url="https://bugzilla.suse.com/1249533" source="BUGZILLA"/>
		<reference ref_id="1249538" ref_url="https://bugzilla.suse.com/1249538" source="BUGZILLA"/>
		<reference ref_id="1249540" ref_url="https://bugzilla.suse.com/1249540" source="BUGZILLA"/>
		<reference ref_id="1249542" ref_url="https://bugzilla.suse.com/1249542" source="BUGZILLA"/>
		<reference ref_id="1249545" ref_url="https://bugzilla.suse.com/1249545" source="BUGZILLA"/>
		<reference ref_id="1249547" ref_url="https://bugzilla.suse.com/1249547" source="BUGZILLA"/>
		<reference ref_id="1249548" ref_url="https://bugzilla.suse.com/1249548" source="BUGZILLA"/>
		<reference ref_id="1249550" ref_url="https://bugzilla.suse.com/1249550" source="BUGZILLA"/>
		<reference ref_id="1249552" ref_url="https://bugzilla.suse.com/1249552" source="BUGZILLA"/>
		<reference ref_id="1249554" ref_url="https://bugzilla.suse.com/1249554" source="BUGZILLA"/>
		<reference ref_id="1249562" ref_url="https://bugzilla.suse.com/1249562" source="BUGZILLA"/>
		<reference ref_id="1249566" ref_url="https://bugzilla.suse.com/1249566" source="BUGZILLA"/>
		<reference ref_id="1249587" ref_url="https://bugzilla.suse.com/1249587" source="BUGZILLA"/>
		<reference ref_id="1249598" ref_url="https://bugzilla.suse.com/1249598" source="BUGZILLA"/>
		<reference ref_id="1249604" ref_url="https://bugzilla.suse.com/1249604" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249615" ref_url="https://bugzilla.suse.com/1249615" source="BUGZILLA"/>
		<reference ref_id="1249618" ref_url="https://bugzilla.suse.com/1249618" source="BUGZILLA"/>
		<reference ref_id="1249774" ref_url="https://bugzilla.suse.com/1249774" source="BUGZILLA"/>
		<reference ref_id="1249833" ref_url="https://bugzilla.suse.com/1249833" source="BUGZILLA"/>
		<reference ref_id="1249887" ref_url="https://bugzilla.suse.com/1249887" source="BUGZILLA"/>
		<reference ref_id="1249888" ref_url="https://bugzilla.suse.com/1249888" source="BUGZILLA"/>
		<reference ref_id="1249901" ref_url="https://bugzilla.suse.com/1249901" source="BUGZILLA"/>
		<reference ref_id="1249904" ref_url="https://bugzilla.suse.com/1249904" source="BUGZILLA"/>
		<reference ref_id="1249906" ref_url="https://bugzilla.suse.com/1249906" source="BUGZILLA"/>
		<reference ref_id="1249915" ref_url="https://bugzilla.suse.com/1249915" source="BUGZILLA"/>
		<reference ref_id="1249974" ref_url="https://bugzilla.suse.com/1249974" source="BUGZILLA"/>
		<reference ref_id="1249975" ref_url="https://bugzilla.suse.com/1249975" source="BUGZILLA"/>
		<reference ref_id="1250002" ref_url="https://bugzilla.suse.com/1250002" source="BUGZILLA"/>
		<reference ref_id="1250007" ref_url="https://bugzilla.suse.com/1250007" source="BUGZILLA"/>
		<reference ref_id="1250021" ref_url="https://bugzilla.suse.com/1250021" source="BUGZILLA"/>
		<reference ref_id="1250025" ref_url="https://bugzilla.suse.com/1250025" source="BUGZILLA"/>
		<reference ref_id="1250028" ref_url="https://bugzilla.suse.com/1250028" source="BUGZILLA"/>
		<reference ref_id="1250032" ref_url="https://bugzilla.suse.com/1250032" source="BUGZILLA"/>
		<reference ref_id="1250087" ref_url="https://bugzilla.suse.com/1250087" source="BUGZILLA"/>
		<reference ref_id="1250088" ref_url="https://bugzilla.suse.com/1250088" source="BUGZILLA"/>
		<reference ref_id="1250119" ref_url="https://bugzilla.suse.com/1250119" source="BUGZILLA"/>
		<reference ref_id="1250123" ref_url="https://bugzilla.suse.com/1250123" source="BUGZILLA"/>
		<reference ref_id="1250124" ref_url="https://bugzilla.suse.com/1250124" source="BUGZILLA"/>
		<reference ref_id="1250177" ref_url="https://bugzilla.suse.com/1250177" source="BUGZILLA"/>
		<reference ref_id="1250179" ref_url="https://bugzilla.suse.com/1250179" source="BUGZILLA"/>
		<reference ref_id="1250203" ref_url="https://bugzilla.suse.com/1250203" source="BUGZILLA"/>
		<reference ref_id="1250204" ref_url="https://bugzilla.suse.com/1250204" source="BUGZILLA"/>
		<reference ref_id="1250205" ref_url="https://bugzilla.suse.com/1250205" source="BUGZILLA"/>
		<reference ref_id="1250237" ref_url="https://bugzilla.suse.com/1250237" source="BUGZILLA"/>
		<reference ref_id="1250242" ref_url="https://bugzilla.suse.com/1250242" source="BUGZILLA"/>
		<reference ref_id="1250247" ref_url="https://bugzilla.suse.com/1250247" source="BUGZILLA"/>
		<reference ref_id="1250249" ref_url="https://bugzilla.suse.com/1250249" source="BUGZILLA"/>
		<reference ref_id="1250251" ref_url="https://bugzilla.suse.com/1250251" source="BUGZILLA"/>
		<reference ref_id="1250258" ref_url="https://bugzilla.suse.com/1250258" source="BUGZILLA"/>
		<reference ref_id="1250262" ref_url="https://bugzilla.suse.com/1250262" source="BUGZILLA"/>
		<reference ref_id="1250266" ref_url="https://bugzilla.suse.com/1250266" source="BUGZILLA"/>
		<reference ref_id="1250267" ref_url="https://bugzilla.suse.com/1250267" source="BUGZILLA"/>
		<reference ref_id="1250268" ref_url="https://bugzilla.suse.com/1250268" source="BUGZILLA"/>
		<reference ref_id="1250275" ref_url="https://bugzilla.suse.com/1250275" source="BUGZILLA"/>
		<reference ref_id="1250276" ref_url="https://bugzilla.suse.com/1250276" source="BUGZILLA"/>
		<reference ref_id="1250281" ref_url="https://bugzilla.suse.com/1250281" source="BUGZILLA"/>
		<reference ref_id="1250291" ref_url="https://bugzilla.suse.com/1250291" source="BUGZILLA"/>
		<reference ref_id="1250292" ref_url="https://bugzilla.suse.com/1250292" source="BUGZILLA"/>
		<reference ref_id="1250294" ref_url="https://bugzilla.suse.com/1250294" source="BUGZILLA"/>
		<reference ref_id="1250296" ref_url="https://bugzilla.suse.com/1250296" source="BUGZILLA"/>
		<reference ref_id="1250297" ref_url="https://bugzilla.suse.com/1250297" source="BUGZILLA"/>
		<reference ref_id="1250298" ref_url="https://bugzilla.suse.com/1250298" source="BUGZILLA"/>
		<reference ref_id="1250334" ref_url="https://bugzilla.suse.com/1250334" source="BUGZILLA"/>
		<reference ref_id="1250344" ref_url="https://bugzilla.suse.com/1250344" source="BUGZILLA"/>
		<reference ref_id="1250365" ref_url="https://bugzilla.suse.com/1250365" source="BUGZILLA"/>
		<reference ref_id="1250371" ref_url="https://bugzilla.suse.com/1250371" source="BUGZILLA"/>
		<reference ref_id="1250377" ref_url="https://bugzilla.suse.com/1250377" source="BUGZILLA"/>
		<reference ref_id="1250386" ref_url="https://bugzilla.suse.com/1250386" source="BUGZILLA"/>
		<reference ref_id="1250389" ref_url="https://bugzilla.suse.com/1250389" source="BUGZILLA"/>
		<reference ref_id="1250398" ref_url="https://bugzilla.suse.com/1250398" source="BUGZILLA"/>
		<reference ref_id="1250402" ref_url="https://bugzilla.suse.com/1250402" source="BUGZILLA"/>
		<reference ref_id="1250406" ref_url="https://bugzilla.suse.com/1250406" source="BUGZILLA"/>
		<reference ref_id="1250407" ref_url="https://bugzilla.suse.com/1250407" source="BUGZILLA"/>
		<reference ref_id="1250408" ref_url="https://bugzilla.suse.com/1250408" source="BUGZILLA"/>
		<reference ref_id="1250450" ref_url="https://bugzilla.suse.com/1250450" source="BUGZILLA"/>
		<reference ref_id="1250491" ref_url="https://bugzilla.suse.com/1250491" source="BUGZILLA"/>
		<reference ref_id="1250519" ref_url="https://bugzilla.suse.com/1250519" source="BUGZILLA"/>
		<reference ref_id="1250522" ref_url="https://bugzilla.suse.com/1250522" source="BUGZILLA"/>
		<reference ref_id="1250650" ref_url="https://bugzilla.suse.com/1250650" source="BUGZILLA"/>
		<reference ref_id="1250655" ref_url="https://bugzilla.suse.com/1250655" source="BUGZILLA"/>
		<reference ref_id="1250671" ref_url="https://bugzilla.suse.com/1250671" source="BUGZILLA"/>
		<reference ref_id="1250702" ref_url="https://bugzilla.suse.com/1250702" source="BUGZILLA"/>
		<reference ref_id="1250711" ref_url="https://bugzilla.suse.com/1250711" source="BUGZILLA"/>
		<reference ref_id="1250712" ref_url="https://bugzilla.suse.com/1250712" source="BUGZILLA"/>
		<reference ref_id="1250713" ref_url="https://bugzilla.suse.com/1250713" source="BUGZILLA"/>
		<reference ref_id="1250716" ref_url="https://bugzilla.suse.com/1250716" source="BUGZILLA"/>
		<reference ref_id="1250719" ref_url="https://bugzilla.suse.com/1250719" source="BUGZILLA"/>
		<reference ref_id="1250722" ref_url="https://bugzilla.suse.com/1250722" source="BUGZILLA"/>
		<reference ref_id="1250729" ref_url="https://bugzilla.suse.com/1250729" source="BUGZILLA"/>
		<reference ref_id="1250736" ref_url="https://bugzilla.suse.com/1250736" source="BUGZILLA"/>
		<reference ref_id="1250737" ref_url="https://bugzilla.suse.com/1250737" source="BUGZILLA"/>
		<reference ref_id="1250739" ref_url="https://bugzilla.suse.com/1250739" source="BUGZILLA"/>
		<reference ref_id="1250741" ref_url="https://bugzilla.suse.com/1250741" source="BUGZILLA"/>
		<reference ref_id="1250742" ref_url="https://bugzilla.suse.com/1250742" source="BUGZILLA"/>
		<reference ref_id="1250758" ref_url="https://bugzilla.suse.com/1250758" source="BUGZILLA"/>
		<reference ref_id="1250952" ref_url="https://bugzilla.suse.com/1250952" source="BUGZILLA"/>
		<reference ref_id="1251100" ref_url="https://bugzilla.suse.com/1251100" source="BUGZILLA"/>
		<reference ref_id="1251114" ref_url="https://bugzilla.suse.com/1251114" source="BUGZILLA"/>
		<reference ref_id="1251134" ref_url="https://bugzilla.suse.com/1251134" source="BUGZILLA"/>
		<reference ref_id="1251135" ref_url="https://bugzilla.suse.com/1251135" source="BUGZILLA"/>
		<reference ref_id="1251143" ref_url="https://bugzilla.suse.com/1251143" source="BUGZILLA"/>
		<reference ref_id="1251146" ref_url="https://bugzilla.suse.com/1251146" source="BUGZILLA"/>
		<reference ref_id="1251186" ref_url="https://bugzilla.suse.com/1251186" source="BUGZILLA"/>
		<reference ref_id="1251216" ref_url="https://bugzilla.suse.com/1251216" source="BUGZILLA"/>
		<reference ref_id="1251230" ref_url="https://bugzilla.suse.com/1251230" source="BUGZILLA"/>
		<reference ref_id="1251810" ref_url="https://bugzilla.suse.com/1251810" source="BUGZILLA"/>
		<reference ref_id="1252084" ref_url="https://bugzilla.suse.com/1252084" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164/" source="CVE"/>
		<reference ref_id="CVE-2024-57891" ref_url="https://www.suse.com/security/cve/CVE-2024-57891/" source="CVE"/>
		<reference ref_id="CVE-2024-57951" ref_url="https://www.suse.com/security/cve/CVE-2024-57951/" source="CVE"/>
		<reference ref_id="CVE-2024-57952" ref_url="https://www.suse.com/security/cve/CVE-2024-57952/" source="CVE"/>
		<reference ref_id="CVE-2024-58090" ref_url="https://www.suse.com/security/cve/CVE-2024-58090/" source="CVE"/>
		<reference ref_id="CVE-2025-22034" ref_url="https://www.suse.com/security/cve/CVE-2025-22034/" source="CVE"/>
		<reference ref_id="CVE-2025-22077" ref_url="https://www.suse.com/security/cve/CVE-2025-22077/" source="CVE"/>
		<reference ref_id="CVE-2025-23141" ref_url="https://www.suse.com/security/cve/CVE-2025-23141/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-37821" ref_url="https://www.suse.com/security/cve/CVE-2025-37821/" source="CVE"/>
		<reference ref_id="CVE-2025-37849" ref_url="https://www.suse.com/security/cve/CVE-2025-37849/" source="CVE"/>
		<reference ref_id="CVE-2025-37856" ref_url="https://www.suse.com/security/cve/CVE-2025-37856/" source="CVE"/>
		<reference ref_id="CVE-2025-37861" ref_url="https://www.suse.com/security/cve/CVE-2025-37861/" source="CVE"/>
		<reference ref_id="CVE-2025-37864" ref_url="https://www.suse.com/security/cve/CVE-2025-37864/" source="CVE"/>
		<reference ref_id="CVE-2025-38006" ref_url="https://www.suse.com/security/cve/CVE-2025-38006/" source="CVE"/>
		<reference ref_id="CVE-2025-38008" ref_url="https://www.suse.com/security/cve/CVE-2025-38008/" source="CVE"/>
		<reference ref_id="CVE-2025-38019" ref_url="https://www.suse.com/security/cve/CVE-2025-38019/" source="CVE"/>
		<reference ref_id="CVE-2025-38034" ref_url="https://www.suse.com/security/cve/CVE-2025-38034/" source="CVE"/>
		<reference ref_id="CVE-2025-38038" ref_url="https://www.suse.com/security/cve/CVE-2025-38038/" source="CVE"/>
		<reference ref_id="CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052/" source="CVE"/>
		<reference ref_id="CVE-2025-38058" ref_url="https://www.suse.com/security/cve/CVE-2025-38058/" source="CVE"/>
		<reference ref_id="CVE-2025-38062" ref_url="https://www.suse.com/security/cve/CVE-2025-38062/" source="CVE"/>
		<reference ref_id="CVE-2025-38075" ref_url="https://www.suse.com/security/cve/CVE-2025-38075/" source="CVE"/>
		<reference ref_id="CVE-2025-38087" ref_url="https://www.suse.com/security/cve/CVE-2025-38087/" source="CVE"/>
		<reference ref_id="CVE-2025-38088" ref_url="https://www.suse.com/security/cve/CVE-2025-38088/" source="CVE"/>
		<reference ref_id="CVE-2025-38089" ref_url="https://www.suse.com/security/cve/CVE-2025-38089/" source="CVE"/>
		<reference ref_id="CVE-2025-38090" ref_url="https://www.suse.com/security/cve/CVE-2025-38090/" source="CVE"/>
		<reference ref_id="CVE-2025-38091" ref_url="https://www.suse.com/security/cve/CVE-2025-38091/" source="CVE"/>
		<reference ref_id="CVE-2025-38095" ref_url="https://www.suse.com/security/cve/CVE-2025-38095/" source="CVE"/>
		<reference ref_id="CVE-2025-38096" ref_url="https://www.suse.com/security/cve/CVE-2025-38096/" source="CVE"/>
		<reference ref_id="CVE-2025-38098" ref_url="https://www.suse.com/security/cve/CVE-2025-38098/" source="CVE"/>
		<reference ref_id="CVE-2025-38099" ref_url="https://www.suse.com/security/cve/CVE-2025-38099/" source="CVE"/>
		<reference ref_id="CVE-2025-38101" ref_url="https://www.suse.com/security/cve/CVE-2025-38101/" source="CVE"/>
		<reference ref_id="CVE-2025-38102" ref_url="https://www.suse.com/security/cve/CVE-2025-38102/" source="CVE"/>
		<reference ref_id="CVE-2025-38103" ref_url="https://www.suse.com/security/cve/CVE-2025-38103/" source="CVE"/>
		<reference ref_id="CVE-2025-38106" ref_url="https://www.suse.com/security/cve/CVE-2025-38106/" source="CVE"/>
		<reference ref_id="CVE-2025-38107" ref_url="https://www.suse.com/security/cve/CVE-2025-38107/" source="CVE"/>
		<reference ref_id="CVE-2025-38108" ref_url="https://www.suse.com/security/cve/CVE-2025-38108/" source="CVE"/>
		<reference ref_id="CVE-2025-38109" ref_url="https://www.suse.com/security/cve/CVE-2025-38109/" source="CVE"/>
		<reference ref_id="CVE-2025-38110" ref_url="https://www.suse.com/security/cve/CVE-2025-38110/" source="CVE"/>
		<reference ref_id="CVE-2025-38111" ref_url="https://www.suse.com/security/cve/CVE-2025-38111/" source="CVE"/>
		<reference ref_id="CVE-2025-38112" ref_url="https://www.suse.com/security/cve/CVE-2025-38112/" source="CVE"/>
		<reference ref_id="CVE-2025-38113" ref_url="https://www.suse.com/security/cve/CVE-2025-38113/" source="CVE"/>
		<reference ref_id="CVE-2025-38114" ref_url="https://www.suse.com/security/cve/CVE-2025-38114/" source="CVE"/>
		<reference ref_id="CVE-2025-38117" ref_url="https://www.suse.com/security/cve/CVE-2025-38117/" source="CVE"/>
		<reference ref_id="CVE-2025-38118" ref_url="https://www.suse.com/security/cve/CVE-2025-38118/" source="CVE"/>
		<reference ref_id="CVE-2025-38119" ref_url="https://www.suse.com/security/cve/CVE-2025-38119/" source="CVE"/>
		<reference ref_id="CVE-2025-38120" ref_url="https://www.suse.com/security/cve/CVE-2025-38120/" source="CVE"/>
		<reference ref_id="CVE-2025-38122" ref_url="https://www.suse.com/security/cve/CVE-2025-38122/" source="CVE"/>
		<reference ref_id="CVE-2025-38123" ref_url="https://www.suse.com/security/cve/CVE-2025-38123/" source="CVE"/>
		<reference ref_id="CVE-2025-38124" ref_url="https://www.suse.com/security/cve/CVE-2025-38124/" source="CVE"/>
		<reference ref_id="CVE-2025-38125" ref_url="https://www.suse.com/security/cve/CVE-2025-38125/" source="CVE"/>
		<reference ref_id="CVE-2025-38127" ref_url="https://www.suse.com/security/cve/CVE-2025-38127/" source="CVE"/>
		<reference ref_id="CVE-2025-38128" ref_url="https://www.suse.com/security/cve/CVE-2025-38128/" source="CVE"/>
		<reference ref_id="CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129/" source="CVE"/>
		<reference ref_id="CVE-2025-38134" ref_url="https://www.suse.com/security/cve/CVE-2025-38134/" source="CVE"/>
		<reference ref_id="CVE-2025-38135" ref_url="https://www.suse.com/security/cve/CVE-2025-38135/" source="CVE"/>
		<reference ref_id="CVE-2025-38136" ref_url="https://www.suse.com/security/cve/CVE-2025-38136/" source="CVE"/>
		<reference ref_id="CVE-2025-38137" ref_url="https://www.suse.com/security/cve/CVE-2025-38137/" source="CVE"/>
		<reference ref_id="CVE-2025-38138" ref_url="https://www.suse.com/security/cve/CVE-2025-38138/" source="CVE"/>
		<reference ref_id="CVE-2025-38140" ref_url="https://www.suse.com/security/cve/CVE-2025-38140/" source="CVE"/>
		<reference ref_id="CVE-2025-38141" ref_url="https://www.suse.com/security/cve/CVE-2025-38141/" source="CVE"/>
		<reference ref_id="CVE-2025-38142" ref_url="https://www.suse.com/security/cve/CVE-2025-38142/" source="CVE"/>
		<reference ref_id="CVE-2025-38143" ref_url="https://www.suse.com/security/cve/CVE-2025-38143/" source="CVE"/>
		<reference ref_id="CVE-2025-38145" ref_url="https://www.suse.com/security/cve/CVE-2025-38145/" source="CVE"/>
		<reference ref_id="CVE-2025-38146" ref_url="https://www.suse.com/security/cve/CVE-2025-38146/" source="CVE"/>
		<reference ref_id="CVE-2025-38148" ref_url="https://www.suse.com/security/cve/CVE-2025-38148/" source="CVE"/>
		<reference ref_id="CVE-2025-38149" ref_url="https://www.suse.com/security/cve/CVE-2025-38149/" source="CVE"/>
		<reference ref_id="CVE-2025-38151" ref_url="https://www.suse.com/security/cve/CVE-2025-38151/" source="CVE"/>
		<reference ref_id="CVE-2025-38153" ref_url="https://www.suse.com/security/cve/CVE-2025-38153/" source="CVE"/>
		<reference ref_id="CVE-2025-38154" ref_url="https://www.suse.com/security/cve/CVE-2025-38154/" source="CVE"/>
		<reference ref_id="CVE-2025-38155" ref_url="https://www.suse.com/security/cve/CVE-2025-38155/" source="CVE"/>
		<reference ref_id="CVE-2025-38156" ref_url="https://www.suse.com/security/cve/CVE-2025-38156/" source="CVE"/>
		<reference ref_id="CVE-2025-38157" ref_url="https://www.suse.com/security/cve/CVE-2025-38157/" source="CVE"/>
		<reference ref_id="CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159/" source="CVE"/>
		<reference ref_id="CVE-2025-38160" ref_url="https://www.suse.com/security/cve/CVE-2025-38160/" source="CVE"/>
		<reference ref_id="CVE-2025-38161" ref_url="https://www.suse.com/security/cve/CVE-2025-38161/" source="CVE"/>
		<reference ref_id="CVE-2025-38165" ref_url="https://www.suse.com/security/cve/CVE-2025-38165/" source="CVE"/>
		<reference ref_id="CVE-2025-38168" ref_url="https://www.suse.com/security/cve/CVE-2025-38168/" source="CVE"/>
		<reference ref_id="CVE-2025-38169" ref_url="https://www.suse.com/security/cve/CVE-2025-38169/" source="CVE"/>
		<reference ref_id="CVE-2025-38170" ref_url="https://www.suse.com/security/cve/CVE-2025-38170/" source="CVE"/>
		<reference ref_id="CVE-2025-38172" ref_url="https://www.suse.com/security/cve/CVE-2025-38172/" source="CVE"/>
		<reference ref_id="CVE-2025-38173" ref_url="https://www.suse.com/security/cve/CVE-2025-38173/" source="CVE"/>
		<reference ref_id="CVE-2025-38174" ref_url="https://www.suse.com/security/cve/CVE-2025-38174/" source="CVE"/>
		<reference ref_id="CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177/" source="CVE"/>
		<reference ref_id="CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180/" source="CVE"/>
		<reference ref_id="CVE-2025-38181" ref_url="https://www.suse.com/security/cve/CVE-2025-38181/" source="CVE"/>
		<reference ref_id="CVE-2025-38182" ref_url="https://www.suse.com/security/cve/CVE-2025-38182/" source="CVE"/>
		<reference ref_id="CVE-2025-38184" ref_url="https://www.suse.com/security/cve/CVE-2025-38184/" source="CVE"/>
		<reference ref_id="CVE-2025-38185" ref_url="https://www.suse.com/security/cve/CVE-2025-38185/" source="CVE"/>
		<reference ref_id="CVE-2025-38186" ref_url="https://www.suse.com/security/cve/CVE-2025-38186/" source="CVE"/>
		<reference ref_id="CVE-2025-38188" ref_url="https://www.suse.com/security/cve/CVE-2025-38188/" source="CVE"/>
		<reference ref_id="CVE-2025-38189" ref_url="https://www.suse.com/security/cve/CVE-2025-38189/" source="CVE"/>
		<reference ref_id="CVE-2025-38190" ref_url="https://www.suse.com/security/cve/CVE-2025-38190/" source="CVE"/>
		<reference ref_id="CVE-2025-38193" ref_url="https://www.suse.com/security/cve/CVE-2025-38193/" source="CVE"/>
		<reference ref_id="CVE-2025-38197" ref_url="https://www.suse.com/security/cve/CVE-2025-38197/" source="CVE"/>
		<reference ref_id="CVE-2025-38198" ref_url="https://www.suse.com/security/cve/CVE-2025-38198/" source="CVE"/>
		<reference ref_id="CVE-2025-38201" ref_url="https://www.suse.com/security/cve/CVE-2025-38201/" source="CVE"/>
		<reference ref_id="CVE-2025-38205" ref_url="https://www.suse.com/security/cve/CVE-2025-38205/" source="CVE"/>
		<reference ref_id="CVE-2025-38208" ref_url="https://www.suse.com/security/cve/CVE-2025-38208/" source="CVE"/>
		<reference ref_id="CVE-2025-38209" ref_url="https://www.suse.com/security/cve/CVE-2025-38209/" source="CVE"/>
		<reference ref_id="CVE-2025-38211" ref_url="https://www.suse.com/security/cve/CVE-2025-38211/" source="CVE"/>
		<reference ref_id="CVE-2025-38213" ref_url="https://www.suse.com/security/cve/CVE-2025-38213/" source="CVE"/>
		<reference ref_id="CVE-2025-38214" ref_url="https://www.suse.com/security/cve/CVE-2025-38214/" source="CVE"/>
		<reference ref_id="CVE-2025-38215" ref_url="https://www.suse.com/security/cve/CVE-2025-38215/" source="CVE"/>
		<reference ref_id="CVE-2025-38216" ref_url="https://www.suse.com/security/cve/CVE-2025-38216/" source="CVE"/>
		<reference ref_id="CVE-2025-38217" ref_url="https://www.suse.com/security/cve/CVE-2025-38217/" source="CVE"/>
		<reference ref_id="CVE-2025-38220" ref_url="https://www.suse.com/security/cve/CVE-2025-38220/" source="CVE"/>
		<reference ref_id="CVE-2025-38222" ref_url="https://www.suse.com/security/cve/CVE-2025-38222/" source="CVE"/>
		<reference ref_id="CVE-2025-38224" ref_url="https://www.suse.com/security/cve/CVE-2025-38224/" source="CVE"/>
		<reference ref_id="CVE-2025-38225" ref_url="https://www.suse.com/security/cve/CVE-2025-38225/" source="CVE"/>
		<reference ref_id="CVE-2025-38226" ref_url="https://www.suse.com/security/cve/CVE-2025-38226/" source="CVE"/>
		<reference ref_id="CVE-2025-38227" ref_url="https://www.suse.com/security/cve/CVE-2025-38227/" source="CVE"/>
		<reference ref_id="CVE-2025-38228" ref_url="https://www.suse.com/security/cve/CVE-2025-38228/" source="CVE"/>
		<reference ref_id="CVE-2025-38229" ref_url="https://www.suse.com/security/cve/CVE-2025-38229/" source="CVE"/>
		<reference ref_id="CVE-2025-38231" ref_url="https://www.suse.com/security/cve/CVE-2025-38231/" source="CVE"/>
		<reference ref_id="CVE-2025-38232" ref_url="https://www.suse.com/security/cve/CVE-2025-38232/" source="CVE"/>
		<reference ref_id="CVE-2025-38233" ref_url="https://www.suse.com/security/cve/CVE-2025-38233/" source="CVE"/>
		<reference ref_id="CVE-2025-38234" ref_url="https://www.suse.com/security/cve/CVE-2025-38234/" source="CVE"/>
		<reference ref_id="CVE-2025-38242" ref_url="https://www.suse.com/security/cve/CVE-2025-38242/" source="CVE"/>
		<reference ref_id="CVE-2025-38244" ref_url="https://www.suse.com/security/cve/CVE-2025-38244/" source="CVE"/>
		<reference ref_id="CVE-2025-38245" ref_url="https://www.suse.com/security/cve/CVE-2025-38245/" source="CVE"/>
		<reference ref_id="CVE-2025-38246" ref_url="https://www.suse.com/security/cve/CVE-2025-38246/" source="CVE"/>
		<reference ref_id="CVE-2025-38249" ref_url="https://www.suse.com/security/cve/CVE-2025-38249/" source="CVE"/>
		<reference ref_id="CVE-2025-38251" ref_url="https://www.suse.com/security/cve/CVE-2025-38251/" source="CVE"/>
		<reference ref_id="CVE-2025-38253" ref_url="https://www.suse.com/security/cve/CVE-2025-38253/" source="CVE"/>
		<reference ref_id="CVE-2025-38255" ref_url="https://www.suse.com/security/cve/CVE-2025-38255/" source="CVE"/>
		<reference ref_id="CVE-2025-38256" ref_url="https://www.suse.com/security/cve/CVE-2025-38256/" source="CVE"/>
		<reference ref_id="CVE-2025-38257" ref_url="https://www.suse.com/security/cve/CVE-2025-38257/" source="CVE"/>
		<reference ref_id="CVE-2025-38258" ref_url="https://www.suse.com/security/cve/CVE-2025-38258/" source="CVE"/>
		<reference ref_id="CVE-2025-38259" ref_url="https://www.suse.com/security/cve/CVE-2025-38259/" source="CVE"/>
		<reference ref_id="CVE-2025-38263" ref_url="https://www.suse.com/security/cve/CVE-2025-38263/" source="CVE"/>
		<reference ref_id="CVE-2025-38264" ref_url="https://www.suse.com/security/cve/CVE-2025-38264/" source="CVE"/>
		<reference ref_id="CVE-2025-38265" ref_url="https://www.suse.com/security/cve/CVE-2025-38265/" source="CVE"/>
		<reference ref_id="CVE-2025-38267" ref_url="https://www.suse.com/security/cve/CVE-2025-38267/" source="CVE"/>
		<reference ref_id="CVE-2025-38268" ref_url="https://www.suse.com/security/cve/CVE-2025-38268/" source="CVE"/>
		<reference ref_id="CVE-2025-38270" ref_url="https://www.suse.com/security/cve/CVE-2025-38270/" source="CVE"/>
		<reference ref_id="CVE-2025-38272" ref_url="https://www.suse.com/security/cve/CVE-2025-38272/" source="CVE"/>
		<reference ref_id="CVE-2025-38273" ref_url="https://www.suse.com/security/cve/CVE-2025-38273/" source="CVE"/>
		<reference ref_id="CVE-2025-38274" ref_url="https://www.suse.com/security/cve/CVE-2025-38274/" source="CVE"/>
		<reference ref_id="CVE-2025-38275" ref_url="https://www.suse.com/security/cve/CVE-2025-38275/" source="CVE"/>
		<reference ref_id="CVE-2025-38277" ref_url="https://www.suse.com/security/cve/CVE-2025-38277/" source="CVE"/>
		<reference ref_id="CVE-2025-38278" ref_url="https://www.suse.com/security/cve/CVE-2025-38278/" source="CVE"/>
		<reference ref_id="CVE-2025-38286" ref_url="https://www.suse.com/security/cve/CVE-2025-38286/" source="CVE"/>
		<reference ref_id="CVE-2025-38287" ref_url="https://www.suse.com/security/cve/CVE-2025-38287/" source="CVE"/>
		<reference ref_id="CVE-2025-38288" ref_url="https://www.suse.com/security/cve/CVE-2025-38288/" source="CVE"/>
		<reference ref_id="CVE-2025-38289" ref_url="https://www.suse.com/security/cve/CVE-2025-38289/" source="CVE"/>
		<reference ref_id="CVE-2025-38290" ref_url="https://www.suse.com/security/cve/CVE-2025-38290/" source="CVE"/>
		<reference ref_id="CVE-2025-38291" ref_url="https://www.suse.com/security/cve/CVE-2025-38291/" source="CVE"/>
		<reference ref_id="CVE-2025-38292" ref_url="https://www.suse.com/security/cve/CVE-2025-38292/" source="CVE"/>
		<reference ref_id="CVE-2025-38293" ref_url="https://www.suse.com/security/cve/CVE-2025-38293/" source="CVE"/>
		<reference ref_id="CVE-2025-38299" ref_url="https://www.suse.com/security/cve/CVE-2025-38299/" source="CVE"/>
		<reference ref_id="CVE-2025-38300" ref_url="https://www.suse.com/security/cve/CVE-2025-38300/" source="CVE"/>
		<reference ref_id="CVE-2025-38301" ref_url="https://www.suse.com/security/cve/CVE-2025-38301/" source="CVE"/>
		<reference ref_id="CVE-2025-38302" ref_url="https://www.suse.com/security/cve/CVE-2025-38302/" source="CVE"/>
		<reference ref_id="CVE-2025-38303" ref_url="https://www.suse.com/security/cve/CVE-2025-38303/" source="CVE"/>
		<reference ref_id="CVE-2025-38304" ref_url="https://www.suse.com/security/cve/CVE-2025-38304/" source="CVE"/>
		<reference ref_id="CVE-2025-38305" ref_url="https://www.suse.com/security/cve/CVE-2025-38305/" source="CVE"/>
		<reference ref_id="CVE-2025-38306" ref_url="https://www.suse.com/security/cve/CVE-2025-38306/" source="CVE"/>
		<reference ref_id="CVE-2025-38307" ref_url="https://www.suse.com/security/cve/CVE-2025-38307/" source="CVE"/>
		<reference ref_id="CVE-2025-38311" ref_url="https://www.suse.com/security/cve/CVE-2025-38311/" source="CVE"/>
		<reference ref_id="CVE-2025-38312" ref_url="https://www.suse.com/security/cve/CVE-2025-38312/" source="CVE"/>
		<reference ref_id="CVE-2025-38313" ref_url="https://www.suse.com/security/cve/CVE-2025-38313/" source="CVE"/>
		<reference ref_id="CVE-2025-38315" ref_url="https://www.suse.com/security/cve/CVE-2025-38315/" source="CVE"/>
		<reference ref_id="CVE-2025-38317" ref_url="https://www.suse.com/security/cve/CVE-2025-38317/" source="CVE"/>
		<reference ref_id="CVE-2025-38318" ref_url="https://www.suse.com/security/cve/CVE-2025-38318/" source="CVE"/>
		<reference ref_id="CVE-2025-38319" ref_url="https://www.suse.com/security/cve/CVE-2025-38319/" source="CVE"/>
		<reference ref_id="CVE-2025-38322" ref_url="https://www.suse.com/security/cve/CVE-2025-38322/" source="CVE"/>
		<reference ref_id="CVE-2025-38323" ref_url="https://www.suse.com/security/cve/CVE-2025-38323/" source="CVE"/>
		<reference ref_id="CVE-2025-38326" ref_url="https://www.suse.com/security/cve/CVE-2025-38326/" source="CVE"/>
		<reference ref_id="CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332/" source="CVE"/>
		<reference ref_id="CVE-2025-38335" ref_url="https://www.suse.com/security/cve/CVE-2025-38335/" source="CVE"/>
		<reference ref_id="CVE-2025-38336" ref_url="https://www.suse.com/security/cve/CVE-2025-38336/" source="CVE"/>
		<reference ref_id="CVE-2025-38337" ref_url="https://www.suse.com/security/cve/CVE-2025-38337/" source="CVE"/>
		<reference ref_id="CVE-2025-38338" ref_url="https://www.suse.com/security/cve/CVE-2025-38338/" source="CVE"/>
		<reference ref_id="CVE-2025-38339" ref_url="https://www.suse.com/security/cve/CVE-2025-38339/" source="CVE"/>
		<reference ref_id="CVE-2025-38341" ref_url="https://www.suse.com/security/cve/CVE-2025-38341/" source="CVE"/>
		<reference ref_id="CVE-2025-38342" ref_url="https://www.suse.com/security/cve/CVE-2025-38342/" source="CVE"/>
		<reference ref_id="CVE-2025-38343" ref_url="https://www.suse.com/security/cve/CVE-2025-38343/" source="CVE"/>
		<reference ref_id="CVE-2025-38344" ref_url="https://www.suse.com/security/cve/CVE-2025-38344/" source="CVE"/>
		<reference ref_id="CVE-2025-38345" ref_url="https://www.suse.com/security/cve/CVE-2025-38345/" source="CVE"/>
		<reference ref_id="CVE-2025-38348" ref_url="https://www.suse.com/security/cve/CVE-2025-38348/" source="CVE"/>
		<reference ref_id="CVE-2025-38349" ref_url="https://www.suse.com/security/cve/CVE-2025-38349/" source="CVE"/>
		<reference ref_id="CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350/" source="CVE"/>
		<reference ref_id="CVE-2025-38351" ref_url="https://www.suse.com/security/cve/CVE-2025-38351/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<reference ref_id="CVE-2025-38353" ref_url="https://www.suse.com/security/cve/CVE-2025-38353/" source="CVE"/>
		<reference ref_id="CVE-2025-38354" ref_url="https://www.suse.com/security/cve/CVE-2025-38354/" source="CVE"/>
		<reference ref_id="CVE-2025-38355" ref_url="https://www.suse.com/security/cve/CVE-2025-38355/" source="CVE"/>
		<reference ref_id="CVE-2025-38356" ref_url="https://www.suse.com/security/cve/CVE-2025-38356/" source="CVE"/>
		<reference ref_id="CVE-2025-38359" ref_url="https://www.suse.com/security/cve/CVE-2025-38359/" source="CVE"/>
		<reference ref_id="CVE-2025-38360" ref_url="https://www.suse.com/security/cve/CVE-2025-38360/" source="CVE"/>
		<reference ref_id="CVE-2025-38361" ref_url="https://www.suse.com/security/cve/CVE-2025-38361/" source="CVE"/>
		<reference ref_id="CVE-2025-38362" ref_url="https://www.suse.com/security/cve/CVE-2025-38362/" source="CVE"/>
		<reference ref_id="CVE-2025-38363" ref_url="https://www.suse.com/security/cve/CVE-2025-38363/" source="CVE"/>
		<reference ref_id="CVE-2025-38364" ref_url="https://www.suse.com/security/cve/CVE-2025-38364/" source="CVE"/>
		<reference ref_id="CVE-2025-38365" ref_url="https://www.suse.com/security/cve/CVE-2025-38365/" source="CVE"/>
		<reference ref_id="CVE-2025-38368" ref_url="https://www.suse.com/security/cve/CVE-2025-38368/" source="CVE"/>
		<reference ref_id="CVE-2025-38369" ref_url="https://www.suse.com/security/cve/CVE-2025-38369/" source="CVE"/>
		<reference ref_id="CVE-2025-38371" ref_url="https://www.suse.com/security/cve/CVE-2025-38371/" source="CVE"/>
		<reference ref_id="CVE-2025-38372" ref_url="https://www.suse.com/security/cve/CVE-2025-38372/" source="CVE"/>
		<reference ref_id="CVE-2025-38373" ref_url="https://www.suse.com/security/cve/CVE-2025-38373/" source="CVE"/>
		<reference ref_id="CVE-2025-38374" ref_url="https://www.suse.com/security/cve/CVE-2025-38374/" source="CVE"/>
		<reference ref_id="CVE-2025-38375" ref_url="https://www.suse.com/security/cve/CVE-2025-38375/" source="CVE"/>
		<reference ref_id="CVE-2025-38376" ref_url="https://www.suse.com/security/cve/CVE-2025-38376/" source="CVE"/>
		<reference ref_id="CVE-2025-38377" ref_url="https://www.suse.com/security/cve/CVE-2025-38377/" source="CVE"/>
		<reference ref_id="CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380/" source="CVE"/>
		<reference ref_id="CVE-2025-38381" ref_url="https://www.suse.com/security/cve/CVE-2025-38381/" source="CVE"/>
		<reference ref_id="CVE-2025-38382" ref_url="https://www.suse.com/security/cve/CVE-2025-38382/" source="CVE"/>
		<reference ref_id="CVE-2025-38383" ref_url="https://www.suse.com/security/cve/CVE-2025-38383/" source="CVE"/>
		<reference ref_id="CVE-2025-38384" ref_url="https://www.suse.com/security/cve/CVE-2025-38384/" source="CVE"/>
		<reference ref_id="CVE-2025-38385" ref_url="https://www.suse.com/security/cve/CVE-2025-38385/" source="CVE"/>
		<reference ref_id="CVE-2025-38386" ref_url="https://www.suse.com/security/cve/CVE-2025-38386/" source="CVE"/>
		<reference ref_id="CVE-2025-38387" ref_url="https://www.suse.com/security/cve/CVE-2025-38387/" source="CVE"/>
		<reference ref_id="CVE-2025-38389" ref_url="https://www.suse.com/security/cve/CVE-2025-38389/" source="CVE"/>
		<reference ref_id="CVE-2025-38390" ref_url="https://www.suse.com/security/cve/CVE-2025-38390/" source="CVE"/>
		<reference ref_id="CVE-2025-38391" ref_url="https://www.suse.com/security/cve/CVE-2025-38391/" source="CVE"/>
		<reference ref_id="CVE-2025-38392" ref_url="https://www.suse.com/security/cve/CVE-2025-38392/" source="CVE"/>
		<reference ref_id="CVE-2025-38393" ref_url="https://www.suse.com/security/cve/CVE-2025-38393/" source="CVE"/>
		<reference ref_id="CVE-2025-38395" ref_url="https://www.suse.com/security/cve/CVE-2025-38395/" source="CVE"/>
		<reference ref_id="CVE-2025-38396" ref_url="https://www.suse.com/security/cve/CVE-2025-38396/" source="CVE"/>
		<reference ref_id="CVE-2025-38397" ref_url="https://www.suse.com/security/cve/CVE-2025-38397/" source="CVE"/>
		<reference ref_id="CVE-2025-38399" ref_url="https://www.suse.com/security/cve/CVE-2025-38399/" source="CVE"/>
		<reference ref_id="CVE-2025-38400" ref_url="https://www.suse.com/security/cve/CVE-2025-38400/" source="CVE"/>
		<reference ref_id="CVE-2025-38401" ref_url="https://www.suse.com/security/cve/CVE-2025-38401/" source="CVE"/>
		<reference ref_id="CVE-2025-38402" ref_url="https://www.suse.com/security/cve/CVE-2025-38402/" source="CVE"/>
		<reference ref_id="CVE-2025-38403" ref_url="https://www.suse.com/security/cve/CVE-2025-38403/" source="CVE"/>
		<reference ref_id="CVE-2025-38404" ref_url="https://www.suse.com/security/cve/CVE-2025-38404/" source="CVE"/>
		<reference ref_id="CVE-2025-38405" ref_url="https://www.suse.com/security/cve/CVE-2025-38405/" source="CVE"/>
		<reference ref_id="CVE-2025-38406" ref_url="https://www.suse.com/security/cve/CVE-2025-38406/" source="CVE"/>
		<reference ref_id="CVE-2025-38408" ref_url="https://www.suse.com/security/cve/CVE-2025-38408/" source="CVE"/>
		<reference ref_id="CVE-2025-38409" ref_url="https://www.suse.com/security/cve/CVE-2025-38409/" source="CVE"/>
		<reference ref_id="CVE-2025-38410" ref_url="https://www.suse.com/security/cve/CVE-2025-38410/" source="CVE"/>
		<reference ref_id="CVE-2025-38412" ref_url="https://www.suse.com/security/cve/CVE-2025-38412/" source="CVE"/>
		<reference ref_id="CVE-2025-38413" ref_url="https://www.suse.com/security/cve/CVE-2025-38413/" source="CVE"/>
		<reference ref_id="CVE-2025-38414" ref_url="https://www.suse.com/security/cve/CVE-2025-38414/" source="CVE"/>
		<reference ref_id="CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415/" source="CVE"/>
		<reference ref_id="CVE-2025-38416" ref_url="https://www.suse.com/security/cve/CVE-2025-38416/" source="CVE"/>
		<reference ref_id="CVE-2025-38417" ref_url="https://www.suse.com/security/cve/CVE-2025-38417/" source="CVE"/>
		<reference ref_id="CVE-2025-38418" ref_url="https://www.suse.com/security/cve/CVE-2025-38418/" source="CVE"/>
		<reference ref_id="CVE-2025-38419" ref_url="https://www.suse.com/security/cve/CVE-2025-38419/" source="CVE"/>
		<reference ref_id="CVE-2025-38420" ref_url="https://www.suse.com/security/cve/CVE-2025-38420/" source="CVE"/>
		<reference ref_id="CVE-2025-38421" ref_url="https://www.suse.com/security/cve/CVE-2025-38421/" source="CVE"/>
		<reference ref_id="CVE-2025-38424" ref_url="https://www.suse.com/security/cve/CVE-2025-38424/" source="CVE"/>
		<reference ref_id="CVE-2025-38425" ref_url="https://www.suse.com/security/cve/CVE-2025-38425/" source="CVE"/>
		<reference ref_id="CVE-2025-38426" ref_url="https://www.suse.com/security/cve/CVE-2025-38426/" source="CVE"/>
		<reference ref_id="CVE-2025-38427" ref_url="https://www.suse.com/security/cve/CVE-2025-38427/" source="CVE"/>
		<reference ref_id="CVE-2025-38428" ref_url="https://www.suse.com/security/cve/CVE-2025-38428/" source="CVE"/>
		<reference ref_id="CVE-2025-38429" ref_url="https://www.suse.com/security/cve/CVE-2025-38429/" source="CVE"/>
		<reference ref_id="CVE-2025-38430" ref_url="https://www.suse.com/security/cve/CVE-2025-38430/" source="CVE"/>
		<reference ref_id="CVE-2025-38436" ref_url="https://www.suse.com/security/cve/CVE-2025-38436/" source="CVE"/>
		<reference ref_id="CVE-2025-38438" ref_url="https://www.suse.com/security/cve/CVE-2025-38438/" source="CVE"/>
		<reference ref_id="CVE-2025-38439" ref_url="https://www.suse.com/security/cve/CVE-2025-38439/" source="CVE"/>
		<reference ref_id="CVE-2025-38440" ref_url="https://www.suse.com/security/cve/CVE-2025-38440/" source="CVE"/>
		<reference ref_id="CVE-2025-38441" ref_url="https://www.suse.com/security/cve/CVE-2025-38441/" source="CVE"/>
		<reference ref_id="CVE-2025-38443" ref_url="https://www.suse.com/security/cve/CVE-2025-38443/" source="CVE"/>
		<reference ref_id="CVE-2025-38444" ref_url="https://www.suse.com/security/cve/CVE-2025-38444/" source="CVE"/>
		<reference ref_id="CVE-2025-38445" ref_url="https://www.suse.com/security/cve/CVE-2025-38445/" source="CVE"/>
		<reference ref_id="CVE-2025-38446" ref_url="https://www.suse.com/security/cve/CVE-2025-38446/" source="CVE"/>
		<reference ref_id="CVE-2025-38448" ref_url="https://www.suse.com/security/cve/CVE-2025-38448/" source="CVE"/>
		<reference ref_id="CVE-2025-38449" ref_url="https://www.suse.com/security/cve/CVE-2025-38449/" source="CVE"/>
		<reference ref_id="CVE-2025-38450" ref_url="https://www.suse.com/security/cve/CVE-2025-38450/" source="CVE"/>
		<reference ref_id="CVE-2025-38451" ref_url="https://www.suse.com/security/cve/CVE-2025-38451/" source="CVE"/>
		<reference ref_id="CVE-2025-38453" ref_url="https://www.suse.com/security/cve/CVE-2025-38453/" source="CVE"/>
		<reference ref_id="CVE-2025-38454" ref_url="https://www.suse.com/security/cve/CVE-2025-38454/" source="CVE"/>
		<reference ref_id="CVE-2025-38455" ref_url="https://www.suse.com/security/cve/CVE-2025-38455/" source="CVE"/>
		<reference ref_id="CVE-2025-38456" ref_url="https://www.suse.com/security/cve/CVE-2025-38456/" source="CVE"/>
		<reference ref_id="CVE-2025-38457" ref_url="https://www.suse.com/security/cve/CVE-2025-38457/" source="CVE"/>
		<reference ref_id="CVE-2025-38458" ref_url="https://www.suse.com/security/cve/CVE-2025-38458/" source="CVE"/>
		<reference ref_id="CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459/" source="CVE"/>
		<reference ref_id="CVE-2025-38460" ref_url="https://www.suse.com/security/cve/CVE-2025-38460/" source="CVE"/>
		<reference ref_id="CVE-2025-38461" ref_url="https://www.suse.com/security/cve/CVE-2025-38461/" source="CVE"/>
		<reference ref_id="CVE-2025-38462" ref_url="https://www.suse.com/security/cve/CVE-2025-38462/" source="CVE"/>
		<reference ref_id="CVE-2025-38463" ref_url="https://www.suse.com/security/cve/CVE-2025-38463/" source="CVE"/>
		<reference ref_id="CVE-2025-38464" ref_url="https://www.suse.com/security/cve/CVE-2025-38464/" source="CVE"/>
		<reference ref_id="CVE-2025-38465" ref_url="https://www.suse.com/security/cve/CVE-2025-38465/" source="CVE"/>
		<reference ref_id="CVE-2025-38466" ref_url="https://www.suse.com/security/cve/CVE-2025-38466/" source="CVE"/>
		<reference ref_id="CVE-2025-38467" ref_url="https://www.suse.com/security/cve/CVE-2025-38467/" source="CVE"/>
		<reference ref_id="CVE-2025-38468" ref_url="https://www.suse.com/security/cve/CVE-2025-38468/" source="CVE"/>
		<reference ref_id="CVE-2025-38470" ref_url="https://www.suse.com/security/cve/CVE-2025-38470/" source="CVE"/>
		<reference ref_id="CVE-2025-38472" ref_url="https://www.suse.com/security/cve/CVE-2025-38472/" source="CVE"/>
		<reference ref_id="CVE-2025-38473" ref_url="https://www.suse.com/security/cve/CVE-2025-38473/" source="CVE"/>
		<reference ref_id="CVE-2025-38474" ref_url="https://www.suse.com/security/cve/CVE-2025-38474/" source="CVE"/>
		<reference ref_id="CVE-2025-38475" ref_url="https://www.suse.com/security/cve/CVE-2025-38475/" source="CVE"/>
		<reference ref_id="CVE-2025-38476" ref_url="https://www.suse.com/security/cve/CVE-2025-38476/" source="CVE"/>
		<reference ref_id="CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477/" source="CVE"/>
		<reference ref_id="CVE-2025-38478" ref_url="https://www.suse.com/security/cve/CVE-2025-38478/" source="CVE"/>
		<reference ref_id="CVE-2025-38480" ref_url="https://www.suse.com/security/cve/CVE-2025-38480/" source="CVE"/>
		<reference ref_id="CVE-2025-38481" ref_url="https://www.suse.com/security/cve/CVE-2025-38481/" source="CVE"/>
		<reference ref_id="CVE-2025-38482" ref_url="https://www.suse.com/security/cve/CVE-2025-38482/" source="CVE"/>
		<reference ref_id="CVE-2025-38483" ref_url="https://www.suse.com/security/cve/CVE-2025-38483/" source="CVE"/>
		<reference ref_id="CVE-2025-38484" ref_url="https://www.suse.com/security/cve/CVE-2025-38484/" source="CVE"/>
		<reference ref_id="CVE-2025-38485" ref_url="https://www.suse.com/security/cve/CVE-2025-38485/" source="CVE"/>
		<reference ref_id="CVE-2025-38487" ref_url="https://www.suse.com/security/cve/CVE-2025-38487/" source="CVE"/>
		<reference ref_id="CVE-2025-38488" ref_url="https://www.suse.com/security/cve/CVE-2025-38488/" source="CVE"/>
		<reference ref_id="CVE-2025-38489" ref_url="https://www.suse.com/security/cve/CVE-2025-38489/" source="CVE"/>
		<reference ref_id="CVE-2025-38490" ref_url="https://www.suse.com/security/cve/CVE-2025-38490/" source="CVE"/>
		<reference ref_id="CVE-2025-38491" ref_url="https://www.suse.com/security/cve/CVE-2025-38491/" source="CVE"/>
		<reference ref_id="CVE-2025-38493" ref_url="https://www.suse.com/security/cve/CVE-2025-38493/" source="CVE"/>
		<reference ref_id="CVE-2025-38494" ref_url="https://www.suse.com/security/cve/CVE-2025-38494/" source="CVE"/>
		<reference ref_id="CVE-2025-38495" ref_url="https://www.suse.com/security/cve/CVE-2025-38495/" source="CVE"/>
		<reference ref_id="CVE-2025-38496" ref_url="https://www.suse.com/security/cve/CVE-2025-38496/" source="CVE"/>
		<reference ref_id="CVE-2025-38497" ref_url="https://www.suse.com/security/cve/CVE-2025-38497/" source="CVE"/>
		<reference ref_id="CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499/" source="CVE"/>
		<reference ref_id="CVE-2025-38500" ref_url="https://www.suse.com/security/cve/CVE-2025-38500/" source="CVE"/>
		<reference ref_id="CVE-2025-38503" ref_url="https://www.suse.com/security/cve/CVE-2025-38503/" source="CVE"/>
		<reference ref_id="CVE-2025-38506" ref_url="https://www.suse.com/security/cve/CVE-2025-38506/" source="CVE"/>
		<reference ref_id="CVE-2025-38508" ref_url="https://www.suse.com/security/cve/CVE-2025-38508/" source="CVE"/>
		<reference ref_id="CVE-2025-38514" ref_url="https://www.suse.com/security/cve/CVE-2025-38514/" source="CVE"/>
		<reference ref_id="CVE-2025-38524" ref_url="https://www.suse.com/security/cve/CVE-2025-38524/" source="CVE"/>
		<reference ref_id="CVE-2025-38526" ref_url="https://www.suse.com/security/cve/CVE-2025-38526/" source="CVE"/>
		<reference ref_id="CVE-2025-38527" ref_url="https://www.suse.com/security/cve/CVE-2025-38527/" source="CVE"/>
		<reference ref_id="CVE-2025-38528" ref_url="https://www.suse.com/security/cve/CVE-2025-38528/" source="CVE"/>
		<reference ref_id="CVE-2025-38531" ref_url="https://www.suse.com/security/cve/CVE-2025-38531/" source="CVE"/>
		<reference ref_id="CVE-2025-38533" ref_url="https://www.suse.com/security/cve/CVE-2025-38533/" source="CVE"/>
		<reference ref_id="CVE-2025-38539" ref_url="https://www.suse.com/security/cve/CVE-2025-38539/" source="CVE"/>
		<reference ref_id="CVE-2025-38544" ref_url="https://www.suse.com/security/cve/CVE-2025-38544/" source="CVE"/>
		<reference ref_id="CVE-2025-38545" ref_url="https://www.suse.com/security/cve/CVE-2025-38545/" source="CVE"/>
		<reference ref_id="CVE-2025-38546" ref_url="https://www.suse.com/security/cve/CVE-2025-38546/" source="CVE"/>
		<reference ref_id="CVE-2025-38549" ref_url="https://www.suse.com/security/cve/CVE-2025-38549/" source="CVE"/>
		<reference ref_id="CVE-2025-38552" ref_url="https://www.suse.com/security/cve/CVE-2025-38552/" source="CVE"/>
		<reference ref_id="CVE-2025-38553" ref_url="https://www.suse.com/security/cve/CVE-2025-38553/" source="CVE"/>
		<reference ref_id="CVE-2025-38554" ref_url="https://www.suse.com/security/cve/CVE-2025-38554/" source="CVE"/>
		<reference ref_id="CVE-2025-38555" ref_url="https://www.suse.com/security/cve/CVE-2025-38555/" source="CVE"/>
		<reference ref_id="CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556/" source="CVE"/>
		<reference ref_id="CVE-2025-38557" ref_url="https://www.suse.com/security/cve/CVE-2025-38557/" source="CVE"/>
		<reference ref_id="CVE-2025-38559" ref_url="https://www.suse.com/security/cve/CVE-2025-38559/" source="CVE"/>
		<reference ref_id="CVE-2025-38560" ref_url="https://www.suse.com/security/cve/CVE-2025-38560/" source="CVE"/>
		<reference ref_id="CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563/" source="CVE"/>
		<reference ref_id="CVE-2025-38564" ref_url="https://www.suse.com/security/cve/CVE-2025-38564/" source="CVE"/>
		<reference ref_id="CVE-2025-38565" ref_url="https://www.suse.com/security/cve/CVE-2025-38565/" source="CVE"/>
		<reference ref_id="CVE-2025-38566" ref_url="https://www.suse.com/security/cve/CVE-2025-38566/" source="CVE"/>
		<reference ref_id="CVE-2025-38568" ref_url="https://www.suse.com/security/cve/CVE-2025-38568/" source="CVE"/>
		<reference ref_id="CVE-2025-38571" ref_url="https://www.suse.com/security/cve/CVE-2025-38571/" source="CVE"/>
		<reference ref_id="CVE-2025-38572" ref_url="https://www.suse.com/security/cve/CVE-2025-38572/" source="CVE"/>
		<reference ref_id="CVE-2025-38573" ref_url="https://www.suse.com/security/cve/CVE-2025-38573/" source="CVE"/>
		<reference ref_id="CVE-2025-38574" ref_url="https://www.suse.com/security/cve/CVE-2025-38574/" source="CVE"/>
		<reference ref_id="CVE-2025-38576" ref_url="https://www.suse.com/security/cve/CVE-2025-38576/" source="CVE"/>
		<reference ref_id="CVE-2025-38581" ref_url="https://www.suse.com/security/cve/CVE-2025-38581/" source="CVE"/>
		<reference ref_id="CVE-2025-38582" ref_url="https://www.suse.com/security/cve/CVE-2025-38582/" source="CVE"/>
		<reference ref_id="CVE-2025-38583" ref_url="https://www.suse.com/security/cve/CVE-2025-38583/" source="CVE"/>
		<reference ref_id="CVE-2025-38584" ref_url="https://www.suse.com/security/cve/CVE-2025-38584/" source="CVE"/>
		<reference ref_id="CVE-2025-38585" ref_url="https://www.suse.com/security/cve/CVE-2025-38585/" source="CVE"/>
		<reference ref_id="CVE-2025-38586" ref_url="https://www.suse.com/security/cve/CVE-2025-38586/" source="CVE"/>
		<reference ref_id="CVE-2025-38587" ref_url="https://www.suse.com/security/cve/CVE-2025-38587/" source="CVE"/>
		<reference ref_id="CVE-2025-38588" ref_url="https://www.suse.com/security/cve/CVE-2025-38588/" source="CVE"/>
		<reference ref_id="CVE-2025-38591" ref_url="https://www.suse.com/security/cve/CVE-2025-38591/" source="CVE"/>
		<reference ref_id="CVE-2025-38593" ref_url="https://www.suse.com/security/cve/CVE-2025-38593/" source="CVE"/>
		<reference ref_id="CVE-2025-38595" ref_url="https://www.suse.com/security/cve/CVE-2025-38595/" source="CVE"/>
		<reference ref_id="CVE-2025-38597" ref_url="https://www.suse.com/security/cve/CVE-2025-38597/" source="CVE"/>
		<reference ref_id="CVE-2025-38601" ref_url="https://www.suse.com/security/cve/CVE-2025-38601/" source="CVE"/>
		<reference ref_id="CVE-2025-38602" ref_url="https://www.suse.com/security/cve/CVE-2025-38602/" source="CVE"/>
		<reference ref_id="CVE-2025-38604" ref_url="https://www.suse.com/security/cve/CVE-2025-38604/" source="CVE"/>
		<reference ref_id="CVE-2025-38605" ref_url="https://www.suse.com/security/cve/CVE-2025-38605/" source="CVE"/>
		<reference ref_id="CVE-2025-38608" ref_url="https://www.suse.com/security/cve/CVE-2025-38608/" source="CVE"/>
		<reference ref_id="CVE-2025-38609" ref_url="https://www.suse.com/security/cve/CVE-2025-38609/" source="CVE"/>
		<reference ref_id="CVE-2025-38610" ref_url="https://www.suse.com/security/cve/CVE-2025-38610/" source="CVE"/>
		<reference ref_id="CVE-2025-38612" ref_url="https://www.suse.com/security/cve/CVE-2025-38612/" source="CVE"/>
		<reference ref_id="CVE-2025-38614" ref_url="https://www.suse.com/security/cve/CVE-2025-38614/" source="CVE"/>
		<reference ref_id="CVE-2025-38616" ref_url="https://www.suse.com/security/cve/CVE-2025-38616/" source="CVE"/>
		<reference ref_id="CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617/" source="CVE"/>
		<reference ref_id="CVE-2025-38618" ref_url="https://www.suse.com/security/cve/CVE-2025-38618/" source="CVE"/>
		<reference ref_id="CVE-2025-38619" ref_url="https://www.suse.com/security/cve/CVE-2025-38619/" source="CVE"/>
		<reference ref_id="CVE-2025-38621" ref_url="https://www.suse.com/security/cve/CVE-2025-38621/" source="CVE"/>
		<reference ref_id="CVE-2025-38622" ref_url="https://www.suse.com/security/cve/CVE-2025-38622/" source="CVE"/>
		<reference ref_id="CVE-2025-38623" ref_url="https://www.suse.com/security/cve/CVE-2025-38623/" source="CVE"/>
		<reference ref_id="CVE-2025-38624" ref_url="https://www.suse.com/security/cve/CVE-2025-38624/" source="CVE"/>
		<reference ref_id="CVE-2025-38628" ref_url="https://www.suse.com/security/cve/CVE-2025-38628/" source="CVE"/>
		<reference ref_id="CVE-2025-38630" ref_url="https://www.suse.com/security/cve/CVE-2025-38630/" source="CVE"/>
		<reference ref_id="CVE-2025-38631" ref_url="https://www.suse.com/security/cve/CVE-2025-38631/" source="CVE"/>
		<reference ref_id="CVE-2025-38632" ref_url="https://www.suse.com/security/cve/CVE-2025-38632/" source="CVE"/>
		<reference ref_id="CVE-2025-38634" ref_url="https://www.suse.com/security/cve/CVE-2025-38634/" source="CVE"/>
		<reference ref_id="CVE-2025-38635" ref_url="https://www.suse.com/security/cve/CVE-2025-38635/" source="CVE"/>
		<reference ref_id="CVE-2025-38639" ref_url="https://www.suse.com/security/cve/CVE-2025-38639/" source="CVE"/>
		<reference ref_id="CVE-2025-38640" ref_url="https://www.suse.com/security/cve/CVE-2025-38640/" source="CVE"/>
		<reference ref_id="CVE-2025-38643" ref_url="https://www.suse.com/security/cve/CVE-2025-38643/" source="CVE"/>
		<reference ref_id="CVE-2025-38644" ref_url="https://www.suse.com/security/cve/CVE-2025-38644/" source="CVE"/>
		<reference ref_id="CVE-2025-38646" ref_url="https://www.suse.com/security/cve/CVE-2025-38646/" source="CVE"/>
		<reference ref_id="CVE-2025-38648" ref_url="https://www.suse.com/security/cve/CVE-2025-38648/" source="CVE"/>
		<reference ref_id="CVE-2025-38656" ref_url="https://www.suse.com/security/cve/CVE-2025-38656/" source="CVE"/>
		<reference ref_id="CVE-2025-38658" ref_url="https://www.suse.com/security/cve/CVE-2025-38658/" source="CVE"/>
		<reference ref_id="CVE-2025-38659" ref_url="https://www.suse.com/security/cve/CVE-2025-38659/" source="CVE"/>
		<reference ref_id="CVE-2025-38660" ref_url="https://www.suse.com/security/cve/CVE-2025-38660/" source="CVE"/>
		<reference ref_id="CVE-2025-38662" ref_url="https://www.suse.com/security/cve/CVE-2025-38662/" source="CVE"/>
		<reference ref_id="CVE-2025-38664" ref_url="https://www.suse.com/security/cve/CVE-2025-38664/" source="CVE"/>
		<reference ref_id="CVE-2025-38665" ref_url="https://www.suse.com/security/cve/CVE-2025-38665/" source="CVE"/>
		<reference ref_id="CVE-2025-38668" ref_url="https://www.suse.com/security/cve/CVE-2025-38668/" source="CVE"/>
		<reference ref_id="CVE-2025-38670" ref_url="https://www.suse.com/security/cve/CVE-2025-38670/" source="CVE"/>
		<reference ref_id="CVE-2025-38671" ref_url="https://www.suse.com/security/cve/CVE-2025-38671/" source="CVE"/>
		<reference ref_id="CVE-2025-38676" ref_url="https://www.suse.com/security/cve/CVE-2025-38676/" source="CVE"/>
		<reference ref_id="CVE-2025-38678" ref_url="https://www.suse.com/security/cve/CVE-2025-38678/" source="CVE"/>
		<reference ref_id="CVE-2025-38679" ref_url="https://www.suse.com/security/cve/CVE-2025-38679/" source="CVE"/>
		<reference ref_id="CVE-2025-38680" ref_url="https://www.suse.com/security/cve/CVE-2025-38680/" source="CVE"/>
		<reference ref_id="CVE-2025-38681" ref_url="https://www.suse.com/security/cve/CVE-2025-38681/" source="CVE"/>
		<reference ref_id="CVE-2025-38683" ref_url="https://www.suse.com/security/cve/CVE-2025-38683/" source="CVE"/>
		<reference ref_id="CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684/" source="CVE"/>
		<reference ref_id="CVE-2025-38685" ref_url="https://www.suse.com/security/cve/CVE-2025-38685/" source="CVE"/>
		<reference ref_id="CVE-2025-38686" ref_url="https://www.suse.com/security/cve/CVE-2025-38686/" source="CVE"/>
		<reference ref_id="CVE-2025-38687" ref_url="https://www.suse.com/security/cve/CVE-2025-38687/" source="CVE"/>
		<reference ref_id="CVE-2025-38691" ref_url="https://www.suse.com/security/cve/CVE-2025-38691/" source="CVE"/>
		<reference ref_id="CVE-2025-38692" ref_url="https://www.suse.com/security/cve/CVE-2025-38692/" source="CVE"/>
		<reference ref_id="CVE-2025-38693" ref_url="https://www.suse.com/security/cve/CVE-2025-38693/" source="CVE"/>
		<reference ref_id="CVE-2025-38694" ref_url="https://www.suse.com/security/cve/CVE-2025-38694/" source="CVE"/>
		<reference ref_id="CVE-2025-38695" ref_url="https://www.suse.com/security/cve/CVE-2025-38695/" source="CVE"/>
		<reference ref_id="CVE-2025-38700" ref_url="https://www.suse.com/security/cve/CVE-2025-38700/" source="CVE"/>
		<reference ref_id="CVE-2025-38701" ref_url="https://www.suse.com/security/cve/CVE-2025-38701/" source="CVE"/>
		<reference ref_id="CVE-2025-38702" ref_url="https://www.suse.com/security/cve/CVE-2025-38702/" source="CVE"/>
		<reference ref_id="CVE-2025-38703" ref_url="https://www.suse.com/security/cve/CVE-2025-38703/" source="CVE"/>
		<reference ref_id="CVE-2025-38705" ref_url="https://www.suse.com/security/cve/CVE-2025-38705/" source="CVE"/>
		<reference ref_id="CVE-2025-38706" ref_url="https://www.suse.com/security/cve/CVE-2025-38706/" source="CVE"/>
		<reference ref_id="CVE-2025-38709" ref_url="https://www.suse.com/security/cve/CVE-2025-38709/" source="CVE"/>
		<reference ref_id="CVE-2025-38710" ref_url="https://www.suse.com/security/cve/CVE-2025-38710/" source="CVE"/>
		<reference ref_id="CVE-2025-38717" ref_url="https://www.suse.com/security/cve/CVE-2025-38717/" source="CVE"/>
		<reference ref_id="CVE-2025-38721" ref_url="https://www.suse.com/security/cve/CVE-2025-38721/" source="CVE"/>
		<reference ref_id="CVE-2025-38722" ref_url="https://www.suse.com/security/cve/CVE-2025-38722/" source="CVE"/>
		<reference ref_id="CVE-2025-38724" ref_url="https://www.suse.com/security/cve/CVE-2025-38724/" source="CVE"/>
		<reference ref_id="CVE-2025-38725" ref_url="https://www.suse.com/security/cve/CVE-2025-38725/" source="CVE"/>
		<reference ref_id="CVE-2025-38727" ref_url="https://www.suse.com/security/cve/CVE-2025-38727/" source="CVE"/>
		<reference ref_id="CVE-2025-38729" ref_url="https://www.suse.com/security/cve/CVE-2025-38729/" source="CVE"/>
		<reference ref_id="CVE-2025-38730" ref_url="https://www.suse.com/security/cve/CVE-2025-38730/" source="CVE"/>
		<reference ref_id="CVE-2025-38732" ref_url="https://www.suse.com/security/cve/CVE-2025-38732/" source="CVE"/>
		<reference ref_id="CVE-2025-38733" ref_url="https://www.suse.com/security/cve/CVE-2025-38733/" source="CVE"/>
		<reference ref_id="CVE-2025-38734" ref_url="https://www.suse.com/security/cve/CVE-2025-38734/" source="CVE"/>
		<reference ref_id="CVE-2025-38735" ref_url="https://www.suse.com/security/cve/CVE-2025-38735/" source="CVE"/>
		<reference ref_id="CVE-2025-38736" ref_url="https://www.suse.com/security/cve/CVE-2025-38736/" source="CVE"/>
		<reference ref_id="CVE-2025-39673" ref_url="https://www.suse.com/security/cve/CVE-2025-39673/" source="CVE"/>
		<reference ref_id="CVE-2025-39675" ref_url="https://www.suse.com/security/cve/CVE-2025-39675/" source="CVE"/>
		<reference ref_id="CVE-2025-39677" ref_url="https://www.suse.com/security/cve/CVE-2025-39677/" source="CVE"/>
		<reference ref_id="CVE-2025-39678" ref_url="https://www.suse.com/security/cve/CVE-2025-39678/" source="CVE"/>
		<reference ref_id="CVE-2025-39679" ref_url="https://www.suse.com/security/cve/CVE-2025-39679/" source="CVE"/>
		<reference ref_id="CVE-2025-39681" ref_url="https://www.suse.com/security/cve/CVE-2025-39681/" source="CVE"/>
		<reference ref_id="CVE-2025-39682" ref_url="https://www.suse.com/security/cve/CVE-2025-39682/" source="CVE"/>
		<reference ref_id="CVE-2025-39683" ref_url="https://www.suse.com/security/cve/CVE-2025-39683/" source="CVE"/>
		<reference ref_id="CVE-2025-39684" ref_url="https://www.suse.com/security/cve/CVE-2025-39684/" source="CVE"/>
		<reference ref_id="CVE-2025-39685" ref_url="https://www.suse.com/security/cve/CVE-2025-39685/" source="CVE"/>
		<reference ref_id="CVE-2025-39686" ref_url="https://www.suse.com/security/cve/CVE-2025-39686/" source="CVE"/>
		<reference ref_id="CVE-2025-39687" ref_url="https://www.suse.com/security/cve/CVE-2025-39687/" source="CVE"/>
		<reference ref_id="CVE-2025-39691" ref_url="https://www.suse.com/security/cve/CVE-2025-39691/" source="CVE"/>
		<reference ref_id="CVE-2025-39693" ref_url="https://www.suse.com/security/cve/CVE-2025-39693/" source="CVE"/>
		<reference ref_id="CVE-2025-39694" ref_url="https://www.suse.com/security/cve/CVE-2025-39694/" source="CVE"/>
		<reference ref_id="CVE-2025-39695" ref_url="https://www.suse.com/security/cve/CVE-2025-39695/" source="CVE"/>
		<reference ref_id="CVE-2025-39697" ref_url="https://www.suse.com/security/cve/CVE-2025-39697/" source="CVE"/>
		<reference ref_id="CVE-2025-39698" ref_url="https://www.suse.com/security/cve/CVE-2025-39698/" source="CVE"/>
		<reference ref_id="CVE-2025-39700" ref_url="https://www.suse.com/security/cve/CVE-2025-39700/" source="CVE"/>
		<reference ref_id="CVE-2025-39701" ref_url="https://www.suse.com/security/cve/CVE-2025-39701/" source="CVE"/>
		<reference ref_id="CVE-2025-39703" ref_url="https://www.suse.com/security/cve/CVE-2025-39703/" source="CVE"/>
		<reference ref_id="CVE-2025-39705" ref_url="https://www.suse.com/security/cve/CVE-2025-39705/" source="CVE"/>
		<reference ref_id="CVE-2025-39706" ref_url="https://www.suse.com/security/cve/CVE-2025-39706/" source="CVE"/>
		<reference ref_id="CVE-2025-39707" ref_url="https://www.suse.com/security/cve/CVE-2025-39707/" source="CVE"/>
		<reference ref_id="CVE-2025-39709" ref_url="https://www.suse.com/security/cve/CVE-2025-39709/" source="CVE"/>
		<reference ref_id="CVE-2025-39710" ref_url="https://www.suse.com/security/cve/CVE-2025-39710/" source="CVE"/>
		<reference ref_id="CVE-2025-39711" ref_url="https://www.suse.com/security/cve/CVE-2025-39711/" source="CVE"/>
		<reference ref_id="CVE-2025-39712" ref_url="https://www.suse.com/security/cve/CVE-2025-39712/" source="CVE"/>
		<reference ref_id="CVE-2025-39713" ref_url="https://www.suse.com/security/cve/CVE-2025-39713/" source="CVE"/>
		<reference ref_id="CVE-2025-39714" ref_url="https://www.suse.com/security/cve/CVE-2025-39714/" source="CVE"/>
		<reference ref_id="CVE-2025-39718" ref_url="https://www.suse.com/security/cve/CVE-2025-39718/" source="CVE"/>
		<reference ref_id="CVE-2025-39719" ref_url="https://www.suse.com/security/cve/CVE-2025-39719/" source="CVE"/>
		<reference ref_id="CVE-2025-39721" ref_url="https://www.suse.com/security/cve/CVE-2025-39721/" source="CVE"/>
		<reference ref_id="CVE-2025-39722" ref_url="https://www.suse.com/security/cve/CVE-2025-39722/" source="CVE"/>
		<reference ref_id="CVE-2025-39723" ref_url="https://www.suse.com/security/cve/CVE-2025-39723/" source="CVE"/>
		<reference ref_id="CVE-2025-39724" ref_url="https://www.suse.com/security/cve/CVE-2025-39724/" source="CVE"/>
		<reference ref_id="CVE-2025-39726" ref_url="https://www.suse.com/security/cve/CVE-2025-39726/" source="CVE"/>
		<reference ref_id="CVE-2025-39727" ref_url="https://www.suse.com/security/cve/CVE-2025-39727/" source="CVE"/>
		<reference ref_id="CVE-2025-39730" ref_url="https://www.suse.com/security/cve/CVE-2025-39730/" source="CVE"/>
		<reference ref_id="CVE-2025-39732" ref_url="https://www.suse.com/security/cve/CVE-2025-39732/" source="CVE"/>
		<reference ref_id="CVE-2025-39738" ref_url="https://www.suse.com/security/cve/CVE-2025-39738/" source="CVE"/>
		<reference ref_id="CVE-2025-39739" ref_url="https://www.suse.com/security/cve/CVE-2025-39739/" source="CVE"/>
		<reference ref_id="CVE-2025-39742" ref_url="https://www.suse.com/security/cve/CVE-2025-39742/" source="CVE"/>
		<reference ref_id="CVE-2025-39744" ref_url="https://www.suse.com/security/cve/CVE-2025-39744/" source="CVE"/>
		<reference ref_id="CVE-2025-39746" ref_url="https://www.suse.com/security/cve/CVE-2025-39746/" source="CVE"/>
		<reference ref_id="CVE-2025-39747" ref_url="https://www.suse.com/security/cve/CVE-2025-39747/" source="CVE"/>
		<reference ref_id="CVE-2025-39748" ref_url="https://www.suse.com/security/cve/CVE-2025-39748/" source="CVE"/>
		<reference ref_id="CVE-2025-39749" ref_url="https://www.suse.com/security/cve/CVE-2025-39749/" source="CVE"/>
		<reference ref_id="CVE-2025-39750" ref_url="https://www.suse.com/security/cve/CVE-2025-39750/" source="CVE"/>
		<reference ref_id="CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751/" source="CVE"/>
		<reference ref_id="CVE-2025-39754" ref_url="https://www.suse.com/security/cve/CVE-2025-39754/" source="CVE"/>
		<reference ref_id="CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757/" source="CVE"/>
		<reference ref_id="CVE-2025-39758" ref_url="https://www.suse.com/security/cve/CVE-2025-39758/" source="CVE"/>
		<reference ref_id="CVE-2025-39759" ref_url="https://www.suse.com/security/cve/CVE-2025-39759/" source="CVE"/>
		<reference ref_id="CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760/" source="CVE"/>
		<reference ref_id="CVE-2025-39761" ref_url="https://www.suse.com/security/cve/CVE-2025-39761/" source="CVE"/>
		<reference ref_id="CVE-2025-39763" ref_url="https://www.suse.com/security/cve/CVE-2025-39763/" source="CVE"/>
		<reference ref_id="CVE-2025-39764" ref_url="https://www.suse.com/security/cve/CVE-2025-39764/" source="CVE"/>
		<reference ref_id="CVE-2025-39765" ref_url="https://www.suse.com/security/cve/CVE-2025-39765/" source="CVE"/>
		<reference ref_id="CVE-2025-39766" ref_url="https://www.suse.com/security/cve/CVE-2025-39766/" source="CVE"/>
		<reference ref_id="CVE-2025-39770" ref_url="https://www.suse.com/security/cve/CVE-2025-39770/" source="CVE"/>
		<reference ref_id="CVE-2025-39772" ref_url="https://www.suse.com/security/cve/CVE-2025-39772/" source="CVE"/>
		<reference ref_id="CVE-2025-39773" ref_url="https://www.suse.com/security/cve/CVE-2025-39773/" source="CVE"/>
		<reference ref_id="CVE-2025-39775" ref_url="https://www.suse.com/security/cve/CVE-2025-39775/" source="CVE"/>
		<reference ref_id="CVE-2025-39782" ref_url="https://www.suse.com/security/cve/CVE-2025-39782/" source="CVE"/>
		<reference ref_id="CVE-2025-39783" ref_url="https://www.suse.com/security/cve/CVE-2025-39783/" source="CVE"/>
		<reference ref_id="CVE-2025-39787" ref_url="https://www.suse.com/security/cve/CVE-2025-39787/" source="CVE"/>
		<reference ref_id="CVE-2025-39788" ref_url="https://www.suse.com/security/cve/CVE-2025-39788/" source="CVE"/>
		<reference ref_id="CVE-2025-39790" ref_url="https://www.suse.com/security/cve/CVE-2025-39790/" source="CVE"/>
		<reference ref_id="CVE-2025-39791" ref_url="https://www.suse.com/security/cve/CVE-2025-39791/" source="CVE"/>
		<reference ref_id="CVE-2025-39792" ref_url="https://www.suse.com/security/cve/CVE-2025-39792/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39798" ref_url="https://www.suse.com/security/cve/CVE-2025-39798/" source="CVE"/>
		<reference ref_id="CVE-2025-39800" ref_url="https://www.suse.com/security/cve/CVE-2025-39800/" source="CVE"/>
		<reference ref_id="CVE-2025-39801" ref_url="https://www.suse.com/security/cve/CVE-2025-39801/" source="CVE"/>
		<reference ref_id="CVE-2025-39806" ref_url="https://www.suse.com/security/cve/CVE-2025-39806/" source="CVE"/>
		<reference ref_id="CVE-2025-39807" ref_url="https://www.suse.com/security/cve/CVE-2025-39807/" source="CVE"/>
		<reference ref_id="CVE-2025-39808" ref_url="https://www.suse.com/security/cve/CVE-2025-39808/" source="CVE"/>
		<reference ref_id="CVE-2025-39810" ref_url="https://www.suse.com/security/cve/CVE-2025-39810/" source="CVE"/>
		<reference ref_id="CVE-2025-39811" ref_url="https://www.suse.com/security/cve/CVE-2025-39811/" source="CVE"/>
		<reference ref_id="CVE-2025-39813" ref_url="https://www.suse.com/security/cve/CVE-2025-39813/" source="CVE"/>
		<reference ref_id="CVE-2025-39816" ref_url="https://www.suse.com/security/cve/CVE-2025-39816/" source="CVE"/>
		<reference ref_id="CVE-2025-39823" ref_url="https://www.suse.com/security/cve/CVE-2025-39823/" source="CVE"/>
		<reference ref_id="CVE-2025-39824" ref_url="https://www.suse.com/security/cve/CVE-2025-39824/" source="CVE"/>
		<reference ref_id="CVE-2025-39825" ref_url="https://www.suse.com/security/cve/CVE-2025-39825/" source="CVE"/>
		<reference ref_id="CVE-2025-39826" ref_url="https://www.suse.com/security/cve/CVE-2025-39826/" source="CVE"/>
		<reference ref_id="CVE-2025-39827" ref_url="https://www.suse.com/security/cve/CVE-2025-39827/" source="CVE"/>
		<reference ref_id="CVE-2025-39828" ref_url="https://www.suse.com/security/cve/CVE-2025-39828/" source="CVE"/>
		<reference ref_id="CVE-2025-39830" ref_url="https://www.suse.com/security/cve/CVE-2025-39830/" source="CVE"/>
		<reference ref_id="CVE-2025-39832" ref_url="https://www.suse.com/security/cve/CVE-2025-39832/" source="CVE"/>
		<reference ref_id="CVE-2025-39833" ref_url="https://www.suse.com/security/cve/CVE-2025-39833/" source="CVE"/>
		<reference ref_id="CVE-2025-39834" ref_url="https://www.suse.com/security/cve/CVE-2025-39834/" source="CVE"/>
		<reference ref_id="CVE-2025-39835" ref_url="https://www.suse.com/security/cve/CVE-2025-39835/" source="CVE"/>
		<reference ref_id="CVE-2025-39836" ref_url="https://www.suse.com/security/cve/CVE-2025-39836/" source="CVE"/>
		<reference ref_id="CVE-2025-39838" ref_url="https://www.suse.com/security/cve/CVE-2025-39838/" source="CVE"/>
		<reference ref_id="CVE-2025-39839" ref_url="https://www.suse.com/security/cve/CVE-2025-39839/" source="CVE"/>
		<reference ref_id="CVE-2025-39841" ref_url="https://www.suse.com/security/cve/CVE-2025-39841/" source="CVE"/>
		<reference ref_id="CVE-2025-39842" ref_url="https://www.suse.com/security/cve/CVE-2025-39842/" source="CVE"/>
		<reference ref_id="CVE-2025-39844" ref_url="https://www.suse.com/security/cve/CVE-2025-39844/" source="CVE"/>
		<reference ref_id="CVE-2025-39845" ref_url="https://www.suse.com/security/cve/CVE-2025-39845/" source="CVE"/>
		<reference ref_id="CVE-2025-39847" ref_url="https://www.suse.com/security/cve/CVE-2025-39847/" source="CVE"/>
		<reference ref_id="CVE-2025-39848" ref_url="https://www.suse.com/security/cve/CVE-2025-39848/" source="CVE"/>
		<reference ref_id="CVE-2025-39849" ref_url="https://www.suse.com/security/cve/CVE-2025-39849/" source="CVE"/>
		<reference ref_id="CVE-2025-39850" ref_url="https://www.suse.com/security/cve/CVE-2025-39850/" source="CVE"/>
		<reference ref_id="CVE-2025-39851" ref_url="https://www.suse.com/security/cve/CVE-2025-39851/" source="CVE"/>
		<reference ref_id="CVE-2025-39852" ref_url="https://www.suse.com/security/cve/CVE-2025-39852/" source="CVE"/>
		<reference ref_id="CVE-2025-39853" ref_url="https://www.suse.com/security/cve/CVE-2025-39853/" source="CVE"/>
		<reference ref_id="CVE-2025-39854" ref_url="https://www.suse.com/security/cve/CVE-2025-39854/" source="CVE"/>
		<reference ref_id="CVE-2025-39857" ref_url="https://www.suse.com/security/cve/CVE-2025-39857/" source="CVE"/>
		<reference ref_id="CVE-2025-39860" ref_url="https://www.suse.com/security/cve/CVE-2025-39860/" source="CVE"/>
		<reference ref_id="CVE-2025-39861" ref_url="https://www.suse.com/security/cve/CVE-2025-39861/" source="CVE"/>
		<reference ref_id="CVE-2025-39863" ref_url="https://www.suse.com/security/cve/CVE-2025-39863/" source="CVE"/>
		<reference ref_id="CVE-2025-39864" ref_url="https://www.suse.com/security/cve/CVE-2025-39864/" source="CVE"/>
		<reference ref_id="CVE-2025-39865" ref_url="https://www.suse.com/security/cve/CVE-2025-39865/" source="CVE"/>
		<reference ref_id="CVE-2025-39869" ref_url="https://www.suse.com/security/cve/CVE-2025-39869/" source="CVE"/>
		<reference ref_id="CVE-2025-39870" ref_url="https://www.suse.com/security/cve/CVE-2025-39870/" source="CVE"/>
		<reference ref_id="CVE-2025-39871" ref_url="https://www.suse.com/security/cve/CVE-2025-39871/" source="CVE"/>
		<reference ref_id="CVE-2025-39873" ref_url="https://www.suse.com/security/cve/CVE-2025-39873/" source="CVE"/>
		<reference ref_id="CVE-2025-39875" ref_url="https://www.suse.com/security/cve/CVE-2025-39875/" source="CVE"/>
		<reference ref_id="CVE-2025-39877" ref_url="https://www.suse.com/security/cve/CVE-2025-39877/" source="CVE"/>
		<reference ref_id="CVE-2025-39882" ref_url="https://www.suse.com/security/cve/CVE-2025-39882/" source="CVE"/>
		<reference ref_id="CVE-2025-39884" ref_url="https://www.suse.com/security/cve/CVE-2025-39884/" source="CVE"/>
		<reference ref_id="CVE-2025-39885" ref_url="https://www.suse.com/security/cve/CVE-2025-39885/" source="CVE"/>
		<reference ref_id="CVE-2025-39889" ref_url="https://www.suse.com/security/cve/CVE-2025-39889/" source="CVE"/>
		<reference ref_id="CVE-2025-39890" ref_url="https://www.suse.com/security/cve/CVE-2025-39890/" source="CVE"/>
		<reference ref_id="CVE-2025-39891" ref_url="https://www.suse.com/security/cve/CVE-2025-39891/" source="CVE"/>
		<reference ref_id="CVE-2025-39896" ref_url="https://www.suse.com/security/cve/CVE-2025-39896/" source="CVE"/>
		<reference ref_id="CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898/" source="CVE"/>
		<reference ref_id="CVE-2025-39899" ref_url="https://www.suse.com/security/cve/CVE-2025-39899/" source="CVE"/>
		<reference ref_id="CVE-2025-39900" ref_url="https://www.suse.com/security/cve/CVE-2025-39900/" source="CVE"/>
		<reference ref_id="CVE-2025-39902" ref_url="https://www.suse.com/security/cve/CVE-2025-39902/" source="CVE"/>
		<reference ref_id="CVE-2025-39907" ref_url="https://www.suse.com/security/cve/CVE-2025-39907/" source="CVE"/>
		<reference ref_id="CVE-2025-39909" ref_url="https://www.suse.com/security/cve/CVE-2025-39909/" source="CVE"/>
		<reference ref_id="CVE-2025-39916" ref_url="https://www.suse.com/security/cve/CVE-2025-39916/" source="CVE"/>
		<reference ref_id="CVE-2025-39918" ref_url="https://www.suse.com/security/cve/CVE-2025-39918/" source="CVE"/>
		<reference ref_id="CVE-2025-39922" ref_url="https://www.suse.com/security/cve/CVE-2025-39922/" source="CVE"/>
		<reference ref_id="CVE-2025-39923" ref_url="https://www.suse.com/security/cve/CVE-2025-39923/" source="CVE"/>
		<reference ref_id="CVE-2025-39925" ref_url="https://www.suse.com/security/cve/CVE-2025-39925/" source="CVE"/>
		<reference ref_id="CVE-2025-39926" ref_url="https://www.suse.com/security/cve/CVE-2025-39926/" source="CVE"/>
		<reference ref_id="CVE-2025-39931" ref_url="https://www.suse.com/security/cve/CVE-2025-39931/" source="CVE"/>
		<reference ref_id="CVE-2025-39934" ref_url="https://www.suse.com/security/cve/CVE-2025-39934/" source="CVE"/>
		<reference ref_id="CVE-2025-39937" ref_url="https://www.suse.com/security/cve/CVE-2025-39937/" source="CVE"/>
		<reference ref_id="CVE-2025-39938" ref_url="https://www.suse.com/security/cve/CVE-2025-39938/" source="CVE"/>
		<reference ref_id="CVE-2025-39945" ref_url="https://www.suse.com/security/cve/CVE-2025-39945/" source="CVE"/>
		<reference ref_id="CVE-2025-39946" ref_url="https://www.suse.com/security/cve/CVE-2025-39946/" source="CVE"/>
		<reference ref_id="CVE-2025-39952" ref_url="https://www.suse.com/security/cve/CVE-2025-39952/" source="CVE"/>
		<reference ref_id="CVE-2025-39957" ref_url="https://www.suse.com/security/cve/CVE-2025-39957/" source="CVE"/>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass() (bsc#1235953).
- CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug (bsc#1237108).
- CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir" (bsc#1237131).
- CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324).
- CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive() (bsc#1241435).
- CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod" (bsc#1241403).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37821: sched/eevdf: Fix se-&gt;slice being set to U64_MAX and resulting (bsc#1242864).
- CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation (bsc#1243000).
- CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068).
- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).
- CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965).
- CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930).
- CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939).
- CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices (bsc#1245000).
- CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792).
- CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost (bsc#1244812).
- CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151).
- CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216).
- CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734).
- CVE-2025-38101: ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set() (bsc#1245659).
- CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663).
- CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup failure (bsc#1245664).
- CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695).
- CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700).
- CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710).
- CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767).
- CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780).
- CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure (bsc#1245763).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012).
- CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973).
- CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977).
- CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005).
- CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815).
- CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963).
- CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966).
- CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976).
- CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache (bsc#1246176).
- CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183).
- CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193).
- CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181).
- CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188).
- CVE-2025-38258: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter-&gt;memcg_path on write (bsc#1246185).
- CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).
- CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a commit_overrun (bsc#1246245).
- CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll (bsc#1246252).
- CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268).
- CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup (bsc#1246351).
- CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children() (bsc#1246366).
- CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376).
- CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata() (bsc#1246444).
- CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event() (bsc#1246447).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253).
- CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg (bsc#1246260).
- CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).
- CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078).
- CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023).
- CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024).
- CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031).
- CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250).
- CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169).
- CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156).
- CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097).
- CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262).
- CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126).
- CVE-2025-38418: remoteproc: core: Release rproc-&gt;clean_table after rproc_attach() fails (bsc#1247137).
- CVE-2025-38419: remoteproc: core: Cleanup acquired resources when
  rproc_handle_resources() fails in rproc_attach() (bsc#1247136).
- CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252).
- CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155).
- CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290).
- CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167).
- CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162).
- CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229).
- CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102).
- CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247234).
- CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099).
- CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098).
- CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116).
- CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113).
- CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).
- CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288).
- CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313).
- CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion (bsc#1247308).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243).
- CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280).
- CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack() (bsc#1247283).
- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088).
- CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (bsc#1248190).
- CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202).
- CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194).
- CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192).
- CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199).
- CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200).
- CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace event (bsc#1248211).
- CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225).
- CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info (bsc#1248224).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths (bsc#1248235).
- CVE-2025-38554: mm: fix a UAF when vma-&gt;mm is freed after vma-&gt;vm_refcnt got dropped (bsc#1248299).
- CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248374).
- CVE-2025-38571: sunrpc: fix client side handling of tls alerts (bsc#1248401).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365).
- CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343).
- CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1248368).
- CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357).
- CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392).
- CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619).
- CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610).
- CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616).
- CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null-terminated (bsc#1248674).
- CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622).
- CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156).
- CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry (bsc#1249160).
- CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn-&gt;dd_data only if memory is allocated (bsc#1249182).
- CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258).
- CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199).
- CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201).
- CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320).
- CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300).
- CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303).
- CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284).
- CVE-2025-39683: tracing: Limit access to parser-&gt;buffer when trace_get_user failed (bsc#1249286).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1249322).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314).
- CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494).
- CVE-2025-39749: rcu: Protect -&gt;defer_qs_iw_pending from data race (bsc#1249533).
- CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524).
- CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510).
- CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508).
- CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504).
- CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled (bsc#1249500).
- CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526).
- CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned targets (bsc#1249550).
- CVE-2025-39792: dm: Always split write BIOs to zoned device limits (bsc#1249618).
- CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608).
- CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter files (bsc#1250032).
- CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179).
- CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205).
- CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974).
- CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365).
- CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267).
- CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292).
- CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276).
- CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296).
- CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 (bsc#1250258).
- CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275).
- CVE-2025-39854: ice: fix NULL access of tx-&gt;in_use in ice_ll_ts_intr (bsc#1250297).
- CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251).
- CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294).
- CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test (bsc#1250398).
- CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407).
- CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742).
- CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758).
- CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702).
- CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722).
- CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM (bsc#1250737).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114).
- CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483).
- CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387).

The following non-security bugs were fixed:

- ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
- ACPI/processor_idle: Add FFH state handling (jsc#PED-13815).
- ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815).
- ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes).
- ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes).
- ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes).
- ACPI: LPSS: Remove AudioDSP related ID (git-fixes).
- ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git-fixes).
- ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes).
- ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled (stable-fixes).
- ACPI: Suppress misleading SPCR console message when SPCR table is absent (stable-fixes).
- ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes).
- ACPI: battery: Add synchronization between interface updates (git-fixes).
- ACPI: debug: fix signedness issues in read/write helpers (git-fixes).
- ACPI: pfr_update: Fix the driver update version check (git-fixes).
- ACPI: processor: Rescan "dead" SMT siblings during initialization (jsc#PED-13815).
- ACPI: processor: fix acpi_object initialization (stable-fixes).
- ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes).
- ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes).
- ACPI: processor: perflib: Move problematic pr-&gt;performance check (git-fixes).
- ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
- ACPICA: Fix largest possible resource descriptor index (git-fixes).
- ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes).
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes).
- ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes).
- ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX (stable-fixes).
- ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable-fixes).
- ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable-fixes).
- ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes).
- ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes).
- ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable-fixes).
- ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes).
- ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes).
- ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes).
- ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes).
- ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes).
- ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes).
- ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes).
- ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable-fixes).
- ALSA: hda: Disable jack polling at shutdown (stable-fixes).
- ALSA: hda: Handle the jack polling always via a work (stable-fixes).
- ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git-fixes).
- ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable-fixes).
- ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git-fixes).
- ALSA: lx_core: use int type to store negative error codes (git-fixes).
- ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes).
- ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable-fixes).
- ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes).
- ALSA: timer: fix ida_free call while not allocated (git-fixes).
- ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable-fixes).
- ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable-fixes).
- ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes).
- ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable-fixes).
- ALSA: usb-audio: Convert comma to semicolon (git-fixes).
- ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes).
- ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes).
- ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git-fixes).
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes).
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes).
- ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes).
- ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable-fixes).
- ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes).
- ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes).
- ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes).
- ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes).
- ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes).
- ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes).
- ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git-fixes).
- ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of buffer time (git-fixes).
- ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes).
- ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes).
- ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes).
- ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size (git-fixes).
- ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git-fixes).
- ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode (stable-fixes).
- ASoC: amd: acp: Adjust pdm gain value (stable-fixes).
- ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes).
- ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes).
- ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes).
- ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes).
- ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes).
- ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes).
- ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes).
- ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable-fixes).
- ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes).
- ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes).
- ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable-fixes).
- ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes).
- ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv (git-fixes).
- ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git-fixes).
- ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes).
- ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes).
- ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes).
- ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes).
- ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git-fixes).
- ASoC: qcom: use drvdata instead of component to keep id (stable-fixes).
- ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes).
- ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git-fixes).
- ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes).
- ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes).
- ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes).
- ASoC: wm8940: Correct PLL rate rounding (git-fixes).
- ASoC: wm8940: Correct typo in control name (git-fixes).
- ASoC: wm8974: Correct PLL rate rounding (git-fixes).
- Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes).
- Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes).
- Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes).
- Bluetooth: ISO: free rx_skb if not consumed (git-fixes).
- Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes).
- Bluetooth: MGMT: Fix possible UAFs (git-fixes).
- Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git-fixes).
- Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable-fixes).
- Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes).
- Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes).
- Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git-fixes).
- Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git-fixes).
- Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git-fixes).
- Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes).
- Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes).
- Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes).
- Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git-fixes).
- Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes).
- Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable-fixes).
- Bluetooth: hci_sync: Avoid adding default advertising on startup (stable-fixes).
- Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes).
- Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git-fixes).
- Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes).
- Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git-fixes).
- Bluetooth: hci_sync: fix set_local_name race condition (git-fixes).
- Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes).
- CONFIG &amp; no reference -&gt; OK temporarily, must be resolved eventually
- Disable CET before shutdown by tboot (bsc#1247950).
- Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes).
- Documentation/x86: Document new attack vector controls (git-fixes).
- Documentation: ACPI: Fix parent device references (git-fixes).
- Documentation: KVM: Fix unexpected unindent warning (git-fixes).
- Documentation: KVM: Fix unexpected unindent warnings (git-fixes).
- Documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes).
- Drop ath12k patch that was reverted in the upstream (git-fixes)
- EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693).
- Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone
  using CMA or investigating CMA issues, with a small and simple code base
  and no runtime overhead.
- Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325)
- Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256).
- Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked in 6.12 kernel itself.
- Fix dma_unmap_sg() nents value (git-fixes)
- HID: amd_sfh: Add sync across amd sfh work functions (git-fixes).
- HID: apple: avoid setting up battery timer for devices without battery (git-fixes).
- HID: apple: validate feature-report field count to prevent NULL pointer dereference (git-fixes).
- HID: asus: add support for missing PX series fn keys (stable-fixes).
- HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes).
- HID: core: do not bypass hid_hw_raw_request (stable-fixes).
- HID: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes).
- HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes).
- HID: hidraw: tighten ioctl command parsing (git-fixes).
- HID: input: rename hidinput_set_battery_charge_status() (stable-fixes).
- HID: input: report battery status changes immediately (git-fixes).
- HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes).
- HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes).
- HID: magicmouse: avoid setting up battery timer when not needed (git-fixes).
- HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git-fixes).
- HID: quirks: add support for Legion Go dual dinput modes (stable-fixes).
- HID: wacom: Add a new Art Pen 2 (stable-fixes).
- IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes)
- IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes)
- Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes).
- Input: iqs7222 - avoid enabling unused interrupts (stable-fixes).
- Input: psxpad-spi - add a check for the return value of spi_setup() (git-fixes).
- Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes).
- KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes).
- KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
- KVM: Allow CPU to reschedule while setting per-page memory attributes (git-fixes).
- KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes).
- KVM: Bound the number of dirty ring entries in a single reset at INT_MAX (git-fixes).
- KVM: Conditionally reschedule when resetting the dirty ring (git-fixes).
- KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199).
- KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes).
- KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
- KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (git-fixes).
- KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs (jsc#PED-13302).
- KVM: TDX: Do not report base TDVMCALLs (git-fixes).
- KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302).
- KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302).
- KVM: TDX: Handle TDG.VP.VMCALL&amp;lt;GetQuote&gt; (jsc#PED-13302).
- KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (jsc#PED-13302).
- KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL (git-fixes).
- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).
- KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out (jsc#PED-13302).
- KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes).
- KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes).
- KVM: arm64: Fix error path in init_hyp_mode() (git-fixes).
- KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes).
- KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes).
- KVM: s390: Fix access to unavailable adapter indicator pages during postcopy (git-fixes bsc#1250124).
- KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250123).
- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).
- KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes).
- KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL (git-fixes).
- KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes).
- KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes).
- KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git-fixes).
- KVM: x86: avoid underflow when scaling TSC frequency (git-fixes).
- Limit patch filenames to 100 characters (bsc#1249604).
- Move upstreamed SPI patch into sorted section
- NFS: Fix a race when updating an existing write (git-fixes).
- NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes).
- NFS: Fix the setting of capabilities when automounting a new filesystem (git-fixes).
- NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git-fixes).
- NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes).
- NFS: nfs_invalidate_folio() must observe the offset and size arguments (git-fixes).
- NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes).
- NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes).
- NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git-fixes).
- NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes).
- NFSv4.2: another fix for listxattr (git-fixes).
- NFSv4/flexfiles: Fix layout merge mirror check (git-fixes).
- NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git-fixes).
- NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes).
- NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git-fixes).
- NFSv4: Do not clear capabilities that won't be reset (git-fixes).
- Octeontx2-af: Skip overlap check for SPI field (git-fixes).
- PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes).
- PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-fixes).
- PCI/AER: Fix missing uevent on recovery when a reset is requested (git-fixes).
- PCI/ERR: Fix uevent on failure to recover (git-fixes).
- PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git-fixes).
- PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457).
- PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes).
- PCI/pwrctrl: Fix device leak at registration (git-fixes).
- PCI/sysfs: Ensure devices are powered for config reads (git-fixes).
- PCI: Extend isolated function probing to LoongArch (git-fixes).
- PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS (git-fixes).
- PCI: Support Immediate Readiness on devices without PM capabilities (git-fixes).
- PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes).
- PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes).
- PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up (stable-fixes).
- PCI: endpoint: Fix configfs group list head handling (git-fixes).
- PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes).
- PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes).
- PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes).
- PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457).
- PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes).
- PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes).
- PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes).
- PCI: imx6: Delay link start until configfs 'start' written (git-fixes).
- PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes).
- PCI: j721e: Fix incorrect error message in probe() (git-fixes).
- PCI: j721e: Fix programming sequence of "strap" settings (git-fixes).
- PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes).
- PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199).
- PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199).
- PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes).
- PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes).
- PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes).
- PCI: rcar-gen4: Fix PHY initialization (git-fixes).
- PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git-fixes).
- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).
- PCI: rcar-host: Drop PMSR spinlock (git-fixes).
- PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes).
- PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git-fixes).
- PCI: rockchip: Use standard PCIe definitions (git-fixes).
- PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes).
- PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes).
- PCI: tegra194: Handle errors in BPMP response (git-fixes).
- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).
- PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git-fixes).
- PCI: tegra: Fix devm_kcalloc() argument order for port-&gt;phys allocation (git-fixes).
- PCI: xilinx-nwl: Fix ECAM programming (git-fixes).
- PM / devfreq: Check governor before using governor-&gt;name (git-fixes).
- PM / devfreq: Fix a index typo in trans_stat (git-fixes).
- PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes).
- PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes).
- PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes).
- PM: EM: use kfree_rcu() to simplify the code (stable-fixes).
- PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes).
- PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112).
- PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112).
- PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112).
- PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112).
- PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable-fixes).
- PM: runtime: Take active children into account in pm_runtime_get_if_in_use() (git-fixes).
- PM: sleep: console: Fix the black screen issue (stable-fixes).
- PM: sleep: core: Clear power.must_resume in noirq suspend error path (git-fixes).
- RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034).
- RAS/AMD/FMPM: Get masked address (bsc#1242034).
- RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes)
- RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM (git-fixes)
- RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes)
- RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes)
- RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes)
- RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes)
- RDMA/core: Rate limit GID cache warning messages (git-fixes)
- RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes)
- RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes)
- RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes)
- RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes)
- RDMA/hns: Drop GFP_NOWARN (git-fixes)
- RDMA/hns: Fix -Wframe-larger-than issue (git-fixes)
- RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes)
- RDMA/hns: Fix accessing uninitialized resources (git-fixes)
- RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes)
- RDMA/hns: Fix double destruction of rsv_qp (git-fixes)
- RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes)
- RDMA/hns: Get message length of ack_req from FW (git-fixes)
- RDMA/mana_ib: Add device statistics support (bsc#1246651).
- RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135).
- RDMA/mana_ib: Extend modify QP (bsc#1251135).
- RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes).
- RDMA/mana_ib: add additional port counters (git-fixes).
- RDMA/mana_ib: add support of multiple ports (git-fixes).
- RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes)
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes)
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes)
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
- RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes)
- RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes)
- RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes)
- RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes)
- RDMA/rxe: Fix race in do_task() when draining (git-fixes)
- RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes)
- RDMA/siw: Always report immediate post SQ errors (git-fixes)
- RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes)
- RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes)
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes)
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-fixes)
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
- RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes)
- README.BRANCH: mfranc@suse.cz leaving SUSE
- RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348).
- Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes).
- Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815).
- Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes).
- Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes).
- Revert "drm/nouveau: check ioctl command codes better" (git-fixes).
- Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes).
- Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" (git-fixes).
- Revert "mac80211: Dynamically set CoDel parameters per station" (stable-fixes).
- Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes).
- Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" (stable-fixes).
- Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git-fixes).
- SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes).
- Squashfs: add additional inode sanity checking (git-fixes).
- Squashfs: fix uninit-value in squashfs_get_parent (git-fixes).
- Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes).
- USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes).
- USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes).
- USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes).
- USB: serial: option: add Foxconn T99W640 (stable-fixes).
- USB: serial: option: add Foxconn T99W709 (stable-fixes).
- USB: serial: option: add SIMCom 8230C compositions (stable-fixes).
- USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable-fixes).
- USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes).
- USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes).
- USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes).
- USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes).
- Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps.
- Update config files: revive pwc driver for Leap (bsc#1249060)
- accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes).
- accel/ivpu: Correct DCT interrupt handling (git-fixes).
- accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes).
- accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes).
- accel/ivpu: Prevent recovery work from being queued during device removal (git-fixes).
- amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable-fixes).
- aoe: defer rexmit timer downdev work to workqueue (git-fixes).
- arch/powerpc: Remove .interp section in vmlinux (bsc#1215199).
- arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes)
- arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes)
- arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes)
- arm64/mm: Close theoretical race where stale TLB entry remains valid (git-fixes)
- arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes)
- arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes)
- arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes)
- arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes)
- arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes)
- arm64: Handle KCOV __init vs inline mismatches (git-fixes)
- arm64: Mark kernel as tainted on SAE and SError panic (git-fixes)
- arm64: Restrict pagetable teardown to avoid false warning (git-fixes)
- arm64: config: Make tpm_tis_spi module build-in (bsc#1246896)
- arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes)
- arm64: dts: add big-endian property back into watchdog node (git-fixes)
- arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes)
- arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes)
- arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes)
- arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git-fixes)
- arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes)
- arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes)
- arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes)
- arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes)
- arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git-fixes)
- arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes)
- arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git-fixes)
- arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes)
- arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes)
- arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp: Correct thermal sensor index (git-fixes)
- arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git-fixes)
- arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes)
- arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes)
- arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes)
- arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git-fixes)
- arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes)
- arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git-fixes)
- arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git-fixes)
- arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git-fixes).
- arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git-fixes)
- arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes)
- arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git-fixes)
- arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git-fixes)
- arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git-fixes)
- arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git-fixes)
- arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes)
- arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git-fixes)
- arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma (git-fixes)
- arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes)
- arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git-fixes)
- arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes)
- arm64: dts: st: fix timer used for ticks (git-fixes)
- arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git-fixes)
- arm64: map [_text, _stext) virtual address range (git-fixes)
- arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes)
- arm64: poe: Handle spurious Overlay faults (git-fixes)
- arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes)
- arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes)
- arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes)
- arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes)
- arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes)
- arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes)
- arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes)
- ata: ahci: Disable DIPM if host lacks support (stable-fixes).
- ata: ahci: Disallow LPM policy control if not supported (stable-fixes).
- ata: libata-sata: Add link_power_management_supported sysfs attribute (git-fixes).
- ata: libata-sata: Disallow changing LPM state if not supported (stable-fixes).
- ata: libata-scsi: Fix CDL control (git-fixes).
- audit,module: restore audit logging in load failure case (git-fixes).
- ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes).
- batman-adv: fix OOB read/write in network-coding decode (git-fixes).
- benet: fix BUG when creating VFs (git-fixes).
- block: Introduce bio_needs_zone_write_plugging() (git-fixes).
- block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552).
- block: ensure discard_granularity is zero when discard is not supported (git-fixes).
- block: fix kobject leak in blk_unregister_queue (git-fixes).
- block: mtip32xx: Fix usage of dma_map_sg() (git-fixes).
- block: sanitize chunk_sectors for atomic write limits (git-fixes).
- bnxt_en: Add a helper function to configure MRU and RSS (git-fixes).
- bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes).
- bnxt_en: Fix DCB ETS validation (git-fixes).
- bnxt_en: Fix memory corruption when FW resources change during ifdown (git-fixes).
- bnxt_en: Fix stats context reservation logic (git-fixes).
- bnxt_en: Flush FW trace before copying to the coredump (git-fixes).
- bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git-fixes).
- bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL (git-fixes).
- bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git-fixes)
- bpf, arm64: Fix fp initialization for exception boundary (git-fixes)
- bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes).
- bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes).
- bpf: Adjust free target to avoid global starvation of LRU map (git-fixes).
- bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git-fixes).
- bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes).
- bpf: Check link_create.flags parameter for multi_kprobe (git-fixes).
- bpf: Check link_create.flags parameter for multi_uprobe (git-fixes).
- bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes).
- bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes).
- bpf: Forget ranges when refining tnum after JSET (git-fixes).
- bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes).
- bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates storage (git-fixes).
- bpf: Reject %p% format string in bprintf-like helpers (git-fixes).
- bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes).
- bpf: Reject narrower access to pointer ctx fields (git-fixes).
- bpf: Return prog btf_id without capable check (git-fixes).
- bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes).
- bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git-fixes).
- bpf: fix possible endless loop in BPF map iteration (git-fixes).
- btrfs: abort transaction during log replay if walk_log_tree() failed (git-fixes).
- btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes).
- btrfs: add assertions and comment about path expectations to btrfs_cross_ref_exist() (git-fixes).
- btrfs: add debug build only WARN (bsc#1249038).
- btrfs: add function comment for check_committed_ref() (git-fixes).
- btrfs: always abort transaction on failure to add block group to free space tree (git-fixes).
- btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes).
- btrfs: avoid redundant call to get inline ref type at check_committed_ref() (git-fixes).
- btrfs: avoid starting new transaction when cleaning qgroup during subvolume drop (git-fixes).
- btrfs: clear dirty status from extent buffer on error at insert_new_root() (git-fixes).
- btrfs: codify pattern for adding block_group to bg_list (git-fixes).
- btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038).
- btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes).
- btrfs: correctly escape subvol in btrfs_show_options() (git-fixes).
- btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540).
- btrfs: do not ignore inode missing when replaying log tree (git-fixes).
- btrfs: do not output error message if a qgroup has been already cleaned up (git-fixes).
- btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap write (bsc#1247949).
- btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes).
- btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes).
- btrfs: enhance ASSERT() to take optional format string (bsc#1249038).
- btrfs: error on missing block group when unaccounting log tree extent buffers (git-fixes).
- btrfs: exit after state split error at set_extent_bit() (git-fixes).
- btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068)
- btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949).
- btrfs: fix assertion when building free space tree (git-fixes).
- btrfs: fix corruption reading compressed range when block size is smaller than page size (git-fixes).
- btrfs: fix data overwriting bug during buffered write when block size &amp;lt; page size (git-fixes).
- btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes).
- btrfs: fix incorrect log message for nobarrier mount option (git-fixes).
- btrfs: fix inode lookup error handling during log replay (git-fixes).
- btrfs: fix invalid extref key setup when replaying dentry (git-fixes).
- btrfs: fix invalid inode pointer after failure to create reloc inode (git-fixes).
- btrfs: fix invalid inode pointer dereferences during log replay (git-fixes).
- btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes).
- btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes).
- btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes).
- btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes).
- btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git-fixes).
- btrfs: fix race between logging inode and checking if it was logged before (git-fixes).
- btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes).
- btrfs: fix squota compressed stats leak (git-fixes).
- btrfs: fix ssd_spread overallocation (git-fixes).
- btrfs: fix subvolume deletion lockup caused by inodes xarray race (git-fixes).
- btrfs: fix the inode leak in btrfs_iget() (git-fixes).
- btrfs: fix two misuses of folio_shift() (git-fixes).
- btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git-fixes).
- btrfs: handle unaligned EOF truncation correctly for subpage cases (bsc#1249038).
- btrfs: initialize inode::file_extent_tree after i_mode has been set (git-fixes).
- btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068)
- btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes).
- btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes).
- btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes).
- btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes).
- btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes).
- btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes).
- btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git-fixes).
- btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes).
- btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes).
- btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite() (bsc#1247949).
- btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes).
- btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes).
- btrfs: props: switch prop_handler::extract to struct btrfs_inode (git-fixes).
- btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes).
- btrfs: qgroup: fix qgroup create ioctl returning success after quotas disabled (git-fixes).
- btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git-fixes).
- btrfs: qgroup: remove no longer used fs_info-&gt;qgroup_ulist (git-fixes).
- btrfs: qgroup: set quota enabled bit if quota disable fails flushing reservations (git-fixes).
- btrfs: record new subvolume in parent dir earlier to avoid dir logging races (git-fixes).
- btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git-fixes).
- btrfs: remove no longer needed strict argument from can_nocow_extent() (git-fixes).
- btrfs: remove redundant path release when replaying a log tree (git-fixes).
- btrfs: remove the snapshot check from check_committed_ref() (git-fixes).
- btrfs: restore mount option info messages during mount (git-fixes).
- btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes).
- btrfs: return a btrfs_inode from read_one_inode() (git-fixes).
- btrfs: return any hit error from extent_writepage_io() (git-fixes).
- btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent() (git-fixes).
- btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes).
- btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949).
- btrfs: simplify error detection flow during log replay (git-fixes).
- btrfs: simplify return logic at check_committed_ref() (git-fixes).
- btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes).
- btrfs: tests: fix chunk map leak after failure to add it to the tree (git-fixes).
- btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes).
- btrfs: unfold transaction aborts when replaying log trees (git-fixes).
- btrfs: unify ordering of btrfs_key initializations (git-fixes).
- btrfs: update superblock's device bytes_used when dropping chunk (git-fixes).
- btrfs: use a single variable to track return value at btrfs_page_mkwrite() (bsc#1247949).
- btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes).
- btrfs: use filemap_get_folio() helper (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git-fixes).
- btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes).
- btrfs: use verbose ASSERT() in volumes.c (bsc#1249038).
- build_bug.h: Add KABI assert (bsc#1249186).
- bus: firewall: Fix missing static inline annotations for stubs (git-fixes).
- bus: fsl-mc: Check return value of platform_get_resource() (git-fixes).
- bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes).
- bus: mhi: ep: Fix chained transfer handling in read path (git-fixes).
- bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes).
- bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes).
- bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git-fixes).
- can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes).
- can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes).
- can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes).
- can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes).
- can: kvaser_pciefd: Store device channel index (git-fixes).
- can: kvaser_usb: Assign netdev.dev_port based on device channel index (git-fixes).
- can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes).
- can: peak_usb: fix USB FD devices potential malfunction (git-fixes).
- can: peak_usb: fix shift-out-of-bounds issue (git-fixes).
- can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes).
- can: rcar_canfd: Fix controller mode setting (stable-fixes).
- can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes).
- cdc-acm: fix race between initial clearing halt and open (git-fixes).
- cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes).
- cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes).
- cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166).
- cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166).
- cgroup: Add compatibility option for content of /proc/cgroups (jsc#PED-12405).
- cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405).
- cgroup: llist: avoid memory tears for llist_node (bsc#1247963).
- cgroup: make css_rstat_updated nmi safe (bsc#1247963).
- cgroup: remove per-cpu per-subsystem locks (bsc#1247963).
- cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963).
- char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes).
- clk: at91: peripheral: fix return value (git-fixes).
- clk: at91: sam9x7: update pll clk ranges (git-fixes).
- clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes).
- clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes).
- clk: imx95-blk-ctl: Fix synchronous abort (git-fixes).
- clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes).
- clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git-fixes).
- clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register() (git-fixes).
- clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git-fixes).
- clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git-fixes).
- clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git-fixes).
- clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks (git-fixes).
- clk: samsung: exynos850: fix a comment (git-fixes).
- clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes).
- clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git-fixes).
- clk: sunxi-ng: v3s: Fix de clock definition (git-fixes).
- clk: tegra: do not overallocate memory for bpmp clocks (git-fixes).
- clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes).
- clk: xilinx: vcu: unregister pll_post only if registered correctly (git-fixes).
- comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes).
- comedi: Make insn_rw_emulate_bits() do insn-&gt;n samples (git-fixes).
- comedi: fix race between polling and detaching (git-fixes).
- comedi: pcl726: Prevent invalid irq number (git-fixes).
- compiler-clang.h: define __SANITIZE_*__ macros only when undefined (stable-fixes).
- compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes).
- config.sh: SLFO 1.2 branched in IBS
- config: arm64: default: enable mtu3 dual-role support for MediaTek platforms (bsc#1245206)
- coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
- cpu: Define attack vectors (git-fixes).
- cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git-fixes).
- cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for performance governor (git-fixes).
- cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes)
- cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes)
- cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes).
- cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable-fixes).
- cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes).
- cpufreq: Exit governor when failed to start old governor (stable-fixes).
- cpufreq: Init policy-&gt;rwsem before it may be possibly used (git-fixes).
- cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes).
- cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes).
- cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency (stable-fixes git-fixes).
- cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes).
- cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes).
- cpufreq: armada-8k: make both cpu masks static (git-fixes).
- cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes).
- cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git-fixes).
- cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable-fixes).
- cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git-fixes).
- cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (git-fixes).
- cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes).
- cpufreq: mediatek: fix device leak on probe failure (git-fixes).
- cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git-fixes).
- cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable-fixes).
- cpufreq: scpi: compare kHz instead of Hz (git-fixes).
- cpufreq: sun50i: prevent out-of-bounds access (git-fixes).
- cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes).
- cpufreq: tegra186: Share policy per cluster (stable-fixes).
- cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes).
- crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes).
- crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes).
- crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes).
- crypto: atmel - Fix dma_unmap_sg() direction (git-fixes).
- crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes).
- crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes).
- crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes).
- crypto: ccp - Fix locking on alloc failure handling (git-fixes).
- crypto: essiv - Check ssize for decryption and in-place encryption (git-fixes).
- crypto: hisilicon - re-enable address prefetch after device resuming (git-fixes).
- crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes).
- crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes).
- crypto: hisilicon/qm - set NULL to qm-&gt;debug.qm_diff_regs (git-fixes).
- crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes).
- crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes).
- crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes).
- crypto: jitter - fix intermediary handling (stable-fixes).
- crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes).
- crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes).
- crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes).
- crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes).
- crypto: octeontx2 - Fix address alignment issue on ucode loading (stable-fixes).
- crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2 (stable-fixes).
- crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable-fixes).
- crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes).
- crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes).
- crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes).
- crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes).
- crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes).
- crypto: qat - fix state restore for banks with exceptions (git-fixes).
- crypto: qat - flush misc workqueue during device shutdown (git-fixes).
- crypto: qat - lower priority for skcipher and aead algorithms (stable-fixes).
- crypto: qat - use unmanaged allocation for dc_data (git-fixes).
- crypto: rng - Ensure set_ent is always present (git-fixes).
- crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes).
- crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes).
- devlink: Add support for u64 parameters (jsc#PED-13331).
- devlink: avoid param type value translations (jsc#PED-13331).
- devlink: define enum for attr types of dynamic attributes (jsc#PED-13331).
- devlink: introduce devlink_nl_put_u64() (jsc#PED-13331).
- devlink: let driver opt out of automatic phys_port_name generation (git-fixes).
- dm-mpath: do not print the "loaded" message if registering fails (git-fixes).
- dm-stripe: limit chunk_sectors to the stripe size (git-fixes).
- dm-table: fix checking for rq stackable devices (git-fixes).
- dm: Check for forbidden splitting of zone write operations (git-fixes).
- dm: split write BIOs on zone boundaries when zone append is not emulated (git-fixes).
- dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes).
- dmaengine: Fix dma_async_tx_descriptor-&gt;tx_submit documentation (git-fixes).
- dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes).
- dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes).
- dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes).
- dmaengine: idxd: Fix refcount underflow on module unload (git-fixes).
- dmaengine: idxd: Remove improper idxd_free (git-fixes).
- dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git-fixes).
- dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes).
- dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git-fixes).
- dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes).
- dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git-fixes).
- dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes).
- dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs (stable-fixes).
- dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git-fixes).
- docs: admin-guide: update to current minimum pipe size default (git-fixes).
- dpll: Add basic Microchip ZL3073x support (jsc#PED-13331).
- dpll: Make ZL3073X invisible (jsc#PED-13331).
- dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331).
- dpll: zl3073x: Add support to get/set priority on input pins (jsc#PED-13331).
- dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331).
- dpll: zl3073x: Fix build failure (jsc#PED-13331).
- dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331).
- dpll: zl3073x: Implement input pin state setting in automatic mode (jsc#PED-13331).
- dpll: zl3073x: Read DPLL types and pin properties from system firmware (jsc#PED-13331).
- dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331).
- dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (jsc#PED-13331).
- driver core/PM: Set power.no_callbacks along with power.no_pm (stable-fixes).
- drivers/base/node: fix double free in register_one_node() (git-fixes).
- drivers/base/node: handle error properly in register_one_node() (git-fixes).
- drivers: base: handle module_kobject creation (git-fixes).
- drm/amd : Update MES API header file for v11 &amp; v12 (stable-fixes).
- drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes).
- drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes).
- drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112).
- drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable-fixes).
- drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112).
- drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes).
- drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes).
- drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes).
- drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes).
- drm/amd/display: Allow DCN301 to clear update flags (git-fixes).
- drm/amd/display: Allow RX6xxx &amp; RX7700 to invoke amdgpu_irq_get/put (git-fixes).
- drm/amd/display: Avoid a NULL pointer dereference (stable-fixes).
- drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes).
- drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes).
- drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes).
- drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes).
- drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes).
- drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121).
- drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable-fixes).
- drm/amd/display: Disable scaling on DCE6 for now (git-fixes).
- drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes).
- drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes).
- drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes).
- drm/amd/display: Do not print errors for nonexistent connectors (git-fixes).
- drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes).
- drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112).
- drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes).
- drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes).
- drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes).
- drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes).
- drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable-fixes).
- drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git-fixes).
- drm/amd/display: Fix mismatch type comparison (stable-fixes).
- drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112).
- drm/amd/display: Free memory allocation (stable-fixes).
- drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes).
- drm/amd/display: Initialize mode_select to 0 (stable-fixes).
- drm/amd/display: Only finalize atomic_obj if it was initialized (stable-fixes).
- drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes).
- drm/amd/display: Properly disable scaling on DCE6 (git-fixes).
- drm/amd/display: Remove redundant semicolons (git-fixes).
- drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes).
- drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes).
- drm/amd/display: add workaround flag to link to force FFE preset (stable-fixes).
- drm/amd/display: fix a Null pointer dereference vulnerability (stable-fixes).
- drm/amd/display: fix dmub access race condition (bsc#1243112).
- drm/amd/display: fix initial backlight brightness calculation (git-fixes).
- drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes).
- drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112).
- drm/amd/display: remove output_tf_change flag (git-fixes).
- drm/amd/display: use udelay rather than fsleep (git-fixes).
- drm/amd/include : MES v11 and v12 API header update (stable-fixes).
- drm/amd/include : Update MES v12 API for fence update (stable-fixes).
- drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git-fixes).
- drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes).
- drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes).
- drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes).
- drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes).
- drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes).
- drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes).
- drm/amd/pm: fix null pointer access (stable-fixes).
- drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes).
- drm/amd: Avoid evicting resources at S5 (bsc#1243112).
- drm/amd: Check whether secure display TA loaded successfully (bsc#1243112).
- drm/amd: Fix hybrid sleep (bsc#1243112).
- drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112).
- drm/amd: Restore cached manual clock settings during resume (bsc#1243112).
- drm/amd: Restore cached power limit during resume (stable-fixes).
- drm/amdgpu/discovery: fix fw based ip discovery (git-fixes).
- drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes).
- drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes).
- drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes).
- drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes).
- drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes).
- drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112).
- drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112).
- drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112).
- drm/amdgpu/mes: add missing locking in helper functions (stable-fixes).
- drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes).
- drm/amdgpu/mes: optimize compute loop handling (stable-fixes).
- drm/amdgpu/swm14: Update power limit logic (stable-fixes).
- drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable-fixes).
- drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes).
- drm/amdgpu/vcn: fix ref counting for ring based profile handling (git-fixes).
- drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112).
- drm/amdgpu: Add additional DCE6 SCL registers (git-fixes).
- drm/amdgpu: Avoid extra evict-restore process (stable-fixes).
- drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112).
- drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes).
- drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes).
- drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112).
- drm/amdgpu: Increase reset counter only on success (stable-fixes).
- drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git-fixes).
- drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes).
- drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes).
- drm/amdgpu: Report individual reset error (bsc#1243112).
- drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes).
- drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes).
- drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable-fixes).
- drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes).
- drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes).
- drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112).
- drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes).
- drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes).
- drm/amdgpu: fix incorrect vm flags to map bo (git-fixes).
- drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112).
- drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes).
- drm/amdgpu: fix vram reservation issue (git-fixes).
- drm/amdgpu: remove the redeclaration of variable i (git-fixes).
- drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes).
- drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes).
- drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes).
- drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes).
- drm/amdkfd: Fix mmap write lock not release (bsc#1243112).
- drm/ast: Use msleep instead of mdelay for edid read (git-fixes).
- drm/bridge: fix OF node leak (git-fixes).
- drm/bridge: it6505: select REGMAP_I2C (git-fixes).
- drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes).
- drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes).
- drm/cirrus-qemu: Fix pitch programming (git-fixes).
- drm/connector: hdmi: Evaluate limited range after computing format (git-fixes).
- drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121).
- drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes).
- drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121).
- drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121).
- drm/edid: Define the quirks in an enum list (bsc#1248121).
- drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes).
- drm/gem: Internally test import_attach for imported objects (git-fixes).
- drm/gem: Test for imported GEM buffers with helper (stable-fixes).
- drm/gma500: Fix null dereference in hdmi teardown (git-fixes).
- drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes).
- drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes).
- drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes).
- drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes).
- drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes).
- drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes).
- drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes).
- drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git-fixes).
- drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes).
- drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes).
- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).
- drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes).
- drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable-fixes).
- drm/i915/icl+/tc: Cache the max lane count value (stable-fixes).
- drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable-fixes).
- drm/i915/power: fix size for for_each_set_bit() in abox iteration (git-fixes).
- drm/imagination: Clear runtime PM errors while resetting the GPU (stable-fixes).
- drm/mediatek: Add error handling for old state CRTC in atomic_disable (git-fixes).
- drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes).
- drm/mediatek: fix potential OF node use-after-free (git-fixes).
- drm/msm/dp: account for widebus and yuv420 during mode validation (git-fixes).
- drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes).
- drm/msm/dpu: fix incorrect type for ret (git-fixes).
- drm/msm/kms: move snapshot init earlier in KMS init (git-fixes).
- drm/msm: Add error handling for krealloc in metadata setup (stable-fixes).
- drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes).
- drm/msm: update the high bitfield of certain DSI registers (git-fixes).
- drm/msm: use trylock for debugfs (stable-fixes).
- drm/nouveau/disp: Always accept linear modifier (git-fixes).
- drm/nouveau/gsp: fix potential leak of memory used during acpi init (git-fixes).
- drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes).
- drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes).
- drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes).
- drm/nouveau: fix typos in comments (git-fixes).
- drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes).
- drm/nouveau: remove unused memory target test (git-fixes).
- drm/panel: novatek-nt35560: Fix invalid return value (git-fixes).
- drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes).
- drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git-fixes).
- drm/panthor: Defer scheduler entitiy destruction to queue release (git-fixes).
- drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes).
- drm/panthor: validate group queue count (git-fixes).
- drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes).
- drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes).
- drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes).
- drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes).
- drm/simpledrm: Do not upcast in release helpers (git-fixes).
- drm/tests: Fix endian warning (git-fixes).
- drm/ttm: Respect the shrinker core free target (stable-fixes).
- drm/ttm: Should to return the evict error (stable-fixes).
- drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes).
- drm/vmwgfx: Fix Use-after-free in validation (git-fixes).
- drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes).
- drm/vmwgfx: Fix copy-paste typo in validation (git-fixes).
- drm/xe/bmg: Add new PCI IDs (stable-fixes).
- drm/xe/bmg: Add one additional PCI ID (stable-fixes).
- drm/xe/bmg: Update Wa_22019338487 (git-fixes).
- drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes).
- drm/xe/hw_engine_group: Fix double write lock release in error path (git-fixes).
- drm/xe/mocs: Initialize MOCS index early (stable-fixes).
- drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes).
- drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes).
- drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes).
- drm/xe/tile: Release kobject for the failure path (git-fixes).
- drm/xe/uapi: Correct sync type definition in comments (git-fixes).
- drm/xe/uapi: loosen used tracking restriction (git-fixes).
- drm/xe/vf: Disable CSC support on VF (git-fixes).
- drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes).
- drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes).
- drm/xe/xe_sync: avoid race during ufence signaling (git-fixes).
- drm/xe: Allow dropping kunit dependency as built-in (git-fixes).
- drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes).
- drm/xe: Carve out wopcm portion from the stolen memory (git-fixes).
- drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes).
- drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes).
- drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git-fixes).
- drm/xe: Fix build without debugfs (git-fixes).
- drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes).
- drm/xe: Move page fault init after topology init (git-fixes).
- drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git-fixes).
- drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes).
- dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331).
- dt-bindings: dpll: Add support for Microchip Azurite chip family (jsc#PED-13331).
- e1000e: disregard NVM checksum on tgp when valid checksum bit is not set (git-fixes).
- e1000e: ignore uninitialized checksum word on tgp (git-fixes).
- efi: stmm: Fix incorrect buffer allocation method (git-fixes).
- erofs: avoid reading more for fragment maps (git-fixes).
- erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git-fixes).
- execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes).
- exfat: add cluster chain loop check for dir (git-fixes).
- exfat: fdatasync flag should be same like generic_write_sync() (git-fixes).
- ext4: fix checks for orphan inodes (bsc#1250119).
- ext4: remove writable userspace mappings before truncating page cache (bsc#1247223).
- fbcon: Fix OOB access in font allocation (git-fixes).
- fbcon: Fix outdated registered_fb reference in comment (git-fixes).
- fbcon: fix integer overflow in fbcon_do_set_font (git-fixes).
- fbdev: Fix logic error in "offb" name match (git-fixes).
- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes).
- fbdev: fix potential buffer overflow in do_register_framebuffer() (stable-fixes).
- fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes).
- fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes).
- fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git-fixes).
- firewire: core: fix overlooked update of subsystem ABI version (git-fixes).
- firewire: ohci: correct code comments about bus_reset tasklet (git-fixes).
- firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall (stable-fixes).
- firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes).
- firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes).
- firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver (git-fixes).
- firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early during resume (stable-fixes).
- firmware: firmware: meson-sm: fix compile-test default (git-fixes).
- firmware: meson_sm: fix device leak at probe (git-fixes).
- firmware: tegra: Fix IVC dependency problems (stable-fixes).
- flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes).
- fs/nfs/io: make nfs_start_io_*() killable (git-fixes).
- fs/proc/task_mmu: check p-&gt;vec_buf for NULL (git-fixes).
- fs/proc: Use inode_get_dev() for device numbers in procmap_query References: bsc#1246450
- ftrace: Fix function profiler's filtering functionality (git-fixes).
- ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes).
- gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220).
- gfs2: Clean up delete work processing (bsc#1247220).
- gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220).
- gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220).
- gfs2: Minor delete_work_func cleanup (bsc#1247220).
- gfs2: Only defer deletes when we have an iopen glock (bsc#1247220).
- gfs2: Prevent inode creation race (2) (bsc#1247220).
- gfs2: Prevent inode creation race (bsc#1247220).
- gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220).
- gfs2: Rename GIF_{DEFERRED -&gt; DEFER}_DELETE (bsc#1247220).
- gfs2: Rename dinode_demise to evict_behavior (bsc#1247220).
- gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220).
- gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (bsc#1247220).
- gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220).
- gfs2: Update to the evict / remote delete documentation (bsc#1247220).
- gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220).
- gfs2: gfs2_evict_inode clarification (bsc#1247220).
- gfs2: minor evict fix (bsc#1247220).
- gfs2: skip if we cannot defer delete (bsc#1247220).
- gpio: mlxbf2: use platform_get_irq_optional() (git-fixes).
- gpio: mlxbf3: use platform_get_irq_optional() (git-fixes).
- gpio: tps65912: check the return value of regmap_update_bits() (stable-fixes).
- gpio: virtio: Fix config space reading (git-fixes).
- gpio: wcd934x: check the return value of regmap_update_bits() (stable-fixes).
- gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes).
- gpiolib: Extend software-node support to support secondary software-nodes (git-fixes).
- gve: Fix stuck TX queue for DQ queue format (git-fixes).
- gve: prevent ethtool ops after shutdown (git-fixes).
- habanalabs: fix UAF in export_dmabuf() (git-fixes).
- hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes).
- hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
- hv_netvsc: Link queues to NAPIs (git-fixes).
- hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes).
- hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes).
- hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes).
- hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes).
- hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes).
- hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes).
- hwrng: nomadik - add ARM_AMBA dependency (git-fixes).
- i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes).
- i2c: designware: Add disabling clocks when probe fails (git-fixes).
- i2c: designware: Add quirk for Intel Xe (stable-fixes).
- i2c: designware: Fix clock issue when PM is disabled (git-fixes).
- i2c: designware: Use temporary variable for struct device (stable-fixes).
- i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes).
- i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes).
- i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git-fixes).
- i2c: omap: Add support for setting mux (stable-fixes).
- i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes).
- i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes).
- i2c: omap: fix deprecated of_property_read_bool() use (git-fixes).
- i2c: qup: jump out of the loop in case of timeout (git-fixes).
- i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes).
- i2c: tegra: Fix reset error handling with ACPI (git-fixes).
- i2c: tegra: Use internal reset when reset property is not available (bsc#1249143)
- i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes).
- i3c: Fix default I2C adapter timeout value (git-fixes).
- i3c: add missing include to internal header (stable-fixes).
- i3c: do not fail if GETHDRCAP is unsupported (stable-fixes).
- i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes).
- i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes).
- i3c: master: svc: Recycle unused IBI slot (git-fixes).
- i3c: master: svc: Use manual response for IBI events (git-fixes).
- i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes).
- i40e: report VF tx_dropped with tx_errors instead of tx_discards (git-fixes).
- ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git-fixes).
- ice, irdma: fix an off by one in error handling code (bsc#1247712).
- ice, irdma: move interrupts code to irdma (bsc#1247712).
- ice/ptp: fix crosstimestamp reporting (git-fixes).
- ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712).
- ice: Replace ice specific DSCP mapping num with a kernel define (jsc#PED-13728 jsc#PED-13762).
- ice: check correct pointer in fwlog debugfs (git-fixes).
- ice: count combined queues using Rx/Tx count (bsc#1247712).
- ice: devlink PF MSI-X max and min parameter (bsc#1247712).
- ice: do not leave device non-functional if Tx scheduler config fails (git-fixes).
- ice: enable_rdma devlink param (bsc#1247712).
- ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset (jsc#PED-13728).
- ice: fix incorrect counter for buffer allocation failures (git-fixes).
- ice: get rid of num_lan_msix field (bsc#1247712).
- ice: init flow director before RDMA (bsc#1247712).
- ice: remove splitting MSI-X between features (bsc#1247712).
- ice: simplify VF MSI-X managing (bsc#1247712).
- ice: treat dyn_allowed only as suggestion (bsc#1247712).
- ice: use fixed adapter index for E825C embedded devices (git-fixes).
- idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762).
- idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728 jsc#PED-13762).
- idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762).
- idpf: add cross timestamping (jsc#PED-13728).
- idpf: add flow steering support (jsc#PED-13728).
- idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762).
- idpf: add mailbox access to read PTP clock time (jsc#PED-13728 jsc#PED-13762).
- idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762).
- idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728).
- idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728 jsc#PED-13762).
- idpf: change the method for mailbox workqueue allocation (jsc#PED-13728 jsc#PED-13762).
- idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728).
- idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728 jsc#PED-13762).
- idpf: implement RDMA vport auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762).
- idpf: implement core RDMA auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762).
- idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762).
- idpf: implement remaining IDC RDMA core callbacks and handlers (jsc#PED-13728 jsc#PED-13762).
- idpf: improve when to set RE bit logic (jsc#PED-13728).
- idpf: move virtchnl structures to the header file (jsc#PED-13728 jsc#PED-13762).
- idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728 jsc#PED-13762).
- idpf: preserve coalescing settings across resets (jsc#PED-13728).
- idpf: remove obsolete stashing code (jsc#PED-13728).
- idpf: remove unreachable code from setting mailbox (jsc#PED-13728 jsc#PED-13762).
- idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728).
- idpf: set mac type when adding and removing MAC filters (jsc#PED-13728).
- idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728).
- idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728).
- idpf: use reserved RDMA vectors from control plane (jsc#PED-13728 jsc#PED-13762).
- igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes).
- igc: disable L1.2 PCI-E link substate to avoid performance issue (git-fixes).
- igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes).
- iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762).
- iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762).
- iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762).
- iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728 jsc#PED-13762).
- iio/adc/pac1934: fix channel disable configuration (git-fixes).
- iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git-fixes).
- iio: accel: fxls8962af: Fix temperature calculation (git-fixes).
- iio: adc: ad7173: fix setting ODR in probe (git-fixes).
- iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes).
- iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable-fixes).
- iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes).
- iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes).
- iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes).
- iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes).
- iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes).
- iio: adc: max1363: Reorder mode_list[] entries (stable-fixes).
- iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes).
- iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes).
- iio: common: st_sensors: Fix use of uninitialize device structs (stable-fixes).
- iio: consumers: Fix handling of negative channel scale in iio_convert_raw_to_processed() (git-fixes).
- iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git-fixes).
- iio: dac: ad5360: use int type to store negative error codes (git-fixes).
- iio: dac: ad5421: use int type to store negative error codes (git-fixes).
- iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes).
- iio: frequency: adf4350: Fix prescaler usage (git-fixes).
- iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes).
- iio: hid-sensor-prox: Restore lost scale assignments (git-fixes).
- iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes).
- iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes).
- iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes).
- iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes).
- iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes).
- iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes).
- iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes).
- iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes).
- iio: light: as73211: Ensure buffer holes are zeroed (git-fixes).
- iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes).
- iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes).
- iio: proximity: isl29501: fix buffered read on big-endian systems (git-fixes).
- iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() (git-fixes).
- iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes).
- iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes).
- integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343).
- intel_idle: Provide the default enter_dead() handler (jsc#PED-13815).
- intel_idle: Rescan "dead" SMT siblings during initialization (jsc#PED-13815).
- intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815).
- interconnect: qcom: sc8180x: specify num_nodes (git-fixes).
- interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git-fixes).
- io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop blacklisting.
- io_uring: expose read/write attribute capability (jsc#PED-12882 bsc#1237542).
- io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes).
- iommu/amd: Enable PASID and ATS capabilities in the correct order (git-fixes).
- iommu/amd: Fix alias device DTE setting (git-fixes).
- iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes).
- iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes).
- iommu/arm-smmu-v3: Fix smmu_domain-&gt;nr_ats_masters decrement (git-fixes).
- iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git-fixes).
- iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes).
- iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git-fixes).
- iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all (git-fixes).
- iommu/vt-d: Fix possible circular locking dependency (git-fixes).
- iommu/vt-d: Fix system hang on reboot -f (git-fixes).
- iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes).
- iommu: Handle race with default domain setup (git-fixes).
- iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes).
- ipmi: Fix strcpy source and destination the same (stable-fixes).
- ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable-fixes).
- ipv6: annotate data-races around rt-&gt;fib6_nsiblings (git-fixes).
- ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes).
- ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes).
- ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes).
- ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes).
- irdma: free iwdev-&gt;rf after removing MSI-X (bsc#1247712).
- isolcpus: add missing hunk back (bsc#1236897 bsc#1249206).
- iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes).
- ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410).
- ixgbe: prevent from unwanted interface name changes (git-fixes).
- ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git-fixes).
- kABI fix after Add TDX support for vSphere (jsc#PED-13302).
- kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
- kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).
- kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes).
- kABI fix after vhost: Reintroduce kthread API and add mode selection (git-fixes).
- kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121).
- kABI workaround for amd_sfh (git-fixes).
- kABI workaround for drm_gem.h (git-fixes).
- kABI workaround for struct mtk_base_afe changes (git-fixes).
- kABI: Fix the module::name type in audit_context (git-fixes).
- kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-fixes).
- kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes).
- kABI: fix for struct devlink_port_attrs: move new member to the end (git-fixes).
- kABI: netfilter: supress warnings for nft_set_ops (git-fixes).
- kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git-fixes).
- kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They are used only locally
- kabi/severities: ignore two unused/dropped symbols from MEI
- kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745).
- kabi: Restore layout of parallel_data (bsc1248343).
- kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963).
- kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes).
- kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655).
- kbuild: rust: add rustc-min-version support function (git-fixes)
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- kernel: globalize lookup_or_create_module_kobject() (stable-fixes).
- kernel: param: rename locate_module_kobject (stable-fixes).
- leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes).
- leds: flash: leds-qcom-flash: Update torch current clamp setting (git-fixes).
- leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes).
- leds: leds-lp55xx: Use correct address for memory programming (git-fixes).
- lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897).
- libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes).
- libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728 jsc#PED-13762).
- livepatch: Add stack_order sysfs attribute (poo#187320).
- loop: use kiocb helpers to fix lockdep warning (git-fixes).
- lpfc: do not use file-&gt;f_path.dentry for comparisons (bsc#1250519).
- mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes).
- mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes).
- mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes).
- mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git-fixes).
- mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes).
- mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable-fixes).
- mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes).
- mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes).
- mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git-fixes).
- mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git-fixes).
- mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes).
- maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes).
- maple_tree: fix status setup on restore to active (git-fixes).
- maple_tree: fix testing for 32 bit builds (git-fixes).
- mctp: no longer rely on net-&gt;dev_index_head (git-fixes).
- md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes).
- md: allow removing faulty rdev during resync (git-fixes).
- md: dm-zoned-target: Initialize return variable r to avoid uninitialized use (git-fixes).
- md: make rdev_addable usable for rcu mode (git-fixes).
- media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes).
- media: cec: extron-da-hd-4k-plus: drop external-module make commands (git-fixes).
- media: cx18: Add missing check after DMA map (git-fixes).
- media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes).
- media: dvb-frontends: w7090p: fix null-ptr-deref in
  w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes).
- media: gspca: Add bounds checking to firmware parser (git-fixes).
- media: hi556: Fix reset GPIO timings (stable-fixes).
- media: hi556: correct the test pattern configuration (git-fixes).
- media: i2c: mt9v111: fix incorrect type for ret (git-fixes).
- media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes).
- media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes).
- media: ipu-bridge: Add _HID for OV5670 (stable-fixes).
- media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes).
- media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls (git-fixes).
- media: lirc: Fix error handling in lirc_register() (git-fixes).
- media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes).
- media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git-fixes).
- media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes).
- media: pci: ivtv: Add missing check after DMA map (git-fixes).
- media: pci: mg4b: fix uninitialized iio scan data (git-fixes).
- media: pisp_be: Fix pm_runtime underrun in probe (git-fixes).
- media: qcom: camss: cleanup media device allocated resource on error path (git-fixes).
- media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git-fixes).
- media: rc: fix races with imon_disconnect() (git-fixes).
- media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes).
- media: s5p-mfc: remove an unused/uninitialized variable (git-fixes).
- media: st-delta: avoid excessive stack usage (git-fixes).
- media: tc358743: Check I2C succeeded during probe (stable-fixes).
- media: tc358743: Increase FIFO trigger level to 374 (stable-fixes).
- media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes).
- media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes).
- media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes).
- media: ti: j721e-csi2rx: fix list_del corruption (git-fixes).
- media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes).
- media: usb: hdpvr: disable zero-length read messages (stable-fixes).
- media: usbtv: Lock resolution while streaming (git-fixes).
- media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes).
- media: uvcvideo: Do not mark valid metadata as invalid (git-fixes).
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git-fixes).
- media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes).
- media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git-fixes).
- media: uvcvideo: Rollback non processed entities on error (git-fixes).
- media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes).
- media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes).
- media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes).
- media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes).
- media: v4l2: Add support for NV12M tiled variants to v4l2_format_info() (git-fixes).
- media: venus: Add a check for packet size after reading from shared memory (git-fixes).
- media: venus: Fix MSM8998 frequency table (git-fixes).
- media: venus: Fix OOB read due to missing payload bound check (git-fixes).
- media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes).
- media: venus: hfi: explicitly release IRQ during teardown (git-fixes).
- media: venus: protect against spurious interrupts during probe (git-fixes).
- media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git-fixes).
- media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git-fixes).
- media: verisilicon: Fix AV1 decoder clock frequency (git-fixes).
- media: vivid: fix wrong pixel_array control size (git-fixes).
- media: zoran: Remove zoran_fh structure (git-fixes).
- mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes).
- mei: vsc: Destroy mutex after freeing the IRQ (git-fixes).
- mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes).
- mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable-fixes).
- mei: vsc: Event notifier fixes (git-fixes).
- mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes).
- mei: vsc: Run event callback from a workqueue (git-fixes).
- mei: vsc: Unset the event callback on remove and probe errors (git-fixes).
- memory: mtk-smi: Add ostd setting for mt8186 (git-fixes).
- memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git-fixes).
- memstick: Fix deadlock by moving removing flag earlier (git-fixes).
- mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes).
- mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes).
- mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() (git-fixes).
- mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes).
- mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes).
- microchip: lan865x: Fix LAN8651 autoloading (git-fixes).
- microchip: lan865x: Fix module autoloading (git-fixes).
- microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git-fixes).
- microchip: lan865x: fix missing netif_start_queue() call on device open (git-fixes).
- misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes).
- misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes).
- misc: fastrpc: Skip reference for DMA handles (git-fixes).
- misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes).
- misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes).
- misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git-fixes).
- misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable-fixes).
- misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes).
- mm/damon/core: avoid destroyed target reference from DAMOS quota (git-fixes).
- mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota() (git-fixes).
- mm/damon/core: set quota-&gt;charged_from to jiffies at first charge window (git-fixes).
- mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() (git-fixes).
- mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes).
- mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() (git-fixes).
- mm/damon/sysfs: fix use-after-free in state_show() (git-fixes).
- mm/memory-failure: fix redundant updates for already poisoned pages (bsc#1250087).
- mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes)
- mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes).
- mm: close theoretical race where stale TLB entries could linger (git-fixes).
- mm: fault in complete folios instead of individual pages for tmpfs (git-fixes).
- mm: fix the inaccurate memory statistics issue for users (bsc#1244723).
- mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes).
- mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git-fixes).
- mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630).
- mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630).
- mm: move page table sync declarations to linux/pgtable.h (git-fixes).
- mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes).
- mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes).
- mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes).
- mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes).
- mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes).
- mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable-fixes).
- mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable-fixes).
- mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes).
- mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes).
- mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes).
- mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes).
- module: Fix memory deallocation on error path in move_module() (git-fixes).
- module: Prevent silent truncation of module name in delete_module(2) (git-fixes).
- module: Remove unnecessary +1 from last_unloaded_module::name size (git-fixes).
- module: Restore the moduleparam prefix length check (git-fixes).
- most: core: Drop device reference after usage in get_channel() (git-fixes).
- mptcp: fix spurious wake-up on under memory pressure (git-fixes).
- mtd: fix possible integer overflow in erase_xfer() (git-fixes).
- mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes).
- mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes).
- mtd: rawnand: atmel: Fix error handling path in atmel_nand_controller_add_nands (git-fixes).
- mtd: rawnand: atmel: set pmecc data setup time (git-fixes).
- mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes).
- mtd: rawnand: omap2: fix device leak on probe failure (git-fixes).
- mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() (git-fixes).
- mtd: rawnand: renesas: Add missing check after DMA map (git-fixes).
- mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes).
- mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git-fixes).
- mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes).
- mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes).
- mtd: spi-nor: spansion: Fixup params-&gt;set_4byte_addr_mode for SEMPER (git-fixes).
- mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes).
- mwl8k: Add missing check after DMA map (git-fixes).
- neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes).
- net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes).
- net/mlx5: CT: Use the correct counter offset (git-fixes).
- net/mlx5: Check device memory pointer before usage (git-fixes).
- net/mlx5: Correctly set gso_segs when LRO is used (git-fixes).
- net/mlx5: Correctly set gso_size when LRO is used (git-fixes).
- net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes).
- net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes).
- net/mlx5: Fix memory leak in cmd_exec() (git-fixes).
- net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (git-fixes).
- net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path (git-fixes).
- net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes).
- net/mlx5: Nack sync reset when SFs are present (git-fixes).
- net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes).
- net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes).
- net/mlx5e: Add new prio for promiscuous mode (git-fixes).
- net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git-fixes).
- net/mlx5e: Preserve shared buffer capacity during headroom updates (git-fixes).
- net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes).
- net/mlx5e: Set local Xoff after FW update (git-fixes).
- net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes).
- net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes).
- net/packet: fix a race in packet_set_ring() and packet_notifier() (git-fixes).
- net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes).
- net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git-fixes).
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes).
- net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes).
- net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll (git-fixes).
- net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes).
- net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN-untagged traffic (git-fixes).
- net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes).
- net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes).
- net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes).
- net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes).
- net: ieee8021q: fix insufficient table-size assertion (stable-fixes).
- net: llc: reset skb-&gt;transport_header (git-fixes).
- net: mana: Add handler for hardware servicing events (bsc#1245730).
- net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726).
- net: mana: Add support for net_shaper_ops (bsc#1245726).
- net: mana: Allocate MSI-X vectors dynamically (bsc#1245457).
- net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457).
- net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729).
- net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes).
- net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726).
- net: mana: Handle Reset Request from MANA NIC (bsc#1245728).
- net: mana: Handle unsupported HWC commands (bsc#1245726).
- net: mana: Set tx_packets to post gso processing packet count (bsc#1245731).
- net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754).
- net: mana: explain irq_setup() algorithm (bsc#1245457).
- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).
- net: mctp: handle skb cleanup on sock_queue failures (git-fixes).
- net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes).
- net: nfc: nci: Add parameter validation for packet data (git-fixes).
- net: page_pool: allow enabling recycling late, fix false positive warning (git-fixes).
- net: phy: bcm54811: PHY initialization (stable-fixes).
- net: phy: fix phy_uses_state_machine() (git-fixes).
- net: phy: micrel: Add ksz9131_resume() (stable-fixes).
- net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes).
- net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes).
- net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes).
- net: rose: convert 'use' field to refcount_t (git-fixes).
- net: rose: fix a typo in rose_clear_routes() (git-fixes).
- net: rose: include node references in rose_neigh refcount (git-fixes).
- net: rose: split remove and free operations in rose_remove_neigh() (stable-fixes).
- net: thunderbolt: Enable end-to-end flow control also in transmit (stable-fixes).
- net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes).
- net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git-fixes).
- net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git-fixes).
- net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes).
- net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes).
- net: usb: cdc-ncm: check for filtering capability (git-fixes).
- net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable-fixes).
- net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git-fixes).
- net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes).
- net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes).
- net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes).
- net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes).
- netfilter: ctnetlink: fix refcount leak on table dump (git-fixes).
- netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes).
- netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around (git-fixes).
- netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git-fixes).
- netfilter: nf_reject: do not leak dst refcount for loopback packets (git-fixes).
- netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes).
- netfilter: nf_tables: adjust lockdep assertions handling (git-fixes).
- netfilter: nf_tables: fix set size with rbtree backend (git-fixes).
- netfilter: nf_tables: imbalance in flowtable binding (git-fixes).
- netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template (git-fixes).
- netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes).
- netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237).
- netfilter: nft_set_hash: skip duplicated elements pending gc run (git-fixes).
- netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git-fixes).
- netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes).
- netfilter: nft_tunnel: fix geneve_opt dump (git-fixes).
- netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds (git-fixes).
- netlink: fix policy dump for int with validation callback (jsc#PED-13331).
- netlink: specs: devlink: replace underscores with dashes in names (jsc#PED-13331).
- netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes).
- nfs/localio: add direct IO enablement with sync and async IO support (git-fixes).
- nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter (git-fixes).
- nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes).
- nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes).
- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes).
- nouveau: fix disabling the nonstall irq due to storm code (git-fixes).
- nvme-auth: update bi_directional flag (git-fixes).
- nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500).
- nvme-pci: try function level reset on init failure (git-fixes).
- nvme-tcp: log TLS handshake failures at error level (git-fixes).
- nvme-tcp: send only permitted commands for secure concat (git-fixes).
- nvme: fix PI insert on write (git-fixes).
- nvme: fix endianness of command word prints in nvme_log_err_passthru() (git-fixes).
- nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes).
- nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes).
- nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500).
- nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500).
- nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500).
- nvmet-tcp: fix callback lock for TLS handshake (git-fixes).
- nvmet: exit debugfs after discovery subsystem exits (git-fixes).
- nvmet: initialize discovery subsys after debugfs is initialized (git-fixes).
- nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails (git-fixes).
- objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() (stable-fixes).
- objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes).
- objtool, regulator: rk808: Remove potential undefined behavior in rk806_set_mode_dcdc() (stable-fixes).
- of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes).
- of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git-fixes).
- of: resolver: Fix device node refcount leakage in of_resolve_phandles() (git-fixes).
- of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes).
- of: unittest: Fix device reference count leak in of_unittest_pci_node_verify (git-fixes).
- of: unittest: Unlock on error in unittest_data_add() (git-fixes).
- pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes).
- pNFS: Fix disk addr range check in block/scsi layout (git-fixes).
- pNFS: Fix stripe mapping in block/scsi layout (git-fixes).
- pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes).
- pNFS: Handle RPC size limit for layoutcommits (git-fixes).
- percpu: fix race on alloc failed warning limit (git-fixes).
- perf bpf-event: Fix use-after-free in synthesis (git-fixes).
- perf bpf-utils: Constify bpil_array_desc (git-fixes).
- perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes).
- perf dso: Add missed dso__put to dso__load_kcore (git-fixes).
- perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes).
- perf parse-events: Set default GH modifier properly (git-fixes).
- perf record: Cache build-ID of hit DSOs only (git-fixes).
- perf sched: Fix memory leaks for evsel-&gt;priv in timehist (git-fixes).
- perf sched: Fix memory leaks in 'perf sched latency' (git-fixes).
- perf sched: Fix memory leaks in 'perf sched map' (git-fixes).
- perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes).
- perf sched: Free thread-&gt;priv using priv_destructor (git-fixes).
- perf sched: Make sure it frees the usage string (git-fixes).
- perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes).
- perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git-fixes).
- perf test: Fix a build error in x86 topdown test (git-fixes).
- perf tests bp_account: Fix leaked file descriptor (git-fixes).
- perf tools: Remove libtraceevent in .gitignore (git-fixes).
- perf topdown: Use attribute to see an event is a topdown metic or slots (git-fixes).
- perf trace: Remove --map-dump documentation (git-fixes).
- phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes).
- phy: mscc: Fix parsing of unicast frames (git-fixes).
- phy: mscc: Fix timestamping for vsc8584 (git-fixes).
- phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence (git-fixes).
- phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git-fixes).
- phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes).
- phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable-fixes).
- phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes).
- phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy-&gt;rate in case of errors (git-fixes).
- phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes).
- phy: tegra: xusb: fix device and OF node leak at probe (git-fixes).
- phy: ti-pipe3: fix device leak at unbind (git-fixes).
- phy: ti: omap-usb2: fix device leak at unbind (git-fixes).
- pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113).
- pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562).
- pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes).
- pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git-fixes).
- pinctrl: equilibrium: Remove redundant semicolons (git-fixes).
- pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes).
- pinctrl: renesas: Use int type to store negative error codes (git-fixes).
- pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read() (git-fixes).
- pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes).
- pinctrl: stm32: Manage irq affinity settings (stable-fixes).
- pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes).
- pinmux: fix race causing mux_owner NULL with active mux_usecount (git-fixes).
- platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git-fixes).
- platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready (stable-fixes).
- platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable-fixes).
- platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes).
- platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git-fixes).
- platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes).
- platform/x86/amd/hsmp: Ensure sock-&gt;metric_tbl_addr is non-NULL (git-fixes).
- platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes).
- platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes).
- platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes).
- platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes).
- platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable-fixes).
- platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes).
- platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes).
- platform/x86: Fix initialization order for firmware_attributes_class (git-fixes).
- platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA (stable-fixes).
- platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 (stable-fixes).
- platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git-fixes).
- platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git-fixes).
- platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git-fixes).
- platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes).
- platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes).
- pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes).
- pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable-fixes).
- power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes).
- power: supply: bq27xxx: restrict no-battery detection to bq27000 (git-fixes).
- power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes).
- power: supply: cw2015: Fix a alignment coding style issue (git-fixes).
- power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git-fixes).
- power: supply: max77976_charger: fix constant current reporting (git-fixes).
- power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes).
- powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git-fixes).
- powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199).
- powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199).
- powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git-fixes).
- powerpc/ftrace: ensure ftrace record ops are always set for NOPs (jsc#PED-10909 git-fixes).
- powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199).
- powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199).
- powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199).
- powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199).
- powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343).
- powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343).
- powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (jsc#PED-10909 git-fixes).
- powerpc: do not build ppc_save_regs.o always (bsc#1215199).
- powerpc: floppy: Add missing checks after DMA map (bsc#1215199).
- pptp: fix pptp_xmit() error path (git-fixes).
- printk: nbcon: Allow reacquire during panic (bsc#1246688).
- psample: adjust size if rate_as_probability is set (git-fixes).
- ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes).
- pwm: berlin: Fix wrong register in suspend/resume (git-fixes).
- pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes).
- pwm: mediatek: Fix duty and period setting (git-fixes).
- pwm: mediatek: Handle hardware enable and clock enable separately (stable-fixes).
- pwm: rockchip: Round period/duty down on apply, up on get (git-fixes).
- pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes).
- pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes).
- pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git-fixes).
- pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes).
- r8169: add support for RTL8125D (stable-fixes).
- r8169: disable RTL8126 ZRX-DC timeout (stable-fixes).
- r8169: do not scan PHY addresses &gt; 0 (stable-fixes).
- rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes)
- regmap: Remove superfluous check for !config in __regmap_init() (git-fixes).
- regulator: core: fix NULL dereference on unbind due to stale coupling data (stable-fixes).
- regulator: scmi: Use int type to store negative error codes (git-fixes).
- regulator: sy7636a: fix lifecycle of power good gpio (git-fixes).
- reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes).
- reset: eyeq: fix OF node leak (git-fixes).
- resource: Add resource set range and size helpers (jsc#PED-13728 jsc#PED-13762).
- resource: fix false warning in __request_region() (git-fixes).
- ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes).
- ring-buffer: Make reading page consistent with the code logic (git-fixes).
- rpm/config.sh: SLFO 1.2 is now synced to OBS as well
- rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes).
- rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes).
- rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable-fixes).
- rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes).
- rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes).
- rtc: optee: fix memory leak on driver removal (git-fixes).
- rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes).
- rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes).
- rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes).
- rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes).
- s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1247837).
- s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246868).
- s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249477).
- s390/early: Copy last breaking event address to pt_regs (git-fixes bsc#1249061).
- s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727 git-fixes).
- s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes).
- s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372).
- s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes bsc#1247838).
- s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066).
- s390/mm: Remove possible false-positive warning in pte_free_defer() (git-fixes bsc#1247366).
- s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478).
- s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728 git-fixes).
- s390/sclp: Fix SCCB present check (git-fixes bsc#1249065).
- s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062).
- s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064).
- samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes).
- samples: mei: Fix building on musl libc (git-fixes).
- sched/deadline: Always stop dl-server before changing parameters (bsc#1247936).
- sched/deadline: Do not count nr_running for dl_server proxy tasks (git-fixes, bsc#1247936).
- sched/deadline: Fix RT task potential starvation when expiry time passed (git-fixes, bsc#1247936).
- sched/deadline: Fix dl_server_stopped() (bsc#1247936).
- sched/deadline: Initialize dl_servers after SMP (git-fixes)
- sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes)
- scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes).
- scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes).
- scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519).
- scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: isci: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519).
- scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519).
- scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519).
- scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519).
- scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int (bsc#1250519).
- scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519).
- scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519).
- scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519).
- scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519).
- scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519).
- scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519).
- scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519).
- scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519).
- scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519).
- scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519).
- scsi: lpfc: Use int type to store negative error codes (bsc#1250519).
- scsi: lpfc: Use switch case statements in DIF debugfs handlers (bsc#1250519).
- scsi: lpfc: use min() to improve code (bsc#1250519).
- scsi: mpi3mr: Event processing debug improvement (bsc#1251186).
- scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186).
- scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251186).
- scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251186).
- scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes).
- scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186).
- scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes).
- scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git-fixes).
- scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186).
- scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186).
- scsi: mpt3sas: Fix a fw_event memory leak (git-fixes).
- scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes).
- scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes).
- scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes).
- scsi: qla2xxx: Remove firmware URL (git-fixes).
- scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git-fixes).
- scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes).
- scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes).
- scsi: smartpqi: Enhance WWID logging logic (bsc#1246631).
- scsi: smartpqi: Take drives offline when controller is offline (bsc#1246631).
- scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631).
- scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed (git-fixes).
- scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git-fixes).
- scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes).
- scsi: ufs: core: Add missing post notify for power mode change (git-fixes).
- scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes).
- scsi: ufs: core: Always initialize the UIC done completion (git-fixes).
- scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git-fixes).
- scsi: ufs: core: Fix clk scaling to be conditional in reset and restore (git-fixes).
- scsi: ufs: core: Fix error return with query response (git-fixes).
- scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes).
- scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out() (git-fixes).
- scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers (git-fixes).
- scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes).
- scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes).
- scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes).
- scsi: ufs: core: Remove redundant query_complete trace (git-fixes).
- scsi: ufs: core: Set default runtime/system PM levels before ufshcd_hba_init() (git-fixes).
- scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe (git-fixes).
- scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume (git-fixes).
- scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes).
- scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster (git-fixes).
- scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git-fixes).
- scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes).
- scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init() (git-fixes).
- scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes).
- scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes).
- scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes).
- scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes).
- scsi: ufs: exynos: Remove empty drv_init method (git-fixes).
- scsi: ufs: exynos: Remove superfluous function parameter (git-fixes).
- scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes).
- scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git-fixes).
- scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git-fixes).
- scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove() (git-fixes).
- scsi: ufs: qcom: Fix crypto key eviction (git-fixes).
- scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git-fixes).
- scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes).
- scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers (git-fixes).
- seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes bsc#1250671).
- selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE (poo#187320).
- selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344).
- selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320).
- selftests/livepatch: Replace hardcoded module name with variable in test-callbacks.sh (poo#187320).
- selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320).
- selftests/run_kselftest.sh: Use readlink if realpath is not available (poo#187320).
- selftests/tracing: Fix false failure of subsystem event test (git-fixes).
- selftests: ALSA: fix memory leak in utimer test (git-fixes).
- selftests: livepatch: add new ftrace helpers functions (poo#187320).
- selftests: livepatch: add test cases of stack_order sysfs interface (poo#187320).
- selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320).
- selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320).
- selftests: livepatch: save and restore kprobe state (poo#187320).
- selftests: livepatch: test if ftrace can trace a livepatched function (poo#187320).
- selftests: livepatch: test livepatching a kprobed function (poo#187320).
- selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443).
- selinux: change security_compute_sid to return the ssid or tsid on match (git-fixes).
- selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable-fixes).
- serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688).
- serial: 8250: fix panic due to PSLVERR (git-fixes).
- serial: max310x: Add error checking in probe() (git-fixes).
- serial: sc16is7xx: fix bug in flow control levels init (git-fixes).
- skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
- slab: Decouple slab_debug and no_hash_pointers (bsc#1249022).
- smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206).
- smb: client: fix netns refcount leak after net_passive changes (git-fixes).
- soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes).
- soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes).
- soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git-fixes).
- soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git-fixes).
- soc: qcom: QMI encoding/decoding for big endian (git-fixes).
- soc: qcom: fix endianness for QMI header (git-fixes).
- soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes).
- soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes).
- soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git-fixes).
- soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git-fixes).
- soc: qcom: pmic_glink: fix OF node leak (git-fixes).
- soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes).
- soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes).
- soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes).
- soundwire: amd: cancel pending slave status handling workqueue during remove sequence (stable-fixes).
- soundwire: amd: fix for handling slave alerts after link is down (git-fixes).
- soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes).
- soundwire: stream: restore params when prepare ports fail (git-fixes).
- spi: bcm2835: Remove redundant semicolons (git-fixes).
- spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes).
- spi: cadence-quadspi: Flush posted register writes before DAC access (git-fixes).
- spi: cadence-quadspi: Flush posted register writes before INDAC access (git-fixes).
- spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable-fixes).
- spi: cs42l43: Property entry should be a null-terminated array (bsc#1246979).
- spi: fix return code when spi device has too many chipselects (git-fixes).
- spi: mtk-snfi: Remove redundant semicolons (git-fixes).
- spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes).
- spi: spi-fsl-lpspi: Clear status register after disabling the module (git-fixes).
- spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes).
- spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git-fixes).
- spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes).
- spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes).
- sprintf.h requires stdarg.h (git-fixes).
- sprintf.h: mask additional include (git-fixes).
- squashfs: fix memory leak in squashfs_fill_super (git-fixes).
- staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes).
- staging: axis-fifo: fix maximum TX packet length check (git-fixes).
- staging: axis-fifo: flush RX FIFO on read errors (git-fixes).
- staging: axis-fifo: remove sysfs interface (git-fixes).
- staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git-fixes).
- staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (git-fixes).
- staging: nvec: Fix incorrect null termination of battery manufacturer (git-fixes).
- staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes).
- struct cdc_ncm_ctx: move new member to end (git-fixes).
- sunrpc: fix client side handling of tls alerts (git-fixes).
- sunrpc: fix handling of server side tls alerts (git-fixes).
- sunrpc: fix null pointer dereference on zero-length checksum (git-fixes).
- sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes).
- supported.conf: Mark ZL3073X modules supported
- supported.conf: mark hyperv_drm as external
- tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes).
- tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
- thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data (stable-fixes).
- thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable-fixes).
- thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const (stable-fixes).
- thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes).
- thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes).
- thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes).
- thunderbolt: Compare HMAC values in constant time (git-fixes).
- thunderbolt: Fix copy+paste error in match_service_id() (git-fixes).
- tools/power turbostat: Clustered Uncore MHz counters should honor show/hide options (stable-fixes).
- tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes).
- tools/power turbostat: Fix build with musl (stable-fixes).
- tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes).
- tools/power turbostat: Handle non-root legacy-uncore sysfs permissions (stable-fixes).
- tools/resolve_btfids: Fix build when cross compiling kernel with clang (git-fixes).
- tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes).
- trace/fgraph: Fix error handling (git-fixes).
- trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (git-fixes).
- tracepoint: Print the function symbol when tracepoint_debug is set (jsc#PED-13631).
- tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes).
- tracing/kprobes: Fix to free objects when failed to copy a symbol (git-fixes).
- tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes).
- tracing: Fix filter string testing (git-fixes).
- tracing: Fix using ret variable in tracing_set_tracer() (git-fixes).
- tracing: Remove unneeded goto out logic (bsc#1249286).
- tracing: Switch trace.c code over to use guard() (git-fixes).
- tracing: Switch trace_events_hist.c code over to use guard() (git-fixes).
- tracing: fprobe events: Fix possible UAF on modules (git-fixes).
- tracing: tprobe-events: Fix leakage of module refcount (git-fixes).
- tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062).
- tty: n_gsm: Do not block input queue by waiting MSC (git-fixes).
- tty: serial: fix print format specifiers (stable-fixes).
- ublk: sanity check add_dev input for underflow (git-fixes).
- ublk: use vmalloc for ublk_device's __queues (git-fixes).
- ucount: fix atomic_long_inc_below() argument type (git-fixes).
- uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes).
- usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes).
- usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git-fixes).
- usb: core: Add 0x prefix to quirks debug output (stable-fixes).
- usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes).
- usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes).
- usb: core: usb_submit_urb: downgrade type check (stable-fixes).
- usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git-fixes).
- usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable-fixes).
- usb: dwc3: imx8mp: fix device leak at unbind (git-fixes).
- usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes).
- usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes).
- usb: dwc3: qcom: Do not leave BCR asserted (git-fixes).
- usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes).
- usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes).
- usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
- usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes).
- usb: gadget: midi2: Fix missing UMP group attributes initialization (git-fixes).
- usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes).
- usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git-fixes).
- usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes).
- usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes).
- usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git-fixes).
- usb: musb: omap2430: fix device leak at unbind (git-fixes).
- usb: phy: twl6030: Fix incorrect type for ret (git-fixes).
- usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes).
- usb: renesas-xhci: Fix External ROM access timeouts (git-fixes).
- usb: storage: realtek_cr: Use correct byte order for bcs-&gt;Residue (git-fixes).
- usb: typec: fusb302: cache PD RX state (git-fixes).
- usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable-fixes).
- usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes).
- usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes).
- usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes).
- usb: typec: tcpm: allow switching to mode accessory to mux properly (stable-fixes).
- usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes).
- usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git-fixes).
- usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git-fixes).
- usb: typec: tipd: Clear interrupts first (git-fixes).
- usb: typec: ucsi: Update power_supply on power role change (git-fixes).
- usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes).
- usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes).
- usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
- usb: xhci: Avoid showing errors during surprise removal (stable-fixes).
- usb: xhci: Avoid showing warnings for dying controller (stable-fixes).
- usb: xhci: Fix slot_id resource race conflict (git-fixes).
- usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes).
- usb: xhci: print xhci-&gt;xhc_state when queue_command failed (stable-fixes).
- use uniform permission checks for all mount propagation changes (git-fixes).
- vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes).
- vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes).
- vhost-scsi: Fix log flooding with target does not exist errors (git-fixes).
- vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git-fixes).
- vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes).
- vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes).
- vhost: Reintroduce kthread API and add mode selection (git-fixes).
- vhost: fail early when __vhost_add_used() fails (git-fixes).
- virtchnl2: add flow steering support (jsc#PED-13728).
- virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728).
- virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762).
- virtio_net: Enforce minimum TX ring size for reliability (git-fixes).
- virtio_ring: Fix error reporting in virtqueue_resize (git-fixes).
- vmci: Prevent the dispatching of uninitialized payloads (git-fixes).
- vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes).
- vsock/virtio: Validate length in packet header before skb_put() (git-fixes).
- vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes).
- vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes).
- watchdog: dw_wdt: Fix default timeout (stable-fixes).
- watchdog: iTCO_wdt: Report error if timeout configuration fails (stable-fixes).
- watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes).
- watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes).
- watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git-fixes).
- wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes).
- wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes).
- wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git-fixes).
- wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes).
- wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes).
- wifi: ath11k: fix dest ring-buffer corruption (git-fixes).
- wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes).
- wifi: ath11k: fix group data packet drops during rekey (git-fixes).
- wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes).
- wifi: ath11k: fix source ring-buffer corruption (git-fixes).
- wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes).
- wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952).
- wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes).
- wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes).
- wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable-fixes).
- wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes).
- wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes).
- wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (git-fixes).
- wifi: ath12k: fix dest ring-buffer corruption (git-fixes).
- wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes).
- wifi: ath12k: fix endianness handling while accessing wmi service bit (git-fixes).
- wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes).
- wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes).
- wifi: ath12k: fix source ring-buffer corruption (git-fixes).
- wifi: ath12k: fix the fetching of combined rssi (git-fixes).
- wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
- wifi: ath12k: fix wrong logging ID used for CE (git-fixes).
- wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes).
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes).
- wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes).
- wifi: cfg80211: Fix interface type validation (stable-fixes).
- wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes).
- wifi: cfg80211: reject HTC bit for management frames (stable-fixes).
- wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git-fixes).
- wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes).
- wifi: iwlegacy: Check rate_idx range after addition (stable-fixes).
- wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084).
- wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes).
- wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes).
- wifi: iwlwifi: Remove redundant header files (git-fixes).
- wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084).
- wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable-fixes).
- wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable-fixes).
- wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes).
- wifi: iwlwifi: mvm: fix scan request validation (stable-fixes).
- wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes).
- wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes).
- wifi: iwlwifi: uefi: check DSM item validity (git-fixes).
- wifi: libertas: cap SSID len in lbs_associate() (git-fixes).
- wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes).
- wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes).
- wifi: mac80211: Do not schedule stopped TXQs (git-fixes).
- wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() (git-fixes).
- wifi: mac80211: avoid weird state in error path (stable-fixes).
- wifi: mac80211: do not complete management TX on SAE commit (stable-fixes).
- wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes).
- wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes).
- wifi: mac80211: fix incorrect type for ret (stable-fixes).
- wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes).
- wifi: mac80211: increase scan_ies_len for S1G (stable-fixes).
- wifi: mac80211: reject TDLS operations when station is not associated (git-fixes).
- wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes).
- wifi: mt76: fix linked list corruption (git-fixes).
- wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes).
- wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes).
- wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes).
- wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes).
- wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure (git-fixes).
- wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes).
- wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes).
- wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes).
- wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes).
- wifi: mt76: mt7996: Fix RX packets configuration for primary WED device (git-fixes).
- wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git-fixes).
- wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes).
- wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes).
- wifi: mwifiex: send world regulatory domain to driver (git-fixes).
- wifi: nl80211: Set num_sub_specs before looping through sub_specs (git-fixes).
- wifi: plfxlc: Fix error handling in usb driver probe (git-fixes).
- wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes).
- wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes).
- wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes).
- wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes).
- wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes).
- wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes).
- wifi: rtw88: Fix macid assigned to TDLS station (git-fixes).
- wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes).
- wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable-fixes).
- wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes).
- wifi: rtw89: avoid circular locking dependency in ser_state_run() (git-fixes).
- wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes).
- wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode (stable-fixes).
- wifi: virt_wifi: Fix page fault on connect (stable-fixes).
- wifi: wilc1000: avoid buffer overflow in WID string configuration (stable-fixes).
- writeback: Avoid contention on wb-&gt;list_lock when switching inodes (bsc#1237776).
- writeback: Avoid contention on wb-&gt;list_lock when switching inodes (kABI fixup) (bsc#1237776).
- writeback: Avoid excessively long inode switching times (bsc#1237776).
- writeback: Avoid softlockup when switching many inodes (bsc#1237776).
- x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704).
- x86/Kconfig: Add arch attack vector support (git-fixes).
- x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes).
- x86/boot: Sanitize boot params before parsing command line (git-fixes).
- x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes).
- x86/bugs: Add attack vector controls for BHI (git-fixes).
- x86/bugs: Add attack vector controls for GDS (git-fixes).
- x86/bugs: Add attack vector controls for ITS (git-fixes).
- x86/bugs: Add attack vector controls for L1TF (git-fixes).
- x86/bugs: Add attack vector controls for MDS (git-fixes).
- x86/bugs: Add attack vector controls for MMIO (git-fixes).
- x86/bugs: Add attack vector controls for RFDS (git-fixes).
- x86/bugs: Add attack vector controls for SRBDS (git-fixes).
- x86/bugs: Add attack vector controls for SRSO (git-fixes).
- x86/bugs: Add attack vector controls for SSB (git-fixes).
- x86/bugs: Add attack vector controls for TAA (git-fixes).
- x86/bugs: Add attack vector controls for TSA (git-fixes).
- x86/bugs: Add attack vector controls for retbleed (git-fixes).
- x86/bugs: Add attack vector controls for spectre_v1 (git-fixes).
- x86/bugs: Add attack vector controls for spectre_v2 (git-fixes).
- x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes).
- x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes).
- x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git-fixes).
- x86/bugs: Avoid warning when overriding return thunk (git-fixes).
- x86/bugs: Clean up SRSO microcode handling (git-fixes).
- x86/bugs: Define attack vectors relevant for each bug (git-fixes).
- x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes).
- x86/bugs: Introduce cdt_possible() (git-fixes).
- x86/bugs: Print enabled attack vectors (git-fixes).
- x86/bugs: Remove its=stuff dependency on retbleed (git-fixes).
- x86/bugs: Select best SRSO mitigation (git-fixes).
- x86/bugs: Simplify the retbleed=stuff checks (git-fixes).
- x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes).
- x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes).
- x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git-fixes).
- x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git-fixes).
- x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes).
- x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes).
- x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes).
- x86/fpu: Avoid copying dynamic FP state from init_task in arch_dup_task_struct() (git-fixes).
- x86/fpu: Delay instruction pointer fixup until after warning (git-fixes).
- x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
- x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes).
- x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git-fixes).
- x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler (git-fixes).
- x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in UAPI headers (git-fixes).
- x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op() (git-fixes).
- x86/mce/amd: Add default names for MCA banks and blocks (git-fixes).
- x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes).
- x86/mce: Ensure user polling settings are honored when restarting timer (git-fixes).
- x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git-fixes).
- x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes).
- x86/microcode: Consolidate the loader enablement checking (git-fixes).
- x86/microcode: Update the Intel processor flag scan check (git-fixes).
- x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes).
- x86/mm/pat: do not collapse pages without PSE set (git-fixes).
- x86/nmi: Add an emergency handler in nmi_desc &amp; use it in nmi_shootdown_cpus() (git-fixes).
- x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC &amp;lt; 14.2 (git-fixes).
- x86/pkeys: Simplify PKRU update in signal frame (git-fixes).
- x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes).
- x86/pti: Add attack vector controls for PTI (git-fixes).
- x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes).
- x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815).
- x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815).
- x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815).
- x86/smpboot: Fix INIT delay assignment for extended Intel Families (git-fixes).
- x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815).
- x86/traps: Initialize DR6 by writing its architectural reset value (git-fixes).
- xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes).
- xen/netfront: Fix TX response spurious interrupts (git-fixes).
- xen: fix UAF in dmabuf_exp_from_pages() (git-fixes).
- xfrm: replay: Fix the update of replay_esn-&gt;oseq_hi for GSO (git-fixes).
- xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS() (git-fixes).
- xfs: do not propagate ENODATA disk errors into xattr code (git-fixes).
- xfs: fix scrub trace with null pointer in quotacheck (git-fixes).
- xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes).
- xfs: remove unused event xfs_alloc_near_error (git-fixes).
- xfs: remove unused event xfs_alloc_near_nominleft (git-fixes).
- xfs: remove unused event xfs_attr_node_removename (git-fixes).
- xfs: remove unused event xfs_ioctl_clone (git-fixes).
- xfs: remove unused event xfs_pagecache_inval (git-fixes).
- xfs: remove unused event xlog_iclog_want_sync (git-fixes).
- xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes).
- xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes).
- xfs: remove unused trace event xfs_discard_rtrelax (git-fixes).
- xfs: remove unused trace event xfs_log_cil_return (git-fixes).
- xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes).
- xfs: remove unused xfs_attr events (git-fixes).
- xfs: remove unused xfs_reflink_compare_extents events (git-fixes).
- xfs: remove usused xfs_end_io_direct events (git-fixes).
- xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes).
- xhci: dbc: decouple endpoint allocation from initialization (git-fixes).
- xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes).
- xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes).
- zram: permit only one post-processing operation at a time (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215199">SUSE bug 1215199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230062">SUSE bug 1230062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234634">SUSE bug 1234634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234693">SUSE bug 1234693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235953">SUSE bug 1235953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236897">SUSE bug 1236897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237108">SUSE bug 1237108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237131">SUSE bug 1237131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237542">SUSE bug 1237542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237776">SUSE bug 1237776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238972">SUSE bug 1238972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239206">SUSE bug 1239206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240324">SUSE bug 1240324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240696">SUSE bug 1240696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240966">SUSE bug 1240966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240998">SUSE bug 1240998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241166">SUSE bug 1241166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241353">SUSE bug 1241353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241403">SUSE bug 1241403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241435">SUSE bug 1241435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242034">SUSE bug 1242034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242086">SUSE bug 1242086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242782">SUSE bug 1242782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242864">SUSE bug 1242864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242965">SUSE bug 1242965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242995">SUSE bug 1242995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243000">SUSE bug 1243000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243055">SUSE bug 1243055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243068">SUSE bug 1243068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243100">SUSE bug 1243100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243112">SUSE bug 1243112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243774">SUSE bug 1243774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244309">SUSE bug 1244309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244723">SUSE bug 1244723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244734">SUSE bug 1244734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244749">SUSE bug 1244749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244792">SUSE bug 1244792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244812">SUSE bug 1244812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244930">SUSE bug 1244930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244939">SUSE bug 1244939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245000">SUSE bug 1245000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245151">SUSE bug 1245151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245193">SUSE bug 1245193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245206">SUSE bug 1245206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245216">SUSE bug 1245216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245260">SUSE bug 1245260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245410">SUSE bug 1245410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245457">SUSE bug 1245457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245504">SUSE bug 1245504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245506">SUSE bug 1245506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245508">SUSE bug 1245508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245510">SUSE bug 1245510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245596">SUSE bug 1245596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245621">SUSE bug 1245621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245630">SUSE bug 1245630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245654">SUSE bug 1245654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245657">SUSE bug 1245657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245658">SUSE bug 1245658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245659">SUSE bug 1245659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245663">SUSE bug 1245663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245664">SUSE bug 1245664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245665">SUSE bug 1245665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245666">SUSE bug 1245666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245668">SUSE bug 1245668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245669">SUSE bug 1245669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245670">SUSE bug 1245670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245671">SUSE bug 1245671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245675">SUSE bug 1245675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245676">SUSE bug 1245676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245678">SUSE bug 1245678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245683">SUSE bug 1245683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245684">SUSE bug 1245684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245686">SUSE bug 1245686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245688">SUSE bug 1245688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245690">SUSE bug 1245690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245691">SUSE bug 1245691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245695">SUSE bug 1245695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245700">SUSE bug 1245700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245703">SUSE bug 1245703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245705">SUSE bug 1245705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245710">SUSE bug 1245710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245711">SUSE bug 1245711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245713">SUSE bug 1245713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245714">SUSE bug 1245714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245715">SUSE bug 1245715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245717">SUSE bug 1245717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245719">SUSE bug 1245719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245721">SUSE bug 1245721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245723">SUSE bug 1245723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245726">SUSE bug 1245726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245728">SUSE bug 1245728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245729">SUSE bug 1245729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245730">SUSE bug 1245730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245731">SUSE bug 1245731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245735">SUSE bug 1245735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245737">SUSE bug 1245737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245744">SUSE bug 1245744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245745">SUSE bug 1245745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245746">SUSE bug 1245746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245747">SUSE bug 1245747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245748">SUSE bug 1245748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245749">SUSE bug 1245749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245751">SUSE bug 1245751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245757">SUSE bug 1245757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245763">SUSE bug 1245763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245765">SUSE bug 1245765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245767">SUSE bug 1245767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245769">SUSE bug 1245769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245777">SUSE bug 1245777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245780">SUSE bug 1245780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245781">SUSE bug 1245781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245784">SUSE bug 1245784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245785">SUSE bug 1245785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245787">SUSE bug 1245787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245812">SUSE bug 1245812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245814">SUSE bug 1245814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245815">SUSE bug 1245815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245937">SUSE bug 1245937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245945">SUSE bug 1245945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245952">SUSE bug 1245952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245955">SUSE bug 1245955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245956">SUSE bug 1245956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245963">SUSE bug 1245963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245966">SUSE bug 1245966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245970">SUSE bug 1245970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245973">SUSE bug 1245973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245976">SUSE bug 1245976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245977">SUSE bug 1245977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246000">SUSE bug 1246000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246002">SUSE bug 1246002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246005">SUSE bug 1246005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246008">SUSE bug 1246008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246012">SUSE bug 1246012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246022">SUSE bug 1246022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246023">SUSE bug 1246023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246031">SUSE bug 1246031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246034">SUSE bug 1246034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246037">SUSE bug 1246037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246041">SUSE bug 1246041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246042">SUSE bug 1246042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246047">SUSE bug 1246047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246049">SUSE bug 1246049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246050">SUSE bug 1246050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246053">SUSE bug 1246053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246054">SUSE bug 1246054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246055">SUSE bug 1246055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246057">SUSE bug 1246057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246098">SUSE bug 1246098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246109">SUSE bug 1246109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246125">SUSE bug 1246125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246166">SUSE bug 1246166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246171">SUSE bug 1246171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246176">SUSE bug 1246176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246181">SUSE bug 1246181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246183">SUSE bug 1246183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246185">SUSE bug 1246185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246186">SUSE bug 1246186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246188">SUSE bug 1246188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246190">SUSE bug 1246190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246192">SUSE bug 1246192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246193">SUSE bug 1246193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246195">SUSE bug 1246195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246220">SUSE bug 1246220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246234">SUSE bug 1246234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246236">SUSE bug 1246236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246240">SUSE bug 1246240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246243">SUSE bug 1246243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246244">SUSE bug 1246244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246245">SUSE bug 1246245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246246">SUSE bug 1246246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246248">SUSE bug 1246248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246250">SUSE bug 1246250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246252">SUSE bug 1246252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246253">SUSE bug 1246253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246255">SUSE bug 1246255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246258">SUSE bug 1246258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246259">SUSE bug 1246259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246260">SUSE bug 1246260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246262">SUSE bug 1246262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246266">SUSE bug 1246266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246268">SUSE bug 1246268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246283">SUSE bug 1246283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246285">SUSE bug 1246285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246286">SUSE bug 1246286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246287">SUSE bug 1246287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246290">SUSE bug 1246290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246292">SUSE bug 1246292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246293">SUSE bug 1246293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246295">SUSE bug 1246295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246297">SUSE bug 1246297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246333">SUSE bug 1246333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246334">SUSE bug 1246334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246337">SUSE bug 1246337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246342">SUSE bug 1246342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246349">SUSE bug 1246349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246351">SUSE bug 1246351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246353">SUSE bug 1246353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246354">SUSE bug 1246354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246358">SUSE bug 1246358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246364">SUSE bug 1246364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246366">SUSE bug 1246366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246370">SUSE bug 1246370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246375">SUSE bug 1246375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246376">SUSE bug 1246376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246385">SUSE bug 1246385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246386">SUSE bug 1246386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246387">SUSE bug 1246387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246438">SUSE bug 1246438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246443">SUSE bug 1246443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246444">SUSE bug 1246444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246447">SUSE bug 1246447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246450">SUSE bug 1246450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246453">SUSE bug 1246453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246473">SUSE bug 1246473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246490">SUSE bug 1246490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246509">SUSE bug 1246509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246547">SUSE bug 1246547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246631">SUSE bug 1246631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246651">SUSE bug 1246651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246688">SUSE bug 1246688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246777">SUSE bug 1246777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246782">SUSE bug 1246782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246868">SUSE bug 1246868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246896">SUSE bug 1246896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246979">SUSE bug 1246979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247018">SUSE bug 1247018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247020">SUSE bug 1247020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247022">SUSE bug 1247022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247023">SUSE bug 1247023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247024">SUSE bug 1247024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247027">SUSE bug 1247027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247028">SUSE bug 1247028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247031">SUSE bug 1247031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247033">SUSE bug 1247033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247035">SUSE bug 1247035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247061">SUSE bug 1247061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247062">SUSE bug 1247062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247064">SUSE bug 1247064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247076">SUSE bug 1247076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247078">SUSE bug 1247078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247079">SUSE bug 1247079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247088">SUSE bug 1247088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247089">SUSE bug 1247089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247091">SUSE bug 1247091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247097">SUSE bug 1247097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247098">SUSE bug 1247098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247099">SUSE bug 1247099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247101">SUSE bug 1247101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247102">SUSE bug 1247102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247103">SUSE bug 1247103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247104">SUSE bug 1247104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247112">SUSE bug 1247112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247113">SUSE bug 1247113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247116">SUSE bug 1247116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247118">SUSE bug 1247118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247119">SUSE bug 1247119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247123">SUSE bug 1247123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247125">SUSE bug 1247125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247126">SUSE bug 1247126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247128">SUSE bug 1247128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247130">SUSE bug 1247130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247131">SUSE bug 1247131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247132">SUSE bug 1247132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247136">SUSE bug 1247136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247137">SUSE bug 1247137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247138">SUSE bug 1247138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247141">SUSE bug 1247141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247143">SUSE bug 1247143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247145">SUSE bug 1247145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247146">SUSE bug 1247146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247147">SUSE bug 1247147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247149">SUSE bug 1247149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247150">SUSE bug 1247150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247151">SUSE bug 1247151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247152">SUSE bug 1247152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247153">SUSE bug 1247153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247154">SUSE bug 1247154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247155">SUSE bug 1247155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247156">SUSE bug 1247156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247157">SUSE bug 1247157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247160">SUSE bug 1247160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247162">SUSE bug 1247162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247163">SUSE bug 1247163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247164">SUSE bug 1247164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247167">SUSE bug 1247167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247169">SUSE bug 1247169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247170">SUSE bug 1247170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247171">SUSE bug 1247171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247174">SUSE bug 1247174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247176">SUSE bug 1247176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247177">SUSE bug 1247177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247178">SUSE bug 1247178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247181">SUSE bug 1247181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247209">SUSE bug 1247209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247210">SUSE bug 1247210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247220">SUSE bug 1247220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247223">SUSE bug 1247223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247227">SUSE bug 1247227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247229">SUSE bug 1247229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247231">SUSE bug 1247231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247233">SUSE bug 1247233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247234">SUSE bug 1247234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247235">SUSE bug 1247235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247236">SUSE bug 1247236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247238">SUSE bug 1247238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247239">SUSE bug 1247239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247241">SUSE bug 1247241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247243">SUSE bug 1247243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247250">SUSE bug 1247250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247251">SUSE bug 1247251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247252">SUSE bug 1247252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247253">SUSE bug 1247253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247255">SUSE bug 1247255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247262">SUSE bug 1247262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247265">SUSE bug 1247265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247270">SUSE bug 1247270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247271">SUSE bug 1247271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247273">SUSE bug 1247273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247274">SUSE bug 1247274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247276">SUSE bug 1247276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247277">SUSE bug 1247277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247278">SUSE bug 1247278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247279">SUSE bug 1247279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247280">SUSE bug 1247280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247282">SUSE bug 1247282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247283">SUSE bug 1247283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247284">SUSE bug 1247284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247285">SUSE bug 1247285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247288">SUSE bug 1247288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247289">SUSE bug 1247289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247290">SUSE bug 1247290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247293">SUSE bug 1247293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247308">SUSE bug 1247308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247311">SUSE bug 1247311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247313">SUSE bug 1247313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247314">SUSE bug 1247314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247317">SUSE bug 1247317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247325">SUSE bug 1247325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247347">SUSE bug 1247347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247348">SUSE bug 1247348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247349">SUSE bug 1247349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247366">SUSE bug 1247366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247372">SUSE bug 1247372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247376">SUSE bug 1247376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247426">SUSE bug 1247426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247437">SUSE bug 1247437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247442">SUSE bug 1247442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247483">SUSE bug 1247483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247500">SUSE bug 1247500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247712">SUSE bug 1247712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247837">SUSE bug 1247837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247838">SUSE bug 1247838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247935">SUSE bug 1247935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247936">SUSE bug 1247936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247949">SUSE bug 1247949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247950">SUSE bug 1247950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247963">SUSE bug 1247963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247976">SUSE bug 1247976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248088">SUSE bug 1248088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248111">SUSE bug 1248111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248121">SUSE bug 1248121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248183">SUSE bug 1248183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248186">SUSE bug 1248186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248190">SUSE bug 1248190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248192">SUSE bug 1248192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248194">SUSE bug 1248194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248198">SUSE bug 1248198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248199">SUSE bug 1248199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248200">SUSE bug 1248200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248202">SUSE bug 1248202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248205">SUSE bug 1248205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248211">SUSE bug 1248211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248223">SUSE bug 1248223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248224">SUSE bug 1248224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248225">SUSE bug 1248225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248230">SUSE bug 1248230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248235">SUSE bug 1248235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248255">SUSE bug 1248255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248296">SUSE bug 1248296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248297">SUSE bug 1248297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248299">SUSE bug 1248299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248302">SUSE bug 1248302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248304">SUSE bug 1248304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248312">SUSE bug 1248312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248333">SUSE bug 1248333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248334">SUSE bug 1248334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248337">SUSE bug 1248337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248338">SUSE bug 1248338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248340">SUSE bug 1248340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248341">SUSE bug 1248341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248343">SUSE bug 1248343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248345">SUSE bug 1248345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248349">SUSE bug 1248349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248350">SUSE bug 1248350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248354">SUSE bug 1248354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248355">SUSE bug 1248355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248357">SUSE bug 1248357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248359">SUSE bug 1248359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248361">SUSE bug 1248361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248363">SUSE bug 1248363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248365">SUSE bug 1248365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248367">SUSE bug 1248367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248368">SUSE bug 1248368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248374">SUSE bug 1248374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248377">SUSE bug 1248377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248378">SUSE bug 1248378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248380">SUSE bug 1248380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248386">SUSE bug 1248386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248390">SUSE bug 1248390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248392">SUSE bug 1248392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248395">SUSE bug 1248395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248396">SUSE bug 1248396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248399">SUSE bug 1248399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248401">SUSE bug 1248401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248511">SUSE bug 1248511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248512">SUSE bug 1248512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248573">SUSE bug 1248573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248575">SUSE bug 1248575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248577">SUSE bug 1248577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248609">SUSE bug 1248609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248610">SUSE bug 1248610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248616">SUSE bug 1248616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248617">SUSE bug 1248617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248619">SUSE bug 1248619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248621">SUSE bug 1248621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248622">SUSE bug 1248622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248624">SUSE bug 1248624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248627">SUSE bug 1248627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248628">SUSE bug 1248628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248634">SUSE bug 1248634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248635">SUSE bug 1248635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248639">SUSE bug 1248639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248643">SUSE bug 1248643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248647">SUSE bug 1248647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248648">SUSE bug 1248648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248652">SUSE bug 1248652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248655">SUSE bug 1248655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248662">SUSE bug 1248662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248664">SUSE bug 1248664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248666">SUSE bug 1248666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248669">SUSE bug 1248669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248674">SUSE bug 1248674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248681">SUSE bug 1248681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248727">SUSE bug 1248727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248728">SUSE bug 1248728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248748">SUSE bug 1248748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248754">SUSE bug 1248754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248775">SUSE bug 1248775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249022">SUSE bug 1249022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249038">SUSE bug 1249038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249060">SUSE bug 1249060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249061">SUSE bug 1249061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249062">SUSE bug 1249062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249064">SUSE bug 1249064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249065">SUSE bug 1249065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249066">SUSE bug 1249066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249126">SUSE bug 1249126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249143">SUSE bug 1249143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249156">SUSE bug 1249156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249159">SUSE bug 1249159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249160">SUSE bug 1249160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249163">SUSE bug 1249163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249164">SUSE bug 1249164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249166">SUSE bug 1249166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249167">SUSE bug 1249167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249169">SUSE bug 1249169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249170">SUSE bug 1249170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249172">SUSE bug 1249172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249176">SUSE bug 1249176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249177">SUSE bug 1249177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249182">SUSE bug 1249182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249186">SUSE bug 1249186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249190">SUSE bug 1249190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249193">SUSE bug 1249193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249195">SUSE bug 1249195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249199">SUSE bug 1249199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249201">SUSE bug 1249201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249202">SUSE bug 1249202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249203">SUSE bug 1249203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249204">SUSE bug 1249204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249206">SUSE bug 1249206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249215">SUSE bug 1249215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249220">SUSE bug 1249220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249221">SUSE bug 1249221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249254">SUSE bug 1249254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249258">SUSE bug 1249258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249262">SUSE bug 1249262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249263">SUSE bug 1249263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249265">SUSE bug 1249265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249266">SUSE bug 1249266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249269">SUSE bug 1249269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249271">SUSE bug 1249271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249272">SUSE bug 1249272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249273">SUSE bug 1249273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249274">SUSE bug 1249274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249278">SUSE bug 1249278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249279">SUSE bug 1249279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249281">SUSE bug 1249281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249282">SUSE bug 1249282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249284">SUSE bug 1249284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249285">SUSE bug 1249285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249286">SUSE bug 1249286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249288">SUSE bug 1249288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249290">SUSE bug 1249290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249292">SUSE bug 1249292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249295">SUSE bug 1249295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249296">SUSE bug 1249296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249297">SUSE bug 1249297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249299">SUSE bug 1249299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249300">SUSE bug 1249300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249301">SUSE bug 1249301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249303">SUSE bug 1249303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249304">SUSE bug 1249304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249305">SUSE bug 1249305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249306">SUSE bug 1249306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249308">SUSE bug 1249308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249309">SUSE bug 1249309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249312">SUSE bug 1249312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249313">SUSE bug 1249313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249314">SUSE bug 1249314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249315">SUSE bug 1249315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249316">SUSE bug 1249316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249318">SUSE bug 1249318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249319">SUSE bug 1249319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249320">SUSE bug 1249320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249321">SUSE bug 1249321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249322">SUSE bug 1249322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249323">SUSE bug 1249323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249324">SUSE bug 1249324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249333">SUSE bug 1249333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249334">SUSE bug 1249334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249338">SUSE bug 1249338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249346">SUSE bug 1249346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249374">SUSE bug 1249374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249413">SUSE bug 1249413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249477">SUSE bug 1249477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249478">SUSE bug 1249478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249479">SUSE bug 1249479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249486">SUSE bug 1249486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249490">SUSE bug 1249490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249494">SUSE bug 1249494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249500">SUSE bug 1249500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249504">SUSE bug 1249504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249506">SUSE bug 1249506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249508">SUSE bug 1249508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249509">SUSE bug 1249509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249510">SUSE bug 1249510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249513">SUSE bug 1249513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249515">SUSE bug 1249515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249516">SUSE bug 1249516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249522">SUSE bug 1249522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249523">SUSE bug 1249523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249524">SUSE bug 1249524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249526">SUSE bug 1249526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249533">SUSE bug 1249533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249540">SUSE bug 1249540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249542">SUSE bug 1249542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249545">SUSE bug 1249545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249547">SUSE bug 1249547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249548">SUSE bug 1249548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249550">SUSE bug 1249550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249552">SUSE bug 1249552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249554">SUSE bug 1249554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249562">SUSE bug 1249562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249566">SUSE bug 1249566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249587">SUSE bug 1249587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249598">SUSE bug 1249598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249604">SUSE bug 1249604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249615">SUSE bug 1249615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249618">SUSE bug 1249618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249774">SUSE bug 1249774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249833">SUSE bug 1249833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249887">SUSE bug 1249887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249888">SUSE bug 1249888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249901">SUSE bug 1249901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249904">SUSE bug 1249904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249906">SUSE bug 1249906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249915">SUSE bug 1249915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249974">SUSE bug 1249974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249975">SUSE bug 1249975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250002">SUSE bug 1250002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250007">SUSE bug 1250007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250021">SUSE bug 1250021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250025">SUSE bug 1250025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250028">SUSE bug 1250028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250032">SUSE bug 1250032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250087">SUSE bug 1250087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250088">SUSE bug 1250088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250119">SUSE bug 1250119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250123">SUSE bug 1250123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250124">SUSE bug 1250124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250177">SUSE bug 1250177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250179">SUSE bug 1250179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250203">SUSE bug 1250203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250204">SUSE bug 1250204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250205">SUSE bug 1250205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250237">SUSE bug 1250237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250242">SUSE bug 1250242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250247">SUSE bug 1250247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250249">SUSE bug 1250249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250251">SUSE bug 1250251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250258">SUSE bug 1250258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250262">SUSE bug 1250262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250266">SUSE bug 1250266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250267">SUSE bug 1250267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250268">SUSE bug 1250268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250275">SUSE bug 1250275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250276">SUSE bug 1250276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250281">SUSE bug 1250281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250291">SUSE bug 1250291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250292">SUSE bug 1250292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250294">SUSE bug 1250294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250296">SUSE bug 1250296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250297">SUSE bug 1250297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250298">SUSE bug 1250298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250334">SUSE bug 1250334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250344">SUSE bug 1250344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250365">SUSE bug 1250365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250371">SUSE bug 1250371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250377">SUSE bug 1250377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250386">SUSE bug 1250386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250389">SUSE bug 1250389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250398">SUSE bug 1250398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250402">SUSE bug 1250402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250406">SUSE bug 1250406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250407">SUSE bug 1250407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250408">SUSE bug 1250408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250450">SUSE bug 1250450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250491">SUSE bug 1250491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250519">SUSE bug 1250519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250522">SUSE bug 1250522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250650">SUSE bug 1250650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250655">SUSE bug 1250655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250671">SUSE bug 1250671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250702">SUSE bug 1250702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250711">SUSE bug 1250711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250712">SUSE bug 1250712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250713">SUSE bug 1250713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250716">SUSE bug 1250716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250719">SUSE bug 1250719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250722">SUSE bug 1250722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250729">SUSE bug 1250729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250736">SUSE bug 1250736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250737">SUSE bug 1250737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250739">SUSE bug 1250739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250741">SUSE bug 1250741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250758">SUSE bug 1250758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250952">SUSE bug 1250952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251100">SUSE bug 1251100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251114">SUSE bug 1251114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251134">SUSE bug 1251134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251135">SUSE bug 1251135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251143">SUSE bug 1251143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251146">SUSE bug 1251146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251186">SUSE bug 1251186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251216">SUSE bug 1251216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251230">SUSE bug 1251230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251810">SUSE bug 1251810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252084">SUSE bug 1252084</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57891/">CVE-2024-57891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57891">CVE-2024-57891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57951/">CVE-2024-57951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57951">CVE-2024-57951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57952/">CVE-2024-57952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57952">CVE-2024-57952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58090/">CVE-2024-58090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58090">CVE-2024-58090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22034/">CVE-2025-22034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22034">CVE-2025-22034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22077/">CVE-2025-22077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23141/">CVE-2025-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23141">CVE-2025-23141 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37821/">CVE-2025-37821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37821">CVE-2025-37821 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-37849/">CVE-2025-37849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37849">CVE-2025-37849 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37856/">CVE-2025-37856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37856">CVE-2025-37856 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37861/">CVE-2025-37861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37861">CVE-2025-37861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37864/">CVE-2025-37864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37864">CVE-2025-37864 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38006/">CVE-2025-38006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38008/">CVE-2025-38008 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38019/">CVE-2025-38019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38034/">CVE-2025-38034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38038/">CVE-2025-38038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38038">CVE-2025-38038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38058/">CVE-2025-38058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38062/">CVE-2025-38062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38075/">CVE-2025-38075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38087/">CVE-2025-38087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38088/">CVE-2025-38088 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38089/">CVE-2025-38089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38090/">CVE-2025-38090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38091/">CVE-2025-38091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38091">CVE-2025-38091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38095/">CVE-2025-38095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38095">CVE-2025-38095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38096/">CVE-2025-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38096">CVE-2025-38096 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38098/">CVE-2025-38098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38098">CVE-2025-38098 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38099/">CVE-2025-38099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38099">CVE-2025-38099 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38101/">CVE-2025-38101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38101">CVE-2025-38101 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38102/">CVE-2025-38102 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38102">CVE-2025-38102 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38103/">CVE-2025-38103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38103">CVE-2025-38103 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38106/">CVE-2025-38106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38106">CVE-2025-38106 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38107/">CVE-2025-38107 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38107">CVE-2025-38107 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38108/">CVE-2025-38108 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38108">CVE-2025-38108 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38109/">CVE-2025-38109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38110/">CVE-2025-38110 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38111/">CVE-2025-38111 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38112/">CVE-2025-38112 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38112">CVE-2025-38112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38113/">CVE-2025-38113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38113">CVE-2025-38113 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38114/">CVE-2025-38114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38114">CVE-2025-38114 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38117/">CVE-2025-38117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38117">CVE-2025-38117 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38118/">CVE-2025-38118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38118">CVE-2025-38118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38119/">CVE-2025-38119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38119">CVE-2025-38119 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38120/">CVE-2025-38120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38122/">CVE-2025-38122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38122">CVE-2025-38122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38123/">CVE-2025-38123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38123">CVE-2025-38123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38124/">CVE-2025-38124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38125/">CVE-2025-38125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38125">CVE-2025-38125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38127/">CVE-2025-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38127">CVE-2025-38127 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38128/">CVE-2025-38128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38128">CVE-2025-38128 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38134/">CVE-2025-38134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38134">CVE-2025-38134 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38135/">CVE-2025-38135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38135">CVE-2025-38135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38136/">CVE-2025-38136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38136">CVE-2025-38136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38137/">CVE-2025-38137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38137">CVE-2025-38137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38138/">CVE-2025-38138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38138">CVE-2025-38138 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38140/">CVE-2025-38140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38140">CVE-2025-38140 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38141/">CVE-2025-38141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38141">CVE-2025-38141 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38142/">CVE-2025-38142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38142">CVE-2025-38142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38143/">CVE-2025-38143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38143">CVE-2025-38143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38145/">CVE-2025-38145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38145">CVE-2025-38145 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38146/">CVE-2025-38146 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38146">CVE-2025-38146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38148/">CVE-2025-38148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38148">CVE-2025-38148 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38149/">CVE-2025-38149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38149">CVE-2025-38149 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38151/">CVE-2025-38151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38151">CVE-2025-38151 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38153/">CVE-2025-38153 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38153">CVE-2025-38153 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38154/">CVE-2025-38154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38155/">CVE-2025-38155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38155">CVE-2025-38155 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38156/">CVE-2025-38156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38156">CVE-2025-38156 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38157/">CVE-2025-38157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38157">CVE-2025-38157 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38160/">CVE-2025-38160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38160">CVE-2025-38160 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38161/">CVE-2025-38161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38161">CVE-2025-38161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38165/">CVE-2025-38165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38165">CVE-2025-38165 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38168/">CVE-2025-38168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38168">CVE-2025-38168 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38169/">CVE-2025-38169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38169">CVE-2025-38169 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38170/">CVE-2025-38170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38170">CVE-2025-38170 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38172/">CVE-2025-38172 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38172">CVE-2025-38172 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38173/">CVE-2025-38173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38173">CVE-2025-38173 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38174/">CVE-2025-38174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38174">CVE-2025-38174 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38181/">CVE-2025-38181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38182/">CVE-2025-38182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38184/">CVE-2025-38184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38185/">CVE-2025-38185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38186/">CVE-2025-38186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38186">CVE-2025-38186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38188/">CVE-2025-38188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38188">CVE-2025-38188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38189/">CVE-2025-38189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38189">CVE-2025-38189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38190/">CVE-2025-38190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38193/">CVE-2025-38193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38197/">CVE-2025-38197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38198/">CVE-2025-38198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38201/">CVE-2025-38201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38201">CVE-2025-38201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38205/">CVE-2025-38205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38205">CVE-2025-38205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38208/">CVE-2025-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38209/">CVE-2025-38209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38209">CVE-2025-38209 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38211/">CVE-2025-38211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38213/">CVE-2025-38213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38214/">CVE-2025-38214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38215/">CVE-2025-38215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38216/">CVE-2025-38216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38216">CVE-2025-38216 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38217/">CVE-2025-38217 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38220/">CVE-2025-38220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38222/">CVE-2025-38222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38224/">CVE-2025-38224 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38224">CVE-2025-38224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38225/">CVE-2025-38225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38226/">CVE-2025-38226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38227/">CVE-2025-38227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38228/">CVE-2025-38228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38228">CVE-2025-38228 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38229/">CVE-2025-38229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38231/">CVE-2025-38231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38232/">CVE-2025-38232 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38232">CVE-2025-38232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38233/">CVE-2025-38233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38233">CVE-2025-38233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38234/">CVE-2025-38234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38234">CVE-2025-38234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38242/">CVE-2025-38242 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38242">CVE-2025-38242 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38244/">CVE-2025-38244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38244">CVE-2025-38244 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38245/">CVE-2025-38245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38245">CVE-2025-38245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38246/">CVE-2025-38246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38246">CVE-2025-38246 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38249/">CVE-2025-38249 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38249">CVE-2025-38249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38251/">CVE-2025-38251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38251">CVE-2025-38251 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38253/">CVE-2025-38253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38253">CVE-2025-38253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38255/">CVE-2025-38255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38255">CVE-2025-38255 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38256/">CVE-2025-38256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38256">CVE-2025-38256 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38257/">CVE-2025-38257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38258/">CVE-2025-38258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38258">CVE-2025-38258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38259/">CVE-2025-38259 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38259">CVE-2025-38259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38263/">CVE-2025-38263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38263">CVE-2025-38263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38264/">CVE-2025-38264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38264">CVE-2025-38264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38265/">CVE-2025-38265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38265">CVE-2025-38265 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38267/">CVE-2025-38267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38267">CVE-2025-38267 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38268/">CVE-2025-38268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38268">CVE-2025-38268 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38270/">CVE-2025-38270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38270">CVE-2025-38270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38272/">CVE-2025-38272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38272">CVE-2025-38272 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38273/">CVE-2025-38273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38273">CVE-2025-38273 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38274/">CVE-2025-38274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38274">CVE-2025-38274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38275/">CVE-2025-38275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38275">CVE-2025-38275 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38277/">CVE-2025-38277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38277">CVE-2025-38277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38278/">CVE-2025-38278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38278">CVE-2025-38278 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38286/">CVE-2025-38286 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38286">CVE-2025-38286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38287/">CVE-2025-38287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38287">CVE-2025-38287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38288/">CVE-2025-38288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38288">CVE-2025-38288 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38289/">CVE-2025-38289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38289">CVE-2025-38289 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38290/">CVE-2025-38290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38290">CVE-2025-38290 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38291/">CVE-2025-38291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38291">CVE-2025-38291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38292/">CVE-2025-38292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38292">CVE-2025-38292 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38293/">CVE-2025-38293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38293">CVE-2025-38293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38299/">CVE-2025-38299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38299">CVE-2025-38299 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38300/">CVE-2025-38300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38300">CVE-2025-38300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38301/">CVE-2025-38301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38301">CVE-2025-38301 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38302/">CVE-2025-38302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38302">CVE-2025-38302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38303/">CVE-2025-38303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38303">CVE-2025-38303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38304/">CVE-2025-38304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38304">CVE-2025-38304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38305/">CVE-2025-38305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38305">CVE-2025-38305 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38306/">CVE-2025-38306 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38306">CVE-2025-38306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38307/">CVE-2025-38307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38307">CVE-2025-38307 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38311/">CVE-2025-38311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38311">CVE-2025-38311 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38312/">CVE-2025-38312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38312">CVE-2025-38312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38313/">CVE-2025-38313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38313">CVE-2025-38313 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38315/">CVE-2025-38315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38315">CVE-2025-38315 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38317/">CVE-2025-38317 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38317">CVE-2025-38317 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38318/">CVE-2025-38318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38318">CVE-2025-38318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38319/">CVE-2025-38319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38319">CVE-2025-38319 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38322/">CVE-2025-38322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38322">CVE-2025-38322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38323/">CVE-2025-38323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38326/">CVE-2025-38326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38326">CVE-2025-38326 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38335/">CVE-2025-38335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38335">CVE-2025-38335 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38336/">CVE-2025-38336 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38336">CVE-2025-38336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38337/">CVE-2025-38337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38337">CVE-2025-38337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38338/">CVE-2025-38338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38338">CVE-2025-38338 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38339/">CVE-2025-38339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38339">CVE-2025-38339 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38341/">CVE-2025-38341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38341">CVE-2025-38341 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38342/">CVE-2025-38342 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38342">CVE-2025-38342 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-38343/">CVE-2025-38343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38343">CVE-2025-38343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38344/">CVE-2025-38344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38344">CVE-2025-38344 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38345/">CVE-2025-38345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38345">CVE-2025-38345 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38348/">CVE-2025-38348 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38348">CVE-2025-38348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38349/">CVE-2025-38349 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38351/">CVE-2025-38351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38351">CVE-2025-38351 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38353/">CVE-2025-38353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38353">CVE-2025-38353 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38354/">CVE-2025-38354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38354">CVE-2025-38354 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38355/">CVE-2025-38355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38355">CVE-2025-38355 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38356/">CVE-2025-38356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38356">CVE-2025-38356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38359/">CVE-2025-38359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38359">CVE-2025-38359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38360/">CVE-2025-38360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38360">CVE-2025-38360 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38361/">CVE-2025-38361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38361">CVE-2025-38361 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38362/">CVE-2025-38362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38362">CVE-2025-38362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38363/">CVE-2025-38363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38363">CVE-2025-38363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38364/">CVE-2025-38364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38364">CVE-2025-38364 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38365/">CVE-2025-38365 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38365">CVE-2025-38365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38368/">CVE-2025-38368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38368">CVE-2025-38368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38369/">CVE-2025-38369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38369">CVE-2025-38369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38371/">CVE-2025-38371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38371">CVE-2025-38371 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38372/">CVE-2025-38372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38372">CVE-2025-38372 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38373/">CVE-2025-38373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38373">CVE-2025-38373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38374/">CVE-2025-38374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38374">CVE-2025-38374 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38375/">CVE-2025-38375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38376/">CVE-2025-38376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38376">CVE-2025-38376 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38377/">CVE-2025-38377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38377">CVE-2025-38377 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38381/">CVE-2025-38381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38381">CVE-2025-38381 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38382/">CVE-2025-38382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38382">CVE-2025-38382 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38383/">CVE-2025-38383 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38383">CVE-2025-38383 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38384/">CVE-2025-38384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38384">CVE-2025-38384 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38385/">CVE-2025-38385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38385">CVE-2025-38385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38386/">CVE-2025-38386 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38386">CVE-2025-38386 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38387/">CVE-2025-38387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38387">CVE-2025-38387 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38389/">CVE-2025-38389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38389">CVE-2025-38389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38390/">CVE-2025-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38390">CVE-2025-38390 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38391/">CVE-2025-38391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38391">CVE-2025-38391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38392/">CVE-2025-38392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38393/">CVE-2025-38393 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38395/">CVE-2025-38395 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38395">CVE-2025-38395 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38396/">CVE-2025-38396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38397/">CVE-2025-38397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38397">CVE-2025-38397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38399/">CVE-2025-38399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38399">CVE-2025-38399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38400/">CVE-2025-38400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38400">CVE-2025-38400 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38401/">CVE-2025-38401 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38401">CVE-2025-38401 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38402/">CVE-2025-38402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38402">CVE-2025-38402 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38403/">CVE-2025-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38404/">CVE-2025-38404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38404">CVE-2025-38404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38405/">CVE-2025-38405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38405">CVE-2025-38405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38406/">CVE-2025-38406 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38406">CVE-2025-38406 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38408/">CVE-2025-38408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38408">CVE-2025-38408 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38409/">CVE-2025-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38409">CVE-2025-38409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38410/">CVE-2025-38410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38410">CVE-2025-38410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38412/">CVE-2025-38412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38412">CVE-2025-38412 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38413/">CVE-2025-38413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38413">CVE-2025-38413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38414/">CVE-2025-38414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38414">CVE-2025-38414 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38416/">CVE-2025-38416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38416">CVE-2025-38416 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38417/">CVE-2025-38417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38417">CVE-2025-38417 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38418/">CVE-2025-38418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38418">CVE-2025-38418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38419/">CVE-2025-38419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38419">CVE-2025-38419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38420/">CVE-2025-38420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38420">CVE-2025-38420 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38421/">CVE-2025-38421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38421">CVE-2025-38421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38424/">CVE-2025-38424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38424">CVE-2025-38424 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38425/">CVE-2025-38425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38425">CVE-2025-38425 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38426/">CVE-2025-38426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38426">CVE-2025-38426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38427/">CVE-2025-38427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38427">CVE-2025-38427 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38428/">CVE-2025-38428 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38428">CVE-2025-38428 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38429/">CVE-2025-38429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38429">CVE-2025-38429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38430/">CVE-2025-38430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38430">CVE-2025-38430 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38436/">CVE-2025-38436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38436">CVE-2025-38436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38438/">CVE-2025-38438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38439/">CVE-2025-38439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38439">CVE-2025-38439 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38440/">CVE-2025-38440 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38440">CVE-2025-38440 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38441/">CVE-2025-38441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38441">CVE-2025-38441 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38443/">CVE-2025-38443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38443">CVE-2025-38443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38444/">CVE-2025-38444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38444">CVE-2025-38444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38445/">CVE-2025-38445 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38445">CVE-2025-38445 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38446/">CVE-2025-38446 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38446">CVE-2025-38446 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38448/">CVE-2025-38448 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38448">CVE-2025-38448 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38449/">CVE-2025-38449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38450/">CVE-2025-38450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38450">CVE-2025-38450 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38451/">CVE-2025-38451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38451">CVE-2025-38451 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38453/">CVE-2025-38453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38453">CVE-2025-38453 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38454/">CVE-2025-38454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38454">CVE-2025-38454 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38455/">CVE-2025-38455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38455">CVE-2025-38455 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38456/">CVE-2025-38456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38456">CVE-2025-38456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38457/">CVE-2025-38457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38457">CVE-2025-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38458/">CVE-2025-38458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38458">CVE-2025-38458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38460/">CVE-2025-38460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38461/">CVE-2025-38461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38462/">CVE-2025-38462 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38462">CVE-2025-38462 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38463/">CVE-2025-38463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38463">CVE-2025-38463 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38464/">CVE-2025-38464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38465/">CVE-2025-38465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38465">CVE-2025-38465 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-38466/">CVE-2025-38466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38466">CVE-2025-38466 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38467/">CVE-2025-38467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38467">CVE-2025-38467 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38468/">CVE-2025-38468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38470/">CVE-2025-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38472/">CVE-2025-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38473/">CVE-2025-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38473">CVE-2025-38473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38474/">CVE-2025-38474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38474">CVE-2025-38474 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38475/">CVE-2025-38475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38475">CVE-2025-38475 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38476/">CVE-2025-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38478/">CVE-2025-38478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38478">CVE-2025-38478 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38480/">CVE-2025-38480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38480">CVE-2025-38480 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38481/">CVE-2025-38481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38481">CVE-2025-38481 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38482/">CVE-2025-38482 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38482">CVE-2025-38482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38483/">CVE-2025-38483 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38483">CVE-2025-38483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38484/">CVE-2025-38484 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38484">CVE-2025-38484 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38485/">CVE-2025-38485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38485">CVE-2025-38485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38487/">CVE-2025-38487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38487">CVE-2025-38487 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38488/">CVE-2025-38488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38489/">CVE-2025-38489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38489">CVE-2025-38489 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38490/">CVE-2025-38490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38490">CVE-2025-38490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38491/">CVE-2025-38491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38491">CVE-2025-38491 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38493/">CVE-2025-38493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38493">CVE-2025-38493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38494/">CVE-2025-38494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38495/">CVE-2025-38495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38496/">CVE-2025-38496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38496">CVE-2025-38496 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38497/">CVE-2025-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38500/">CVE-2025-38500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38503/">CVE-2025-38503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38503">CVE-2025-38503 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38506/">CVE-2025-38506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38506">CVE-2025-38506 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38508/">CVE-2025-38508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38508">CVE-2025-38508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38514/">CVE-2025-38514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38514">CVE-2025-38514 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38524/">CVE-2025-38524 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38524">CVE-2025-38524 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38526/">CVE-2025-38526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38526">CVE-2025-38526 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38527/">CVE-2025-38527 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38528/">CVE-2025-38528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38528">CVE-2025-38528 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38531/">CVE-2025-38531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38531">CVE-2025-38531 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38533/">CVE-2025-38533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38533">CVE-2025-38533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38539/">CVE-2025-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38544/">CVE-2025-38544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38544">CVE-2025-38544 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38545/">CVE-2025-38545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38545">CVE-2025-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38546/">CVE-2025-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38549/">CVE-2025-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38549">CVE-2025-38549 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38552/">CVE-2025-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38553/">CVE-2025-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38554/">CVE-2025-38554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38554">CVE-2025-38554 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38555/">CVE-2025-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38557/">CVE-2025-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38557">CVE-2025-38557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38559/">CVE-2025-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38559">CVE-2025-38559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38560/">CVE-2025-38560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38564/">CVE-2025-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38564">CVE-2025-38564 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38565/">CVE-2025-38565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38566/">CVE-2025-38566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38568/">CVE-2025-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38571/">CVE-2025-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38572/">CVE-2025-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38573/">CVE-2025-38573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38573">CVE-2025-38573 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38574/">CVE-2025-38574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38576/">CVE-2025-38576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38581/">CVE-2025-38581 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38582/">CVE-2025-38582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38582">CVE-2025-38582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38583/">CVE-2025-38583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38584/">CVE-2025-38584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38584">CVE-2025-38584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38585/">CVE-2025-38585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38585">CVE-2025-38585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38586/">CVE-2025-38586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38586">CVE-2025-38586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38587/">CVE-2025-38587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38588/">CVE-2025-38588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38591/">CVE-2025-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38591">CVE-2025-38591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38593/">CVE-2025-38593 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38593">CVE-2025-38593 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38595/">CVE-2025-38595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38595">CVE-2025-38595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38597/">CVE-2025-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38597">CVE-2025-38597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38601/">CVE-2025-38601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38602/">CVE-2025-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38604/">CVE-2025-38604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38605/">CVE-2025-38605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38605">CVE-2025-38605 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38608/">CVE-2025-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38609/">CVE-2025-38609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38610/">CVE-2025-38610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38612/">CVE-2025-38612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38614/">CVE-2025-38614 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38614">CVE-2025-38614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38616/">CVE-2025-38616 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38616">CVE-2025-38616 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38618/">CVE-2025-38618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38619/">CVE-2025-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38619">CVE-2025-38619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38621/">CVE-2025-38621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38621">CVE-2025-38621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38622/">CVE-2025-38622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38623/">CVE-2025-38623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38624/">CVE-2025-38624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38628/">CVE-2025-38628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38628">CVE-2025-38628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38630/">CVE-2025-38630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38631/">CVE-2025-38631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38631">CVE-2025-38631 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38632/">CVE-2025-38632 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38634/">CVE-2025-38634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38635/">CVE-2025-38635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38639/">CVE-2025-38639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38640/">CVE-2025-38640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38643/">CVE-2025-38643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38643">CVE-2025-38643 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38644/">CVE-2025-38644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38646/">CVE-2025-38646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38648/">CVE-2025-38648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38656/">CVE-2025-38656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38656">CVE-2025-38656 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38658/">CVE-2025-38658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38658">CVE-2025-38658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38659/">CVE-2025-38659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38660/">CVE-2025-38660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38660">CVE-2025-38660 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38662/">CVE-2025-38662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38662">CVE-2025-38662 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38664/">CVE-2025-38664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38665/">CVE-2025-38665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38668/">CVE-2025-38668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38670/">CVE-2025-38670 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38671/">CVE-2025-38671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38676/">CVE-2025-38676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38676">CVE-2025-38676 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38678/">CVE-2025-38678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38678">CVE-2025-38678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38679/">CVE-2025-38679 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38680/">CVE-2025-38680 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38681/">CVE-2025-38681 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38683/">CVE-2025-38683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38685/">CVE-2025-38685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38686/">CVE-2025-38686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38686">CVE-2025-38686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38687/">CVE-2025-38687 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38691/">CVE-2025-38691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38692/">CVE-2025-38692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38693/">CVE-2025-38693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38694/">CVE-2025-38694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-38695/">CVE-2025-38695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38700/">CVE-2025-38700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38701/">CVE-2025-38701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38702/">CVE-2025-38702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38703/">CVE-2025-38703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38705/">CVE-2025-38705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38705">CVE-2025-38705 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38706/">CVE-2025-38706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38709/">CVE-2025-38709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38710/">CVE-2025-38710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38710">CVE-2025-38710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38717/">CVE-2025-38717 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38717">CVE-2025-38717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38721/">CVE-2025-38721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38722/">CVE-2025-38722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38722">CVE-2025-38722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38724/">CVE-2025-38724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38725/">CVE-2025-38725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38727/">CVE-2025-38727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38729/">CVE-2025-38729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38730/">CVE-2025-38730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38732/">CVE-2025-38732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38733/">CVE-2025-38733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38733">CVE-2025-38733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38734/">CVE-2025-38734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38735/">CVE-2025-38735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38736/">CVE-2025-38736 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38736">CVE-2025-38736 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39673/">CVE-2025-39673 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39675/">CVE-2025-39675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39677/">CVE-2025-39677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39677">CVE-2025-39677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39678/">CVE-2025-39678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39678">CVE-2025-39678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39679/">CVE-2025-39679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39681/">CVE-2025-39681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-39682/">CVE-2025-39682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39683/">CVE-2025-39683 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39684/">CVE-2025-39684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39685/">CVE-2025-39685 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39686/">CVE-2025-39686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39687/">CVE-2025-39687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39691/">CVE-2025-39691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39693/">CVE-2025-39693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39694/">CVE-2025-39694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39695/">CVE-2025-39695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39695">CVE-2025-39695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39697/">CVE-2025-39697 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39698/">CVE-2025-39698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39700/">CVE-2025-39700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39700">CVE-2025-39700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39701/">CVE-2025-39701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39703/">CVE-2025-39703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39705/">CVE-2025-39705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39705">CVE-2025-39705 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39706/">CVE-2025-39706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39707/">CVE-2025-39707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39707">CVE-2025-39707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39709/">CVE-2025-39709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39710/">CVE-2025-39710 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39711/">CVE-2025-39711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39712/">CVE-2025-39712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39712">CVE-2025-39712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39713/">CVE-2025-39713 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39714/">CVE-2025-39714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39718/">CVE-2025-39718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39719/">CVE-2025-39719 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39721/">CVE-2025-39721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39722/">CVE-2025-39722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39722">CVE-2025-39722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39723/">CVE-2025-39723 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39723">CVE-2025-39723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39724/">CVE-2025-39724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39726/">CVE-2025-39726 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39727/">CVE-2025-39727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39727">CVE-2025-39727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39730/">CVE-2025-39730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39732/">CVE-2025-39732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39732">CVE-2025-39732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39738/">CVE-2025-39738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39739/">CVE-2025-39739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39742/">CVE-2025-39742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39744/">CVE-2025-39744 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39746/">CVE-2025-39746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39747/">CVE-2025-39747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39747">CVE-2025-39747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39748/">CVE-2025-39748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39748">CVE-2025-39748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39749/">CVE-2025-39749 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39750/">CVE-2025-39750 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39754/">CVE-2025-39754 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39754">CVE-2025-39754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39758/">CVE-2025-39758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39759/">CVE-2025-39759 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39761/">CVE-2025-39761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39763/">CVE-2025-39763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39764/">CVE-2025-39764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39764">CVE-2025-39764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39765/">CVE-2025-39765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39765">CVE-2025-39765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39766/">CVE-2025-39766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39770/">CVE-2025-39770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39772/">CVE-2025-39772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39773/">CVE-2025-39773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39775/">CVE-2025-39775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39775">CVE-2025-39775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39782/">CVE-2025-39782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39783/">CVE-2025-39783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39787/">CVE-2025-39787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39788/">CVE-2025-39788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39790/">CVE-2025-39790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39791/">CVE-2025-39791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39791">CVE-2025-39791 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39792/">CVE-2025-39792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39792">CVE-2025-39792 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39798/">CVE-2025-39798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39800/">CVE-2025-39800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39800">CVE-2025-39800 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39801/">CVE-2025-39801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39801">CVE-2025-39801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39806/">CVE-2025-39806 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39806">CVE-2025-39806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39807/">CVE-2025-39807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39807">CVE-2025-39807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39808/">CVE-2025-39808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39808">CVE-2025-39808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39810/">CVE-2025-39810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39810">CVE-2025-39810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39811/">CVE-2025-39811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39811">CVE-2025-39811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39813/">CVE-2025-39813 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39813">CVE-2025-39813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39816/">CVE-2025-39816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39816">CVE-2025-39816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39823/">CVE-2025-39823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39823">CVE-2025-39823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39824/">CVE-2025-39824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39824">CVE-2025-39824 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39825/">CVE-2025-39825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39825">CVE-2025-39825 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39826/">CVE-2025-39826 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39826">CVE-2025-39826 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39827/">CVE-2025-39827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39827">CVE-2025-39827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39828/">CVE-2025-39828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39828">CVE-2025-39828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39830/">CVE-2025-39830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39830">CVE-2025-39830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39832/">CVE-2025-39832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39832">CVE-2025-39832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39833/">CVE-2025-39833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39833">CVE-2025-39833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39834/">CVE-2025-39834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39834">CVE-2025-39834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39835/">CVE-2025-39835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39835">CVE-2025-39835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39836/">CVE-2025-39836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39836">CVE-2025-39836 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39838/">CVE-2025-39838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39838">CVE-2025-39838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39839/">CVE-2025-39839 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39839">CVE-2025-39839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39841/">CVE-2025-39841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39841">CVE-2025-39841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39842/">CVE-2025-39842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39842">CVE-2025-39842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39844/">CVE-2025-39844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39844">CVE-2025-39844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39845/">CVE-2025-39845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39845">CVE-2025-39845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39847/">CVE-2025-39847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39847">CVE-2025-39847 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39848/">CVE-2025-39848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39848">CVE-2025-39848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39849/">CVE-2025-39849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39849">CVE-2025-39849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39850/">CVE-2025-39850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39850">CVE-2025-39850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39851/">CVE-2025-39851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39851">CVE-2025-39851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39852/">CVE-2025-39852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39852">CVE-2025-39852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39853/">CVE-2025-39853 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39853">CVE-2025-39853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39854/">CVE-2025-39854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39854">CVE-2025-39854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39857/">CVE-2025-39857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39857">CVE-2025-39857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39860/">CVE-2025-39860 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39860">CVE-2025-39860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39861/">CVE-2025-39861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39861">CVE-2025-39861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39863/">CVE-2025-39863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39863">CVE-2025-39863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39864/">CVE-2025-39864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39864">CVE-2025-39864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39865/">CVE-2025-39865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39865">CVE-2025-39865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39869/">CVE-2025-39869 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39870/">CVE-2025-39870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39870">CVE-2025-39870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39871/">CVE-2025-39871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39871">CVE-2025-39871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39873/">CVE-2025-39873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39873">CVE-2025-39873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39875/">CVE-2025-39875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39875">CVE-2025-39875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39877/">CVE-2025-39877 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39877">CVE-2025-39877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39882/">CVE-2025-39882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39882">CVE-2025-39882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39884/">CVE-2025-39884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39884">CVE-2025-39884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39885/">CVE-2025-39885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39885">CVE-2025-39885 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39889/">CVE-2025-39889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39889">CVE-2025-39889 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39890/">CVE-2025-39890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39890">CVE-2025-39890 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39891/">CVE-2025-39891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39891">CVE-2025-39891 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39896/">CVE-2025-39896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39896">CVE-2025-39896 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39899/">CVE-2025-39899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39899">CVE-2025-39899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39900/">CVE-2025-39900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39900">CVE-2025-39900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39902/">CVE-2025-39902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39902">CVE-2025-39902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39907/">CVE-2025-39907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907">CVE-2025-39907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39909/">CVE-2025-39909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909">CVE-2025-39909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39916/">CVE-2025-39916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916">CVE-2025-39916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39918/">CVE-2025-39918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39918">CVE-2025-39918 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39922/">CVE-2025-39922 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39922">CVE-2025-39922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39923/">CVE-2025-39923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923">CVE-2025-39923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39925/">CVE-2025-39925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925">CVE-2025-39925 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39926/">CVE-2025-39926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39926">CVE-2025-39926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39931/">CVE-2025-39931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931">CVE-2025-39931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39934/">CVE-2025-39934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934">CVE-2025-39934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39937/">CVE-2025-39937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937">CVE-2025-39937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39938/">CVE-2025-39938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938">CVE-2025-39938 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39945/">CVE-2025-39945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39946/">CVE-2025-39946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946">CVE-2025-39946 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39952/">CVE-2025-39952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952">CVE-2025-39952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39957/">CVE-2025-39957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957">CVE-2025-39957 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032869" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032870" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032871" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032869" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032870" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032871" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94594" version="1" class="patch">
	<metadata>
		<title>Security update for lasso (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253092" ref_url="https://bugzilla.suse.com/1253092" source="BUGZILLA"/>
		<reference ref_id="1253093" ref_url="https://bugzilla.suse.com/1253093" source="BUGZILLA"/>
		<reference ref_id="1253095" ref_url="https://bugzilla.suse.com/1253095" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-46404" ref_url="https://www.suse.com/security/cve/CVE-2025-46404/" source="CVE"/>
		<reference ref_id="CVE-2025-46705" ref_url="https://www.suse.com/security/cve/CVE-2025-46705/" source="CVE"/>
		<reference ref_id="CVE-2025-47151" ref_url="https://www.suse.com/security/cve/CVE-2025-47151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023514.html" source="SUSE-SU"/>
		<description>
This update for lasso fixes the following issues:

- CVE-2025-46404: specially crafted SAML response can lead to a denial of service (bsc#1253092).
- CVE-2025-46705: specially crafted SAML assertion response can lead to a denial of service (bsc#1253093).
- CVE-2025-47151: type confusion vulnerability exists in the lasso_node_impl_init_from_xml functionality can lead to
  an arbitrary code execution (bsc#1253095).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1253092">SUSE bug 1253092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253093">SUSE bug 1253093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253095">SUSE bug 1253095</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46404/">CVE-2025-46404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46404">CVE-2025-46404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46705/">CVE-2025-46705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46705">CVE-2025-46705 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47151/">CVE-2025-47151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47151">CVE-2025-47151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031629" comment="liblasso-devel-2.8.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031630" comment="liblasso3-2.8.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031629" comment="liblasso-devel-2.8.2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031630" comment="liblasso3-2.8.2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94595" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1241693" ref_url="https://bugzilla.suse.com/1241693" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-30706" ref_url="https://www.suse.com/security/cve/CVE-2025-30706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023513.html" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- Upgrade to Version 9.3.0
  - CVE-2025-30706: Fixed Connector/J vulnerability (bsc#1241693)
  - Updatable ResultSet fails with 'Parameter index out of range'.
  - Fixed Resultset UPDATE methods not checking validity of ResultSet.
  - DatabaseMetaData clean up.
  - Fixed implement missing methods in DatabaseMetaDataUsingInfoSchema.
  - Fixed procedure execution failing when the parameter name contains escape character.
  - Fixed allow only Krb5LoginModule in Kerberos authentication.
  - Fixed EXECUTE on CallableStatement resulting in ArrayIndexOutOfBoundsException.
  - Mysql connector use an uneffective way to match numericValue.
  - Fixed parameter index validation not proper in CallableStatement
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2025-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1241693">SUSE bug 1241693</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30706/">CVE-2025-30706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30706">CVE-2025-30706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031701" comment="mysql-connector-java-9.3.0-160000.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031701" comment="mysql-connector-java-9.3.0-160000.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94596" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249191" ref_url="https://bugzilla.suse.com/1249191" source="BUGZILLA"/>
		<reference ref_id="1249348" ref_url="https://bugzilla.suse.com/1249348" source="BUGZILLA"/>
		<reference ref_id="1249367" ref_url="https://bugzilla.suse.com/1249367" source="BUGZILLA"/>
		<reference ref_id="1253757" ref_url="https://bugzilla.suse.com/1253757" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10148" ref_url="https://www.suse.com/security/cve/CVE-2025-10148/" source="CVE"/>
		<reference ref_id="CVE-2025-11563" ref_url="https://www.suse.com/security/cve/CVE-2025-11563/" source="CVE"/>
		<reference ref_id="CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2025-9086: Fixed Out of bounds read for cookie path (bsc#1249191)
- CVE-2025-11563: Fixed wcurl path traversal with percent-encoded slashes (bsc#1253757)
- CVE-2025-10148: Fixed predictable WebSocket mask (bsc#1249348)

Other fixes:
- tool_operate: fix return code when --retry is used but not
  triggered (bsc#1249367)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2025-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249191">SUSE bug 1249191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249348">SUSE bug 1249348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249367">SUSE bug 1249367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253757">SUSE bug 1253757</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10148/">CVE-2025-10148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10148">CVE-2025-10148 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11563/">CVE-2025-11563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11563">CVE-2025-11563 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031704" comment="curl-zsh-completion-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031705" comment="libcurl-devel-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031706" comment="libcurl-devel-doc-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032872" comment="libcurl-mini4-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031704" comment="curl-zsh-completion-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031705" comment="libcurl-devel-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031706" comment="libcurl-devel-doc-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032872" comment="libcurl-mini4-8.14.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94597" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1238472" ref_url="https://bugzilla.suse.com/1238472" source="BUGZILLA"/>
		<reference ref_id="1239206" ref_url="https://bugzilla.suse.com/1239206" source="BUGZILLA"/>
		<reference ref_id="1241166" ref_url="https://bugzilla.suse.com/1241166" source="BUGZILLA"/>
		<reference ref_id="1241637" ref_url="https://bugzilla.suse.com/1241637" source="BUGZILLA"/>
		<reference ref_id="1247222" ref_url="https://bugzilla.suse.com/1247222" source="BUGZILLA"/>
		<reference ref_id="1248630" ref_url="https://bugzilla.suse.com/1248630" source="BUGZILLA"/>
		<reference ref_id="1249161" ref_url="https://bugzilla.suse.com/1249161" source="BUGZILLA"/>
		<reference ref_id="1249226" ref_url="https://bugzilla.suse.com/1249226" source="BUGZILLA"/>
		<reference ref_id="1249302" ref_url="https://bugzilla.suse.com/1249302" source="BUGZILLA"/>
		<reference ref_id="1249317" ref_url="https://bugzilla.suse.com/1249317" source="BUGZILLA"/>
		<reference ref_id="1249397" ref_url="https://bugzilla.suse.com/1249397" source="BUGZILLA"/>
		<reference ref_id="1249398" ref_url="https://bugzilla.suse.com/1249398" source="BUGZILLA"/>
		<reference ref_id="1249495" ref_url="https://bugzilla.suse.com/1249495" source="BUGZILLA"/>
		<reference ref_id="1249512" ref_url="https://bugzilla.suse.com/1249512" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249735" ref_url="https://bugzilla.suse.com/1249735" source="BUGZILLA"/>
		<reference ref_id="1250202" ref_url="https://bugzilla.suse.com/1250202" source="BUGZILLA"/>
		<reference ref_id="1250379" ref_url="https://bugzilla.suse.com/1250379" source="BUGZILLA"/>
		<reference ref_id="1250400" ref_url="https://bugzilla.suse.com/1250400" source="BUGZILLA"/>
		<reference ref_id="1250455" ref_url="https://bugzilla.suse.com/1250455" source="BUGZILLA"/>
		<reference ref_id="1250491" ref_url="https://bugzilla.suse.com/1250491" source="BUGZILLA"/>
		<reference ref_id="1250704" ref_url="https://bugzilla.suse.com/1250704" source="BUGZILLA"/>
		<reference ref_id="1250721" ref_url="https://bugzilla.suse.com/1250721" source="BUGZILLA"/>
		<reference ref_id="1250749" ref_url="https://bugzilla.suse.com/1250749" source="BUGZILLA"/>
		<reference ref_id="1250946" ref_url="https://bugzilla.suse.com/1250946" source="BUGZILLA"/>
		<reference ref_id="1251176" ref_url="https://bugzilla.suse.com/1251176" source="BUGZILLA"/>
		<reference ref_id="1251177" ref_url="https://bugzilla.suse.com/1251177" source="BUGZILLA"/>
		<reference ref_id="1251232" ref_url="https://bugzilla.suse.com/1251232" source="BUGZILLA"/>
		<reference ref_id="1251233" ref_url="https://bugzilla.suse.com/1251233" source="BUGZILLA"/>
		<reference ref_id="1251804" ref_url="https://bugzilla.suse.com/1251804" source="BUGZILLA"/>
		<reference ref_id="1251809" ref_url="https://bugzilla.suse.com/1251809" source="BUGZILLA"/>
		<reference ref_id="1251819" ref_url="https://bugzilla.suse.com/1251819" source="BUGZILLA"/>
		<reference ref_id="1251930" ref_url="https://bugzilla.suse.com/1251930" source="BUGZILLA"/>
		<reference ref_id="1251967" ref_url="https://bugzilla.suse.com/1251967" source="BUGZILLA"/>
		<reference ref_id="1252033" ref_url="https://bugzilla.suse.com/1252033" source="BUGZILLA"/>
		<reference ref_id="1252035" ref_url="https://bugzilla.suse.com/1252035" source="BUGZILLA"/>
		<reference ref_id="1252039" ref_url="https://bugzilla.suse.com/1252039" source="BUGZILLA"/>
		<reference ref_id="1252044" ref_url="https://bugzilla.suse.com/1252044" source="BUGZILLA"/>
		<reference ref_id="1252047" ref_url="https://bugzilla.suse.com/1252047" source="BUGZILLA"/>
		<reference ref_id="1252051" ref_url="https://bugzilla.suse.com/1252051" source="BUGZILLA"/>
		<reference ref_id="1252052" ref_url="https://bugzilla.suse.com/1252052" source="BUGZILLA"/>
		<reference ref_id="1252056" ref_url="https://bugzilla.suse.com/1252056" source="BUGZILLA"/>
		<reference ref_id="1252060" ref_url="https://bugzilla.suse.com/1252060" source="BUGZILLA"/>
		<reference ref_id="1252062" ref_url="https://bugzilla.suse.com/1252062" source="BUGZILLA"/>
		<reference ref_id="1252064" ref_url="https://bugzilla.suse.com/1252064" source="BUGZILLA"/>
		<reference ref_id="1252065" ref_url="https://bugzilla.suse.com/1252065" source="BUGZILLA"/>
		<reference ref_id="1252067" ref_url="https://bugzilla.suse.com/1252067" source="BUGZILLA"/>
		<reference ref_id="1252069" ref_url="https://bugzilla.suse.com/1252069" source="BUGZILLA"/>
		<reference ref_id="1252070" ref_url="https://bugzilla.suse.com/1252070" source="BUGZILLA"/>
		<reference ref_id="1252072" ref_url="https://bugzilla.suse.com/1252072" source="BUGZILLA"/>
		<reference ref_id="1252074" ref_url="https://bugzilla.suse.com/1252074" source="BUGZILLA"/>
		<reference ref_id="1252075" ref_url="https://bugzilla.suse.com/1252075" source="BUGZILLA"/>
		<reference ref_id="1252076" ref_url="https://bugzilla.suse.com/1252076" source="BUGZILLA"/>
		<reference ref_id="1252078" ref_url="https://bugzilla.suse.com/1252078" source="BUGZILLA"/>
		<reference ref_id="1252079" ref_url="https://bugzilla.suse.com/1252079" source="BUGZILLA"/>
		<reference ref_id="1252081" ref_url="https://bugzilla.suse.com/1252081" source="BUGZILLA"/>
		<reference ref_id="1252082" ref_url="https://bugzilla.suse.com/1252082" source="BUGZILLA"/>
		<reference ref_id="1252083" ref_url="https://bugzilla.suse.com/1252083" source="BUGZILLA"/>
		<reference ref_id="1252253" ref_url="https://bugzilla.suse.com/1252253" source="BUGZILLA"/>
		<reference ref_id="1252265" ref_url="https://bugzilla.suse.com/1252265" source="BUGZILLA"/>
		<reference ref_id="1252267" ref_url="https://bugzilla.suse.com/1252267" source="BUGZILLA"/>
		<reference ref_id="1252270" ref_url="https://bugzilla.suse.com/1252270" source="BUGZILLA"/>
		<reference ref_id="1252330" ref_url="https://bugzilla.suse.com/1252330" source="BUGZILLA"/>
		<reference ref_id="1252333" ref_url="https://bugzilla.suse.com/1252333" source="BUGZILLA"/>
		<reference ref_id="1252336" ref_url="https://bugzilla.suse.com/1252336" source="BUGZILLA"/>
		<reference ref_id="1252346" ref_url="https://bugzilla.suse.com/1252346" source="BUGZILLA"/>
		<reference ref_id="1252348" ref_url="https://bugzilla.suse.com/1252348" source="BUGZILLA"/>
		<reference ref_id="1252349" ref_url="https://bugzilla.suse.com/1252349" source="BUGZILLA"/>
		<reference ref_id="1252678" ref_url="https://bugzilla.suse.com/1252678" source="BUGZILLA"/>
		<reference ref_id="1252679" ref_url="https://bugzilla.suse.com/1252679" source="BUGZILLA"/>
		<reference ref_id="1252688" ref_url="https://bugzilla.suse.com/1252688" source="BUGZILLA"/>
		<reference ref_id="1252725" ref_url="https://bugzilla.suse.com/1252725" source="BUGZILLA"/>
		<reference ref_id="1252734" ref_url="https://bugzilla.suse.com/1252734" source="BUGZILLA"/>
		<reference ref_id="1252772" ref_url="https://bugzilla.suse.com/1252772" source="BUGZILLA"/>
		<reference ref_id="1252774" ref_url="https://bugzilla.suse.com/1252774" source="BUGZILLA"/>
		<reference ref_id="1252780" ref_url="https://bugzilla.suse.com/1252780" source="BUGZILLA"/>
		<reference ref_id="1252785" ref_url="https://bugzilla.suse.com/1252785" source="BUGZILLA"/>
		<reference ref_id="1252787" ref_url="https://bugzilla.suse.com/1252787" source="BUGZILLA"/>
		<reference ref_id="1252789" ref_url="https://bugzilla.suse.com/1252789" source="BUGZILLA"/>
		<reference ref_id="1252797" ref_url="https://bugzilla.suse.com/1252797" source="BUGZILLA"/>
		<reference ref_id="1252819" ref_url="https://bugzilla.suse.com/1252819" source="BUGZILLA"/>
		<reference ref_id="1252822" ref_url="https://bugzilla.suse.com/1252822" source="BUGZILLA"/>
		<reference ref_id="1252826" ref_url="https://bugzilla.suse.com/1252826" source="BUGZILLA"/>
		<reference ref_id="1252841" ref_url="https://bugzilla.suse.com/1252841" source="BUGZILLA"/>
		<reference ref_id="1252848" ref_url="https://bugzilla.suse.com/1252848" source="BUGZILLA"/>
		<reference ref_id="1252849" ref_url="https://bugzilla.suse.com/1252849" source="BUGZILLA"/>
		<reference ref_id="1252850" ref_url="https://bugzilla.suse.com/1252850" source="BUGZILLA"/>
		<reference ref_id="1252851" ref_url="https://bugzilla.suse.com/1252851" source="BUGZILLA"/>
		<reference ref_id="1252854" ref_url="https://bugzilla.suse.com/1252854" source="BUGZILLA"/>
		<reference ref_id="1252858" ref_url="https://bugzilla.suse.com/1252858" source="BUGZILLA"/>
		<reference ref_id="1252862" ref_url="https://bugzilla.suse.com/1252862" source="BUGZILLA"/>
		<reference ref_id="1252865" ref_url="https://bugzilla.suse.com/1252865" source="BUGZILLA"/>
		<reference ref_id="1252866" ref_url="https://bugzilla.suse.com/1252866" source="BUGZILLA"/>
		<reference ref_id="1252873" ref_url="https://bugzilla.suse.com/1252873" source="BUGZILLA"/>
		<reference ref_id="1252902" ref_url="https://bugzilla.suse.com/1252902" source="BUGZILLA"/>
		<reference ref_id="1252909" ref_url="https://bugzilla.suse.com/1252909" source="BUGZILLA"/>
		<reference ref_id="1252915" ref_url="https://bugzilla.suse.com/1252915" source="BUGZILLA"/>
		<reference ref_id="1252918" ref_url="https://bugzilla.suse.com/1252918" source="BUGZILLA"/>
		<reference ref_id="1252921" ref_url="https://bugzilla.suse.com/1252921" source="BUGZILLA"/>
		<reference ref_id="1252939" ref_url="https://bugzilla.suse.com/1252939" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-21816" ref_url="https://www.suse.com/security/cve/CVE-2025-21816/" source="CVE"/>
		<reference ref_id="CVE-2025-38653" ref_url="https://www.suse.com/security/cve/CVE-2025-38653/" source="CVE"/>
		<reference ref_id="CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718/" source="CVE"/>
		<reference ref_id="CVE-2025-39676" ref_url="https://www.suse.com/security/cve/CVE-2025-39676/" source="CVE"/>
		<reference ref_id="CVE-2025-39702" ref_url="https://www.suse.com/security/cve/CVE-2025-39702/" source="CVE"/>
		<reference ref_id="CVE-2025-39756" ref_url="https://www.suse.com/security/cve/CVE-2025-39756/" source="CVE"/>
		<reference ref_id="CVE-2025-39779" ref_url="https://www.suse.com/security/cve/CVE-2025-39779/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39812" ref_url="https://www.suse.com/security/cve/CVE-2025-39812/" source="CVE"/>
		<reference ref_id="CVE-2025-39866" ref_url="https://www.suse.com/security/cve/CVE-2025-39866/" source="CVE"/>
		<reference ref_id="CVE-2025-39876" ref_url="https://www.suse.com/security/cve/CVE-2025-39876/" source="CVE"/>
		<reference ref_id="CVE-2025-39881" ref_url="https://www.suse.com/security/cve/CVE-2025-39881/" source="CVE"/>
		<reference ref_id="CVE-2025-39895" ref_url="https://www.suse.com/security/cve/CVE-2025-39895/" source="CVE"/>
		<reference ref_id="CVE-2025-39903" ref_url="https://www.suse.com/security/cve/CVE-2025-39903/" source="CVE"/>
		<reference ref_id="CVE-2025-39911" ref_url="https://www.suse.com/security/cve/CVE-2025-39911/" source="CVE"/>
		<reference ref_id="CVE-2025-39947" ref_url="https://www.suse.com/security/cve/CVE-2025-39947/" source="CVE"/>
		<reference ref_id="CVE-2025-39948" ref_url="https://www.suse.com/security/cve/CVE-2025-39948/" source="CVE"/>
		<reference ref_id="CVE-2025-39949" ref_url="https://www.suse.com/security/cve/CVE-2025-39949/" source="CVE"/>
		<reference ref_id="CVE-2025-39950" ref_url="https://www.suse.com/security/cve/CVE-2025-39950/" source="CVE"/>
		<reference ref_id="CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955/" source="CVE"/>
		<reference ref_id="CVE-2025-39956" ref_url="https://www.suse.com/security/cve/CVE-2025-39956/" source="CVE"/>
		<reference ref_id="CVE-2025-39963" ref_url="https://www.suse.com/security/cve/CVE-2025-39963/" source="CVE"/>
		<reference ref_id="CVE-2025-39965" ref_url="https://www.suse.com/security/cve/CVE-2025-39965/" source="CVE"/>
		<reference ref_id="CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967/" source="CVE"/>
		<reference ref_id="CVE-2025-39968" ref_url="https://www.suse.com/security/cve/CVE-2025-39968/" source="CVE"/>
		<reference ref_id="CVE-2025-39969" ref_url="https://www.suse.com/security/cve/CVE-2025-39969/" source="CVE"/>
		<reference ref_id="CVE-2025-39970" ref_url="https://www.suse.com/security/cve/CVE-2025-39970/" source="CVE"/>
		<reference ref_id="CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971/" source="CVE"/>
		<reference ref_id="CVE-2025-39972" ref_url="https://www.suse.com/security/cve/CVE-2025-39972/" source="CVE"/>
		<reference ref_id="CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973/" source="CVE"/>
		<reference ref_id="CVE-2025-39978" ref_url="https://www.suse.com/security/cve/CVE-2025-39978/" source="CVE"/>
		<reference ref_id="CVE-2025-39979" ref_url="https://www.suse.com/security/cve/CVE-2025-39979/" source="CVE"/>
		<reference ref_id="CVE-2025-39981" ref_url="https://www.suse.com/security/cve/CVE-2025-39981/" source="CVE"/>
		<reference ref_id="CVE-2025-39982" ref_url="https://www.suse.com/security/cve/CVE-2025-39982/" source="CVE"/>
		<reference ref_id="CVE-2025-39984" ref_url="https://www.suse.com/security/cve/CVE-2025-39984/" source="CVE"/>
		<reference ref_id="CVE-2025-39985" ref_url="https://www.suse.com/security/cve/CVE-2025-39985/" source="CVE"/>
		<reference ref_id="CVE-2025-39986" ref_url="https://www.suse.com/security/cve/CVE-2025-39986/" source="CVE"/>
		<reference ref_id="CVE-2025-39987" ref_url="https://www.suse.com/security/cve/CVE-2025-39987/" source="CVE"/>
		<reference ref_id="CVE-2025-39988" ref_url="https://www.suse.com/security/cve/CVE-2025-39988/" source="CVE"/>
		<reference ref_id="CVE-2025-39991" ref_url="https://www.suse.com/security/cve/CVE-2025-39991/" source="CVE"/>
		<reference ref_id="CVE-2025-39992" ref_url="https://www.suse.com/security/cve/CVE-2025-39992/" source="CVE"/>
		<reference ref_id="CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993/" source="CVE"/>
		<reference ref_id="CVE-2025-39994" ref_url="https://www.suse.com/security/cve/CVE-2025-39994/" source="CVE"/>
		<reference ref_id="CVE-2025-39995" ref_url="https://www.suse.com/security/cve/CVE-2025-39995/" source="CVE"/>
		<reference ref_id="CVE-2025-39996" ref_url="https://www.suse.com/security/cve/CVE-2025-39996/" source="CVE"/>
		<reference ref_id="CVE-2025-39997" ref_url="https://www.suse.com/security/cve/CVE-2025-39997/" source="CVE"/>
		<reference ref_id="CVE-2025-40000" ref_url="https://www.suse.com/security/cve/CVE-2025-40000/" source="CVE"/>
		<reference ref_id="CVE-2025-40005" ref_url="https://www.suse.com/security/cve/CVE-2025-40005/" source="CVE"/>
		<reference ref_id="CVE-2025-40009" ref_url="https://www.suse.com/security/cve/CVE-2025-40009/" source="CVE"/>
		<reference ref_id="CVE-2025-40011" ref_url="https://www.suse.com/security/cve/CVE-2025-40011/" source="CVE"/>
		<reference ref_id="CVE-2025-40012" ref_url="https://www.suse.com/security/cve/CVE-2025-40012/" source="CVE"/>
		<reference ref_id="CVE-2025-40013" ref_url="https://www.suse.com/security/cve/CVE-2025-40013/" source="CVE"/>
		<reference ref_id="CVE-2025-40016" ref_url="https://www.suse.com/security/cve/CVE-2025-40016/" source="CVE"/>
		<reference ref_id="CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018/" source="CVE"/>
		<reference ref_id="CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019/" source="CVE"/>
		<reference ref_id="CVE-2025-40020" ref_url="https://www.suse.com/security/cve/CVE-2025-40020/" source="CVE"/>
		<reference ref_id="CVE-2025-40029" ref_url="https://www.suse.com/security/cve/CVE-2025-40029/" source="CVE"/>
		<reference ref_id="CVE-2025-40032" ref_url="https://www.suse.com/security/cve/CVE-2025-40032/" source="CVE"/>
		<reference ref_id="CVE-2025-40035" ref_url="https://www.suse.com/security/cve/CVE-2025-40035/" source="CVE"/>
		<reference ref_id="CVE-2025-40036" ref_url="https://www.suse.com/security/cve/CVE-2025-40036/" source="CVE"/>
		<reference ref_id="CVE-2025-40037" ref_url="https://www.suse.com/security/cve/CVE-2025-40037/" source="CVE"/>
		<reference ref_id="CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040/" source="CVE"/>
		<reference ref_id="CVE-2025-40043" ref_url="https://www.suse.com/security/cve/CVE-2025-40043/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048/" source="CVE"/>
		<reference ref_id="CVE-2025-40049" ref_url="https://www.suse.com/security/cve/CVE-2025-40049/" source="CVE"/>
		<reference ref_id="CVE-2025-40051" ref_url="https://www.suse.com/security/cve/CVE-2025-40051/" source="CVE"/>
		<reference ref_id="CVE-2025-40052" ref_url="https://www.suse.com/security/cve/CVE-2025-40052/" source="CVE"/>
		<reference ref_id="CVE-2025-40056" ref_url="https://www.suse.com/security/cve/CVE-2025-40056/" source="CVE"/>
		<reference ref_id="CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058/" source="CVE"/>
		<reference ref_id="CVE-2025-40060" ref_url="https://www.suse.com/security/cve/CVE-2025-40060/" source="CVE"/>
		<reference ref_id="CVE-2025-40061" ref_url="https://www.suse.com/security/cve/CVE-2025-40061/" source="CVE"/>
		<reference ref_id="CVE-2025-40062" ref_url="https://www.suse.com/security/cve/CVE-2025-40062/" source="CVE"/>
		<reference ref_id="CVE-2025-40071" ref_url="https://www.suse.com/security/cve/CVE-2025-40071/" source="CVE"/>
		<reference ref_id="CVE-2025-40078" ref_url="https://www.suse.com/security/cve/CVE-2025-40078/" source="CVE"/>
		<reference ref_id="CVE-2025-40080" ref_url="https://www.suse.com/security/cve/CVE-2025-40080/" source="CVE"/>
		<reference ref_id="CVE-2025-40085" ref_url="https://www.suse.com/security/cve/CVE-2025-40085/" source="CVE"/>
		<reference ref_id="CVE-2025-40087" ref_url="https://www.suse.com/security/cve/CVE-2025-40087/" source="CVE"/>
		<reference ref_id="CVE-2025-40091" ref_url="https://www.suse.com/security/cve/CVE-2025-40091/" source="CVE"/>
		<reference ref_id="CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096/" source="CVE"/>
		<reference ref_id="CVE-2025-40100" ref_url="https://www.suse.com/security/cve/CVE-2025-40100/" source="CVE"/>
		<reference ref_id="CVE-2025-40104" ref_url="https://www.suse.com/security/cve/CVE-2025-40104/" source="CVE"/>
		<reference ref_id="CVE-2025-40364" ref_url="https://www.suse.com/security/cve/CVE-2025-40364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-21816: hrtimers: Force migrate away hrtimers queued after (bsc#1238472).
- CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630).
- CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161).
- CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302).
- CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317).
- CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512).
- CVE-2025-39779: btrfs: subpage: keep TOWRITE tag until folio is cleaned (bsc#1249495).
- CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202).
- CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455).
- CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400).
- CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379).
- CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721).
- CVE-2025-39903: of_numa: fix uninitialized memory nodes causing kernel panic (bsc#1250749).
- CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704).
- CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232).
- CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233).
- CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177).
- CVE-2025-39950: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR (bsc#1251176).
- CVE-2025-39955: tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect() (bsc#1251804).
- CVE-2025-39956: igc: don't fail igc_probe() on LED setup error (bsc#1251809).
- CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251819).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044).
- CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051).
- CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052).
- CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-39979: net/mlx5: fs, add API for sharing HWS action by refcount (bsc#1252067).
- CVE-2025-39984: net: tun: Update napi-&gt;skb after XDP process (bsc#1252081).
- CVE-2025-39992: mm: swap: check for stable address space before operating on the VMA (bsc#1252076).
- CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062).
- CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349).
- CVE-2025-40012: net/smc: fix warning in smc_rx_splice() when calling get_page() (bsc#1252330).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).
- CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858).
- CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826).
- CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848).
- CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789).
- CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).
- CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918).

The following non security issues were fixed:

- add bug reference to existing hv_netvsc change (bsc#1252265)
- amd-pstate-ut: Reset amd-pstate driver mode after running selftests (bsc#1249226).
- cgroup/cpuset: Remove remote_partition_check() &amp; make update_cpumasks_hier() handle remote partition (bsc#1241166).
- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).
- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).
- doc/README.SUSE: Correct the character used for TAINT_NO_SUPPORT
  The character was previously 'N', but upstream used it for TAINT_TEST,
  which prompted the change of TAINT_NO_SUPPORT to 'n'.
- dpll: zl3073x: Add firmware loading functionality (bsc#1252253).
- dpll: zl3073x: Add functions to access hardware registers (bsc#1252253).
- dpll: zl3073x: Add low-level flash functions (bsc#1252253).
- dpll: zl3073x: Add support to get fractional frequency offset (bsc#1252253).
- dpll: zl3073x: Add support to get phase offset on connected input pin (bsc#1252253).
- dpll: zl3073x: Add support to get/set esync on pins (bsc#1252253).
- dpll: zl3073x: Fix double free in zl3073x_devlink_flash_update() (bsc#1252253).
- dpll: zl3073x: Handle missing or corrupted flash configuration (bsc#1252253).
- dpll: zl3073x: Implement devlink flash callback (bsc#1252253).
- dpll: zl3073x: Increase maximum size of flash utility (bsc#1252253).
- dpll: zl3073x: Refactor DPLL initialization (bsc#1252253).
- drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes).
- drm/xe/guc: Prepare GuC register list and update ADS size for error capture (stable-fixes).
- ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd (bsc#1247222).
- ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation (bsc#1247222).
- ixgbevf: fix getting link speed data for E610 devices (bsc#1247222).
- ixgbevf: fix mailbox API compatibility by negotiating supported features (bsc#1247222).
- kbuild/modfinal: Link livepatches with module-common.o (bsc#1218644, bsc#1252270).
- kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939).
- kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930).
- nvme-auth: update sc_c in host response (git-fixes bsc#1249397).
- perf hwmon_pmu: Fix uninitialized variable warning (perf-sle16-v6.13-userspace-update, git-fixes).
- phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes).
- powerpc/fadump: skip parameter area allocation when fadump is disabled (jsc#PED-9891 git-fixes).
- proc: fix missing pde_set_flags() for net proc files (bsc#1248630)
- proc: fix type confusion in pde_set_flags() (bsc#1248630)
- rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too (bsc#1250946)
- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).
- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1252725).
- x86/resctrl: Fix miscount of bandwidth event when reactivating previously unavailable RMID (bsc#1252734).
- x86/resctrl: Refactor resctrl_arch_rmid_read() (bsc#1252734).
- x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL (jsc#PED-348).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2025-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238472">SUSE bug 1238472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239206">SUSE bug 1239206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241166">SUSE bug 1241166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241637">SUSE bug 1241637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247222">SUSE bug 1247222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248630">SUSE bug 1248630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249161">SUSE bug 1249161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249226">SUSE bug 1249226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249302">SUSE bug 1249302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249317">SUSE bug 1249317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249397">SUSE bug 1249397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249398">SUSE bug 1249398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249495">SUSE bug 1249495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249512">SUSE bug 1249512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249735">SUSE bug 1249735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250202">SUSE bug 1250202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250379">SUSE bug 1250379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250400">SUSE bug 1250400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250455">SUSE bug 1250455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250491">SUSE bug 1250491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250704">SUSE bug 1250704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250721">SUSE bug 1250721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250749">SUSE bug 1250749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250946">SUSE bug 1250946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251176">SUSE bug 1251176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251177">SUSE bug 1251177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251232">SUSE bug 1251232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251233">SUSE bug 1251233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251804">SUSE bug 1251804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251809">SUSE bug 1251809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251819">SUSE bug 1251819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251930">SUSE bug 1251930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251967">SUSE bug 1251967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252039">SUSE bug 1252039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252044">SUSE bug 1252044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252047">SUSE bug 1252047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252051">SUSE bug 1252051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252052">SUSE bug 1252052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252056">SUSE bug 1252056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252060">SUSE bug 1252060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252062">SUSE bug 1252062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252064">SUSE bug 1252064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252065">SUSE bug 1252065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252067">SUSE bug 1252067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252069">SUSE bug 1252069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252070">SUSE bug 1252070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252072">SUSE bug 1252072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252074">SUSE bug 1252074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252075">SUSE bug 1252075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252076">SUSE bug 1252076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252078">SUSE bug 1252078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252079">SUSE bug 1252079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252081">SUSE bug 1252081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252082">SUSE bug 1252082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252083">SUSE bug 1252083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252253">SUSE bug 1252253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252265">SUSE bug 1252265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252267">SUSE bug 1252267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252270">SUSE bug 1252270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252330">SUSE bug 1252330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252333">SUSE bug 1252333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252336">SUSE bug 1252336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252346">SUSE bug 1252346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252348">SUSE bug 1252348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252349">SUSE bug 1252349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252678">SUSE bug 1252678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252679">SUSE bug 1252679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252688">SUSE bug 1252688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252725">SUSE bug 1252725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252734">SUSE bug 1252734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252772">SUSE bug 1252772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252774">SUSE bug 1252774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252780">SUSE bug 1252780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252787">SUSE bug 1252787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252789">SUSE bug 1252789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252797">SUSE bug 1252797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252819">SUSE bug 1252819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252822">SUSE bug 1252822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252826">SUSE bug 1252826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252841">SUSE bug 1252841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252848">SUSE bug 1252848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252849">SUSE bug 1252849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252850">SUSE bug 1252850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252851">SUSE bug 1252851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252854">SUSE bug 1252854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252858">SUSE bug 1252858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252862">SUSE bug 1252862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252865">SUSE bug 1252865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252866">SUSE bug 1252866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252873">SUSE bug 1252873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252902">SUSE bug 1252902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252909">SUSE bug 1252909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252915">SUSE bug 1252915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252918">SUSE bug 1252918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252921">SUSE bug 1252921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252939">SUSE bug 1252939</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21816/">CVE-2025-21816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21816">CVE-2025-21816 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38653/">CVE-2025-38653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39676/">CVE-2025-39676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39702/">CVE-2025-39702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39756/">CVE-2025-39756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39779/">CVE-2025-39779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39779">CVE-2025-39779 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39812/">CVE-2025-39812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39812">CVE-2025-39812 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39866/">CVE-2025-39866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39866">CVE-2025-39866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39876/">CVE-2025-39876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39876">CVE-2025-39876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39881/">CVE-2025-39881 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39895/">CVE-2025-39895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39895">CVE-2025-39895 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39903/">CVE-2025-39903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39903">CVE-2025-39903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39911/">CVE-2025-39911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911">CVE-2025-39911 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39947/">CVE-2025-39947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947">CVE-2025-39947 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39948/">CVE-2025-39948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39948">CVE-2025-39948 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39949/">CVE-2025-39949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949">CVE-2025-39949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39950/">CVE-2025-39950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39950">CVE-2025-39950 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39956/">CVE-2025-39956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39956">CVE-2025-39956 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39963/">CVE-2025-39963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39965/">CVE-2025-39965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39965">CVE-2025-39965 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39968/">CVE-2025-39968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39968">CVE-2025-39968 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39969/">CVE-2025-39969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39969">CVE-2025-39969 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39970/">CVE-2025-39970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39970">CVE-2025-39970 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39972/">CVE-2025-39972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39972">CVE-2025-39972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39978/">CVE-2025-39978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39978">CVE-2025-39978 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39979/">CVE-2025-39979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39979">CVE-2025-39979 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39981/">CVE-2025-39981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39981">CVE-2025-39981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39982/">CVE-2025-39982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39982">CVE-2025-39982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39984/">CVE-2025-39984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39984">CVE-2025-39984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39985/">CVE-2025-39985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39985">CVE-2025-39985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39986/">CVE-2025-39986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39986">CVE-2025-39986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39987/">CVE-2025-39987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39987">CVE-2025-39987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39988/">CVE-2025-39988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39988">CVE-2025-39988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39991/">CVE-2025-39991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39991">CVE-2025-39991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39992/">CVE-2025-39992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39992">CVE-2025-39992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39994/">CVE-2025-39994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39994">CVE-2025-39994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39995/">CVE-2025-39995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39996/">CVE-2025-39996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39996">CVE-2025-39996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39997/">CVE-2025-39997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39997">CVE-2025-39997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40000/">CVE-2025-40000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40005/">CVE-2025-40005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40005">CVE-2025-40005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40009/">CVE-2025-40009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40009">CVE-2025-40009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40011/">CVE-2025-40011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40011">CVE-2025-40011 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40012/">CVE-2025-40012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40012">CVE-2025-40012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40013/">CVE-2025-40013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40013">CVE-2025-40013 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40016/">CVE-2025-40016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40016">CVE-2025-40016 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40020/">CVE-2025-40020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40020">CVE-2025-40020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40029/">CVE-2025-40029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40032/">CVE-2025-40032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40035/">CVE-2025-40035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40036/">CVE-2025-40036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40037/">CVE-2025-40037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40043/">CVE-2025-40043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40049/">CVE-2025-40049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40051/">CVE-2025-40051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40052/">CVE-2025-40052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40056/">CVE-2025-40056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40060/">CVE-2025-40060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40061/">CVE-2025-40061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40062/">CVE-2025-40062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40071/">CVE-2025-40071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40078/">CVE-2025-40078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40080/">CVE-2025-40080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40085/">CVE-2025-40085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40087/">CVE-2025-40087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40091/">CVE-2025-40091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40091">CVE-2025-40091 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40100/">CVE-2025-40100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40104/">CVE-2025-40104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40364/">CVE-2025-40364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40364">CVE-2025-40364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032873" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032874" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032875" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032873" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032874" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032875" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94598" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251958" ref_url="https://bugzilla.suse.com/1251958" source="BUGZILLA"/>
		<reference ref_id="1251959" ref_url="https://bugzilla.suse.com/1251959" source="BUGZILLA"/>
		<reference ref_id="1251960" ref_url="https://bugzilla.suse.com/1251960" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

- CVE-2025-62229: Fixed use-after-free in XPresentNotify structures creation (bsc#1251958).
- CVE-2025-62230: Fixed use-after-free in Xkb client resource removal (bsc#1251959).
- CVE-2025-62231: Fixed value overflow in Xkb extension XkbSetCompatMap() (bsc#1251960).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1251958">SUSE bug 1251958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251959">SUSE bug 1251959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251960">SUSE bug 1251960</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032041" comment="xwayland-24.1.6-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032042" comment="xwayland-devel-24.1.6-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032041" comment="xwayland-24.1.6-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032042" comment="xwayland-devel-24.1.6-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94599" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253278" ref_url="https://bugzilla.suse.com/1253278" source="BUGZILLA"/>
		<reference ref_id="1253642" ref_url="https://bugzilla.suse.com/1253642" source="BUGZILLA"/>
		<reference ref_id="1253703" ref_url="https://bugzilla.suse.com/1253703" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12748" ref_url="https://www.suse.com/security/cve/CVE-2025-12748/" source="CVE"/>
		<reference ref_id="CVE-2025-13193" ref_url="https://www.suse.com/security/cve/CVE-2025-13193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023509.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:


- CVE-2025-13193: Fixed Information disclosure via world-readable VM snapshots (bsc#1253703)
- CVE-2025-12748: Fixed Denial of service in XML parsing (bsc#1253278)

Other fixes:

- spec: Adjust dbus dependency (bsc#1253642)
- qemu: Add support for Intel TDX (jsc#PED-9265)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1253278">SUSE bug 1253278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253642">SUSE bug 1253642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253703">SUSE bug 1253703</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12748/">CVE-2025-12748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12748">CVE-2025-12748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13193/">CVE-2025-13193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13193">CVE-2025-13193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032044" comment="libvirt-client-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032045" comment="libvirt-client-qemu-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032046" comment="libvirt-daemon-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032047" comment="libvirt-daemon-common-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032048" comment="libvirt-daemon-config-network-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032049" comment="libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032050" comment="libvirt-daemon-driver-network-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032051" comment="libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032052" comment="libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032053" comment="libvirt-daemon-driver-qemu-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032054" comment="libvirt-daemon-driver-secret-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032055" comment="libvirt-daemon-driver-storage-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032056" comment="libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032057" comment="libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032058" comment="libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032059" comment="libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032060" comment="libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032061" comment="libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032062" comment="libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032063" comment="libvirt-daemon-hooks-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032064" comment="libvirt-daemon-lock-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032065" comment="libvirt-daemon-log-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032066" comment="libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032067" comment="libvirt-daemon-proxy-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032068" comment="libvirt-daemon-qemu-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032069" comment="libvirt-devel-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032070" comment="libvirt-doc-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032071" comment="libvirt-libs-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032072" comment="libvirt-nss-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032073" comment="libvirt-ssh-proxy-11.4.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032044" comment="libvirt-client-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032045" comment="libvirt-client-qemu-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032046" comment="libvirt-daemon-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032047" comment="libvirt-daemon-common-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032048" comment="libvirt-daemon-config-network-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032049" comment="libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032050" comment="libvirt-daemon-driver-network-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032051" comment="libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032052" comment="libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032053" comment="libvirt-daemon-driver-qemu-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032054" comment="libvirt-daemon-driver-secret-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032055" comment="libvirt-daemon-driver-storage-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032056" comment="libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032057" comment="libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032058" comment="libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032059" comment="libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032060" comment="libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032061" comment="libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032062" comment="libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032063" comment="libvirt-daemon-hooks-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032064" comment="libvirt-daemon-lock-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032065" comment="libvirt-daemon-log-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032066" comment="libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032067" comment="libvirt-daemon-proxy-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032068" comment="libvirt-daemon-qemu-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032069" comment="libvirt-devel-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032070" comment="libvirt-doc-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032071" comment="libvirt-libs-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032072" comment="libvirt-nss-11.4.0-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032073" comment="libvirt-ssh-proxy-11.4.0-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94600" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252753" ref_url="https://bugzilla.suse.com/1252753" source="BUGZILLA"/>
		<reference ref_id="1252756" ref_url="https://bugzilla.suse.com/1252756" source="BUGZILLA"/>
		<reference ref_id="1252905" ref_url="https://bugzilla.suse.com/1252905" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<reference ref_id="CVE-2025-55754" ref_url="https://www.suse.com/security/cve/CVE-2025-55754/" source="CVE"/>
		<reference ref_id="CVE-2025-61795" ref_url="https://www.suse.com/security/cve/CVE-2025-61795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023508.html" source="SUSE-SU"/>
		<description>
This update for tomcat11 fixes the following issues:

Update to Tomcat 11.0.13:

- CVE-2025-55752: Fixed directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753).
- CVE-2025-55754: Fixed Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat (bsc#1252905).
- CVE-2025-61795: Fixed temporary copies during the processing of multipart upload can lead to a denial of service (bsc#1252756).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252753">SUSE bug 1252753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252756">SUSE bug 1252756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252905">SUSE bug 1252905</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55754/">CVE-2025-55754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55754">CVE-2025-55754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61795/">CVE-2025-61795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61795">CVE-2025-61795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032075" comment="tomcat11-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032076" comment="tomcat11-admin-webapps-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032077" comment="tomcat11-doc-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032078" comment="tomcat11-docs-webapp-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032079" comment="tomcat11-el-6_0-api-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032080" comment="tomcat11-embed-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032081" comment="tomcat11-jsp-4_0-api-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032082" comment="tomcat11-jsvc-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032083" comment="tomcat11-lib-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032084" comment="tomcat11-servlet-6_1-api-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032085" comment="tomcat11-webapps-11.0.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032075" comment="tomcat11-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032076" comment="tomcat11-admin-webapps-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032077" comment="tomcat11-doc-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032078" comment="tomcat11-docs-webapp-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032079" comment="tomcat11-el-6_0-api-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032080" comment="tomcat11-embed-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032081" comment="tomcat11-jsp-4_0-api-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032082" comment="tomcat11-jsvc-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032083" comment="tomcat11-lib-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032084" comment="tomcat11-servlet-6_1-api-11.0.13-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032085" comment="tomcat11-webapps-11.0.13-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94601" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot24 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1252839" ref_url="https://bugzilla.suse.com/1252839" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-30189" ref_url="https://www.suse.com/security/cve/CVE-2025-30189/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023506.html" source="SUSE-SU"/>
		<description>
This update for dovecot24 fixes the following issues:

- Update dovecot to 2.4.2:
  - CVE-2025-30189: Fixed users cached with same cache key when
    auth cache was enabled (bsc#1252839)
  - Changes
    - auth: Remove proxy_always field.
    - config: Change settings history parsing to use python3.
    - doveadm: Print table formatter - Print empty values as "-".
    - imapc: Propagate remote error codes properly.
    - lda: Default mail_home=$HOME environment if not using userdb
      lookup
    - lib-dcrypt: Salt for new version 2 keys has been increased to
      16 bytes.
    - lib-dregex: Add libpcre2 based regular expression support to
      Dovecot, if the library is missing, disable all regular
      expressions. This adds libpcre2-32 as build dependency.
    - lib-oauth2: jwt - Allow nbf and iat to point 1 second into
      future.
    - lib: Replace libicu with our own unicode library. Removes
      libicu as build dependency.
    - login-common: If proxying fails due to remote having invalid
      SSL cert, don't reconnect.
  - New features
    - auth: Add ssl_client_cert_fp and ssl_client_cert_pubkey_fp
      fields
    - config: Add support for $SET:filter/path/setting.
    - config: Improve @group includes to work with overwriting
      their settings.
    - doveadm kick: Add support for kicking multiple usernames
    - doveadm mailbox status: Add support for deleted status item.
    - imap, imap-client: Add experimental partial IMAP4rev2
      support.
    - imap: Implement support for UTF8=ACCEPT for APPEND
    - lib-oauth2, oauth2: Add oauth2_token_expire_grace setting.
    - lmtp: lmtp-client - Support command pipelining.
    - login-common: Support local/remote blocks better.
    - master: accept() unix/inet connections before creating child
      process to handle it. This reduces timeouts when child
      processes are slow to spawn themselves.
  - Bug fixes
    - SMTPUTF8 was accepted even when it wasn't enabled.
    - auth, *-login: Direct logging with -L parameter was not
      working.
    - auth: Crash occured when OAUTH token validation failed with
      oauth2_use_worker_with_mech=yes.
    - auth: Invalid field handling crashes were fixed.
    - auth: ldap - Potential crash could happen at deinit.
    - auth: mech-gssapi - Server sending empty initial response
      would cause errors.
    - auth: mech-winbind - GSS-SPNEGO mechanism was erroneously
      marked as
    - not accepting NUL.
    - config: Multiple issues with $SET handling has been fixed.
    - configure: Building without LDAP didn't work.
    - doveadm: If source user didn't exist, a crash would occur.
    - imap, pop3, submission, imap-urlauth: USER environment usage
      was broken when running standalone.
    - imap-hibernate: Statistics would get truncated on
      unhibernation.
    - imap: "SEARCH MIMEPART FILENAME ENDS" command could have
      accessed memory outside allocated buffer, resulting in a
      crash.
    - imapc: Fetching partial headers would cause other cached
      headers to be cached empty, breaking e.g. imap envelope
      responses when caching to disk.
    - imapc: Shared namespace's INBOX mailbox was not always
      uppercased.
    - imapc: imapc_features=guid-forced GUID generation was not
      working correctly.
    - lda: USER environment was not accepted if -d hasn't been
      specified.
    - lib-http: http-url - Significant path percent encoding
      through parse and create was not preserved. This is mainly
      important for Dovecot's Lua bindings for lib-http.
    - lib-settings: Crash would occur when using %variables in
      SET_FILE type settings.
    - lib-storage: Attachment flags were attempted to be added for
      readonly mailboxes with mail_attachment_flags=add-flags.
    - lib-storage: Root directory for unusable shared namespaces
      was unnecessarily attempted to be created.
    - lib: Crash would occur when config was reloaded and logging
      to syslog.
    - login-common: Crash might have occured when login proxy was
      destroyed.
    - sqlite: The sqlite_journal_mode=wal setting didn't actually
      do anything.
    - Many other bugs have been fixed.
- Update pigeonhole to 2.4.2
  - Changes
    - lib-sieve: Use new regular expression library in core.
    - managesieve: Add default
      service_extra_groups=$SET:default_internal_group.
  - New features
    - lib-sieve: Add support for "extlists" extension.
    - lib-sieve: regex - Allow unicode comparator.
  - Bug fixes
    - lib-sieve-tool: sieve-tool - All sieve_script settings were
      overriden.
    - lib-sieve: storage: dict: sieve_script_dict filter was
      missing from settings.
    - sieve-ldap-storage: Fix compile without LDAP.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1252839">SUSE bug 1252839</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30189/">CVE-2025-30189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30189">CVE-2025-30189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032086" comment="dovecot24-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032087" comment="dovecot24-backend-mysql-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032088" comment="dovecot24-backend-pgsql-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032089" comment="dovecot24-backend-sqlite-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032090" comment="dovecot24-devel-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032091" comment="dovecot24-fts-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032093" comment="dovecot24-fts-solr-2.4.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032086" comment="dovecot24-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032087" comment="dovecot24-backend-mysql-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032088" comment="dovecot24-backend-pgsql-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032089" comment="dovecot24-backend-sqlite-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032090" comment="dovecot24-devel-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032091" comment="dovecot24-fts-2.4.2-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032093" comment="dovecot24-fts-solr-2.4.2-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94602" version="1" class="patch">
	<metadata>
		<title>Security update for himmelblau (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1249013" ref_url="https://bugzilla.suse.com/1249013" source="BUGZILLA"/>
		<reference ref_id="1250687" ref_url="https://bugzilla.suse.com/1250687" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160/" source="CVE"/>
		<reference ref_id="CVE-2025-59044" ref_url="https://www.suse.com/security/cve/CVE-2025-59044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023507.html" source="SUSE-SU"/>
		<description>
This update for himmelblau fixes the following issues:

- Update to version 0.9.23+git.0.9776141:
  * CVE-2025-59044: Fixed GID collision of same-name groups allowing privilege escalation (bsc#1250687)
  * deps(rust): bump the all-cargo-updates group
  * CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249013)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249013">SUSE bug 1249013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250687">SUSE bug 1250687</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-59044/">CVE-2025-59044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59044">CVE-2025-59044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032094" comment="himmelblau-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032095" comment="himmelblau-qr-greeter-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032096" comment="himmelblau-sshd-config-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032097" comment="himmelblau-sso-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032098" comment="libnss_himmelblau2-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032099" comment="pam-himmelblau-0.9.23+git.0.9776141-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032094" comment="himmelblau-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032095" comment="himmelblau-qr-greeter-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032096" comment="himmelblau-sshd-config-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032097" comment="himmelblau-sso-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032098" comment="libnss_himmelblau2-0.9.23+git.0.9776141-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032099" comment="pam-himmelblau-0.9.23+git.0.9776141-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94603" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251198" ref_url="https://bugzilla.suse.com/1251198" source="BUGZILLA"/>
		<reference ref_id="1251199" ref_url="https://bugzilla.suse.com/1251199" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61984" ref_url="https://www.suse.com/security/cve/CVE-2025-61984/" source="CVE"/>
		<reference ref_id="CVE-2025-61985" ref_url="https://www.suse.com/security/cve/CVE-2025-61985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

 - CVE-2025-61984: code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198).
 - CVE-2025-61985: code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1251198">SUSE bug 1251198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251199">SUSE bug 1251199</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61984/">CVE-2025-61984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984">CVE-2025-61984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61985/">CVE-2025-61985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985">CVE-2025-61985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032319" comment="openssh-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032320" comment="openssh-askpass-gnome-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032321" comment="openssh-cavs-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032322" comment="openssh-clients-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032323" comment="openssh-common-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032324" comment="openssh-helpers-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032325" comment="openssh-server-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032326" comment="openssh-server-config-rootlogin-10.0p2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032319" comment="openssh-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032320" comment="openssh-askpass-gnome-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032321" comment="openssh-cavs-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032322" comment="openssh-clients-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032323" comment="openssh-common-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032324" comment="openssh-helpers-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032325" comment="openssh-server-10.0p2-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032326" comment="openssh-server-config-rootlogin-10.0p2-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94604" version="1" class="patch">
	<metadata>
		<title>Security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246806" ref_url="https://bugzilla.suse.com/1246806" source="BUGZILLA"/>
		<reference ref_id="1252414" ref_url="https://bugzilla.suse.com/1252414" source="BUGZILLA"/>
		<reference ref_id="1252417" ref_url="https://bugzilla.suse.com/1252417" source="BUGZILLA"/>
		<reference ref_id="1252418" ref_url="https://bugzilla.suse.com/1252418" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<reference ref_id="CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<description>
This update for java-21-openjdk fixes the following issues:

Update to upstream tag jdk-21.0.9+10 (October 2025 CPU):

- CVE-2025-53066: Fixed enhance path factories (bsc#1252417).
- CVE-2025-61748: Fixed enhance string handling (bsc#1252418).
- CVE-2025-53057: Fixed enhance certificate handling (bsc#1252414).

Other bug fixes:

- Do not embed rebuild counter (bsc#1246806)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246806">SUSE bug 1246806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252414">SUSE bug 1252414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252417">SUSE bug 1252417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252418">SUSE bug 1252418</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032327" comment="java-21-openjdk-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032328" comment="java-21-openjdk-demo-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032329" comment="java-21-openjdk-devel-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032330" comment="java-21-openjdk-headless-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032331" comment="java-21-openjdk-javadoc-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032332" comment="java-21-openjdk-jmods-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032333" comment="java-21-openjdk-src-21.0.9.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032327" comment="java-21-openjdk-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032328" comment="java-21-openjdk-demo-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032329" comment="java-21-openjdk-devel-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032330" comment="java-21-openjdk-headless-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032331" comment="java-21-openjdk-javadoc-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032332" comment="java-21-openjdk-jmods-21.0.9.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032333" comment="java-21-openjdk-src-21.0.9.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94605" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1246806" ref_url="https://bugzilla.suse.com/1246806" source="BUGZILLA"/>
		<reference ref_id="1252414" ref_url="https://bugzilla.suse.com/1252414" source="BUGZILLA"/>
		<reference ref_id="1252417" ref_url="https://bugzilla.suse.com/1252417" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023503.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

Upgrade to upstream tag jdk-17.0.17+10 (October 2025 CPU):

- CVE-2025-53066: Fixed enhance path factories (bsc#1252417).
- CVE-2025-53057: Fixed enhance certificate handling (bsc#1252414).

Other bug fixes:

- Do not embed rebuild counter (bsc#1246806).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246806">SUSE bug 1246806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252414">SUSE bug 1252414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252417">SUSE bug 1252417</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032334" comment="java-17-openjdk-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032335" comment="java-17-openjdk-demo-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032336" comment="java-17-openjdk-devel-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032337" comment="java-17-openjdk-headless-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032338" comment="java-17-openjdk-javadoc-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032339" comment="java-17-openjdk-jmods-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032340" comment="java-17-openjdk-src-17.0.17.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032334" comment="java-17-openjdk-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032335" comment="java-17-openjdk-demo-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032336" comment="java-17-openjdk-devel-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032337" comment="java-17-openjdk-headless-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032338" comment="java-17-openjdk-javadoc-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032339" comment="java-17-openjdk-jmods-17.0.17.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032340" comment="java-17-openjdk-src-17.0.17.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94606" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1251941" ref_url="https://bugzilla.suse.com/1251941" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-62291" ref_url="https://www.suse.com/security/cve/CVE-2025-62291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023502.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2025-62291: Fixed buffer overflow when handling EAP-MSCHAPv2 failure requests (bsc#1251941).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2025-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1251941">SUSE bug 1251941</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-62291/">CVE-2025-62291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62291">CVE-2025-62291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032401" comment="strongswan-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032402" comment="strongswan-doc-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032403" comment="strongswan-fips-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032404" comment="strongswan-ipsec-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032405" comment="strongswan-mysql-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032406" comment="strongswan-nm-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032407" comment="strongswan-sqlite-6.0.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032401" comment="strongswan-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032402" comment="strongswan-doc-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032403" comment="strongswan-fips-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032404" comment="strongswan-ipsec-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032405" comment="strongswan-mysql-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032406" comment="strongswan-nm-6.0.1-160000.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032407" comment="strongswan-sqlite-6.0.1-160000.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94607" version="1" class="patch">
	<metadata>
		<title>Security update for python-cbor2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1220096" ref_url="https://bugzilla.suse.com/1220096" source="BUGZILLA"/>
		<reference ref_id="1253746" ref_url="https://bugzilla.suse.com/1253746" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-26134" ref_url="https://www.suse.com/security/cve/CVE-2024-26134/" source="CVE"/>
		<reference ref_id="CVE-2025-64076" ref_url="https://www.suse.com/security/cve/CVE-2025-64076/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023501.html" source="SUSE-SU"/>
		<description>
This update for python-cbor2 fixes the following issues:

- CVE-2025-64076: Fixed bug in decode_definite_long_string() that causes incorrect chunk length calculation (bsc#1253746).


Already fixed in release 5.6.3:

- CVE-2024-26134: Fixed potential crash when hashing a CBORTag (bsc#1220096).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2025-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220096">SUSE bug 1220096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253746">SUSE bug 1253746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26134/">CVE-2024-26134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26134">CVE-2024-26134 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:H/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64076/">CVE-2025-64076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64076">CVE-2025-64076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032408" comment="python313-cbor2-5.6.5-160000.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032408" comment="python313-cbor2-5.6.5-160000.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94608" version="1" class="patch">
	<metadata>
		<title>Security update for mozjs128 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1248162" ref_url="https://bugzilla.suse.com/1248162" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5265" ref_url="https://www.suse.com/security/cve/CVE-2025-5265/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6426" ref_url="https://www.suse.com/security/cve/CVE-2025-6426/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<description>
This update for mozjs128 fixes the following issues:

- Update to version 128.14.0 (bsc#1248162):
  + CVE-2025-9179: Sandbox escape due to invalid pointer in the
    Audio/Video: GMP component
  + CVE-2025-9180: Same-origin policy bypass in the Graphics:
    Canvas2D component
  + CVE-2025-9181: Uninitialized memory in the JavaScript Engine
    component
  + CVE-2025-9185: Memory safety bugs fixed in Firefox ESR 115.27,
    Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2,
    Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142

- Update to version 128.13.0:
  + CVE-2025-8027: JavaScript engine only wrote partial return
    value to stack
  + CVE-2025-8028: Large branch table could lead to truncated
    instruction
  + CVE-2025-8029: javascript: URLs executed on object and embed
    tags
  + CVE-2025-8030: Potential user-assisted code execution in “Copy
    as cURL” command
  + CVE-2025-8031: Incorrect URL stripping in CSP reports
  + CVE-2025-8032: XSLT documents could bypass CSP
  + CVE-2025-8033: Incorrect JavaScript state machine for
    generators
  + CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26,
    Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1,
    Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
  + CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13,
    Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR
    140.1, Firefox 141 and Thunderbird 141

- Update to version 128.12.0:
  + CVE-2025-6424: Use-after-free in FontFaceSet
  + CVE-2025-6425: The WebCompat WebExtension shipped with Firefox
    exposed a persistent UUID
  + CVE-2025-6426: No warning when opening executable terminal
    files on macOS
  + CVE-2025-6429: Incorrect parsing of URLs could have allowed
    embedding of youtube.com
  + CVE-2025-6430: Content-Disposition header ignored when a file
    is included in an embed or object tag

- Update to version 128.11.0:
  + CVE-2025-5283: Double-free in libvpx encoder
  + CVE-2025-5263: Error handling for script execution was
    incorrectly isolated from web content
  + CVE-2025-5264: Potential local code execution in “Copy as cURL”
    command
  + CVE-2025-5265: Potential local code execution in “Copy as cURL”
    command
  + CVE-2025-5266: Script element events leaked cross-origin
    resource status
  + CVE-2025-5267: Clickjacking vulnerability could have led to
    leaking saved payment card details
  + CVE-2025-5268: Memory safety bugs fixed in Firefox 139,
    Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11
  + CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11
    and Thunderbird 128.11
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-03"/>
	<updated date="2025-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5265/">CVE-2025-5265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5265">CVE-2025-5265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6426/">CVE-2025-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6426">CVE-2025-6426 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94609" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1253713" ref_url="https://bugzilla.suse.com/1253713" source="BUGZILLA"/>
		<reference ref_id="1253714" ref_url="https://bugzilla.suse.com/1253714" source="BUGZILLA"/>
		<reference ref_id="1253715" ref_url="https://bugzilla.suse.com/1253715" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12495" ref_url="https://www.suse.com/security/cve/CVE-2025-12495/" source="CVE"/>
		<reference ref_id="CVE-2025-12839" ref_url="https://www.suse.com/security/cve/CVE-2025-12839/" source="CVE"/>
		<reference ref_id="CVE-2025-12840" ref_url="https://www.suse.com/security/cve/CVE-2025-12840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023550.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

Changes in openexr:

- CVE-2025-12495: Fixed a file parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability [bsc#1253714]
- CVE-2025-12839: Fixed a file parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability [bsc#1253715]
- CVE-2025-12840: Fixed a file parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability [bsc#1253713]
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-09"/>
	<updated date="2025-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253713">SUSE bug 1253713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253714">SUSE bug 1253714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253715">SUSE bug 1253715</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12495/">CVE-2025-12495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12495">CVE-2025-12495 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12839/">CVE-2025-12839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12839">CVE-2025-12839 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12840/">CVE-2025-12840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12840">CVE-2025-12840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033326" comment="libIex-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033327" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033328" comment="libIlmThread-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033329" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033330" comment="libOpenEXR-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033331" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033332" comment="libOpenEXRCore-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033333" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033334" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033335" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033336" comment="openexr-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033338" comment="openexr-doc-3.2.2-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033326" comment="libIex-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033327" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033328" comment="libIlmThread-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033329" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033330" comment="libOpenEXR-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033331" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033332" comment="libOpenEXRCore-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033333" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033334" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033335" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033336" comment="openexr-3.2.2-160000.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033338" comment="openexr-doc-3.2.2-160000.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94610" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 16.0</platform>
			<platform>SUSE Linux Enterprise Server for SAP applications 16.0</platform>
		</affected>
		<reference ref_id="1236632" ref_url="https://bugzilla.suse.com/1236632" source="BUGZILLA"/>
		<reference ref_id="1236976" ref_url="https://bugzilla.suse.com/1236976" source="BUGZILLA"/>
		<reference ref_id="1236977" ref_url="https://bugzilla.suse.com/1236977" source="BUGZILLA"/>
		<reference ref_id="1236978" ref_url="https://bugzilla.suse.com/1236978" source="BUGZILLA"/>
		<reference ref_id="1236999" ref_url="https://bugzilla.suse.com/1236999" source="BUGZILLA"/>
		<reference ref_id="1237000" ref_url="https://bugzilla.suse.com/1237000" source="BUGZILLA"/>
		<reference ref_id="1237001" ref_url="https://bugzilla.suse.com/1237001" source="BUGZILLA"/>
		<reference ref_id="1237003" ref_url="https://bugzilla.suse.com/1237003" source="BUGZILLA"/>
		<reference ref_id="1237005" ref_url="https://bugzilla.suse.com/1237005" source="BUGZILLA"/>
		<reference ref_id="1237018" ref_url="https://bugzilla.suse.com/1237018" source="BUGZILLA"/>
		<reference ref_id="1237019" ref_url="https://bugzilla.suse.com/1237019" source="BUGZILLA"/>
		<reference ref_id="1237020" ref_url="https://bugzilla.suse.com/1237020" source="BUGZILLA"/>
		<reference ref_id="1237021" ref_url="https://bugzilla.suse.com/1237021" source="BUGZILLA"/>
		<reference ref_id="1237042" ref_url="https://bugzilla.suse.com/1237042" source="BUGZILLA"/>
		<reference ref_id="1240870" ref_url="https://bugzilla.suse.com/1240870" source="BUGZILLA"/>
		<reference ref_id="1243756" ref_url="https://bugzilla.suse.com/1243756" source="BUGZILLA"/>
		<reference ref_id="1243760" ref_url="https://bugzilla.suse.com/1243760" source="BUGZILLA"/>
		<reference ref_id="1246481" ref_url="https://bugzilla.suse.com/1246481" source="BUGZILLA"/>
		<reference ref_id="1246486" ref_url="https://bugzilla.suse.com/1246486" source="BUGZILLA"/>
		<reference ref_id="1247105" ref_url="https://bugzilla.suse.com/1247105" source="BUGZILLA"/>
		<reference ref_id="1247114" ref_url="https://bugzilla.suse.com/1247114" source="BUGZILLA"/>
		<reference ref_id="1247117" ref_url="https://bugzilla.suse.com/1247117" source="BUGZILLA"/>
		<reference ref_id="1250632" ref_url="https://bugzilla.suse.com/1250632" source="BUGZILLA"/>
		<reference ref_id="1251275" ref_url="https://bugzilla.suse.com/1251275" source="BUGZILLA"/>
		<reference ref_id="1251276" ref_url="https://bugzilla.suse.com/1251276" source="BUGZILLA"/>
		<reference ref_id="1251277" ref_url="https://bugzilla.suse.com/1251277" source="BUGZILLA"/>
		<reference ref_id="1251794" ref_url="https://bugzilla.suse.com/1251794" source="BUGZILLA"/>
		<reference ref_id="1251795" ref_url="https://bugzilla.suse.com/1251795" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-0840" ref_url="https://www.suse.com/security/cve/CVE-2025-0840/" source="CVE"/>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<reference ref_id="CVE-2025-11412" ref_url="https://www.suse.com/security/cve/CVE-2025-11412/" source="CVE"/>
		<reference ref_id="CVE-2025-11413" ref_url="https://www.suse.com/security/cve/CVE-2025-11413/" source="CVE"/>
		<reference ref_id="CVE-2025-11414" ref_url="https://www.suse.com/security/cve/CVE-2025-11414/" source="CVE"/>
		<reference ref_id="CVE-2025-1147" ref_url="https://www.suse.com/security/cve/CVE-2025-1147/" source="CVE"/>
		<reference ref_id="CVE-2025-1148" ref_url="https://www.suse.com/security/cve/CVE-2025-1148/" source="CVE"/>
		<reference ref_id="CVE-2025-1149" ref_url="https://www.suse.com/security/cve/CVE-2025-1149/" source="CVE"/>
		<reference ref_id="CVE-2025-11494" ref_url="https://www.suse.com/security/cve/CVE-2025-11494/" source="CVE"/>
		<reference ref_id="CVE-2025-11495" ref_url="https://www.suse.com/security/cve/CVE-2025-11495/" source="CVE"/>
		<reference ref_id="CVE-2025-1150" ref_url="https://www.suse.com/security/cve/CVE-2025-1150/" source="CVE"/>
		<reference ref_id="CVE-2025-1151" ref_url="https://www.suse.com/security/cve/CVE-2025-1151/" source="CVE"/>
		<reference ref_id="CVE-2025-1152" ref_url="https://www.suse.com/security/cve/CVE-2025-1152/" source="CVE"/>
		<reference ref_id="CVE-2025-1153" ref_url="https://www.suse.com/security/cve/CVE-2025-1153/" source="CVE"/>
		<reference ref_id="CVE-2025-1176" ref_url="https://www.suse.com/security/cve/CVE-2025-1176/" source="CVE"/>
		<reference ref_id="CVE-2025-1178" ref_url="https://www.suse.com/security/cve/CVE-2025-1178/" source="CVE"/>
		<reference ref_id="CVE-2025-1179" ref_url="https://www.suse.com/security/cve/CVE-2025-1179/" source="CVE"/>
		<reference ref_id="CVE-2025-1180" ref_url="https://www.suse.com/security/cve/CVE-2025-1180/" source="CVE"/>
		<reference ref_id="CVE-2025-1181" ref_url="https://www.suse.com/security/cve/CVE-2025-1181/" source="CVE"/>
		<reference ref_id="CVE-2025-1182" ref_url="https://www.suse.com/security/cve/CVE-2025-1182/" source="CVE"/>
		<reference ref_id="CVE-2025-3198" ref_url="https://www.suse.com/security/cve/CVE-2025-3198/" source="CVE"/>
		<reference ref_id="CVE-2025-5244" ref_url="https://www.suse.com/security/cve/CVE-2025-5244/" source="CVE"/>
		<reference ref_id="CVE-2025-5245" ref_url="https://www.suse.com/security/cve/CVE-2025-5245/" source="CVE"/>
		<reference ref_id="CVE-2025-7545" ref_url="https://www.suse.com/security/cve/CVE-2025-7545/" source="CVE"/>
		<reference ref_id="CVE-2025-7546" ref_url="https://www.suse.com/security/cve/CVE-2025-7546/" source="CVE"/>
		<reference ref_id="CVE-2025-8224" ref_url="https://www.suse.com/security/cve/CVE-2025-8224/" source="CVE"/>
		<reference ref_id="CVE-2025-8225" ref_url="https://www.suse.com/security/cve/CVE-2025-8225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Changes in binutils:

- Update to current 2.45 branch at 94cb1c075 to include fix
  for PR33584 (a problem related to LTO vs fortran COMMON
  blocks).

- Do not enable '-z gcs=implicit' on aarch64 for old codestreams.

Update to version 2.45:

  * New versioned release of libsframe.so.2
  * s390: tools now support SFrame format 2; recognize "z17" as CPU
    name [bsc#1247105, jsc#IBM-1485]
  * sframe sections are now of ELF section type SHT_GNU_SFRAME.
  * sframe secions generated by the assembler have
    SFRAME_F_FDE_FUNC_START_PCREL set.
  * riscv: Support more extensions: standard: Zicfiss v1.0, Zicfilp v1.0,
    Zcmp v1.0, Zcmt v1.0, Smrnmi v1.0, S[sm]dbltrp v1.0, S[sm]ctr v1.0,
    ssqosid v1.0, ssnpm v1.0, smnpm v1.0, smmpm v1.0, sspm v1.0, supm v1.0,
    sha v1.0, zce v1.0, smcdeleg v1.0, ssccfg v1.0, svvptc v1.0, zilsd v1.0,
    zclsd v1.0, smrnmi v1.0;
    vendor: CORE-V, xcvbitmanip v1.0 and xcvsimd v1.0;
    SiFive, xsfvqmaccdod v1.0, xsfvqmaccqoqv1.0 and xsfvfnrclipxfqf v1.0;
    T-Head: xtheadvdot v1.0;
    MIPS: xmipscbop v1.0, xmipscmov v1.0, xmipsexectl v1.0, xmipslsp v1.0.
  * Support RISC-V privileged version 1.13, profiles 20/22/23, and
    .bfloat16 directive.
  * x86: Add support for these ISAs: Intel Diamond Rapids AMX, MOVRS,
    AVX10.2 (including SM4), MSR_IMM; Zhaoxin PadLock PHE2, RNG2, GMI, XMODX.
    Drop support for  AVX10.2 256 bit rounding.
  * arm: Add support for most of Armv9.6, enabled by -march=armv9.6-a and
    extensions '+cmpbr', '+f8f16mm', '+f8f32mm', '+fprcvt', '+lsfe', '+lsui',
    '+occmo', '+pops', '+sme2p2', '+ssve-aes', '+sve-aes', '+sve-aes2',
    '+sve-bfscale', '+sve-f16f32mm' and '+sve2p2'.
  * Predefined symbols "GAS(version)" and, on non-release builds, "GAS(date)"
    are now being made available.
  * Add .errif and .warnif directives.
  * linker:
    - Add --image-base=&lt;ADDR&gt; option to the ELF linker to behave the same
      as -Ttext-segment for compatibility with LLD.
    - Add support for mixed LTO and non-LTO codes in relocatable output.
    - s390: linker generates .eh_frame and/or .sframe for linker
      generated .plt sections by default (can be disabled
      by --no-ld-generated-unwind-info).
    - riscv: add new PLT formats, and GNU property merge rules for zicfiss
      and zicfilp extensions.
- gold is no longer included

- Contains fixes for these non-CVEs (not security bugs per upstreams
  SECURITY.md):

  * bsc#1236632 aka CVE-2025-0840 aka PR32560
  * bsc#1236977 aka CVE-2025-1149 aka PR32576
  * bsc#1236978 aka CVE-2025-1148 aka PR32576
  * bsc#1236999 aka CVE-2025-1176 aka PR32636
  * bsc#1237000 aka CVE-2025-1153 aka PR32603
  * bsc#1237001 aka CVE-2025-1152 aka PR32576
  * bsc#1237003 aka CVE-2025-1151 aka PR32576
  * bsc#1237005 aka CVE-2025-1150 aka PR32576
  * bsc#1237018 aka CVE-2025-1178 aka PR32638
  * bsc#1237019 aka CVE-2025-1181 aka PR32643
  * bsc#1237020 aka CVE-2025-1180 aka PR32642
  * bsc#1237021 aka CVE-2025-1179 aka PR32640
  * bsc#1237042 aka CVE-2025-1182 aka PR32644
  * bsc#1240870 aka CVE-2025-3198 aka PR32716
  * bsc#1243756 aka CVE-2025-5244 aka PR32858
  * bsc#1243760 aka CVE-2025-5245 aka PR32829
  * bsc#1246481 aka CVE-2025-7545 aka PR33049
  * bsc#1246486 aka CVE-2025-7546 aka PR33050
  * bsc#1247114 aka CVE-2025-8224 aka PR32109
  * bsc#1247117 aka CVE-2025-8225 no PR
  * bsc#1236976 aka CVE-2025-1147 aka PR32556
  * bsc#1250632 aka CVE-2025-11083 aka PR33457
  * bsc#1251275 aka CVE-2025-11412 aka PR33452
  * bsc#1251276 aka CVE-2025-11413 aka PR33456
  * bsc#1251277 aka CVE-2025-11414 aka PR33450
  * bsc#1251794 aka CVE-2025-11494 aka PR33499
  * bsc#1251795 aka CVE-2025-11495 aka PR33502
  binutils-2.43-branch.diff.gz
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-12"/>
	<updated date="2025-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236632">SUSE bug 1236632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236976">SUSE bug 1236976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236977">SUSE bug 1236977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236978">SUSE bug 1236978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236999">SUSE bug 1236999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237000">SUSE bug 1237000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237001">SUSE bug 1237001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237003">SUSE bug 1237003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237005">SUSE bug 1237005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237018">SUSE bug 1237018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237019">SUSE bug 1237019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237020">SUSE bug 1237020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237021">SUSE bug 1237021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237042">SUSE bug 1237042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240870">SUSE bug 1240870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243756">SUSE bug 1243756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243760">SUSE bug 1243760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246481">SUSE bug 1246481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246486">SUSE bug 1246486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247105">SUSE bug 1247105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247114">SUSE bug 1247114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247117">SUSE bug 1247117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250632">SUSE bug 1250632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251275">SUSE bug 1251275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251276">SUSE bug 1251276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251277">SUSE bug 1251277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251794">SUSE bug 1251794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251795">SUSE bug 1251795</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0840/">CVE-2025-0840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0840">CVE-2025-0840 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11412/">CVE-2025-11412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11412">CVE-2025-11412 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11413/">CVE-2025-11413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11413">CVE-2025-11413 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11414/">CVE-2025-11414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11414">CVE-2025-11414 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1147/">CVE-2025-1147 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1147">CVE-2025-1147 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1148/">CVE-2025-1148 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1148">CVE-2025-1148 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1149/">CVE-2025-1149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1149">CVE-2025-1149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11494/">CVE-2025-11494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11494">CVE-2025-11494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11495/">CVE-2025-11495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11495">CVE-2025-11495 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1150/">CVE-2025-1150 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1150">CVE-2025-1150 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1151/">CVE-2025-1151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1151">CVE-2025-1151 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1152/">CVE-2025-1152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1152">CVE-2025-1152 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1153/">CVE-2025-1153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1153">CVE-2025-1153 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1176/">CVE-2025-1176 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1176">CVE-2025-1176 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1178/">CVE-2025-1178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1178">CVE-2025-1178 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1179/">CVE-2025-1179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1179">CVE-2025-1179 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1180/">CVE-2025-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1180">CVE-2025-1180 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1181/">CVE-2025-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1181">CVE-2025-1181 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1182/">CVE-2025-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1182">CVE-2025-1182 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3198/">CVE-2025-3198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3198">CVE-2025-3198 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5244/">CVE-2025-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5244">CVE-2025-5244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5245/">CVE-2025-5245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5245">CVE-2025-5245 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7545/">CVE-2025-7545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7545">CVE-2025-7545 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7546/">CVE-2025-7546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7546">CVE-2025-7546 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8224/">CVE-2025-8224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8224">CVE-2025-8224 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8225/">CVE-2025-8225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8225">CVE-2025-8225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:16:16.0:server</cpe>
		<cpe>cpe:/o:suse:sles:16:16.0:server-sap</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010025976" comment="SUSE Linux Enterprise Server 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029126" comment="SUSE Linux Enterprise Server for SAP applications 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94611" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1235463" ref_url="https://bugzilla.suse.com/1235463" source="BUGZILLA"/>
		<reference ref_id="1243474" ref_url="https://bugzilla.suse.com/1243474" source="BUGZILLA"/>
		<reference ref_id="1245193" ref_url="https://bugzilla.suse.com/1245193" source="BUGZILLA"/>
		<reference ref_id="1245431" ref_url="https://bugzilla.suse.com/1245431" source="BUGZILLA"/>
		<reference ref_id="1245498" ref_url="https://bugzilla.suse.com/1245498" source="BUGZILLA"/>
		<reference ref_id="1245499" ref_url="https://bugzilla.suse.com/1245499" source="BUGZILLA"/>
		<reference ref_id="1246328" ref_url="https://bugzilla.suse.com/1246328" source="BUGZILLA"/>
		<reference ref_id="1246843" ref_url="https://bugzilla.suse.com/1246843" source="BUGZILLA"/>
		<reference ref_id="1247500" ref_url="https://bugzilla.suse.com/1247500" source="BUGZILLA"/>
		<reference ref_id="1248792" ref_url="https://bugzilla.suse.com/1248792" source="BUGZILLA"/>
		<reference ref_id="1249256" ref_url="https://bugzilla.suse.com/1249256" source="BUGZILLA"/>
		<reference ref_id="1249397" ref_url="https://bugzilla.suse.com/1249397" source="BUGZILLA"/>
		<reference ref_id="1249912" ref_url="https://bugzilla.suse.com/1249912" source="BUGZILLA"/>
		<reference ref_id="1249977" ref_url="https://bugzilla.suse.com/1249977" source="BUGZILLA"/>
		<reference ref_id="1249982" ref_url="https://bugzilla.suse.com/1249982" source="BUGZILLA"/>
		<reference ref_id="1250034" ref_url="https://bugzilla.suse.com/1250034" source="BUGZILLA"/>
		<reference ref_id="1250176" ref_url="https://bugzilla.suse.com/1250176" source="BUGZILLA"/>
		<reference ref_id="1250237" ref_url="https://bugzilla.suse.com/1250237" source="BUGZILLA"/>
		<reference ref_id="1250252" ref_url="https://bugzilla.suse.com/1250252" source="BUGZILLA"/>
		<reference ref_id="1250705" ref_url="https://bugzilla.suse.com/1250705" source="BUGZILLA"/>
		<reference ref_id="1250723" ref_url="https://bugzilla.suse.com/1250723" source="BUGZILLA"/>
		<reference ref_id="1250746" ref_url="https://bugzilla.suse.com/1250746" source="BUGZILLA"/>
		<reference ref_id="1251120" ref_url="https://bugzilla.suse.com/1251120" source="BUGZILLA"/>
		<reference ref_id="1251817" ref_url="https://bugzilla.suse.com/1251817" source="BUGZILLA"/>
		<reference ref_id="1252054" ref_url="https://bugzilla.suse.com/1252054" source="BUGZILLA"/>
		<reference ref_id="1252063" ref_url="https://bugzilla.suse.com/1252063" source="BUGZILLA"/>
		<reference ref_id="1252301" ref_url="https://bugzilla.suse.com/1252301" source="BUGZILLA"/>
		<reference ref_id="1252303" ref_url="https://bugzilla.suse.com/1252303" source="BUGZILLA"/>
		<reference ref_id="1252342" ref_url="https://bugzilla.suse.com/1252342" source="BUGZILLA"/>
		<reference ref_id="1252352" ref_url="https://bugzilla.suse.com/1252352" source="BUGZILLA"/>
		<reference ref_id="1252357" ref_url="https://bugzilla.suse.com/1252357" source="BUGZILLA"/>
		<reference ref_id="1252681" ref_url="https://bugzilla.suse.com/1252681" source="BUGZILLA"/>
		<reference ref_id="1252686" ref_url="https://bugzilla.suse.com/1252686" source="BUGZILLA"/>
		<reference ref_id="1252763" ref_url="https://bugzilla.suse.com/1252763" source="BUGZILLA"/>
		<reference ref_id="1252776" ref_url="https://bugzilla.suse.com/1252776" source="BUGZILLA"/>
		<reference ref_id="1252779" ref_url="https://bugzilla.suse.com/1252779" source="BUGZILLA"/>
		<reference ref_id="1252790" ref_url="https://bugzilla.suse.com/1252790" source="BUGZILLA"/>
		<reference ref_id="1252794" ref_url="https://bugzilla.suse.com/1252794" source="BUGZILLA"/>
		<reference ref_id="1252795" ref_url="https://bugzilla.suse.com/1252795" source="BUGZILLA"/>
		<reference ref_id="1252808" ref_url="https://bugzilla.suse.com/1252808" source="BUGZILLA"/>
		<reference ref_id="1252809" ref_url="https://bugzilla.suse.com/1252809" source="BUGZILLA"/>
		<reference ref_id="1252817" ref_url="https://bugzilla.suse.com/1252817" source="BUGZILLA"/>
		<reference ref_id="1252821" ref_url="https://bugzilla.suse.com/1252821" source="BUGZILLA"/>
		<reference ref_id="1252824" ref_url="https://bugzilla.suse.com/1252824" source="BUGZILLA"/>
		<reference ref_id="1252836" ref_url="https://bugzilla.suse.com/1252836" source="BUGZILLA"/>
		<reference ref_id="1252845" ref_url="https://bugzilla.suse.com/1252845" source="BUGZILLA"/>
		<reference ref_id="1252901" ref_url="https://bugzilla.suse.com/1252901" source="BUGZILLA"/>
		<reference ref_id="1252912" ref_url="https://bugzilla.suse.com/1252912" source="BUGZILLA"/>
		<reference ref_id="1252917" ref_url="https://bugzilla.suse.com/1252917" source="BUGZILLA"/>
		<reference ref_id="1252919" ref_url="https://bugzilla.suse.com/1252919" source="BUGZILLA"/>
		<reference ref_id="1252923" ref_url="https://bugzilla.suse.com/1252923" source="BUGZILLA"/>
		<reference ref_id="1252928" ref_url="https://bugzilla.suse.com/1252928" source="BUGZILLA"/>
		<reference ref_id="1253018" ref_url="https://bugzilla.suse.com/1253018" source="BUGZILLA"/>
		<reference ref_id="1253155" ref_url="https://bugzilla.suse.com/1253155" source="BUGZILLA"/>
		<reference ref_id="1253176" ref_url="https://bugzilla.suse.com/1253176" source="BUGZILLA"/>
		<reference ref_id="1253238" ref_url="https://bugzilla.suse.com/1253238" source="BUGZILLA"/>
		<reference ref_id="1253275" ref_url="https://bugzilla.suse.com/1253275" source="BUGZILLA"/>
		<reference ref_id="1253318" ref_url="https://bugzilla.suse.com/1253318" source="BUGZILLA"/>
		<reference ref_id="1253324" ref_url="https://bugzilla.suse.com/1253324" source="BUGZILLA"/>
		<reference ref_id="1253328" ref_url="https://bugzilla.suse.com/1253328" source="BUGZILLA"/>
		<reference ref_id="1253330" ref_url="https://bugzilla.suse.com/1253330" source="BUGZILLA"/>
		<reference ref_id="1253342" ref_url="https://bugzilla.suse.com/1253342" source="BUGZILLA"/>
		<reference ref_id="1253348" ref_url="https://bugzilla.suse.com/1253348" source="BUGZILLA"/>
		<reference ref_id="1253349" ref_url="https://bugzilla.suse.com/1253349" source="BUGZILLA"/>
		<reference ref_id="1253352" ref_url="https://bugzilla.suse.com/1253352" source="BUGZILLA"/>
		<reference ref_id="1253355" ref_url="https://bugzilla.suse.com/1253355" source="BUGZILLA"/>
		<reference ref_id="1253360" ref_url="https://bugzilla.suse.com/1253360" source="BUGZILLA"/>
		<reference ref_id="1253362" ref_url="https://bugzilla.suse.com/1253362" source="BUGZILLA"/>
		<reference ref_id="1253363" ref_url="https://bugzilla.suse.com/1253363" source="BUGZILLA"/>
		<reference ref_id="1253367" ref_url="https://bugzilla.suse.com/1253367" source="BUGZILLA"/>
		<reference ref_id="1253369" ref_url="https://bugzilla.suse.com/1253369" source="BUGZILLA"/>
		<reference ref_id="1253386" ref_url="https://bugzilla.suse.com/1253386" source="BUGZILLA"/>
		<reference ref_id="1253394" ref_url="https://bugzilla.suse.com/1253394" source="BUGZILLA"/>
		<reference ref_id="1253395" ref_url="https://bugzilla.suse.com/1253395" source="BUGZILLA"/>
		<reference ref_id="1253402" ref_url="https://bugzilla.suse.com/1253402" source="BUGZILLA"/>
		<reference ref_id="1253403" ref_url="https://bugzilla.suse.com/1253403" source="BUGZILLA"/>
		<reference ref_id="1253405" ref_url="https://bugzilla.suse.com/1253405" source="BUGZILLA"/>
		<reference ref_id="1253407" ref_url="https://bugzilla.suse.com/1253407" source="BUGZILLA"/>
		<reference ref_id="1253408" ref_url="https://bugzilla.suse.com/1253408" source="BUGZILLA"/>
		<reference ref_id="1253409" ref_url="https://bugzilla.suse.com/1253409" source="BUGZILLA"/>
		<reference ref_id="1253410" ref_url="https://bugzilla.suse.com/1253410" source="BUGZILLA"/>
		<reference ref_id="1253412" ref_url="https://bugzilla.suse.com/1253412" source="BUGZILLA"/>
		<reference ref_id="1253416" ref_url="https://bugzilla.suse.com/1253416" source="BUGZILLA"/>
		<reference ref_id="1253421" ref_url="https://bugzilla.suse.com/1253421" source="BUGZILLA"/>
		<reference ref_id="1253422" ref_url="https://bugzilla.suse.com/1253422" source="BUGZILLA"/>
		<reference ref_id="1253423" ref_url="https://bugzilla.suse.com/1253423" source="BUGZILLA"/>
		<reference ref_id="1253424" ref_url="https://bugzilla.suse.com/1253424" source="BUGZILLA"/>
		<reference ref_id="1253425" ref_url="https://bugzilla.suse.com/1253425" source="BUGZILLA"/>
		<reference ref_id="1253426" ref_url="https://bugzilla.suse.com/1253426" source="BUGZILLA"/>
		<reference ref_id="1253427" ref_url="https://bugzilla.suse.com/1253427" source="BUGZILLA"/>
		<reference ref_id="1253428" ref_url="https://bugzilla.suse.com/1253428" source="BUGZILLA"/>
		<reference ref_id="1253431" ref_url="https://bugzilla.suse.com/1253431" source="BUGZILLA"/>
		<reference ref_id="1253433" ref_url="https://bugzilla.suse.com/1253433" source="BUGZILLA"/>
		<reference ref_id="1253436" ref_url="https://bugzilla.suse.com/1253436" source="BUGZILLA"/>
		<reference ref_id="1253438" ref_url="https://bugzilla.suse.com/1253438" source="BUGZILLA"/>
		<reference ref_id="1253440" ref_url="https://bugzilla.suse.com/1253440" source="BUGZILLA"/>
		<reference ref_id="1253441" ref_url="https://bugzilla.suse.com/1253441" source="BUGZILLA"/>
		<reference ref_id="1253443" ref_url="https://bugzilla.suse.com/1253443" source="BUGZILLA"/>
		<reference ref_id="1253445" ref_url="https://bugzilla.suse.com/1253445" source="BUGZILLA"/>
		<reference ref_id="1253448" ref_url="https://bugzilla.suse.com/1253448" source="BUGZILLA"/>
		<reference ref_id="1253449" ref_url="https://bugzilla.suse.com/1253449" source="BUGZILLA"/>
		<reference ref_id="1253450" ref_url="https://bugzilla.suse.com/1253450" source="BUGZILLA"/>
		<reference ref_id="1253451" ref_url="https://bugzilla.suse.com/1253451" source="BUGZILLA"/>
		<reference ref_id="1253453" ref_url="https://bugzilla.suse.com/1253453" source="BUGZILLA"/>
		<reference ref_id="1253455" ref_url="https://bugzilla.suse.com/1253455" source="BUGZILLA"/>
		<reference ref_id="1253456" ref_url="https://bugzilla.suse.com/1253456" source="BUGZILLA"/>
		<reference ref_id="1253457" ref_url="https://bugzilla.suse.com/1253457" source="BUGZILLA"/>
		<reference ref_id="1253463" ref_url="https://bugzilla.suse.com/1253463" source="BUGZILLA"/>
		<reference ref_id="1253472" ref_url="https://bugzilla.suse.com/1253472" source="BUGZILLA"/>
		<reference ref_id="1253622" ref_url="https://bugzilla.suse.com/1253622" source="BUGZILLA"/>
		<reference ref_id="1253624" ref_url="https://bugzilla.suse.com/1253624" source="BUGZILLA"/>
		<reference ref_id="1253635" ref_url="https://bugzilla.suse.com/1253635" source="BUGZILLA"/>
		<reference ref_id="1253643" ref_url="https://bugzilla.suse.com/1253643" source="BUGZILLA"/>
		<reference ref_id="1253647" ref_url="https://bugzilla.suse.com/1253647" source="BUGZILLA"/>
		<reference ref_id="1254119" ref_url="https://bugzilla.suse.com/1254119" source="BUGZILLA"/>
		<reference ref_id="1254181" ref_url="https://bugzilla.suse.com/1254181" source="BUGZILLA"/>
		<reference ref_id="1254221" ref_url="https://bugzilla.suse.com/1254221" source="BUGZILLA"/>
		<reference ref_id="1254308" ref_url="https://bugzilla.suse.com/1254308" source="BUGZILLA"/>
		<reference ref_id="1254315" ref_url="https://bugzilla.suse.com/1254315" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50253" ref_url="https://www.suse.com/security/cve/CVE-2022-50253/" source="CVE"/>
		<reference ref_id="CVE-2025-37916" ref_url="https://www.suse.com/security/cve/CVE-2025-37916/" source="CVE"/>
		<reference ref_id="CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084/" source="CVE"/>
		<reference ref_id="CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085/" source="CVE"/>
		<reference ref_id="CVE-2025-38321" ref_url="https://www.suse.com/security/cve/CVE-2025-38321/" source="CVE"/>
		<reference ref_id="CVE-2025-38728" ref_url="https://www.suse.com/security/cve/CVE-2025-38728/" source="CVE"/>
		<reference ref_id="CVE-2025-39805" ref_url="https://www.suse.com/security/cve/CVE-2025-39805/" source="CVE"/>
		<reference ref_id="CVE-2025-39819" ref_url="https://www.suse.com/security/cve/CVE-2025-39819/" source="CVE"/>
		<reference ref_id="CVE-2025-39822" ref_url="https://www.suse.com/security/cve/CVE-2025-39822/" source="CVE"/>
		<reference ref_id="CVE-2025-39831" ref_url="https://www.suse.com/security/cve/CVE-2025-39831/" source="CVE"/>
		<reference ref_id="CVE-2025-39859" ref_url="https://www.suse.com/security/cve/CVE-2025-39859/" source="CVE"/>
		<reference ref_id="CVE-2025-39897" ref_url="https://www.suse.com/security/cve/CVE-2025-39897/" source="CVE"/>
		<reference ref_id="CVE-2025-39917" ref_url="https://www.suse.com/security/cve/CVE-2025-39917/" source="CVE"/>
		<reference ref_id="CVE-2025-39944" ref_url="https://www.suse.com/security/cve/CVE-2025-39944/" source="CVE"/>
		<reference ref_id="CVE-2025-39961" ref_url="https://www.suse.com/security/cve/CVE-2025-39961/" source="CVE"/>
		<reference ref_id="CVE-2025-39980" ref_url="https://www.suse.com/security/cve/CVE-2025-39980/" source="CVE"/>
		<reference ref_id="CVE-2025-39990" ref_url="https://www.suse.com/security/cve/CVE-2025-39990/" source="CVE"/>
		<reference ref_id="CVE-2025-40001" ref_url="https://www.suse.com/security/cve/CVE-2025-40001/" source="CVE"/>
		<reference ref_id="CVE-2025-40003" ref_url="https://www.suse.com/security/cve/CVE-2025-40003/" source="CVE"/>
		<reference ref_id="CVE-2025-40006" ref_url="https://www.suse.com/security/cve/CVE-2025-40006/" source="CVE"/>
		<reference ref_id="CVE-2025-40021" ref_url="https://www.suse.com/security/cve/CVE-2025-40021/" source="CVE"/>
		<reference ref_id="CVE-2025-40024" ref_url="https://www.suse.com/security/cve/CVE-2025-40024/" source="CVE"/>
		<reference ref_id="CVE-2025-40027" ref_url="https://www.suse.com/security/cve/CVE-2025-40027/" source="CVE"/>
		<reference ref_id="CVE-2025-40031" ref_url="https://www.suse.com/security/cve/CVE-2025-40031/" source="CVE"/>
		<reference ref_id="CVE-2025-40033" ref_url="https://www.suse.com/security/cve/CVE-2025-40033/" source="CVE"/>
		<reference ref_id="CVE-2025-40038" ref_url="https://www.suse.com/security/cve/CVE-2025-40038/" source="CVE"/>
		<reference ref_id="CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047/" source="CVE"/>
		<reference ref_id="CVE-2025-40053" ref_url="https://www.suse.com/security/cve/CVE-2025-40053/" source="CVE"/>
		<reference ref_id="CVE-2025-40055" ref_url="https://www.suse.com/security/cve/CVE-2025-40055/" source="CVE"/>
		<reference ref_id="CVE-2025-40059" ref_url="https://www.suse.com/security/cve/CVE-2025-40059/" source="CVE"/>
		<reference ref_id="CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064/" source="CVE"/>
		<reference ref_id="CVE-2025-40070" ref_url="https://www.suse.com/security/cve/CVE-2025-40070/" source="CVE"/>
		<reference ref_id="CVE-2025-40074" ref_url="https://www.suse.com/security/cve/CVE-2025-40074/" source="CVE"/>
		<reference ref_id="CVE-2025-40075" ref_url="https://www.suse.com/security/cve/CVE-2025-40075/" source="CVE"/>
		<reference ref_id="CVE-2025-40081" ref_url="https://www.suse.com/security/cve/CVE-2025-40081/" source="CVE"/>
		<reference ref_id="CVE-2025-40083" ref_url="https://www.suse.com/security/cve/CVE-2025-40083/" source="CVE"/>
		<reference ref_id="CVE-2025-40086" ref_url="https://www.suse.com/security/cve/CVE-2025-40086/" source="CVE"/>
		<reference ref_id="CVE-2025-40098" ref_url="https://www.suse.com/security/cve/CVE-2025-40098/" source="CVE"/>
		<reference ref_id="CVE-2025-40101" ref_url="https://www.suse.com/security/cve/CVE-2025-40101/" source="CVE"/>
		<reference ref_id="CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102/" source="CVE"/>
		<reference ref_id="CVE-2025-40105" ref_url="https://www.suse.com/security/cve/CVE-2025-40105/" source="CVE"/>
		<reference ref_id="CVE-2025-40107" ref_url="https://www.suse.com/security/cve/CVE-2025-40107/" source="CVE"/>
		<reference ref_id="CVE-2025-40109" ref_url="https://www.suse.com/security/cve/CVE-2025-40109/" source="CVE"/>
		<reference ref_id="CVE-2025-40110" ref_url="https://www.suse.com/security/cve/CVE-2025-40110/" source="CVE"/>
		<reference ref_id="CVE-2025-40111" ref_url="https://www.suse.com/security/cve/CVE-2025-40111/" source="CVE"/>
		<reference ref_id="CVE-2025-40115" ref_url="https://www.suse.com/security/cve/CVE-2025-40115/" source="CVE"/>
		<reference ref_id="CVE-2025-40116" ref_url="https://www.suse.com/security/cve/CVE-2025-40116/" source="CVE"/>
		<reference ref_id="CVE-2025-40118" ref_url="https://www.suse.com/security/cve/CVE-2025-40118/" source="CVE"/>
		<reference ref_id="CVE-2025-40120" ref_url="https://www.suse.com/security/cve/CVE-2025-40120/" source="CVE"/>
		<reference ref_id="CVE-2025-40121" ref_url="https://www.suse.com/security/cve/CVE-2025-40121/" source="CVE"/>
		<reference ref_id="CVE-2025-40127" ref_url="https://www.suse.com/security/cve/CVE-2025-40127/" source="CVE"/>
		<reference ref_id="CVE-2025-40129" ref_url="https://www.suse.com/security/cve/CVE-2025-40129/" source="CVE"/>
		<reference ref_id="CVE-2025-40132" ref_url="https://www.suse.com/security/cve/CVE-2025-40132/" source="CVE"/>
		<reference ref_id="CVE-2025-40133" ref_url="https://www.suse.com/security/cve/CVE-2025-40133/" source="CVE"/>
		<reference ref_id="CVE-2025-40134" ref_url="https://www.suse.com/security/cve/CVE-2025-40134/" source="CVE"/>
		<reference ref_id="CVE-2025-40135" ref_url="https://www.suse.com/security/cve/CVE-2025-40135/" source="CVE"/>
		<reference ref_id="CVE-2025-40139" ref_url="https://www.suse.com/security/cve/CVE-2025-40139/" source="CVE"/>
		<reference ref_id="CVE-2025-40140" ref_url="https://www.suse.com/security/cve/CVE-2025-40140/" source="CVE"/>
		<reference ref_id="CVE-2025-40141" ref_url="https://www.suse.com/security/cve/CVE-2025-40141/" source="CVE"/>
		<reference ref_id="CVE-2025-40142" ref_url="https://www.suse.com/security/cve/CVE-2025-40142/" source="CVE"/>
		<reference ref_id="CVE-2025-40149" ref_url="https://www.suse.com/security/cve/CVE-2025-40149/" source="CVE"/>
		<reference ref_id="CVE-2025-40153" ref_url="https://www.suse.com/security/cve/CVE-2025-40153/" source="CVE"/>
		<reference ref_id="CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154/" source="CVE"/>
		<reference ref_id="CVE-2025-40156" ref_url="https://www.suse.com/security/cve/CVE-2025-40156/" source="CVE"/>
		<reference ref_id="CVE-2025-40157" ref_url="https://www.suse.com/security/cve/CVE-2025-40157/" source="CVE"/>
		<reference ref_id="CVE-2025-40158" ref_url="https://www.suse.com/security/cve/CVE-2025-40158/" source="CVE"/>
		<reference ref_id="CVE-2025-40159" ref_url="https://www.suse.com/security/cve/CVE-2025-40159/" source="CVE"/>
		<reference ref_id="CVE-2025-40161" ref_url="https://www.suse.com/security/cve/CVE-2025-40161/" source="CVE"/>
		<reference ref_id="CVE-2025-40162" ref_url="https://www.suse.com/security/cve/CVE-2025-40162/" source="CVE"/>
		<reference ref_id="CVE-2025-40164" ref_url="https://www.suse.com/security/cve/CVE-2025-40164/" source="CVE"/>
		<reference ref_id="CVE-2025-40165" ref_url="https://www.suse.com/security/cve/CVE-2025-40165/" source="CVE"/>
		<reference ref_id="CVE-2025-40166" ref_url="https://www.suse.com/security/cve/CVE-2025-40166/" source="CVE"/>
		<reference ref_id="CVE-2025-40168" ref_url="https://www.suse.com/security/cve/CVE-2025-40168/" source="CVE"/>
		<reference ref_id="CVE-2025-40169" ref_url="https://www.suse.com/security/cve/CVE-2025-40169/" source="CVE"/>
		<reference ref_id="CVE-2025-40171" ref_url="https://www.suse.com/security/cve/CVE-2025-40171/" source="CVE"/>
		<reference ref_id="CVE-2025-40172" ref_url="https://www.suse.com/security/cve/CVE-2025-40172/" source="CVE"/>
		<reference ref_id="CVE-2025-40173" ref_url="https://www.suse.com/security/cve/CVE-2025-40173/" source="CVE"/>
		<reference ref_id="CVE-2025-40175" ref_url="https://www.suse.com/security/cve/CVE-2025-40175/" source="CVE"/>
		<reference ref_id="CVE-2025-40176" ref_url="https://www.suse.com/security/cve/CVE-2025-40176/" source="CVE"/>
		<reference ref_id="CVE-2025-40177" ref_url="https://www.suse.com/security/cve/CVE-2025-40177/" source="CVE"/>
		<reference ref_id="CVE-2025-40178" ref_url="https://www.suse.com/security/cve/CVE-2025-40178/" source="CVE"/>
		<reference ref_id="CVE-2025-40180" ref_url="https://www.suse.com/security/cve/CVE-2025-40180/" source="CVE"/>
		<reference ref_id="CVE-2025-40183" ref_url="https://www.suse.com/security/cve/CVE-2025-40183/" source="CVE"/>
		<reference ref_id="CVE-2025-40185" ref_url="https://www.suse.com/security/cve/CVE-2025-40185/" source="CVE"/>
		<reference ref_id="CVE-2025-40186" ref_url="https://www.suse.com/security/cve/CVE-2025-40186/" source="CVE"/>
		<reference ref_id="CVE-2025-40187" ref_url="https://www.suse.com/security/cve/CVE-2025-40187/" source="CVE"/>
		<reference ref_id="CVE-2025-40188" ref_url="https://www.suse.com/security/cve/CVE-2025-40188/" source="CVE"/>
		<reference ref_id="CVE-2025-40192" ref_url="https://www.suse.com/security/cve/CVE-2025-40192/" source="CVE"/>
		<reference ref_id="CVE-2025-40194" ref_url="https://www.suse.com/security/cve/CVE-2025-40194/" source="CVE"/>
		<reference ref_id="CVE-2025-40196" ref_url="https://www.suse.com/security/cve/CVE-2025-40196/" source="CVE"/>
		<reference ref_id="CVE-2025-40197" ref_url="https://www.suse.com/security/cve/CVE-2025-40197/" source="CVE"/>
		<reference ref_id="CVE-2025-40198" ref_url="https://www.suse.com/security/cve/CVE-2025-40198/" source="CVE"/>
		<reference ref_id="CVE-2025-40200" ref_url="https://www.suse.com/security/cve/CVE-2025-40200/" source="CVE"/>
		<reference ref_id="CVE-2025-40201" ref_url="https://www.suse.com/security/cve/CVE-2025-40201/" source="CVE"/>
		<reference ref_id="CVE-2025-40202" ref_url="https://www.suse.com/security/cve/CVE-2025-40202/" source="CVE"/>
		<reference ref_id="CVE-2025-40203" ref_url="https://www.suse.com/security/cve/CVE-2025-40203/" source="CVE"/>
		<reference ref_id="CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204/" source="CVE"/>
		<reference ref_id="CVE-2025-40205" ref_url="https://www.suse.com/security/cve/CVE-2025-40205/" source="CVE"/>
		<reference ref_id="CVE-2025-40206" ref_url="https://www.suse.com/security/cve/CVE-2025-40206/" source="CVE"/>
		<reference ref_id="CVE-2025-40207" ref_url="https://www.suse.com/security/cve/CVE-2025-40207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50253: bpf: make sure skb-&gt;len != 0 when redirecting to a tunneling device (bsc#1249912).
- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).
- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).
- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).
- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).
- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).
- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).
- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).
- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).
- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).
- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).
- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).
- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).
- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).
- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).
- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).
- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).
- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).
- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).
- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).
- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).
- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).
- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).
- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817).
- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).
- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).
- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).
- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).
- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).
- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).
- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).
- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).
- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).
- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).
- CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds (bsc#1252923).
- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).
- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).
- CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928).
- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).
- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).
- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).
- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).
- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).
- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).
- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).
- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).
- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).
- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).
- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).
- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).
- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).
- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-&gt;group_leader) in sys_prlimit64() paths (bsc#1253455).
- CVE-2025-40203: listmount: don't call path_put() under namespace semaphore (bsc#1253457).

The following non security issues were fixed:

- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).
- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).
- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a
  proper watchdog interface and has many code issues. It only handles
  obscure and obsolete hardware. Stop building and supporting this driver
  (jsc#PED-14062).
- Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds" (bsc#1252923)
- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).
- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).
- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).
- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).
- KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352).
- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).
- PCI/ERR: Update device error_state already after reset (stable-fixes).
- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).
- Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes).
- Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes).
- Update config files: enable zstd module decompression (jsc#PED-14115).
- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).
- btrfs: do not clear read-only when adding sprout device (bsc#1253238).
- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).
- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)
- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).
- drm/amd/display: update color on atomic commit time (stable-fixes).
- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).
- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).
- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).
- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).
- mount: handle NULL values in mnt_ns_release() (bsc#1254308)
- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).
- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).
- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).
- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).
- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).
- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).
- net: phy: realtek: improve mmd register access for internal PHY's (jsc#PED-14353).
- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).
- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).
- net: phy: realtek: use string choices helpers (jsc#PED-14353).
- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)
- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)
- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)
- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).
- nvmet-auth: update sc_c in target host hash calculation (git-fixes).
- perf list: Add IBM z17 event descriptions (jsc#PED-13611).
- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).
- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).
- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).
- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).
- r8169: add support for Intel Killer E5000 (jsc#PED-14353).
- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).
- r8169: add support for RTL8125D rev.b (jsc#PED-14353).
- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).
- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).
- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).
- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).
- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).
- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).
- r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353).
- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).
- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).
- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).
- r8169: implement additional ethtool stats ops (jsc#PED-14353).
- r8169: improve __rtl8169_set_wol (jsc#PED-14353).
- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).
- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).
- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).
- r8169: remove leftover locks after reverted change (jsc#PED-14353).
- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).
- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).
- r8169: remove support for chip version 11 (jsc#PED-14353).
- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).
- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).
- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).
- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).
- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).
- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).
- sched/fair: Get rid of sched_domains_curr_level hack for tl-&gt;cpumask() (bsc#1246843).
- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).
- sched/fair: Proportional newidle balance (bsc#1248792).
- sched/fair: Proportional newidle balance -KABI (bsc#1248792).
- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).
- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).
- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).
- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).
- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).
- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).
- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).
- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).
- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).
- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).
- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).
- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).
- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)
- spi: tegra210-quad: Fix timeout handling (bsc#1253155)
- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)
- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)
- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-&gt;cork (bsc#1250705).
- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).
- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).
- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).
- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).
- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).
- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).
- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).
- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).
- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).
- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).
- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).
- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).
- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).
- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).
- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).
- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).
- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).
- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).
- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).
- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).
- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1235463">SUSE bug 1235463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243474">SUSE bug 1243474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245193">SUSE bug 1245193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245431">SUSE bug 1245431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245498">SUSE bug 1245498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245499">SUSE bug 1245499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246328">SUSE bug 1246328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246843">SUSE bug 1246843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247500">SUSE bug 1247500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248792">SUSE bug 1248792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249256">SUSE bug 1249256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249397">SUSE bug 1249397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249912">SUSE bug 1249912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249977">SUSE bug 1249977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249982">SUSE bug 1249982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250034">SUSE bug 1250034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250176">SUSE bug 1250176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250237">SUSE bug 1250237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250252">SUSE bug 1250252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250705">SUSE bug 1250705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250723">SUSE bug 1250723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250746">SUSE bug 1250746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251120">SUSE bug 1251120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251817">SUSE bug 1251817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252054">SUSE bug 1252054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252063">SUSE bug 1252063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252301">SUSE bug 1252301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252303">SUSE bug 1252303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252342">SUSE bug 1252342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252352">SUSE bug 1252352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252357">SUSE bug 1252357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252681">SUSE bug 1252681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252686">SUSE bug 1252686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252763">SUSE bug 1252763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252776">SUSE bug 1252776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252779">SUSE bug 1252779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252790">SUSE bug 1252790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252794">SUSE bug 1252794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252795">SUSE bug 1252795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252808">SUSE bug 1252808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252809">SUSE bug 1252809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252817">SUSE bug 1252817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252821">SUSE bug 1252821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252824">SUSE bug 1252824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252836">SUSE bug 1252836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252845">SUSE bug 1252845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252901">SUSE bug 1252901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252912">SUSE bug 1252912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252917">SUSE bug 1252917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252919">SUSE bug 1252919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252923">SUSE bug 1252923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252928">SUSE bug 1252928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253018">SUSE bug 1253018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253155">SUSE bug 1253155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253176">SUSE bug 1253176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253238">SUSE bug 1253238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253275">SUSE bug 1253275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253318">SUSE bug 1253318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253324">SUSE bug 1253324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253328">SUSE bug 1253328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253330">SUSE bug 1253330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253342">SUSE bug 1253342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253348">SUSE bug 1253348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253349">SUSE bug 1253349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253352">SUSE bug 1253352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253355">SUSE bug 1253355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253360">SUSE bug 1253360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253362">SUSE bug 1253362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253363">SUSE bug 1253363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253367">SUSE bug 1253367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253369">SUSE bug 1253369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253386">SUSE bug 1253386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253394">SUSE bug 1253394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253395">SUSE bug 1253395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253402">SUSE bug 1253402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253403">SUSE bug 1253403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253405">SUSE bug 1253405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253407">SUSE bug 1253407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253408">SUSE bug 1253408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253409">SUSE bug 1253409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253410">SUSE bug 1253410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253412">SUSE bug 1253412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253416">SUSE bug 1253416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253421">SUSE bug 1253421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253422">SUSE bug 1253422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253423">SUSE bug 1253423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253424">SUSE bug 1253424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253425">SUSE bug 1253425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253426">SUSE bug 1253426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253427">SUSE bug 1253427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253428">SUSE bug 1253428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253431">SUSE bug 1253431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253433">SUSE bug 1253433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253436">SUSE bug 1253436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253438">SUSE bug 1253438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253440">SUSE bug 1253440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253441">SUSE bug 1253441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253443">SUSE bug 1253443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253445">SUSE bug 1253445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253448">SUSE bug 1253448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253449">SUSE bug 1253449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253450">SUSE bug 1253450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253451">SUSE bug 1253451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253453">SUSE bug 1253453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253455">SUSE bug 1253455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253456">SUSE bug 1253456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253457">SUSE bug 1253457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253463">SUSE bug 1253463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253472">SUSE bug 1253472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253622">SUSE bug 1253622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253624">SUSE bug 1253624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253635">SUSE bug 1253635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253643">SUSE bug 1253643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253647">SUSE bug 1253647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254119">SUSE bug 1254119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254181">SUSE bug 1254181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254221">SUSE bug 1254221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254308">SUSE bug 1254308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254315">SUSE bug 1254315</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50253/">CVE-2022-50253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50253">CVE-2022-50253 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37916/">CVE-2025-37916 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38321/">CVE-2025-38321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38321">CVE-2025-38321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38728/">CVE-2025-38728 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39805/">CVE-2025-39805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39805">CVE-2025-39805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39819/">CVE-2025-39819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39819">CVE-2025-39819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39822/">CVE-2025-39822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39822">CVE-2025-39822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39831/">CVE-2025-39831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39831">CVE-2025-39831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39859/">CVE-2025-39859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39859">CVE-2025-39859 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39897/">CVE-2025-39897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39897">CVE-2025-39897 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39917/">CVE-2025-39917 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39917">CVE-2025-39917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39944/">CVE-2025-39944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944">CVE-2025-39944 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39961/">CVE-2025-39961 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961">CVE-2025-39961 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39980/">CVE-2025-39980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39980">CVE-2025-39980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39990/">CVE-2025-39990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39990">CVE-2025-39990 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40001/">CVE-2025-40001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40001">CVE-2025-40001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40003/">CVE-2025-40003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40003">CVE-2025-40003 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40006/">CVE-2025-40006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40006">CVE-2025-40006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40021/">CVE-2025-40021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40021">CVE-2025-40021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40024/">CVE-2025-40024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40024">CVE-2025-40024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40027/">CVE-2025-40027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40031/">CVE-2025-40031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40033/">CVE-2025-40033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40038/">CVE-2025-40038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40053/">CVE-2025-40053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40055/">CVE-2025-40055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40059/">CVE-2025-40059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40070/">CVE-2025-40070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40074/">CVE-2025-40074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40074">CVE-2025-40074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40075/">CVE-2025-40075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40075">CVE-2025-40075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40081/">CVE-2025-40081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40083/">CVE-2025-40083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40083">CVE-2025-40083 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40086/">CVE-2025-40086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40086">CVE-2025-40086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40098/">CVE-2025-40098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40098">CVE-2025-40098 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40101/">CVE-2025-40101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40105/">CVE-2025-40105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40107/">CVE-2025-40107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40107">CVE-2025-40107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40109/">CVE-2025-40109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40109">CVE-2025-40109 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40110/">CVE-2025-40110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40110">CVE-2025-40110 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40111/">CVE-2025-40111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40111">CVE-2025-40111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40115/">CVE-2025-40115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40115">CVE-2025-40115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40116/">CVE-2025-40116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40116">CVE-2025-40116 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40118/">CVE-2025-40118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40118">CVE-2025-40118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40120/">CVE-2025-40120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40120">CVE-2025-40120 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40121/">CVE-2025-40121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40121">CVE-2025-40121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40127/">CVE-2025-40127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40127">CVE-2025-40127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40129/">CVE-2025-40129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40129">CVE-2025-40129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40132/">CVE-2025-40132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40132">CVE-2025-40132 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40133/">CVE-2025-40133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40133">CVE-2025-40133 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40134/">CVE-2025-40134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40134">CVE-2025-40134 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40135/">CVE-2025-40135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40135">CVE-2025-40135 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40139/">CVE-2025-40139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40139">CVE-2025-40139 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40140/">CVE-2025-40140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40140">CVE-2025-40140 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40141/">CVE-2025-40141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40141">CVE-2025-40141 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40142/">CVE-2025-40142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40142">CVE-2025-40142 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40149/">CVE-2025-40149 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40149">CVE-2025-40149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40153/">CVE-2025-40153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40153">CVE-2025-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40156/">CVE-2025-40156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40156">CVE-2025-40156 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40157/">CVE-2025-40157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40157">CVE-2025-40157 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40158/">CVE-2025-40158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40158">CVE-2025-40158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40159/">CVE-2025-40159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40159">CVE-2025-40159 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40161/">CVE-2025-40161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40161">CVE-2025-40161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40162/">CVE-2025-40162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40162">CVE-2025-40162 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40164/">CVE-2025-40164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40164">CVE-2025-40164 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40165/">CVE-2025-40165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40165">CVE-2025-40165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40166/">CVE-2025-40166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40166">CVE-2025-40166 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40168/">CVE-2025-40168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40168">CVE-2025-40168 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40169/">CVE-2025-40169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40169">CVE-2025-40169 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40171/">CVE-2025-40171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40171">CVE-2025-40171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40172/">CVE-2025-40172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40172">CVE-2025-40172 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40173/">CVE-2025-40173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40173">CVE-2025-40173 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40175/">CVE-2025-40175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40175">CVE-2025-40175 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40176/">CVE-2025-40176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40177/">CVE-2025-40177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40177">CVE-2025-40177 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40178/">CVE-2025-40178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40178">CVE-2025-40178 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40180/">CVE-2025-40180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40180">CVE-2025-40180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40183/">CVE-2025-40183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40183">CVE-2025-40183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40185/">CVE-2025-40185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40185">CVE-2025-40185 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40186/">CVE-2025-40186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40186">CVE-2025-40186 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40187/">CVE-2025-40187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40187">CVE-2025-40187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40188/">CVE-2025-40188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40188">CVE-2025-40188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40192/">CVE-2025-40192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40192">CVE-2025-40192 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40194/">CVE-2025-40194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40194">CVE-2025-40194 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40196/">CVE-2025-40196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40196">CVE-2025-40196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40197/">CVE-2025-40197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40197">CVE-2025-40197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40198/">CVE-2025-40198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40198">CVE-2025-40198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40200/">CVE-2025-40200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40200">CVE-2025-40200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40201/">CVE-2025-40201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40201">CVE-2025-40201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40202/">CVE-2025-40202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40202">CVE-2025-40202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40203/">CVE-2025-40203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40203">CVE-2025-40203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40205/">CVE-2025-40205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40205">CVE-2025-40205 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40206/">CVE-2025-40206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40206">CVE-2025-40206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40207/">CVE-2025-40207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40207">CVE-2025-40207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036936" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036937" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036938" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94612" version="1" class="patch">
	<metadata>
		<title>Security update for hawk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1230275" ref_url="https://bugzilla.suse.com/1230275" source="BUGZILLA"/>
		<reference ref_id="1247899" ref_url="https://bugzilla.suse.com/1247899" source="BUGZILLA"/>
		<reference ref_id="1248100" ref_url="https://bugzilla.suse.com/1248100" source="BUGZILLA"/>
		<reference ref_id="1251939" ref_url="https://bugzilla.suse.com/1251939" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55193" ref_url="https://www.suse.com/security/cve/CVE-2025-55193/" source="CVE"/>
		<reference ref_id="CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023809.html" source="SUSE-SU"/>
		<description>
This update for hawk2 fixes the following issues:

- Bump ruby gem rack to 3.1.18 (bsc#1251939).
- Bump ruby gem uri to 1.0.4.
- Fix the mtime in manifest.json (bsc#1230275).
- Make builds determinitstic (bsc#1230275).
- Bump rails version from 8.0.2 to 8.0.2.1 (bsc#1248100).
- Require openssl explicitly (bsc#1247899).		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230275">SUSE bug 1230275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247899">SUSE bug 1247899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248100">SUSE bug 1248100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251939">SUSE bug 1251939</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55193/">CVE-2025-55193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55193">CVE-2025-55193 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038481" comment="hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94613" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1250983" ref_url="https://bugzilla.suse.com/1250983" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023808.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2025-11230: issue in the mjson JSON decoder leads to excessive resource consumption when processing numbers with
  large exponents (bsc#1250983).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250983">SUSE bug 1250983</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038482" comment="haproxy-3.2.0+git0.e134140d2-160000.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94614" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1243112" ref_url="https://bugzilla.suse.com/1243112" source="BUGZILLA"/>
		<reference ref_id="1245193" ref_url="https://bugzilla.suse.com/1245193" source="BUGZILLA"/>
		<reference ref_id="1247500" ref_url="https://bugzilla.suse.com/1247500" source="BUGZILLA"/>
		<reference ref_id="1250388" ref_url="https://bugzilla.suse.com/1250388" source="BUGZILLA"/>
		<reference ref_id="1252046" ref_url="https://bugzilla.suse.com/1252046" source="BUGZILLA"/>
		<reference ref_id="1252861" ref_url="https://bugzilla.suse.com/1252861" source="BUGZILLA"/>
		<reference ref_id="1253155" ref_url="https://bugzilla.suse.com/1253155" source="BUGZILLA"/>
		<reference ref_id="1253238" ref_url="https://bugzilla.suse.com/1253238" source="BUGZILLA"/>
		<reference ref_id="1253262" ref_url="https://bugzilla.suse.com/1253262" source="BUGZILLA"/>
		<reference ref_id="1253365" ref_url="https://bugzilla.suse.com/1253365" source="BUGZILLA"/>
		<reference ref_id="1253400" ref_url="https://bugzilla.suse.com/1253400" source="BUGZILLA"/>
		<reference ref_id="1253413" ref_url="https://bugzilla.suse.com/1253413" source="BUGZILLA"/>
		<reference ref_id="1253414" ref_url="https://bugzilla.suse.com/1253414" source="BUGZILLA"/>
		<reference ref_id="1253442" ref_url="https://bugzilla.suse.com/1253442" source="BUGZILLA"/>
		<reference ref_id="1253458" ref_url="https://bugzilla.suse.com/1253458" source="BUGZILLA"/>
		<reference ref_id="1253623" ref_url="https://bugzilla.suse.com/1253623" source="BUGZILLA"/>
		<reference ref_id="1253674" ref_url="https://bugzilla.suse.com/1253674" source="BUGZILLA"/>
		<reference ref_id="1253739" ref_url="https://bugzilla.suse.com/1253739" source="BUGZILLA"/>
		<reference ref_id="1254126" ref_url="https://bugzilla.suse.com/1254126" source="BUGZILLA"/>
		<reference ref_id="1254128" ref_url="https://bugzilla.suse.com/1254128" source="BUGZILLA"/>
		<reference ref_id="1254195" ref_url="https://bugzilla.suse.com/1254195" source="BUGZILLA"/>
		<reference ref_id="1254244" ref_url="https://bugzilla.suse.com/1254244" source="BUGZILLA"/>
		<reference ref_id="1254363" ref_url="https://bugzilla.suse.com/1254363" source="BUGZILLA"/>
		<reference ref_id="1254378" ref_url="https://bugzilla.suse.com/1254378" source="BUGZILLA"/>
		<reference ref_id="1254408" ref_url="https://bugzilla.suse.com/1254408" source="BUGZILLA"/>
		<reference ref_id="1254477" ref_url="https://bugzilla.suse.com/1254477" source="BUGZILLA"/>
		<reference ref_id="1254510" ref_url="https://bugzilla.suse.com/1254510" source="BUGZILLA"/>
		<reference ref_id="1254518" ref_url="https://bugzilla.suse.com/1254518" source="BUGZILLA"/>
		<reference ref_id="1254519" ref_url="https://bugzilla.suse.com/1254519" source="BUGZILLA"/>
		<reference ref_id="1254520" ref_url="https://bugzilla.suse.com/1254520" source="BUGZILLA"/>
		<reference ref_id="1254615" ref_url="https://bugzilla.suse.com/1254615" source="BUGZILLA"/>
		<reference ref_id="1254616" ref_url="https://bugzilla.suse.com/1254616" source="BUGZILLA"/>
		<reference ref_id="1254618" ref_url="https://bugzilla.suse.com/1254618" source="BUGZILLA"/>
		<reference ref_id="1254621" ref_url="https://bugzilla.suse.com/1254621" source="BUGZILLA"/>
		<reference ref_id="1254624" ref_url="https://bugzilla.suse.com/1254624" source="BUGZILLA"/>
		<reference ref_id="1254791" ref_url="https://bugzilla.suse.com/1254791" source="BUGZILLA"/>
		<reference ref_id="1254793" ref_url="https://bugzilla.suse.com/1254793" source="BUGZILLA"/>
		<reference ref_id="1254794" ref_url="https://bugzilla.suse.com/1254794" source="BUGZILLA"/>
		<reference ref_id="1254795" ref_url="https://bugzilla.suse.com/1254795" source="BUGZILLA"/>
		<reference ref_id="1254796" ref_url="https://bugzilla.suse.com/1254796" source="BUGZILLA"/>
		<reference ref_id="1254797" ref_url="https://bugzilla.suse.com/1254797" source="BUGZILLA"/>
		<reference ref_id="1254798" ref_url="https://bugzilla.suse.com/1254798" source="BUGZILLA"/>
		<reference ref_id="1254808" ref_url="https://bugzilla.suse.com/1254808" source="BUGZILLA"/>
		<reference ref_id="1254809" ref_url="https://bugzilla.suse.com/1254809" source="BUGZILLA"/>
		<reference ref_id="1254813" ref_url="https://bugzilla.suse.com/1254813" source="BUGZILLA"/>
		<reference ref_id="1254815" ref_url="https://bugzilla.suse.com/1254815" source="BUGZILLA"/>
		<reference ref_id="1254821" ref_url="https://bugzilla.suse.com/1254821" source="BUGZILLA"/>
		<reference ref_id="1254824" ref_url="https://bugzilla.suse.com/1254824" source="BUGZILLA"/>
		<reference ref_id="1254825" ref_url="https://bugzilla.suse.com/1254825" source="BUGZILLA"/>
		<reference ref_id="1254827" ref_url="https://bugzilla.suse.com/1254827" source="BUGZILLA"/>
		<reference ref_id="1254828" ref_url="https://bugzilla.suse.com/1254828" source="BUGZILLA"/>
		<reference ref_id="1254829" ref_url="https://bugzilla.suse.com/1254829" source="BUGZILLA"/>
		<reference ref_id="1254830" ref_url="https://bugzilla.suse.com/1254830" source="BUGZILLA"/>
		<reference ref_id="1254832" ref_url="https://bugzilla.suse.com/1254832" source="BUGZILLA"/>
		<reference ref_id="1254835" ref_url="https://bugzilla.suse.com/1254835" source="BUGZILLA"/>
		<reference ref_id="1254840" ref_url="https://bugzilla.suse.com/1254840" source="BUGZILLA"/>
		<reference ref_id="1254843" ref_url="https://bugzilla.suse.com/1254843" source="BUGZILLA"/>
		<reference ref_id="1254846" ref_url="https://bugzilla.suse.com/1254846" source="BUGZILLA"/>
		<reference ref_id="1254847" ref_url="https://bugzilla.suse.com/1254847" source="BUGZILLA"/>
		<reference ref_id="1254849" ref_url="https://bugzilla.suse.com/1254849" source="BUGZILLA"/>
		<reference ref_id="1254850" ref_url="https://bugzilla.suse.com/1254850" source="BUGZILLA"/>
		<reference ref_id="1254851" ref_url="https://bugzilla.suse.com/1254851" source="BUGZILLA"/>
		<reference ref_id="1254852" ref_url="https://bugzilla.suse.com/1254852" source="BUGZILLA"/>
		<reference ref_id="1254854" ref_url="https://bugzilla.suse.com/1254854" source="BUGZILLA"/>
		<reference ref_id="1254856" ref_url="https://bugzilla.suse.com/1254856" source="BUGZILLA"/>
		<reference ref_id="1254858" ref_url="https://bugzilla.suse.com/1254858" source="BUGZILLA"/>
		<reference ref_id="1254860" ref_url="https://bugzilla.suse.com/1254860" source="BUGZILLA"/>
		<reference ref_id="1254861" ref_url="https://bugzilla.suse.com/1254861" source="BUGZILLA"/>
		<reference ref_id="1254864" ref_url="https://bugzilla.suse.com/1254864" source="BUGZILLA"/>
		<reference ref_id="1254868" ref_url="https://bugzilla.suse.com/1254868" source="BUGZILLA"/>
		<reference ref_id="1254869" ref_url="https://bugzilla.suse.com/1254869" source="BUGZILLA"/>
		<reference ref_id="1254871" ref_url="https://bugzilla.suse.com/1254871" source="BUGZILLA"/>
		<reference ref_id="1254894" ref_url="https://bugzilla.suse.com/1254894" source="BUGZILLA"/>
		<reference ref_id="1254957" ref_url="https://bugzilla.suse.com/1254957" source="BUGZILLA"/>
		<reference ref_id="1254959" ref_url="https://bugzilla.suse.com/1254959" source="BUGZILLA"/>
		<reference ref_id="1254961" ref_url="https://bugzilla.suse.com/1254961" source="BUGZILLA"/>
		<reference ref_id="1254964" ref_url="https://bugzilla.suse.com/1254964" source="BUGZILLA"/>
		<reference ref_id="1254996" ref_url="https://bugzilla.suse.com/1254996" source="BUGZILLA"/>
		<reference ref_id="1255026" ref_url="https://bugzilla.suse.com/1255026" source="BUGZILLA"/>
		<reference ref_id="1255030" ref_url="https://bugzilla.suse.com/1255030" source="BUGZILLA"/>
		<reference ref_id="1255034" ref_url="https://bugzilla.suse.com/1255034" source="BUGZILLA"/>
		<reference ref_id="1255035" ref_url="https://bugzilla.suse.com/1255035" source="BUGZILLA"/>
		<reference ref_id="1255039" ref_url="https://bugzilla.suse.com/1255039" source="BUGZILLA"/>
		<reference ref_id="1255040" ref_url="https://bugzilla.suse.com/1255040" source="BUGZILLA"/>
		<reference ref_id="1255041" ref_url="https://bugzilla.suse.com/1255041" source="BUGZILLA"/>
		<reference ref_id="1255042" ref_url="https://bugzilla.suse.com/1255042" source="BUGZILLA"/>
		<reference ref_id="1255057" ref_url="https://bugzilla.suse.com/1255057" source="BUGZILLA"/>
		<reference ref_id="1255058" ref_url="https://bugzilla.suse.com/1255058" source="BUGZILLA"/>
		<reference ref_id="1255064" ref_url="https://bugzilla.suse.com/1255064" source="BUGZILLA"/>
		<reference ref_id="1255065" ref_url="https://bugzilla.suse.com/1255065" source="BUGZILLA"/>
		<reference ref_id="1255068" ref_url="https://bugzilla.suse.com/1255068" source="BUGZILLA"/>
		<reference ref_id="1255071" ref_url="https://bugzilla.suse.com/1255071" source="BUGZILLA"/>
		<reference ref_id="1255072" ref_url="https://bugzilla.suse.com/1255072" source="BUGZILLA"/>
		<reference ref_id="1255075" ref_url="https://bugzilla.suse.com/1255075" source="BUGZILLA"/>
		<reference ref_id="1255077" ref_url="https://bugzilla.suse.com/1255077" source="BUGZILLA"/>
		<reference ref_id="1255081" ref_url="https://bugzilla.suse.com/1255081" source="BUGZILLA"/>
		<reference ref_id="1255082" ref_url="https://bugzilla.suse.com/1255082" source="BUGZILLA"/>
		<reference ref_id="1255083" ref_url="https://bugzilla.suse.com/1255083" source="BUGZILLA"/>
		<reference ref_id="1255087" ref_url="https://bugzilla.suse.com/1255087" source="BUGZILLA"/>
		<reference ref_id="1255092" ref_url="https://bugzilla.suse.com/1255092" source="BUGZILLA"/>
		<reference ref_id="1255094" ref_url="https://bugzilla.suse.com/1255094" source="BUGZILLA"/>
		<reference ref_id="1255095" ref_url="https://bugzilla.suse.com/1255095" source="BUGZILLA"/>
		<reference ref_id="1255097" ref_url="https://bugzilla.suse.com/1255097" source="BUGZILLA"/>
		<reference ref_id="1255099" ref_url="https://bugzilla.suse.com/1255099" source="BUGZILLA"/>
		<reference ref_id="1255103" ref_url="https://bugzilla.suse.com/1255103" source="BUGZILLA"/>
		<reference ref_id="1255116" ref_url="https://bugzilla.suse.com/1255116" source="BUGZILLA"/>
		<reference ref_id="1255120" ref_url="https://bugzilla.suse.com/1255120" source="BUGZILLA"/>
		<reference ref_id="1255121" ref_url="https://bugzilla.suse.com/1255121" source="BUGZILLA"/>
		<reference ref_id="1255122" ref_url="https://bugzilla.suse.com/1255122" source="BUGZILLA"/>
		<reference ref_id="1255124" ref_url="https://bugzilla.suse.com/1255124" source="BUGZILLA"/>
		<reference ref_id="1255131" ref_url="https://bugzilla.suse.com/1255131" source="BUGZILLA"/>
		<reference ref_id="1255134" ref_url="https://bugzilla.suse.com/1255134" source="BUGZILLA"/>
		<reference ref_id="1255135" ref_url="https://bugzilla.suse.com/1255135" source="BUGZILLA"/>
		<reference ref_id="1255136" ref_url="https://bugzilla.suse.com/1255136" source="BUGZILLA"/>
		<reference ref_id="1255138" ref_url="https://bugzilla.suse.com/1255138" source="BUGZILLA"/>
		<reference ref_id="1255140" ref_url="https://bugzilla.suse.com/1255140" source="BUGZILLA"/>
		<reference ref_id="1255142" ref_url="https://bugzilla.suse.com/1255142" source="BUGZILLA"/>
		<reference ref_id="1255145" ref_url="https://bugzilla.suse.com/1255145" source="BUGZILLA"/>
		<reference ref_id="1255146" ref_url="https://bugzilla.suse.com/1255146" source="BUGZILLA"/>
		<reference ref_id="1255149" ref_url="https://bugzilla.suse.com/1255149" source="BUGZILLA"/>
		<reference ref_id="1255150" ref_url="https://bugzilla.suse.com/1255150" source="BUGZILLA"/>
		<reference ref_id="1255152" ref_url="https://bugzilla.suse.com/1255152" source="BUGZILLA"/>
		<reference ref_id="1255154" ref_url="https://bugzilla.suse.com/1255154" source="BUGZILLA"/>
		<reference ref_id="1255155" ref_url="https://bugzilla.suse.com/1255155" source="BUGZILLA"/>
		<reference ref_id="1255156" ref_url="https://bugzilla.suse.com/1255156" source="BUGZILLA"/>
		<reference ref_id="1255161" ref_url="https://bugzilla.suse.com/1255161" source="BUGZILLA"/>
		<reference ref_id="1255167" ref_url="https://bugzilla.suse.com/1255167" source="BUGZILLA"/>
		<reference ref_id="1255169" ref_url="https://bugzilla.suse.com/1255169" source="BUGZILLA"/>
		<reference ref_id="1255171" ref_url="https://bugzilla.suse.com/1255171" source="BUGZILLA"/>
		<reference ref_id="1255175" ref_url="https://bugzilla.suse.com/1255175" source="BUGZILLA"/>
		<reference ref_id="1255179" ref_url="https://bugzilla.suse.com/1255179" source="BUGZILLA"/>
		<reference ref_id="1255181" ref_url="https://bugzilla.suse.com/1255181" source="BUGZILLA"/>
		<reference ref_id="1255182" ref_url="https://bugzilla.suse.com/1255182" source="BUGZILLA"/>
		<reference ref_id="1255186" ref_url="https://bugzilla.suse.com/1255186" source="BUGZILLA"/>
		<reference ref_id="1255187" ref_url="https://bugzilla.suse.com/1255187" source="BUGZILLA"/>
		<reference ref_id="1255190" ref_url="https://bugzilla.suse.com/1255190" source="BUGZILLA"/>
		<reference ref_id="1255193" ref_url="https://bugzilla.suse.com/1255193" source="BUGZILLA"/>
		<reference ref_id="1255196" ref_url="https://bugzilla.suse.com/1255196" source="BUGZILLA"/>
		<reference ref_id="1255197" ref_url="https://bugzilla.suse.com/1255197" source="BUGZILLA"/>
		<reference ref_id="1255199" ref_url="https://bugzilla.suse.com/1255199" source="BUGZILLA"/>
		<reference ref_id="1255202" ref_url="https://bugzilla.suse.com/1255202" source="BUGZILLA"/>
		<reference ref_id="1255203" ref_url="https://bugzilla.suse.com/1255203" source="BUGZILLA"/>
		<reference ref_id="1255206" ref_url="https://bugzilla.suse.com/1255206" source="BUGZILLA"/>
		<reference ref_id="1255209" ref_url="https://bugzilla.suse.com/1255209" source="BUGZILLA"/>
		<reference ref_id="1255218" ref_url="https://bugzilla.suse.com/1255218" source="BUGZILLA"/>
		<reference ref_id="1255220" ref_url="https://bugzilla.suse.com/1255220" source="BUGZILLA"/>
		<reference ref_id="1255221" ref_url="https://bugzilla.suse.com/1255221" source="BUGZILLA"/>
		<reference ref_id="1255223" ref_url="https://bugzilla.suse.com/1255223" source="BUGZILLA"/>
		<reference ref_id="1255226" ref_url="https://bugzilla.suse.com/1255226" source="BUGZILLA"/>
		<reference ref_id="1255227" ref_url="https://bugzilla.suse.com/1255227" source="BUGZILLA"/>
		<reference ref_id="1255228" ref_url="https://bugzilla.suse.com/1255228" source="BUGZILLA"/>
		<reference ref_id="1255230" ref_url="https://bugzilla.suse.com/1255230" source="BUGZILLA"/>
		<reference ref_id="1255231" ref_url="https://bugzilla.suse.com/1255231" source="BUGZILLA"/>
		<reference ref_id="1255233" ref_url="https://bugzilla.suse.com/1255233" source="BUGZILLA"/>
		<reference ref_id="1255234" ref_url="https://bugzilla.suse.com/1255234" source="BUGZILLA"/>
		<reference ref_id="1255242" ref_url="https://bugzilla.suse.com/1255242" source="BUGZILLA"/>
		<reference ref_id="1255243" ref_url="https://bugzilla.suse.com/1255243" source="BUGZILLA"/>
		<reference ref_id="1255246" ref_url="https://bugzilla.suse.com/1255246" source="BUGZILLA"/>
		<reference ref_id="1255247" ref_url="https://bugzilla.suse.com/1255247" source="BUGZILLA"/>
		<reference ref_id="1255251" ref_url="https://bugzilla.suse.com/1255251" source="BUGZILLA"/>
		<reference ref_id="1255252" ref_url="https://bugzilla.suse.com/1255252" source="BUGZILLA"/>
		<reference ref_id="1255253" ref_url="https://bugzilla.suse.com/1255253" source="BUGZILLA"/>
		<reference ref_id="1255255" ref_url="https://bugzilla.suse.com/1255255" source="BUGZILLA"/>
		<reference ref_id="1255256" ref_url="https://bugzilla.suse.com/1255256" source="BUGZILLA"/>
		<reference ref_id="1255259" ref_url="https://bugzilla.suse.com/1255259" source="BUGZILLA"/>
		<reference ref_id="1255260" ref_url="https://bugzilla.suse.com/1255260" source="BUGZILLA"/>
		<reference ref_id="1255261" ref_url="https://bugzilla.suse.com/1255261" source="BUGZILLA"/>
		<reference ref_id="1255262" ref_url="https://bugzilla.suse.com/1255262" source="BUGZILLA"/>
		<reference ref_id="1255272" ref_url="https://bugzilla.suse.com/1255272" source="BUGZILLA"/>
		<reference ref_id="1255273" ref_url="https://bugzilla.suse.com/1255273" source="BUGZILLA"/>
		<reference ref_id="1255274" ref_url="https://bugzilla.suse.com/1255274" source="BUGZILLA"/>
		<reference ref_id="1255276" ref_url="https://bugzilla.suse.com/1255276" source="BUGZILLA"/>
		<reference ref_id="1255279" ref_url="https://bugzilla.suse.com/1255279" source="BUGZILLA"/>
		<reference ref_id="1255297" ref_url="https://bugzilla.suse.com/1255297" source="BUGZILLA"/>
		<reference ref_id="1255312" ref_url="https://bugzilla.suse.com/1255312" source="BUGZILLA"/>
		<reference ref_id="1255316" ref_url="https://bugzilla.suse.com/1255316" source="BUGZILLA"/>
		<reference ref_id="1255318" ref_url="https://bugzilla.suse.com/1255318" source="BUGZILLA"/>
		<reference ref_id="1255325" ref_url="https://bugzilla.suse.com/1255325" source="BUGZILLA"/>
		<reference ref_id="1255329" ref_url="https://bugzilla.suse.com/1255329" source="BUGZILLA"/>
		<reference ref_id="1255346" ref_url="https://bugzilla.suse.com/1255346" source="BUGZILLA"/>
		<reference ref_id="1255349" ref_url="https://bugzilla.suse.com/1255349" source="BUGZILLA"/>
		<reference ref_id="1255351" ref_url="https://bugzilla.suse.com/1255351" source="BUGZILLA"/>
		<reference ref_id="1255354" ref_url="https://bugzilla.suse.com/1255354" source="BUGZILLA"/>
		<reference ref_id="1255357" ref_url="https://bugzilla.suse.com/1255357" source="BUGZILLA"/>
		<reference ref_id="1255377" ref_url="https://bugzilla.suse.com/1255377" source="BUGZILLA"/>
		<reference ref_id="1255379" ref_url="https://bugzilla.suse.com/1255379" source="BUGZILLA"/>
		<reference ref_id="1255380" ref_url="https://bugzilla.suse.com/1255380" source="BUGZILLA"/>
		<reference ref_id="1255395" ref_url="https://bugzilla.suse.com/1255395" source="BUGZILLA"/>
		<reference ref_id="1255401" ref_url="https://bugzilla.suse.com/1255401" source="BUGZILLA"/>
		<reference ref_id="1255415" ref_url="https://bugzilla.suse.com/1255415" source="BUGZILLA"/>
		<reference ref_id="1255428" ref_url="https://bugzilla.suse.com/1255428" source="BUGZILLA"/>
		<reference ref_id="1255433" ref_url="https://bugzilla.suse.com/1255433" source="BUGZILLA"/>
		<reference ref_id="1255434" ref_url="https://bugzilla.suse.com/1255434" source="BUGZILLA"/>
		<reference ref_id="1255480" ref_url="https://bugzilla.suse.com/1255480" source="BUGZILLA"/>
		<reference ref_id="1255483" ref_url="https://bugzilla.suse.com/1255483" source="BUGZILLA"/>
		<reference ref_id="1255488" ref_url="https://bugzilla.suse.com/1255488" source="BUGZILLA"/>
		<reference ref_id="1255489" ref_url="https://bugzilla.suse.com/1255489" source="BUGZILLA"/>
		<reference ref_id="1255493" ref_url="https://bugzilla.suse.com/1255493" source="BUGZILLA"/>
		<reference ref_id="1255495" ref_url="https://bugzilla.suse.com/1255495" source="BUGZILLA"/>
		<reference ref_id="1255505" ref_url="https://bugzilla.suse.com/1255505" source="BUGZILLA"/>
		<reference ref_id="1255507" ref_url="https://bugzilla.suse.com/1255507" source="BUGZILLA"/>
		<reference ref_id="1255508" ref_url="https://bugzilla.suse.com/1255508" source="BUGZILLA"/>
		<reference ref_id="1255509" ref_url="https://bugzilla.suse.com/1255509" source="BUGZILLA"/>
		<reference ref_id="1255533" ref_url="https://bugzilla.suse.com/1255533" source="BUGZILLA"/>
		<reference ref_id="1255541" ref_url="https://bugzilla.suse.com/1255541" source="BUGZILLA"/>
		<reference ref_id="1255550" ref_url="https://bugzilla.suse.com/1255550" source="BUGZILLA"/>
		<reference ref_id="1255552" ref_url="https://bugzilla.suse.com/1255552" source="BUGZILLA"/>
		<reference ref_id="1255553" ref_url="https://bugzilla.suse.com/1255553" source="BUGZILLA"/>
		<reference ref_id="1255567" ref_url="https://bugzilla.suse.com/1255567" source="BUGZILLA"/>
		<reference ref_id="1255580" ref_url="https://bugzilla.suse.com/1255580" source="BUGZILLA"/>
		<reference ref_id="1255601" ref_url="https://bugzilla.suse.com/1255601" source="BUGZILLA"/>
		<reference ref_id="1255603" ref_url="https://bugzilla.suse.com/1255603" source="BUGZILLA"/>
		<reference ref_id="1255611" ref_url="https://bugzilla.suse.com/1255611" source="BUGZILLA"/>
		<reference ref_id="1255614" ref_url="https://bugzilla.suse.com/1255614" source="BUGZILLA"/>
		<reference ref_id="1255672" ref_url="https://bugzilla.suse.com/1255672" source="BUGZILLA"/>
		<reference ref_id="1255688" ref_url="https://bugzilla.suse.com/1255688" source="BUGZILLA"/>
		<reference ref_id="1255698" ref_url="https://bugzilla.suse.com/1255698" source="BUGZILLA"/>
		<reference ref_id="1255706" ref_url="https://bugzilla.suse.com/1255706" source="BUGZILLA"/>
		<reference ref_id="1255707" ref_url="https://bugzilla.suse.com/1255707" source="BUGZILLA"/>
		<reference ref_id="1255709" ref_url="https://bugzilla.suse.com/1255709" source="BUGZILLA"/>
		<reference ref_id="1255722" ref_url="https://bugzilla.suse.com/1255722" source="BUGZILLA"/>
		<reference ref_id="1255723" ref_url="https://bugzilla.suse.com/1255723" source="BUGZILLA"/>
		<reference ref_id="1255724" ref_url="https://bugzilla.suse.com/1255724" source="BUGZILLA"/>
		<reference ref_id="1255812" ref_url="https://bugzilla.suse.com/1255812" source="BUGZILLA"/>
		<reference ref_id="1255813" ref_url="https://bugzilla.suse.com/1255813" source="BUGZILLA"/>
		<reference ref_id="1255814" ref_url="https://bugzilla.suse.com/1255814" source="BUGZILLA"/>
		<reference ref_id="1255816" ref_url="https://bugzilla.suse.com/1255816" source="BUGZILLA"/>
		<reference ref_id="1255931" ref_url="https://bugzilla.suse.com/1255931" source="BUGZILLA"/>
		<reference ref_id="1255932" ref_url="https://bugzilla.suse.com/1255932" source="BUGZILLA"/>
		<reference ref_id="1255934" ref_url="https://bugzilla.suse.com/1255934" source="BUGZILLA"/>
		<reference ref_id="1255943" ref_url="https://bugzilla.suse.com/1255943" source="BUGZILLA"/>
		<reference ref_id="1255944" ref_url="https://bugzilla.suse.com/1255944" source="BUGZILLA"/>
		<reference ref_id="1256238" ref_url="https://bugzilla.suse.com/1256238" source="BUGZILLA"/>
		<reference ref_id="1256495" ref_url="https://bugzilla.suse.com/1256495" source="BUGZILLA"/>
		<reference ref_id="1256606" ref_url="https://bugzilla.suse.com/1256606" source="BUGZILLA"/>
		<reference ref_id="1256794" ref_url="https://bugzilla.suse.com/1256794" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-38704" ref_url="https://www.suse.com/security/cve/CVE-2025-38704/" source="CVE"/>
		<reference ref_id="CVE-2025-39880" ref_url="https://www.suse.com/security/cve/CVE-2025-39880/" source="CVE"/>
		<reference ref_id="CVE-2025-39977" ref_url="https://www.suse.com/security/cve/CVE-2025-39977/" source="CVE"/>
		<reference ref_id="CVE-2025-40042" ref_url="https://www.suse.com/security/cve/CVE-2025-40042/" source="CVE"/>
		<reference ref_id="CVE-2025-40123" ref_url="https://www.suse.com/security/cve/CVE-2025-40123/" source="CVE"/>
		<reference ref_id="CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130/" source="CVE"/>
		<reference ref_id="CVE-2025-40160" ref_url="https://www.suse.com/security/cve/CVE-2025-40160/" source="CVE"/>
		<reference ref_id="CVE-2025-40167" ref_url="https://www.suse.com/security/cve/CVE-2025-40167/" source="CVE"/>
		<reference ref_id="CVE-2025-40170" ref_url="https://www.suse.com/security/cve/CVE-2025-40170/" source="CVE"/>
		<reference ref_id="CVE-2025-40179" ref_url="https://www.suse.com/security/cve/CVE-2025-40179/" source="CVE"/>
		<reference ref_id="CVE-2025-40190" ref_url="https://www.suse.com/security/cve/CVE-2025-40190/" source="CVE"/>
		<reference ref_id="CVE-2025-40209" ref_url="https://www.suse.com/security/cve/CVE-2025-40209/" source="CVE"/>
		<reference ref_id="CVE-2025-40211" ref_url="https://www.suse.com/security/cve/CVE-2025-40211/" source="CVE"/>
		<reference ref_id="CVE-2025-40212" ref_url="https://www.suse.com/security/cve/CVE-2025-40212/" source="CVE"/>
		<reference ref_id="CVE-2025-40213" ref_url="https://www.suse.com/security/cve/CVE-2025-40213/" source="CVE"/>
		<reference ref_id="CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214/" source="CVE"/>
		<reference ref_id="CVE-2025-40215" ref_url="https://www.suse.com/security/cve/CVE-2025-40215/" source="CVE"/>
		<reference ref_id="CVE-2025-40218" ref_url="https://www.suse.com/security/cve/CVE-2025-40218/" source="CVE"/>
		<reference ref_id="CVE-2025-40219" ref_url="https://www.suse.com/security/cve/CVE-2025-40219/" source="CVE"/>
		<reference ref_id="CVE-2025-40220" ref_url="https://www.suse.com/security/cve/CVE-2025-40220/" source="CVE"/>
		<reference ref_id="CVE-2025-40221" ref_url="https://www.suse.com/security/cve/CVE-2025-40221/" source="CVE"/>
		<reference ref_id="CVE-2025-40223" ref_url="https://www.suse.com/security/cve/CVE-2025-40223/" source="CVE"/>
		<reference ref_id="CVE-2025-40225" ref_url="https://www.suse.com/security/cve/CVE-2025-40225/" source="CVE"/>
		<reference ref_id="CVE-2025-40226" ref_url="https://www.suse.com/security/cve/CVE-2025-40226/" source="CVE"/>
		<reference ref_id="CVE-2025-40231" ref_url="https://www.suse.com/security/cve/CVE-2025-40231/" source="CVE"/>
		<reference ref_id="CVE-2025-40233" ref_url="https://www.suse.com/security/cve/CVE-2025-40233/" source="CVE"/>
		<reference ref_id="CVE-2025-40235" ref_url="https://www.suse.com/security/cve/CVE-2025-40235/" source="CVE"/>
		<reference ref_id="CVE-2025-40237" ref_url="https://www.suse.com/security/cve/CVE-2025-40237/" source="CVE"/>
		<reference ref_id="CVE-2025-40238" ref_url="https://www.suse.com/security/cve/CVE-2025-40238/" source="CVE"/>
		<reference ref_id="CVE-2025-40239" ref_url="https://www.suse.com/security/cve/CVE-2025-40239/" source="CVE"/>
		<reference ref_id="CVE-2025-40240" ref_url="https://www.suse.com/security/cve/CVE-2025-40240/" source="CVE"/>
		<reference ref_id="CVE-2025-40242" ref_url="https://www.suse.com/security/cve/CVE-2025-40242/" source="CVE"/>
		<reference ref_id="CVE-2025-40246" ref_url="https://www.suse.com/security/cve/CVE-2025-40246/" source="CVE"/>
		<reference ref_id="CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248/" source="CVE"/>
		<reference ref_id="CVE-2025-40250" ref_url="https://www.suse.com/security/cve/CVE-2025-40250/" source="CVE"/>
		<reference ref_id="CVE-2025-40251" ref_url="https://www.suse.com/security/cve/CVE-2025-40251/" source="CVE"/>
		<reference ref_id="CVE-2025-40252" ref_url="https://www.suse.com/security/cve/CVE-2025-40252/" source="CVE"/>
		<reference ref_id="CVE-2025-40254" ref_url="https://www.suse.com/security/cve/CVE-2025-40254/" source="CVE"/>
		<reference ref_id="CVE-2025-40255" ref_url="https://www.suse.com/security/cve/CVE-2025-40255/" source="CVE"/>
		<reference ref_id="CVE-2025-40256" ref_url="https://www.suse.com/security/cve/CVE-2025-40256/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40262" ref_url="https://www.suse.com/security/cve/CVE-2025-40262/" source="CVE"/>
		<reference ref_id="CVE-2025-40263" ref_url="https://www.suse.com/security/cve/CVE-2025-40263/" source="CVE"/>
		<reference ref_id="CVE-2025-40264" ref_url="https://www.suse.com/security/cve/CVE-2025-40264/" source="CVE"/>
		<reference ref_id="CVE-2025-40266" ref_url="https://www.suse.com/security/cve/CVE-2025-40266/" source="CVE"/>
		<reference ref_id="CVE-2025-40268" ref_url="https://www.suse.com/security/cve/CVE-2025-40268/" source="CVE"/>
		<reference ref_id="CVE-2025-40269" ref_url="https://www.suse.com/security/cve/CVE-2025-40269/" source="CVE"/>
		<reference ref_id="CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271/" source="CVE"/>
		<reference ref_id="CVE-2025-40272" ref_url="https://www.suse.com/security/cve/CVE-2025-40272/" source="CVE"/>
		<reference ref_id="CVE-2025-40273" ref_url="https://www.suse.com/security/cve/CVE-2025-40273/" source="CVE"/>
		<reference ref_id="CVE-2025-40274" ref_url="https://www.suse.com/security/cve/CVE-2025-40274/" source="CVE"/>
		<reference ref_id="CVE-2025-40275" ref_url="https://www.suse.com/security/cve/CVE-2025-40275/" source="CVE"/>
		<reference ref_id="CVE-2025-40276" ref_url="https://www.suse.com/security/cve/CVE-2025-40276/" source="CVE"/>
		<reference ref_id="CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277/" source="CVE"/>
		<reference ref_id="CVE-2025-40278" ref_url="https://www.suse.com/security/cve/CVE-2025-40278/" source="CVE"/>
		<reference ref_id="CVE-2025-40279" ref_url="https://www.suse.com/security/cve/CVE-2025-40279/" source="CVE"/>
		<reference ref_id="CVE-2025-40280" ref_url="https://www.suse.com/security/cve/CVE-2025-40280/" source="CVE"/>
		<reference ref_id="CVE-2025-40282" ref_url="https://www.suse.com/security/cve/CVE-2025-40282/" source="CVE"/>
		<reference ref_id="CVE-2025-40283" ref_url="https://www.suse.com/security/cve/CVE-2025-40283/" source="CVE"/>
		<reference ref_id="CVE-2025-40284" ref_url="https://www.suse.com/security/cve/CVE-2025-40284/" source="CVE"/>
		<reference ref_id="CVE-2025-40287" ref_url="https://www.suse.com/security/cve/CVE-2025-40287/" source="CVE"/>
		<reference ref_id="CVE-2025-40288" ref_url="https://www.suse.com/security/cve/CVE-2025-40288/" source="CVE"/>
		<reference ref_id="CVE-2025-40289" ref_url="https://www.suse.com/security/cve/CVE-2025-40289/" source="CVE"/>
		<reference ref_id="CVE-2025-40292" ref_url="https://www.suse.com/security/cve/CVE-2025-40292/" source="CVE"/>
		<reference ref_id="CVE-2025-40293" ref_url="https://www.suse.com/security/cve/CVE-2025-40293/" source="CVE"/>
		<reference ref_id="CVE-2025-40294" ref_url="https://www.suse.com/security/cve/CVE-2025-40294/" source="CVE"/>
		<reference ref_id="CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297/" source="CVE"/>
		<reference ref_id="CVE-2025-40301" ref_url="https://www.suse.com/security/cve/CVE-2025-40301/" source="CVE"/>
		<reference ref_id="CVE-2025-40302" ref_url="https://www.suse.com/security/cve/CVE-2025-40302/" source="CVE"/>
		<reference ref_id="CVE-2025-40303" ref_url="https://www.suse.com/security/cve/CVE-2025-40303/" source="CVE"/>
		<reference ref_id="CVE-2025-40304" ref_url="https://www.suse.com/security/cve/CVE-2025-40304/" source="CVE"/>
		<reference ref_id="CVE-2025-40307" ref_url="https://www.suse.com/security/cve/CVE-2025-40307/" source="CVE"/>
		<reference ref_id="CVE-2025-40308" ref_url="https://www.suse.com/security/cve/CVE-2025-40308/" source="CVE"/>
		<reference ref_id="CVE-2025-40309" ref_url="https://www.suse.com/security/cve/CVE-2025-40309/" source="CVE"/>
		<reference ref_id="CVE-2025-40310" ref_url="https://www.suse.com/security/cve/CVE-2025-40310/" source="CVE"/>
		<reference ref_id="CVE-2025-40311" ref_url="https://www.suse.com/security/cve/CVE-2025-40311/" source="CVE"/>
		<reference ref_id="CVE-2025-40314" ref_url="https://www.suse.com/security/cve/CVE-2025-40314/" source="CVE"/>
		<reference ref_id="CVE-2025-40315" ref_url="https://www.suse.com/security/cve/CVE-2025-40315/" source="CVE"/>
		<reference ref_id="CVE-2025-40316" ref_url="https://www.suse.com/security/cve/CVE-2025-40316/" source="CVE"/>
		<reference ref_id="CVE-2025-40317" ref_url="https://www.suse.com/security/cve/CVE-2025-40317/" source="CVE"/>
		<reference ref_id="CVE-2025-40318" ref_url="https://www.suse.com/security/cve/CVE-2025-40318/" source="CVE"/>
		<reference ref_id="CVE-2025-40319" ref_url="https://www.suse.com/security/cve/CVE-2025-40319/" source="CVE"/>
		<reference ref_id="CVE-2025-40320" ref_url="https://www.suse.com/security/cve/CVE-2025-40320/" source="CVE"/>
		<reference ref_id="CVE-2025-40321" ref_url="https://www.suse.com/security/cve/CVE-2025-40321/" source="CVE"/>
		<reference ref_id="CVE-2025-40322" ref_url="https://www.suse.com/security/cve/CVE-2025-40322/" source="CVE"/>
		<reference ref_id="CVE-2025-40323" ref_url="https://www.suse.com/security/cve/CVE-2025-40323/" source="CVE"/>
		<reference ref_id="CVE-2025-40324" ref_url="https://www.suse.com/security/cve/CVE-2025-40324/" source="CVE"/>
		<reference ref_id="CVE-2025-40328" ref_url="https://www.suse.com/security/cve/CVE-2025-40328/" source="CVE"/>
		<reference ref_id="CVE-2025-40329" ref_url="https://www.suse.com/security/cve/CVE-2025-40329/" source="CVE"/>
		<reference ref_id="CVE-2025-40330" ref_url="https://www.suse.com/security/cve/CVE-2025-40330/" source="CVE"/>
		<reference ref_id="CVE-2025-40331" ref_url="https://www.suse.com/security/cve/CVE-2025-40331/" source="CVE"/>
		<reference ref_id="CVE-2025-40332" ref_url="https://www.suse.com/security/cve/CVE-2025-40332/" source="CVE"/>
		<reference ref_id="CVE-2025-40337" ref_url="https://www.suse.com/security/cve/CVE-2025-40337/" source="CVE"/>
		<reference ref_id="CVE-2025-40338" ref_url="https://www.suse.com/security/cve/CVE-2025-40338/" source="CVE"/>
		<reference ref_id="CVE-2025-40339" ref_url="https://www.suse.com/security/cve/CVE-2025-40339/" source="CVE"/>
		<reference ref_id="CVE-2025-40340" ref_url="https://www.suse.com/security/cve/CVE-2025-40340/" source="CVE"/>
		<reference ref_id="CVE-2025-40342" ref_url="https://www.suse.com/security/cve/CVE-2025-40342/" source="CVE"/>
		<reference ref_id="CVE-2025-40343" ref_url="https://www.suse.com/security/cve/CVE-2025-40343/" source="CVE"/>
		<reference ref_id="CVE-2025-40344" ref_url="https://www.suse.com/security/cve/CVE-2025-40344/" source="CVE"/>
		<reference ref_id="CVE-2025-40345" ref_url="https://www.suse.com/security/cve/CVE-2025-40345/" source="CVE"/>
		<reference ref_id="CVE-2025-40346" ref_url="https://www.suse.com/security/cve/CVE-2025-40346/" source="CVE"/>
		<reference ref_id="CVE-2025-40347" ref_url="https://www.suse.com/security/cve/CVE-2025-40347/" source="CVE"/>
		<reference ref_id="CVE-2025-40350" ref_url="https://www.suse.com/security/cve/CVE-2025-40350/" source="CVE"/>
		<reference ref_id="CVE-2025-40353" ref_url="https://www.suse.com/security/cve/CVE-2025-40353/" source="CVE"/>
		<reference ref_id="CVE-2025-40354" ref_url="https://www.suse.com/security/cve/CVE-2025-40354/" source="CVE"/>
		<reference ref_id="CVE-2025-40355" ref_url="https://www.suse.com/security/cve/CVE-2025-40355/" source="CVE"/>
		<reference ref_id="CVE-2025-40357" ref_url="https://www.suse.com/security/cve/CVE-2025-40357/" source="CVE"/>
		<reference ref_id="CVE-2025-40359" ref_url="https://www.suse.com/security/cve/CVE-2025-40359/" source="CVE"/>
		<reference ref_id="CVE-2025-40360" ref_url="https://www.suse.com/security/cve/CVE-2025-40360/" source="CVE"/>
		<reference ref_id="CVE-2025-40362" ref_url="https://www.suse.com/security/cve/CVE-2025-40362/" source="CVE"/>
		<reference ref_id="CVE-2025-68167" ref_url="https://www.suse.com/security/cve/CVE-2025-68167/" source="CVE"/>
		<reference ref_id="CVE-2025-68170" ref_url="https://www.suse.com/security/cve/CVE-2025-68170/" source="CVE"/>
		<reference ref_id="CVE-2025-68171" ref_url="https://www.suse.com/security/cve/CVE-2025-68171/" source="CVE"/>
		<reference ref_id="CVE-2025-68172" ref_url="https://www.suse.com/security/cve/CVE-2025-68172/" source="CVE"/>
		<reference ref_id="CVE-2025-68176" ref_url="https://www.suse.com/security/cve/CVE-2025-68176/" source="CVE"/>
		<reference ref_id="CVE-2025-68180" ref_url="https://www.suse.com/security/cve/CVE-2025-68180/" source="CVE"/>
		<reference ref_id="CVE-2025-68181" ref_url="https://www.suse.com/security/cve/CVE-2025-68181/" source="CVE"/>
		<reference ref_id="CVE-2025-68183" ref_url="https://www.suse.com/security/cve/CVE-2025-68183/" source="CVE"/>
		<reference ref_id="CVE-2025-68184" ref_url="https://www.suse.com/security/cve/CVE-2025-68184/" source="CVE"/>
		<reference ref_id="CVE-2025-68185" ref_url="https://www.suse.com/security/cve/CVE-2025-68185/" source="CVE"/>
		<reference ref_id="CVE-2025-68190" ref_url="https://www.suse.com/security/cve/CVE-2025-68190/" source="CVE"/>
		<reference ref_id="CVE-2025-68192" ref_url="https://www.suse.com/security/cve/CVE-2025-68192/" source="CVE"/>
		<reference ref_id="CVE-2025-68194" ref_url="https://www.suse.com/security/cve/CVE-2025-68194/" source="CVE"/>
		<reference ref_id="CVE-2025-68195" ref_url="https://www.suse.com/security/cve/CVE-2025-68195/" source="CVE"/>
		<reference ref_id="CVE-2025-68197" ref_url="https://www.suse.com/security/cve/CVE-2025-68197/" source="CVE"/>
		<reference ref_id="CVE-2025-68198" ref_url="https://www.suse.com/security/cve/CVE-2025-68198/" source="CVE"/>
		<reference ref_id="CVE-2025-68201" ref_url="https://www.suse.com/security/cve/CVE-2025-68201/" source="CVE"/>
		<reference ref_id="CVE-2025-68202" ref_url="https://www.suse.com/security/cve/CVE-2025-68202/" source="CVE"/>
		<reference ref_id="CVE-2025-68206" ref_url="https://www.suse.com/security/cve/CVE-2025-68206/" source="CVE"/>
		<reference ref_id="CVE-2025-68207" ref_url="https://www.suse.com/security/cve/CVE-2025-68207/" source="CVE"/>
		<reference ref_id="CVE-2025-68208" ref_url="https://www.suse.com/security/cve/CVE-2025-68208/" source="CVE"/>
		<reference ref_id="CVE-2025-68209" ref_url="https://www.suse.com/security/cve/CVE-2025-68209/" source="CVE"/>
		<reference ref_id="CVE-2025-68210" ref_url="https://www.suse.com/security/cve/CVE-2025-68210/" source="CVE"/>
		<reference ref_id="CVE-2025-68213" ref_url="https://www.suse.com/security/cve/CVE-2025-68213/" source="CVE"/>
		<reference ref_id="CVE-2025-68215" ref_url="https://www.suse.com/security/cve/CVE-2025-68215/" source="CVE"/>
		<reference ref_id="CVE-2025-68217" ref_url="https://www.suse.com/security/cve/CVE-2025-68217/" source="CVE"/>
		<reference ref_id="CVE-2025-68222" ref_url="https://www.suse.com/security/cve/CVE-2025-68222/" source="CVE"/>
		<reference ref_id="CVE-2025-68223" ref_url="https://www.suse.com/security/cve/CVE-2025-68223/" source="CVE"/>
		<reference ref_id="CVE-2025-68230" ref_url="https://www.suse.com/security/cve/CVE-2025-68230/" source="CVE"/>
		<reference ref_id="CVE-2025-68233" ref_url="https://www.suse.com/security/cve/CVE-2025-68233/" source="CVE"/>
		<reference ref_id="CVE-2025-68235" ref_url="https://www.suse.com/security/cve/CVE-2025-68235/" source="CVE"/>
		<reference ref_id="CVE-2025-68237" ref_url="https://www.suse.com/security/cve/CVE-2025-68237/" source="CVE"/>
		<reference ref_id="CVE-2025-68238" ref_url="https://www.suse.com/security/cve/CVE-2025-68238/" source="CVE"/>
		<reference ref_id="CVE-2025-68239" ref_url="https://www.suse.com/security/cve/CVE-2025-68239/" source="CVE"/>
		<reference ref_id="CVE-2025-68242" ref_url="https://www.suse.com/security/cve/CVE-2025-68242/" source="CVE"/>
		<reference ref_id="CVE-2025-68244" ref_url="https://www.suse.com/security/cve/CVE-2025-68244/" source="CVE"/>
		<reference ref_id="CVE-2025-68249" ref_url="https://www.suse.com/security/cve/CVE-2025-68249/" source="CVE"/>
		<reference ref_id="CVE-2025-68252" ref_url="https://www.suse.com/security/cve/CVE-2025-68252/" source="CVE"/>
		<reference ref_id="CVE-2025-68254" ref_url="https://www.suse.com/security/cve/CVE-2025-68254/" source="CVE"/>
		<reference ref_id="CVE-2025-68255" ref_url="https://www.suse.com/security/cve/CVE-2025-68255/" source="CVE"/>
		<reference ref_id="CVE-2025-68256" ref_url="https://www.suse.com/security/cve/CVE-2025-68256/" source="CVE"/>
		<reference ref_id="CVE-2025-68257" ref_url="https://www.suse.com/security/cve/CVE-2025-68257/" source="CVE"/>
		<reference ref_id="CVE-2025-68258" ref_url="https://www.suse.com/security/cve/CVE-2025-68258/" source="CVE"/>
		<reference ref_id="CVE-2025-68259" ref_url="https://www.suse.com/security/cve/CVE-2025-68259/" source="CVE"/>
		<reference ref_id="CVE-2025-68264" ref_url="https://www.suse.com/security/cve/CVE-2025-68264/" source="CVE"/>
		<reference ref_id="CVE-2025-68283" ref_url="https://www.suse.com/security/cve/CVE-2025-68283/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68286" ref_url="https://www.suse.com/security/cve/CVE-2025-68286/" source="CVE"/>
		<reference ref_id="CVE-2025-68287" ref_url="https://www.suse.com/security/cve/CVE-2025-68287/" source="CVE"/>
		<reference ref_id="CVE-2025-68289" ref_url="https://www.suse.com/security/cve/CVE-2025-68289/" source="CVE"/>
		<reference ref_id="CVE-2025-68290" ref_url="https://www.suse.com/security/cve/CVE-2025-68290/" source="CVE"/>
		<reference ref_id="CVE-2025-68293" ref_url="https://www.suse.com/security/cve/CVE-2025-68293/" source="CVE"/>
		<reference ref_id="CVE-2025-68298" ref_url="https://www.suse.com/security/cve/CVE-2025-68298/" source="CVE"/>
		<reference ref_id="CVE-2025-68301" ref_url="https://www.suse.com/security/cve/CVE-2025-68301/" source="CVE"/>
		<reference ref_id="CVE-2025-68302" ref_url="https://www.suse.com/security/cve/CVE-2025-68302/" source="CVE"/>
		<reference ref_id="CVE-2025-68303" ref_url="https://www.suse.com/security/cve/CVE-2025-68303/" source="CVE"/>
		<reference ref_id="CVE-2025-68305" ref_url="https://www.suse.com/security/cve/CVE-2025-68305/" source="CVE"/>
		<reference ref_id="CVE-2025-68306" ref_url="https://www.suse.com/security/cve/CVE-2025-68306/" source="CVE"/>
		<reference ref_id="CVE-2025-68307" ref_url="https://www.suse.com/security/cve/CVE-2025-68307/" source="CVE"/>
		<reference ref_id="CVE-2025-68308" ref_url="https://www.suse.com/security/cve/CVE-2025-68308/" source="CVE"/>
		<reference ref_id="CVE-2025-68311" ref_url="https://www.suse.com/security/cve/CVE-2025-68311/" source="CVE"/>
		<reference ref_id="CVE-2025-68312" ref_url="https://www.suse.com/security/cve/CVE-2025-68312/" source="CVE"/>
		<reference ref_id="CVE-2025-68313" ref_url="https://www.suse.com/security/cve/CVE-2025-68313/" source="CVE"/>
		<reference ref_id="CVE-2025-68317" ref_url="https://www.suse.com/security/cve/CVE-2025-68317/" source="CVE"/>
		<reference ref_id="CVE-2025-68327" ref_url="https://www.suse.com/security/cve/CVE-2025-68327/" source="CVE"/>
		<reference ref_id="CVE-2025-68328" ref_url="https://www.suse.com/security/cve/CVE-2025-68328/" source="CVE"/>
		<reference ref_id="CVE-2025-68330" ref_url="https://www.suse.com/security/cve/CVE-2025-68330/" source="CVE"/>
		<reference ref_id="CVE-2025-68331" ref_url="https://www.suse.com/security/cve/CVE-2025-68331/" source="CVE"/>
		<reference ref_id="CVE-2025-68332" ref_url="https://www.suse.com/security/cve/CVE-2025-68332/" source="CVE"/>
		<reference ref_id="CVE-2025-68335" ref_url="https://www.suse.com/security/cve/CVE-2025-68335/" source="CVE"/>
		<reference ref_id="CVE-2025-68339" ref_url="https://www.suse.com/security/cve/CVE-2025-68339/" source="CVE"/>
		<reference ref_id="CVE-2025-68340" ref_url="https://www.suse.com/security/cve/CVE-2025-68340/" source="CVE"/>
		<reference ref_id="CVE-2025-68342" ref_url="https://www.suse.com/security/cve/CVE-2025-68342/" source="CVE"/>
		<reference ref_id="CVE-2025-68343" ref_url="https://www.suse.com/security/cve/CVE-2025-68343/" source="CVE"/>
		<reference ref_id="CVE-2025-68344" ref_url="https://www.suse.com/security/cve/CVE-2025-68344/" source="CVE"/>
		<reference ref_id="CVE-2025-68345" ref_url="https://www.suse.com/security/cve/CVE-2025-68345/" source="CVE"/>
		<reference ref_id="CVE-2025-68346" ref_url="https://www.suse.com/security/cve/CVE-2025-68346/" source="CVE"/>
		<reference ref_id="CVE-2025-68347" ref_url="https://www.suse.com/security/cve/CVE-2025-68347/" source="CVE"/>
		<reference ref_id="CVE-2025-68351" ref_url="https://www.suse.com/security/cve/CVE-2025-68351/" source="CVE"/>
		<reference ref_id="CVE-2025-68352" ref_url="https://www.suse.com/security/cve/CVE-2025-68352/" source="CVE"/>
		<reference ref_id="CVE-2025-68353" ref_url="https://www.suse.com/security/cve/CVE-2025-68353/" source="CVE"/>
		<reference ref_id="CVE-2025-68354" ref_url="https://www.suse.com/security/cve/CVE-2025-68354/" source="CVE"/>
		<reference ref_id="CVE-2025-68362" ref_url="https://www.suse.com/security/cve/CVE-2025-68362/" source="CVE"/>
		<reference ref_id="CVE-2025-68363" ref_url="https://www.suse.com/security/cve/CVE-2025-68363/" source="CVE"/>
		<reference ref_id="CVE-2025-68378" ref_url="https://www.suse.com/security/cve/CVE-2025-68378/" source="CVE"/>
		<reference ref_id="CVE-2025-68380" ref_url="https://www.suse.com/security/cve/CVE-2025-68380/" source="CVE"/>
		<reference ref_id="CVE-2025-68724" ref_url="https://www.suse.com/security/cve/CVE-2025-68724/" source="CVE"/>
		<reference ref_id="CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732/" source="CVE"/>
		<reference ref_id="CVE-2025-68736" ref_url="https://www.suse.com/security/cve/CVE-2025-68736/" source="CVE"/>
		<reference ref_id="CVE-2025-68740" ref_url="https://www.suse.com/security/cve/CVE-2025-68740/" source="CVE"/>
		<reference ref_id="CVE-2025-68742" ref_url="https://www.suse.com/security/cve/CVE-2025-68742/" source="CVE"/>
		<reference ref_id="CVE-2025-68744" ref_url="https://www.suse.com/security/cve/CVE-2025-68744/" source="CVE"/>
		<reference ref_id="CVE-2025-68746" ref_url="https://www.suse.com/security/cve/CVE-2025-68746/" source="CVE"/>
		<reference ref_id="CVE-2025-68747" ref_url="https://www.suse.com/security/cve/CVE-2025-68747/" source="CVE"/>
		<reference ref_id="CVE-2025-68748" ref_url="https://www.suse.com/security/cve/CVE-2025-68748/" source="CVE"/>
		<reference ref_id="CVE-2025-68749" ref_url="https://www.suse.com/security/cve/CVE-2025-68749/" source="CVE"/>
		<reference ref_id="CVE-2025-68750" ref_url="https://www.suse.com/security/cve/CVE-2025-68750/" source="CVE"/>
		<reference ref_id="CVE-2025-68753" ref_url="https://www.suse.com/security/cve/CVE-2025-68753/" source="CVE"/>
		<reference ref_id="CVE-2025-68757" ref_url="https://www.suse.com/security/cve/CVE-2025-68757/" source="CVE"/>
		<reference ref_id="CVE-2025-68758" ref_url="https://www.suse.com/security/cve/CVE-2025-68758/" source="CVE"/>
		<reference ref_id="CVE-2025-68759" ref_url="https://www.suse.com/security/cve/CVE-2025-68759/" source="CVE"/>
		<reference ref_id="CVE-2025-68765" ref_url="https://www.suse.com/security/cve/CVE-2025-68765/" source="CVE"/>
		<reference ref_id="CVE-2025-68766" ref_url="https://www.suse.com/security/cve/CVE-2025-68766/" source="CVE"/>
		<reference ref_id="CVE-2025-71096" ref_url="https://www.suse.com/security/cve/CVE-2025-71096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-38704: rcu/nocb: Fix possible invalid rdp's-&gt;nocb_cb_kthread pointer (bsc#1254408).
- CVE-2025-39880: ceph: fix race condition validating r_parent before applying state (bsc#1250388).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861).
- CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365).
- CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling
- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).
- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).
- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
- CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
- CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr update (bsc#1253623).
- CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1254961).
- CVE-2025-40215: xfrm: delete x-&gt;tunnel as we delete x (bsc#1254959).
- CVE-2025-40218: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success (bsc#1254964).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport() (bsc#1254815).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40237: fs/notify: call exportfs_encode_fid with s_umount (bsc#1254809).
- CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).
- CVE-2025-40239: net: phy: micrel: always set shared-&gt;phydev for LAN8814 (bsc#1254868).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-40246: xfs: fix out of bounds memory read error in symlink repair (bsc#1254861).
- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).
- CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq() failure (bsc#1254854).
- CVE-2025-40251: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (bsc#1254856).
- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in
  qede_tpa_cont() and qede_tpa_end() (bsc#1254849).
- CVE-2025-40254: net: openvswitch: remove never-working support for setting nsh fields (bsc#1254852).
- CVE-2025-40255: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() (bsc#1255156).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
- CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param (bsc#1255082).
- CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).
- CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying (bsc#1254830).
- CVE-2025-40276: drm/panthor: Flush shmem writes before mapping buffers CPU-uncached (bsc#1254824).
- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).
- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40292: virtio-net: fix received length check in big packets (bsc#1255175).
- CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking (bsc#1255179).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187).
- CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer (bsc#1254794).
- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).
- CVE-2025-40330: bnxt_en: Shutdown FW DMA in bnxt_shutdown() (bsc#1254616).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between components (bsc#1255273).
- CVE-2025-40346: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() (bsc#1255318).
- CVE-2025-40347: net: enetc: fix the deadlock of enetc_mdio_lock (bsc#1255262).
- CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ (bsc#1255260).
- CVE-2025-40355: sysfs: check visibility before changing group attribute ownership (bsc#1255261).
- CVE-2025-40357: net/smc: fix general protection fault in __smc_diag_dump (bsc#1255097).
- CVE-2025-40359: perf/x86/intel: Fix KASAN global-out-of-bounds warning (bsc#1255087).
- CVE-2025-40362: ceph: fix multifs mds auth caps issue (bsc#1255103).
- CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).
- CVE-2025-68197: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() (bsc#1255242).
- CVE-2025-68198: crash: fix crashkernel resource shrink (bsc#1255243).
- CVE-2025-68202: sched_ext: Fix unsafe locking in the scx_dump_state() (bsc#1255223).
- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).
- CVE-2025-68208: bpf: account for current allocated stack depth in widen_imprecise_scalars() (bsc#1255227).
- CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230).
- CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path (bsc#1255226).
- CVE-2025-68239: binfmt_misc: restore write access before closing files opened by open_exec() (bsc#1255272).
- CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199).
- CVE-2025-68264: ext4: refresh inline data size before write operations (bsc#1255380).
- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map-&gt;max_osd (bsc#1255379).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).
- CVE-2025-68293: mm/huge_memory: fix NULL pointer deference when splitting folio (bsc#1255150).
- CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path (bsc#1255120).
- CVE-2025-68302: net: sxgbe: fix potential NULL dereference in sxgbe_rx() (bsc#1255121).
- CVE-2025-68317: io_uring/zctx: check chained notif contexts (bsc#1255354).
- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).
- CVE-2025-68353: net: vxlan: prevent NULL deref in vxlan_xmit_one (bsc#1255533).
- CVE-2025-68363: bpf: Check skb-&gt;transport_header is set in bpf_skb_check_mtu (bsc#1255552).
- CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper function (bsc#1255614).
- CVE-2025-68736: landlock: Optimize file path walks and prepare for audit support (bsc#1255698).
- CVE-2025-68742: bpf: Fix invalid prog-&gt;stats access when update_effective_progs fails (bsc#1255707).
- CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps (bsc#1255709).
- CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606).

The following non security issues were fixed:

- KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it (bsc#1255672).
- Set HZ=1000 for ppc64 default configuration (jsc#PED-14344)
- bpf: Do not limit bpf_cgroup_from_id to current's namespace (bsc#1255433).
- btrfs: handle aligned EOF truncation correctly for subpage cases (bsc#1253238).
- cgroup: rstat: use LOCK CMPXCHG in css_rstat_updated (bsc#1255434).
- cifs: update dstaddr whenever channel iface is updated (git-fixes).
- cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026).
- cpuset: fix warning when disabling remote partition (bsc#1256794).
- ext4: use optimized mballoc scanning regardless of inode format (bsc#1254378).
- net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes).
- netdevsim: print human readable IP address (bsc#1255071).
- powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event
  handling (bsc#1253262 ltc#216029).
- powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285
  bsc#1205462 ltc#200161 ltc#200588 git-fixes bsc#1253739 ltc#211493
  bsc#1254244 ltc#216496).
- sched: Increase sched_tick_remote timeout (bsc#1254510).
- selftests: net: fib-onlink-tests: Set high metric for default IPv6 route (bsc#1255346).
- selftests: net: use slowwait to make sure IPv6 setup finished (bsc#1255349).
- selftests: net: use slowwait to stabilize vrf_route_leaking test (bsc#1255349).
- serial: xilinx_uartps: Use helper function hrtimer_update_function() (stable-fixes).
- supported.conf: Mark lan 743x supported (jsc#PED-14571)
- tick/sched: Limit non-timekeeper CPUs calling jiffies update (bsc#1254477).
- wifi: ath10k: Avoid vdev delete timeout when firmware is already down (stable-fixes).
- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256495).
- x86/microcode/AMD: Make __verify_patch_size() return bool (bsc#1256495).
- x86/microcode/AMD: Remove bogus comment from parse_container() (bsc#1256495).
- x86/microcode/AMD: Select which microcode patch to load (bsc#1256495).
- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256495).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243112">SUSE bug 1243112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245193">SUSE bug 1245193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247500">SUSE bug 1247500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250388">SUSE bug 1250388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252046">SUSE bug 1252046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252861">SUSE bug 1252861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253155">SUSE bug 1253155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253238">SUSE bug 1253238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253262">SUSE bug 1253262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253365">SUSE bug 1253365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253400">SUSE bug 1253400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253413">SUSE bug 1253413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253414">SUSE bug 1253414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253442">SUSE bug 1253442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253458">SUSE bug 1253458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253623">SUSE bug 1253623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253674">SUSE bug 1253674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253739">SUSE bug 1253739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254126">SUSE bug 1254126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254128">SUSE bug 1254128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254195">SUSE bug 1254195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254244">SUSE bug 1254244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254363">SUSE bug 1254363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254378">SUSE bug 1254378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254408">SUSE bug 1254408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254477">SUSE bug 1254477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254510">SUSE bug 1254510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254518">SUSE bug 1254518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254519">SUSE bug 1254519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254520">SUSE bug 1254520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254615">SUSE bug 1254615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254616">SUSE bug 1254616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254618">SUSE bug 1254618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254621">SUSE bug 1254621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254624">SUSE bug 1254624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254791">SUSE bug 1254791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254793">SUSE bug 1254793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254794">SUSE bug 1254794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254795">SUSE bug 1254795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254796">SUSE bug 1254796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254797">SUSE bug 1254797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254798">SUSE bug 1254798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254808">SUSE bug 1254808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254809">SUSE bug 1254809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254813">SUSE bug 1254813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254815">SUSE bug 1254815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254821">SUSE bug 1254821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254824">SUSE bug 1254824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254825">SUSE bug 1254825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254827">SUSE bug 1254827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254828">SUSE bug 1254828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254829">SUSE bug 1254829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254830">SUSE bug 1254830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254832">SUSE bug 1254832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254835">SUSE bug 1254835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254840">SUSE bug 1254840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254843">SUSE bug 1254843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254846">SUSE bug 1254846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254847">SUSE bug 1254847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254849">SUSE bug 1254849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254850">SUSE bug 1254850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254851">SUSE bug 1254851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254852">SUSE bug 1254852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254854">SUSE bug 1254854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254856">SUSE bug 1254856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254858">SUSE bug 1254858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254860">SUSE bug 1254860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254861">SUSE bug 1254861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254864">SUSE bug 1254864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254868">SUSE bug 1254868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254869">SUSE bug 1254869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254871">SUSE bug 1254871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254894">SUSE bug 1254894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254957">SUSE bug 1254957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254959">SUSE bug 1254959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254961">SUSE bug 1254961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254964">SUSE bug 1254964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254996">SUSE bug 1254996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255026">SUSE bug 1255026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255030">SUSE bug 1255030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255034">SUSE bug 1255034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255035">SUSE bug 1255035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255039">SUSE bug 1255039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255040">SUSE bug 1255040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255041">SUSE bug 1255041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255042">SUSE bug 1255042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255057">SUSE bug 1255057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255058">SUSE bug 1255058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255064">SUSE bug 1255064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255065">SUSE bug 1255065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255068">SUSE bug 1255068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255071">SUSE bug 1255071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255072">SUSE bug 1255072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255075">SUSE bug 1255075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255077">SUSE bug 1255077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255081">SUSE bug 1255081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255082">SUSE bug 1255082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255083">SUSE bug 1255083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255087">SUSE bug 1255087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255092">SUSE bug 1255092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255094">SUSE bug 1255094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255095">SUSE bug 1255095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255097">SUSE bug 1255097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255099">SUSE bug 1255099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255103">SUSE bug 1255103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255116">SUSE bug 1255116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255120">SUSE bug 1255120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255121">SUSE bug 1255121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255122">SUSE bug 1255122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255124">SUSE bug 1255124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255131">SUSE bug 1255131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255134">SUSE bug 1255134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255135">SUSE bug 1255135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255136">SUSE bug 1255136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255138">SUSE bug 1255138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255140">SUSE bug 1255140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255142">SUSE bug 1255142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255145">SUSE bug 1255145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255146">SUSE bug 1255146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255149">SUSE bug 1255149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255150">SUSE bug 1255150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255152">SUSE bug 1255152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255154">SUSE bug 1255154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255155">SUSE bug 1255155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255156">SUSE bug 1255156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255161">SUSE bug 1255161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255167">SUSE bug 1255167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255169">SUSE bug 1255169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255171">SUSE bug 1255171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255175">SUSE bug 1255175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255179">SUSE bug 1255179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255181">SUSE bug 1255181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255182">SUSE bug 1255182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255186">SUSE bug 1255186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255187">SUSE bug 1255187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255190">SUSE bug 1255190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255193">SUSE bug 1255193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255196">SUSE bug 1255196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255197">SUSE bug 1255197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255199">SUSE bug 1255199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255202">SUSE bug 1255202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255203">SUSE bug 1255203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255206">SUSE bug 1255206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255209">SUSE bug 1255209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255218">SUSE bug 1255218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255220">SUSE bug 1255220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255221">SUSE bug 1255221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255223">SUSE bug 1255223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255226">SUSE bug 1255226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255227">SUSE bug 1255227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255228">SUSE bug 1255228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255230">SUSE bug 1255230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255231">SUSE bug 1255231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255233">SUSE bug 1255233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255234">SUSE bug 1255234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255242">SUSE bug 1255242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255243">SUSE bug 1255243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255246">SUSE bug 1255246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255247">SUSE bug 1255247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255251">SUSE bug 1255251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255252">SUSE bug 1255252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255253">SUSE bug 1255253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255255">SUSE bug 1255255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255256">SUSE bug 1255256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255259">SUSE bug 1255259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255260">SUSE bug 1255260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255261">SUSE bug 1255261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255262">SUSE bug 1255262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255272">SUSE bug 1255272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255273">SUSE bug 1255273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255274">SUSE bug 1255274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255276">SUSE bug 1255276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255279">SUSE bug 1255279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255297">SUSE bug 1255297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255312">SUSE bug 1255312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255316">SUSE bug 1255316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255318">SUSE bug 1255318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255325">SUSE bug 1255325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255329">SUSE bug 1255329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255346">SUSE bug 1255346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255349">SUSE bug 1255349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255351">SUSE bug 1255351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255354">SUSE bug 1255354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255357">SUSE bug 1255357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255377">SUSE bug 1255377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255379">SUSE bug 1255379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255380">SUSE bug 1255380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255395">SUSE bug 1255395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255415">SUSE bug 1255415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255428">SUSE bug 1255428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255433">SUSE bug 1255433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255434">SUSE bug 1255434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255480">SUSE bug 1255480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255483">SUSE bug 1255483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255488">SUSE bug 1255488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255489">SUSE bug 1255489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255493">SUSE bug 1255493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255495">SUSE bug 1255495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255505">SUSE bug 1255505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255507">SUSE bug 1255507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255508">SUSE bug 1255508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255509">SUSE bug 1255509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255533">SUSE bug 1255533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255541">SUSE bug 1255541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255550">SUSE bug 1255550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255552">SUSE bug 1255552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255553">SUSE bug 1255553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255567">SUSE bug 1255567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255580">SUSE bug 1255580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255601">SUSE bug 1255601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255603">SUSE bug 1255603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255611">SUSE bug 1255611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255614">SUSE bug 1255614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255672">SUSE bug 1255672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255688">SUSE bug 1255688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255698">SUSE bug 1255698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255706">SUSE bug 1255706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255707">SUSE bug 1255707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255709">SUSE bug 1255709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255722">SUSE bug 1255722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255723">SUSE bug 1255723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255724">SUSE bug 1255724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255812">SUSE bug 1255812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255813">SUSE bug 1255813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255814">SUSE bug 1255814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255816">SUSE bug 1255816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255931">SUSE bug 1255931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255932">SUSE bug 1255932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255934">SUSE bug 1255934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255943">SUSE bug 1255943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255944">SUSE bug 1255944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256238">SUSE bug 1256238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256495">SUSE bug 1256495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256606">SUSE bug 1256606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256794">SUSE bug 1256794</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38704/">CVE-2025-38704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38704">CVE-2025-38704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39880/">CVE-2025-39880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39977/">CVE-2025-39977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39977">CVE-2025-39977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40042/">CVE-2025-40042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40123/">CVE-2025-40123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40123">CVE-2025-40123 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40160/">CVE-2025-40160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40160">CVE-2025-40160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40167/">CVE-2025-40167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40167">CVE-2025-40167 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40170/">CVE-2025-40170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40170">CVE-2025-40170 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40179/">CVE-2025-40179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40179">CVE-2025-40179 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40190/">CVE-2025-40190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40190">CVE-2025-40190 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40209/">CVE-2025-40209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40209">CVE-2025-40209 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40211/">CVE-2025-40211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40211">CVE-2025-40211 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40212/">CVE-2025-40212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40213/">CVE-2025-40213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40213">CVE-2025-40213 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40215/">CVE-2025-40215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40215">CVE-2025-40215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40218/">CVE-2025-40218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40218">CVE-2025-40218 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40219/">CVE-2025-40219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40219">CVE-2025-40219 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40220/">CVE-2025-40220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40220">CVE-2025-40220 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40221/">CVE-2025-40221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40221">CVE-2025-40221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40223/">CVE-2025-40223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40223">CVE-2025-40223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40225/">CVE-2025-40225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40225">CVE-2025-40225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40226/">CVE-2025-40226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40226">CVE-2025-40226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40231/">CVE-2025-40231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40231">CVE-2025-40231 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40233/">CVE-2025-40233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40233">CVE-2025-40233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40235/">CVE-2025-40235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40235">CVE-2025-40235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40237/">CVE-2025-40237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40237">CVE-2025-40237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40238/">CVE-2025-40238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40238">CVE-2025-40238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40239/">CVE-2025-40239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40239">CVE-2025-40239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40240/">CVE-2025-40240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40240">CVE-2025-40240 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40242/">CVE-2025-40242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40242">CVE-2025-40242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40246/">CVE-2025-40246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40246">CVE-2025-40246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40250/">CVE-2025-40250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40250">CVE-2025-40250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40251/">CVE-2025-40251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40252/">CVE-2025-40252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40252">CVE-2025-40252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40254/">CVE-2025-40254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40254">CVE-2025-40254 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40255/">CVE-2025-40255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40255">CVE-2025-40255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40256/">CVE-2025-40256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40256">CVE-2025-40256 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40262/">CVE-2025-40262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40262">CVE-2025-40262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40263/">CVE-2025-40263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40263">CVE-2025-40263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40264/">CVE-2025-40264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40264">CVE-2025-40264 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40266/">CVE-2025-40266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40266">CVE-2025-40266 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40268/">CVE-2025-40268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40268">CVE-2025-40268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40269/">CVE-2025-40269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40272/">CVE-2025-40272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40272">CVE-2025-40272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40273/">CVE-2025-40273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40273">CVE-2025-40273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40274/">CVE-2025-40274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40274">CVE-2025-40274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40275/">CVE-2025-40275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40275">CVE-2025-40275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40276/">CVE-2025-40276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40276">CVE-2025-40276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40278/">CVE-2025-40278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40278">CVE-2025-40278 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40279/">CVE-2025-40279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40279">CVE-2025-40279 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40280/">CVE-2025-40280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40282/">CVE-2025-40282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40282">CVE-2025-40282 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40283/">CVE-2025-40283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40283">CVE-2025-40283 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40284/">CVE-2025-40284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40287/">CVE-2025-40287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40287">CVE-2025-40287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40288/">CVE-2025-40288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40288">CVE-2025-40288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40289/">CVE-2025-40289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40289">CVE-2025-40289 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40292/">CVE-2025-40292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40292">CVE-2025-40292 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40293/">CVE-2025-40293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40293">CVE-2025-40293 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40294/">CVE-2025-40294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40294">CVE-2025-40294 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40301/">CVE-2025-40301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40301">CVE-2025-40301 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40302/">CVE-2025-40302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40302">CVE-2025-40302 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40303/">CVE-2025-40303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40303">CVE-2025-40303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40304/">CVE-2025-40304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40304">CVE-2025-40304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40307/">CVE-2025-40307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40307">CVE-2025-40307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40308/">CVE-2025-40308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40308">CVE-2025-40308 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40309/">CVE-2025-40309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40309">CVE-2025-40309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40310/">CVE-2025-40310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40310">CVE-2025-40310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40311/">CVE-2025-40311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40311">CVE-2025-40311 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40314/">CVE-2025-40314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40314">CVE-2025-40314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40315/">CVE-2025-40315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40315">CVE-2025-40315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40316/">CVE-2025-40316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40316">CVE-2025-40316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40317/">CVE-2025-40317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40317">CVE-2025-40317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40318/">CVE-2025-40318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40318">CVE-2025-40318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40319/">CVE-2025-40319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40319">CVE-2025-40319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40320/">CVE-2025-40320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40320">CVE-2025-40320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40321/">CVE-2025-40321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40321">CVE-2025-40321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40322/">CVE-2025-40322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40322">CVE-2025-40322 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40323/">CVE-2025-40323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40323">CVE-2025-40323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40324/">CVE-2025-40324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40324">CVE-2025-40324 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40328/">CVE-2025-40328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40328">CVE-2025-40328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40329/">CVE-2025-40329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40329">CVE-2025-40329 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40330/">CVE-2025-40330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40330">CVE-2025-40330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40331/">CVE-2025-40331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40331">CVE-2025-40331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40332/">CVE-2025-40332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40332">CVE-2025-40332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40337/">CVE-2025-40337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40337">CVE-2025-40337 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40338/">CVE-2025-40338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40338">CVE-2025-40338 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40339/">CVE-2025-40339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40339">CVE-2025-40339 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40340/">CVE-2025-40340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40340">CVE-2025-40340 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40342/">CVE-2025-40342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40342">CVE-2025-40342 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40343/">CVE-2025-40343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40343">CVE-2025-40343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40344/">CVE-2025-40344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40344">CVE-2025-40344 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40345/">CVE-2025-40345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40345">CVE-2025-40345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40346/">CVE-2025-40346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40346">CVE-2025-40346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40347/">CVE-2025-40347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40347">CVE-2025-40347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40350/">CVE-2025-40350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40350">CVE-2025-40350 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40353/">CVE-2025-40353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40353">CVE-2025-40353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40354/">CVE-2025-40354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40354">CVE-2025-40354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40355/">CVE-2025-40355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40355">CVE-2025-40355 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40357/">CVE-2025-40357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40357">CVE-2025-40357 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40359/">CVE-2025-40359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40359">CVE-2025-40359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40360/">CVE-2025-40360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40360">CVE-2025-40360 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40362/">CVE-2025-40362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40362">CVE-2025-40362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68167/">CVE-2025-68167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68167">CVE-2025-68167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68170/">CVE-2025-68170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68170">CVE-2025-68170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68171/">CVE-2025-68171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68171">CVE-2025-68171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68172/">CVE-2025-68172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68172">CVE-2025-68172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68176/">CVE-2025-68176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68176">CVE-2025-68176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68180/">CVE-2025-68180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68180">CVE-2025-68180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68181/">CVE-2025-68181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68181">CVE-2025-68181 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68183/">CVE-2025-68183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68183">CVE-2025-68183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68184/">CVE-2025-68184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68184">CVE-2025-68184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68185/">CVE-2025-68185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68185">CVE-2025-68185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68190/">CVE-2025-68190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68190">CVE-2025-68190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68192/">CVE-2025-68192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68192">CVE-2025-68192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68194/">CVE-2025-68194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68194">CVE-2025-68194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68195/">CVE-2025-68195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68195">CVE-2025-68195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68197/">CVE-2025-68197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68197">CVE-2025-68197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68198/">CVE-2025-68198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68198">CVE-2025-68198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68201/">CVE-2025-68201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68201">CVE-2025-68201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68202/">CVE-2025-68202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68202">CVE-2025-68202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68206/">CVE-2025-68206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68206">CVE-2025-68206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68207/">CVE-2025-68207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68207">CVE-2025-68207 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68208/">CVE-2025-68208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68208">CVE-2025-68208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68209/">CVE-2025-68209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68209">CVE-2025-68209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68210/">CVE-2025-68210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68210">CVE-2025-68210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68213/">CVE-2025-68213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68213">CVE-2025-68213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68215/">CVE-2025-68215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68215">CVE-2025-68215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68217/">CVE-2025-68217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68217">CVE-2025-68217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68222/">CVE-2025-68222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68222">CVE-2025-68222 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68223/">CVE-2025-68223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68223">CVE-2025-68223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68230/">CVE-2025-68230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68230">CVE-2025-68230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68233/">CVE-2025-68233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68233">CVE-2025-68233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68235/">CVE-2025-68235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68235">CVE-2025-68235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68237/">CVE-2025-68237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68237">CVE-2025-68237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68238/">CVE-2025-68238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68238">CVE-2025-68238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68239/">CVE-2025-68239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68239">CVE-2025-68239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68242/">CVE-2025-68242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68242">CVE-2025-68242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68244/">CVE-2025-68244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68244">CVE-2025-68244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68249/">CVE-2025-68249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68249">CVE-2025-68249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68252/">CVE-2025-68252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68252">CVE-2025-68252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68254/">CVE-2025-68254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68255/">CVE-2025-68255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68256/">CVE-2025-68256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68257/">CVE-2025-68257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68258/">CVE-2025-68258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68259/">CVE-2025-68259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68264/">CVE-2025-68264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68283/">CVE-2025-68283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68283">CVE-2025-68283 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68286/">CVE-2025-68286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68286">CVE-2025-68286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68287/">CVE-2025-68287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68287">CVE-2025-68287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68289/">CVE-2025-68289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68289">CVE-2025-68289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68290/">CVE-2025-68290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68290">CVE-2025-68290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68293/">CVE-2025-68293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68293">CVE-2025-68293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68298/">CVE-2025-68298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68298">CVE-2025-68298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68301/">CVE-2025-68301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68301">CVE-2025-68301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68302/">CVE-2025-68302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68302">CVE-2025-68302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68303/">CVE-2025-68303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68303">CVE-2025-68303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68305/">CVE-2025-68305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68305">CVE-2025-68305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68306/">CVE-2025-68306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68306">CVE-2025-68306 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68307/">CVE-2025-68307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68307">CVE-2025-68307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68308/">CVE-2025-68308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68308">CVE-2025-68308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68311/">CVE-2025-68311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68311">CVE-2025-68311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68312/">CVE-2025-68312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68312">CVE-2025-68312 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68313/">CVE-2025-68313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68313">CVE-2025-68313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68317/">CVE-2025-68317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68317">CVE-2025-68317 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68327/">CVE-2025-68327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68327">CVE-2025-68327 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68328/">CVE-2025-68328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68328">CVE-2025-68328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68330/">CVE-2025-68330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68330">CVE-2025-68330 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68331/">CVE-2025-68331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68331">CVE-2025-68331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68332/">CVE-2025-68332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68335/">CVE-2025-68335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68339/">CVE-2025-68339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68339">CVE-2025-68339 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68340/">CVE-2025-68340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68340">CVE-2025-68340 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68342/">CVE-2025-68342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68342">CVE-2025-68342 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68343/">CVE-2025-68343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68343">CVE-2025-68343 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68344/">CVE-2025-68344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68345/">CVE-2025-68345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68345">CVE-2025-68345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68346/">CVE-2025-68346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68347/">CVE-2025-68347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68351/">CVE-2025-68351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68351">CVE-2025-68351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68352/">CVE-2025-68352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68353/">CVE-2025-68353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68353">CVE-2025-68353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68354/">CVE-2025-68354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68362/">CVE-2025-68362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68363/">CVE-2025-68363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68378/">CVE-2025-68378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68380/">CVE-2025-68380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68724/">CVE-2025-68724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68736/">CVE-2025-68736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68736">CVE-2025-68736 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68740/">CVE-2025-68740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68742/">CVE-2025-68742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68744/">CVE-2025-68744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68746/">CVE-2025-68746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68747/">CVE-2025-68747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68748/">CVE-2025-68748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68749/">CVE-2025-68749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68749">CVE-2025-68749 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68750/">CVE-2025-68750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68750">CVE-2025-68750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68753/">CVE-2025-68753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68757/">CVE-2025-68757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68758/">CVE-2025-68758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68759/">CVE-2025-68759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68765/">CVE-2025-68765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68766/">CVE-2025-68766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71096/">CVE-2025-71096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71096">CVE-2025-71096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042239" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042240" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042241" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94615" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1215199" ref_url="https://bugzilla.suse.com/1215199" source="BUGZILLA"/>
		<reference ref_id="1235905" ref_url="https://bugzilla.suse.com/1235905" source="BUGZILLA"/>
		<reference ref_id="1242505" ref_url="https://bugzilla.suse.com/1242505" source="BUGZILLA"/>
		<reference ref_id="1242974" ref_url="https://bugzilla.suse.com/1242974" source="BUGZILLA"/>
		<reference ref_id="1242986" ref_url="https://bugzilla.suse.com/1242986" source="BUGZILLA"/>
		<reference ref_id="1243452" ref_url="https://bugzilla.suse.com/1243452" source="BUGZILLA"/>
		<reference ref_id="1243507" ref_url="https://bugzilla.suse.com/1243507" source="BUGZILLA"/>
		<reference ref_id="1243662" ref_url="https://bugzilla.suse.com/1243662" source="BUGZILLA"/>
		<reference ref_id="1246184" ref_url="https://bugzilla.suse.com/1246184" source="BUGZILLA"/>
		<reference ref_id="1246282" ref_url="https://bugzilla.suse.com/1246282" source="BUGZILLA"/>
		<reference ref_id="1247030" ref_url="https://bugzilla.suse.com/1247030" source="BUGZILLA"/>
		<reference ref_id="1247292" ref_url="https://bugzilla.suse.com/1247292" source="BUGZILLA"/>
		<reference ref_id="1247712" ref_url="https://bugzilla.suse.com/1247712" source="BUGZILLA"/>
		<reference ref_id="1248166" ref_url="https://bugzilla.suse.com/1248166" source="BUGZILLA"/>
		<reference ref_id="1248175" ref_url="https://bugzilla.suse.com/1248175" source="BUGZILLA"/>
		<reference ref_id="1248178" ref_url="https://bugzilla.suse.com/1248178" source="BUGZILLA"/>
		<reference ref_id="1248179" ref_url="https://bugzilla.suse.com/1248179" source="BUGZILLA"/>
		<reference ref_id="1248185" ref_url="https://bugzilla.suse.com/1248185" source="BUGZILLA"/>
		<reference ref_id="1248188" ref_url="https://bugzilla.suse.com/1248188" source="BUGZILLA"/>
		<reference ref_id="1248196" ref_url="https://bugzilla.suse.com/1248196" source="BUGZILLA"/>
		<reference ref_id="1248206" ref_url="https://bugzilla.suse.com/1248206" source="BUGZILLA"/>
		<reference ref_id="1248208" ref_url="https://bugzilla.suse.com/1248208" source="BUGZILLA"/>
		<reference ref_id="1248209" ref_url="https://bugzilla.suse.com/1248209" source="BUGZILLA"/>
		<reference ref_id="1248211" ref_url="https://bugzilla.suse.com/1248211" source="BUGZILLA"/>
		<reference ref_id="1248212" ref_url="https://bugzilla.suse.com/1248212" source="BUGZILLA"/>
		<reference ref_id="1248213" ref_url="https://bugzilla.suse.com/1248213" source="BUGZILLA"/>
		<reference ref_id="1248214" ref_url="https://bugzilla.suse.com/1248214" source="BUGZILLA"/>
		<reference ref_id="1248216" ref_url="https://bugzilla.suse.com/1248216" source="BUGZILLA"/>
		<reference ref_id="1248217" ref_url="https://bugzilla.suse.com/1248217" source="BUGZILLA"/>
		<reference ref_id="1248222" ref_url="https://bugzilla.suse.com/1248222" source="BUGZILLA"/>
		<reference ref_id="1248227" ref_url="https://bugzilla.suse.com/1248227" source="BUGZILLA"/>
		<reference ref_id="1248228" ref_url="https://bugzilla.suse.com/1248228" source="BUGZILLA"/>
		<reference ref_id="1248229" ref_url="https://bugzilla.suse.com/1248229" source="BUGZILLA"/>
		<reference ref_id="1248232" ref_url="https://bugzilla.suse.com/1248232" source="BUGZILLA"/>
		<reference ref_id="1248234" ref_url="https://bugzilla.suse.com/1248234" source="BUGZILLA"/>
		<reference ref_id="1248240" ref_url="https://bugzilla.suse.com/1248240" source="BUGZILLA"/>
		<reference ref_id="1248360" ref_url="https://bugzilla.suse.com/1248360" source="BUGZILLA"/>
		<reference ref_id="1248366" ref_url="https://bugzilla.suse.com/1248366" source="BUGZILLA"/>
		<reference ref_id="1248384" ref_url="https://bugzilla.suse.com/1248384" source="BUGZILLA"/>
		<reference ref_id="1248626" ref_url="https://bugzilla.suse.com/1248626" source="BUGZILLA"/>
		<reference ref_id="1249307" ref_url="https://bugzilla.suse.com/1249307" source="BUGZILLA"/>
		<reference ref_id="1249609" ref_url="https://bugzilla.suse.com/1249609" source="BUGZILLA"/>
		<reference ref_id="1249895" ref_url="https://bugzilla.suse.com/1249895" source="BUGZILLA"/>
		<reference ref_id="1249998" ref_url="https://bugzilla.suse.com/1249998" source="BUGZILLA"/>
		<reference ref_id="1250032" ref_url="https://bugzilla.suse.com/1250032" source="BUGZILLA"/>
		<reference ref_id="1250082" ref_url="https://bugzilla.suse.com/1250082" source="BUGZILLA"/>
		<reference ref_id="1250388" ref_url="https://bugzilla.suse.com/1250388" source="BUGZILLA"/>
		<reference ref_id="1250705" ref_url="https://bugzilla.suse.com/1250705" source="BUGZILLA"/>
		<reference ref_id="1250738" ref_url="https://bugzilla.suse.com/1250738" source="BUGZILLA"/>
		<reference ref_id="1250748" ref_url="https://bugzilla.suse.com/1250748" source="BUGZILLA"/>
		<reference ref_id="1252712" ref_url="https://bugzilla.suse.com/1252712" source="BUGZILLA"/>
		<reference ref_id="1252773" ref_url="https://bugzilla.suse.com/1252773" source="BUGZILLA"/>
		<reference ref_id="1252784" ref_url="https://bugzilla.suse.com/1252784" source="BUGZILLA"/>
		<reference ref_id="1252891" ref_url="https://bugzilla.suse.com/1252891" source="BUGZILLA"/>
		<reference ref_id="1252900" ref_url="https://bugzilla.suse.com/1252900" source="BUGZILLA"/>
		<reference ref_id="1253049" ref_url="https://bugzilla.suse.com/1253049" source="BUGZILLA"/>
		<reference ref_id="1253078" ref_url="https://bugzilla.suse.com/1253078" source="BUGZILLA"/>
		<reference ref_id="1253079" ref_url="https://bugzilla.suse.com/1253079" source="BUGZILLA"/>
		<reference ref_id="1253087" ref_url="https://bugzilla.suse.com/1253087" source="BUGZILLA"/>
		<reference ref_id="1253344" ref_url="https://bugzilla.suse.com/1253344" source="BUGZILLA"/>
		<reference ref_id="1253500" ref_url="https://bugzilla.suse.com/1253500" source="BUGZILLA"/>
		<reference ref_id="1253739" ref_url="https://bugzilla.suse.com/1253739" source="BUGZILLA"/>
		<reference ref_id="1254244" ref_url="https://bugzilla.suse.com/1254244" source="BUGZILLA"/>
		<reference ref_id="1254308" ref_url="https://bugzilla.suse.com/1254308" source="BUGZILLA"/>
		<reference ref_id="1254447" ref_url="https://bugzilla.suse.com/1254447" source="BUGZILLA"/>
		<reference ref_id="1254839" ref_url="https://bugzilla.suse.com/1254839" source="BUGZILLA"/>
		<reference ref_id="1254842" ref_url="https://bugzilla.suse.com/1254842" source="BUGZILLA"/>
		<reference ref_id="1254845" ref_url="https://bugzilla.suse.com/1254845" source="BUGZILLA"/>
		<reference ref_id="1254977" ref_url="https://bugzilla.suse.com/1254977" source="BUGZILLA"/>
		<reference ref_id="1255102" ref_url="https://bugzilla.suse.com/1255102" source="BUGZILLA"/>
		<reference ref_id="1255128" ref_url="https://bugzilla.suse.com/1255128" source="BUGZILLA"/>
		<reference ref_id="1255157" ref_url="https://bugzilla.suse.com/1255157" source="BUGZILLA"/>
		<reference ref_id="1255164" ref_url="https://bugzilla.suse.com/1255164" source="BUGZILLA"/>
		<reference ref_id="1255172" ref_url="https://bugzilla.suse.com/1255172" source="BUGZILLA"/>
		<reference ref_id="1255216" ref_url="https://bugzilla.suse.com/1255216" source="BUGZILLA"/>
		<reference ref_id="1255232" ref_url="https://bugzilla.suse.com/1255232" source="BUGZILLA"/>
		<reference ref_id="1255241" ref_url="https://bugzilla.suse.com/1255241" source="BUGZILLA"/>
		<reference ref_id="1255245" ref_url="https://bugzilla.suse.com/1255245" source="BUGZILLA"/>
		<reference ref_id="1255266" ref_url="https://bugzilla.suse.com/1255266" source="BUGZILLA"/>
		<reference ref_id="1255268" ref_url="https://bugzilla.suse.com/1255268" source="BUGZILLA"/>
		<reference ref_id="1255269" ref_url="https://bugzilla.suse.com/1255269" source="BUGZILLA"/>
		<reference ref_id="1255319" ref_url="https://bugzilla.suse.com/1255319" source="BUGZILLA"/>
		<reference ref_id="1255327" ref_url="https://bugzilla.suse.com/1255327" source="BUGZILLA"/>
		<reference ref_id="1255346" ref_url="https://bugzilla.suse.com/1255346" source="BUGZILLA"/>
		<reference ref_id="1255403" ref_url="https://bugzilla.suse.com/1255403" source="BUGZILLA"/>
		<reference ref_id="1255417" ref_url="https://bugzilla.suse.com/1255417" source="BUGZILLA"/>
		<reference ref_id="1255459" ref_url="https://bugzilla.suse.com/1255459" source="BUGZILLA"/>
		<reference ref_id="1255482" ref_url="https://bugzilla.suse.com/1255482" source="BUGZILLA"/>
		<reference ref_id="1255506" ref_url="https://bugzilla.suse.com/1255506" source="BUGZILLA"/>
		<reference ref_id="1255526" ref_url="https://bugzilla.suse.com/1255526" source="BUGZILLA"/>
		<reference ref_id="1255527" ref_url="https://bugzilla.suse.com/1255527" source="BUGZILLA"/>
		<reference ref_id="1255529" ref_url="https://bugzilla.suse.com/1255529" source="BUGZILLA"/>
		<reference ref_id="1255530" ref_url="https://bugzilla.suse.com/1255530" source="BUGZILLA"/>
		<reference ref_id="1255536" ref_url="https://bugzilla.suse.com/1255536" source="BUGZILLA"/>
		<reference ref_id="1255537" ref_url="https://bugzilla.suse.com/1255537" source="BUGZILLA"/>
		<reference ref_id="1255542" ref_url="https://bugzilla.suse.com/1255542" source="BUGZILLA"/>
		<reference ref_id="1255544" ref_url="https://bugzilla.suse.com/1255544" source="BUGZILLA"/>
		<reference ref_id="1255547" ref_url="https://bugzilla.suse.com/1255547" source="BUGZILLA"/>
		<reference ref_id="1255569" ref_url="https://bugzilla.suse.com/1255569" source="BUGZILLA"/>
		<reference ref_id="1255593" ref_url="https://bugzilla.suse.com/1255593" source="BUGZILLA"/>
		<reference ref_id="1255622" ref_url="https://bugzilla.suse.com/1255622" source="BUGZILLA"/>
		<reference ref_id="1255694" ref_url="https://bugzilla.suse.com/1255694" source="BUGZILLA"/>
		<reference ref_id="1255695" ref_url="https://bugzilla.suse.com/1255695" source="BUGZILLA"/>
		<reference ref_id="1255703" ref_url="https://bugzilla.suse.com/1255703" source="BUGZILLA"/>
		<reference ref_id="1255708" ref_url="https://bugzilla.suse.com/1255708" source="BUGZILLA"/>
		<reference ref_id="1255811" ref_url="https://bugzilla.suse.com/1255811" source="BUGZILLA"/>
		<reference ref_id="1255930" ref_url="https://bugzilla.suse.com/1255930" source="BUGZILLA"/>
		<reference ref_id="1256579" ref_url="https://bugzilla.suse.com/1256579" source="BUGZILLA"/>
		<reference ref_id="1256582" ref_url="https://bugzilla.suse.com/1256582" source="BUGZILLA"/>
		<reference ref_id="1256584" ref_url="https://bugzilla.suse.com/1256584" source="BUGZILLA"/>
		<reference ref_id="1256586" ref_url="https://bugzilla.suse.com/1256586" source="BUGZILLA"/>
		<reference ref_id="1256591" ref_url="https://bugzilla.suse.com/1256591" source="BUGZILLA"/>
		<reference ref_id="1256592" ref_url="https://bugzilla.suse.com/1256592" source="BUGZILLA"/>
		<reference ref_id="1256593" ref_url="https://bugzilla.suse.com/1256593" source="BUGZILLA"/>
		<reference ref_id="1256594" ref_url="https://bugzilla.suse.com/1256594" source="BUGZILLA"/>
		<reference ref_id="1256597" ref_url="https://bugzilla.suse.com/1256597" source="BUGZILLA"/>
		<reference ref_id="1256605" ref_url="https://bugzilla.suse.com/1256605" source="BUGZILLA"/>
		<reference ref_id="1256607" ref_url="https://bugzilla.suse.com/1256607" source="BUGZILLA"/>
		<reference ref_id="1256608" ref_url="https://bugzilla.suse.com/1256608" source="BUGZILLA"/>
		<reference ref_id="1256609" ref_url="https://bugzilla.suse.com/1256609" source="BUGZILLA"/>
		<reference ref_id="1256610" ref_url="https://bugzilla.suse.com/1256610" source="BUGZILLA"/>
		<reference ref_id="1256611" ref_url="https://bugzilla.suse.com/1256611" source="BUGZILLA"/>
		<reference ref_id="1256612" ref_url="https://bugzilla.suse.com/1256612" source="BUGZILLA"/>
		<reference ref_id="1256613" ref_url="https://bugzilla.suse.com/1256613" source="BUGZILLA"/>
		<reference ref_id="1256616" ref_url="https://bugzilla.suse.com/1256616" source="BUGZILLA"/>
		<reference ref_id="1256617" ref_url="https://bugzilla.suse.com/1256617" source="BUGZILLA"/>
		<reference ref_id="1256619" ref_url="https://bugzilla.suse.com/1256619" source="BUGZILLA"/>
		<reference ref_id="1256622" ref_url="https://bugzilla.suse.com/1256622" source="BUGZILLA"/>
		<reference ref_id="1256623" ref_url="https://bugzilla.suse.com/1256623" source="BUGZILLA"/>
		<reference ref_id="1256625" ref_url="https://bugzilla.suse.com/1256625" source="BUGZILLA"/>
		<reference ref_id="1256627" ref_url="https://bugzilla.suse.com/1256627" source="BUGZILLA"/>
		<reference ref_id="1256628" ref_url="https://bugzilla.suse.com/1256628" source="BUGZILLA"/>
		<reference ref_id="1256630" ref_url="https://bugzilla.suse.com/1256630" source="BUGZILLA"/>
		<reference ref_id="1256632" ref_url="https://bugzilla.suse.com/1256632" source="BUGZILLA"/>
		<reference ref_id="1256638" ref_url="https://bugzilla.suse.com/1256638" source="BUGZILLA"/>
		<reference ref_id="1256641" ref_url="https://bugzilla.suse.com/1256641" source="BUGZILLA"/>
		<reference ref_id="1256643" ref_url="https://bugzilla.suse.com/1256643" source="BUGZILLA"/>
		<reference ref_id="1256645" ref_url="https://bugzilla.suse.com/1256645" source="BUGZILLA"/>
		<reference ref_id="1256646" ref_url="https://bugzilla.suse.com/1256646" source="BUGZILLA"/>
		<reference ref_id="1256650" ref_url="https://bugzilla.suse.com/1256650" source="BUGZILLA"/>
		<reference ref_id="1256651" ref_url="https://bugzilla.suse.com/1256651" source="BUGZILLA"/>
		<reference ref_id="1256653" ref_url="https://bugzilla.suse.com/1256653" source="BUGZILLA"/>
		<reference ref_id="1256654" ref_url="https://bugzilla.suse.com/1256654" source="BUGZILLA"/>
		<reference ref_id="1256655" ref_url="https://bugzilla.suse.com/1256655" source="BUGZILLA"/>
		<reference ref_id="1256656" ref_url="https://bugzilla.suse.com/1256656" source="BUGZILLA"/>
		<reference ref_id="1256659" ref_url="https://bugzilla.suse.com/1256659" source="BUGZILLA"/>
		<reference ref_id="1256660" ref_url="https://bugzilla.suse.com/1256660" source="BUGZILLA"/>
		<reference ref_id="1256661" ref_url="https://bugzilla.suse.com/1256661" source="BUGZILLA"/>
		<reference ref_id="1256664" ref_url="https://bugzilla.suse.com/1256664" source="BUGZILLA"/>
		<reference ref_id="1256665" ref_url="https://bugzilla.suse.com/1256665" source="BUGZILLA"/>
		<reference ref_id="1256667" ref_url="https://bugzilla.suse.com/1256667" source="BUGZILLA"/>
		<reference ref_id="1256668" ref_url="https://bugzilla.suse.com/1256668" source="BUGZILLA"/>
		<reference ref_id="1256674" ref_url="https://bugzilla.suse.com/1256674" source="BUGZILLA"/>
		<reference ref_id="1256677" ref_url="https://bugzilla.suse.com/1256677" source="BUGZILLA"/>
		<reference ref_id="1256680" ref_url="https://bugzilla.suse.com/1256680" source="BUGZILLA"/>
		<reference ref_id="1256682" ref_url="https://bugzilla.suse.com/1256682" source="BUGZILLA"/>
		<reference ref_id="1256683" ref_url="https://bugzilla.suse.com/1256683" source="BUGZILLA"/>
		<reference ref_id="1256688" ref_url="https://bugzilla.suse.com/1256688" source="BUGZILLA"/>
		<reference ref_id="1256689" ref_url="https://bugzilla.suse.com/1256689" source="BUGZILLA"/>
		<reference ref_id="1256716" ref_url="https://bugzilla.suse.com/1256716" source="BUGZILLA"/>
		<reference ref_id="1256726" ref_url="https://bugzilla.suse.com/1256726" source="BUGZILLA"/>
		<reference ref_id="1256728" ref_url="https://bugzilla.suse.com/1256728" source="BUGZILLA"/>
		<reference ref_id="1256730" ref_url="https://bugzilla.suse.com/1256730" source="BUGZILLA"/>
		<reference ref_id="1256733" ref_url="https://bugzilla.suse.com/1256733" source="BUGZILLA"/>
		<reference ref_id="1256737" ref_url="https://bugzilla.suse.com/1256737" source="BUGZILLA"/>
		<reference ref_id="1256741" ref_url="https://bugzilla.suse.com/1256741" source="BUGZILLA"/>
		<reference ref_id="1256742" ref_url="https://bugzilla.suse.com/1256742" source="BUGZILLA"/>
		<reference ref_id="1256744" ref_url="https://bugzilla.suse.com/1256744" source="BUGZILLA"/>
		<reference ref_id="1256748" ref_url="https://bugzilla.suse.com/1256748" source="BUGZILLA"/>
		<reference ref_id="1256749" ref_url="https://bugzilla.suse.com/1256749" source="BUGZILLA"/>
		<reference ref_id="1256752" ref_url="https://bugzilla.suse.com/1256752" source="BUGZILLA"/>
		<reference ref_id="1256754" ref_url="https://bugzilla.suse.com/1256754" source="BUGZILLA"/>
		<reference ref_id="1256755" ref_url="https://bugzilla.suse.com/1256755" source="BUGZILLA"/>
		<reference ref_id="1256756" ref_url="https://bugzilla.suse.com/1256756" source="BUGZILLA"/>
		<reference ref_id="1256757" ref_url="https://bugzilla.suse.com/1256757" source="BUGZILLA"/>
		<reference ref_id="1256759" ref_url="https://bugzilla.suse.com/1256759" source="BUGZILLA"/>
		<reference ref_id="1256760" ref_url="https://bugzilla.suse.com/1256760" source="BUGZILLA"/>
		<reference ref_id="1256761" ref_url="https://bugzilla.suse.com/1256761" source="BUGZILLA"/>
		<reference ref_id="1256763" ref_url="https://bugzilla.suse.com/1256763" source="BUGZILLA"/>
		<reference ref_id="1256770" ref_url="https://bugzilla.suse.com/1256770" source="BUGZILLA"/>
		<reference ref_id="1256773" ref_url="https://bugzilla.suse.com/1256773" source="BUGZILLA"/>
		<reference ref_id="1256774" ref_url="https://bugzilla.suse.com/1256774" source="BUGZILLA"/>
		<reference ref_id="1256777" ref_url="https://bugzilla.suse.com/1256777" source="BUGZILLA"/>
		<reference ref_id="1256779" ref_url="https://bugzilla.suse.com/1256779" source="BUGZILLA"/>
		<reference ref_id="1256781" ref_url="https://bugzilla.suse.com/1256781" source="BUGZILLA"/>
		<reference ref_id="1256785" ref_url="https://bugzilla.suse.com/1256785" source="BUGZILLA"/>
		<reference ref_id="1256792" ref_url="https://bugzilla.suse.com/1256792" source="BUGZILLA"/>
		<reference ref_id="1256793" ref_url="https://bugzilla.suse.com/1256793" source="BUGZILLA"/>
		<reference ref_id="1256794" ref_url="https://bugzilla.suse.com/1256794" source="BUGZILLA"/>
		<reference ref_id="1256864" ref_url="https://bugzilla.suse.com/1256864" source="BUGZILLA"/>
		<reference ref_id="1256865" ref_url="https://bugzilla.suse.com/1256865" source="BUGZILLA"/>
		<reference ref_id="1256867" ref_url="https://bugzilla.suse.com/1256867" source="BUGZILLA"/>
		<reference ref_id="1256975" ref_url="https://bugzilla.suse.com/1256975" source="BUGZILLA"/>
		<reference ref_id="1257015" ref_url="https://bugzilla.suse.com/1257015" source="BUGZILLA"/>
		<reference ref_id="1257035" ref_url="https://bugzilla.suse.com/1257035" source="BUGZILLA"/>
		<reference ref_id="1257053" ref_url="https://bugzilla.suse.com/1257053" source="BUGZILLA"/>
		<reference ref_id="1257154" ref_url="https://bugzilla.suse.com/1257154" source="BUGZILLA"/>
		<reference ref_id="1257155" ref_url="https://bugzilla.suse.com/1257155" source="BUGZILLA"/>
		<reference ref_id="1257158" ref_url="https://bugzilla.suse.com/1257158" source="BUGZILLA"/>
		<reference ref_id="1257159" ref_url="https://bugzilla.suse.com/1257159" source="BUGZILLA"/>
		<reference ref_id="1257163" ref_url="https://bugzilla.suse.com/1257163" source="BUGZILLA"/>
		<reference ref_id="1257164" ref_url="https://bugzilla.suse.com/1257164" source="BUGZILLA"/>
		<reference ref_id="1257167" ref_url="https://bugzilla.suse.com/1257167" source="BUGZILLA"/>
		<reference ref_id="1257168" ref_url="https://bugzilla.suse.com/1257168" source="BUGZILLA"/>
		<reference ref_id="1257179" ref_url="https://bugzilla.suse.com/1257179" source="BUGZILLA"/>
		<reference ref_id="1257180" ref_url="https://bugzilla.suse.com/1257180" source="BUGZILLA"/>
		<reference ref_id="1257202" ref_url="https://bugzilla.suse.com/1257202" source="BUGZILLA"/>
		<reference ref_id="1257204" ref_url="https://bugzilla.suse.com/1257204" source="BUGZILLA"/>
		<reference ref_id="1257207" ref_url="https://bugzilla.suse.com/1257207" source="BUGZILLA"/>
		<reference ref_id="1257208" ref_url="https://bugzilla.suse.com/1257208" source="BUGZILLA"/>
		<reference ref_id="1257215" ref_url="https://bugzilla.suse.com/1257215" source="BUGZILLA"/>
		<reference ref_id="1257217" ref_url="https://bugzilla.suse.com/1257217" source="BUGZILLA"/>
		<reference ref_id="1257218" ref_url="https://bugzilla.suse.com/1257218" source="BUGZILLA"/>
		<reference ref_id="1257220" ref_url="https://bugzilla.suse.com/1257220" source="BUGZILLA"/>
		<reference ref_id="1257221" ref_url="https://bugzilla.suse.com/1257221" source="BUGZILLA"/>
		<reference ref_id="1257225" ref_url="https://bugzilla.suse.com/1257225" source="BUGZILLA"/>
		<reference ref_id="1257227" ref_url="https://bugzilla.suse.com/1257227" source="BUGZILLA"/>
		<reference ref_id="1257232" ref_url="https://bugzilla.suse.com/1257232" source="BUGZILLA"/>
		<reference ref_id="1257234" ref_url="https://bugzilla.suse.com/1257234" source="BUGZILLA"/>
		<reference ref_id="1257236" ref_url="https://bugzilla.suse.com/1257236" source="BUGZILLA"/>
		<reference ref_id="1257243" ref_url="https://bugzilla.suse.com/1257243" source="BUGZILLA"/>
		<reference ref_id="1257245" ref_url="https://bugzilla.suse.com/1257245" source="BUGZILLA"/>
		<reference ref_id="1257276" ref_url="https://bugzilla.suse.com/1257276" source="BUGZILLA"/>
		<reference ref_id="1257277" ref_url="https://bugzilla.suse.com/1257277" source="BUGZILLA"/>
		<reference ref_id="1257279" ref_url="https://bugzilla.suse.com/1257279" source="BUGZILLA"/>
		<reference ref_id="1257282" ref_url="https://bugzilla.suse.com/1257282" source="BUGZILLA"/>
		<reference ref_id="1257296" ref_url="https://bugzilla.suse.com/1257296" source="BUGZILLA"/>
		<reference ref_id="1257309" ref_url="https://bugzilla.suse.com/1257309" source="BUGZILLA"/>
		<reference ref_id="1257473" ref_url="https://bugzilla.suse.com/1257473" source="BUGZILLA"/>
		<reference ref_id="1257504" ref_url="https://bugzilla.suse.com/1257504" source="BUGZILLA"/>
		<reference ref_id="1257603" ref_url="https://bugzilla.suse.com/1257603" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-54031" ref_url="https://www.suse.com/security/cve/CVE-2024-54031/" source="CVE"/>
		<reference ref_id="CVE-2025-37744" ref_url="https://www.suse.com/security/cve/CVE-2025-37744/" source="CVE"/>
		<reference ref_id="CVE-2025-37751" ref_url="https://www.suse.com/security/cve/CVE-2025-37751/" source="CVE"/>
		<reference ref_id="CVE-2025-37841" ref_url="https://www.suse.com/security/cve/CVE-2025-37841/" source="CVE"/>
		<reference ref_id="CVE-2025-37845" ref_url="https://www.suse.com/security/cve/CVE-2025-37845/" source="CVE"/>
		<reference ref_id="CVE-2025-37904" ref_url="https://www.suse.com/security/cve/CVE-2025-37904/" source="CVE"/>
		<reference ref_id="CVE-2025-37955" ref_url="https://www.suse.com/security/cve/CVE-2025-37955/" source="CVE"/>
		<reference ref_id="CVE-2025-38243" ref_url="https://www.suse.com/security/cve/CVE-2025-38243/" source="CVE"/>
		<reference ref_id="CVE-2025-38262" ref_url="https://www.suse.com/security/cve/CVE-2025-38262/" source="CVE"/>
		<reference ref_id="CVE-2025-38297" ref_url="https://www.suse.com/security/cve/CVE-2025-38297/" source="CVE"/>
		<reference ref_id="CVE-2025-38298" ref_url="https://www.suse.com/security/cve/CVE-2025-38298/" source="CVE"/>
		<reference ref_id="CVE-2025-38379" ref_url="https://www.suse.com/security/cve/CVE-2025-38379/" source="CVE"/>
		<reference ref_id="CVE-2025-38423" ref_url="https://www.suse.com/security/cve/CVE-2025-38423/" source="CVE"/>
		<reference ref_id="CVE-2025-38505" ref_url="https://www.suse.com/security/cve/CVE-2025-38505/" source="CVE"/>
		<reference ref_id="CVE-2025-38507" ref_url="https://www.suse.com/security/cve/CVE-2025-38507/" source="CVE"/>
		<reference ref_id="CVE-2025-38510" ref_url="https://www.suse.com/security/cve/CVE-2025-38510/" source="CVE"/>
		<reference ref_id="CVE-2025-38511" ref_url="https://www.suse.com/security/cve/CVE-2025-38511/" source="CVE"/>
		<reference ref_id="CVE-2025-38512" ref_url="https://www.suse.com/security/cve/CVE-2025-38512/" source="CVE"/>
		<reference ref_id="CVE-2025-38513" ref_url="https://www.suse.com/security/cve/CVE-2025-38513/" source="CVE"/>
		<reference ref_id="CVE-2025-38515" ref_url="https://www.suse.com/security/cve/CVE-2025-38515/" source="CVE"/>
		<reference ref_id="CVE-2025-38516" ref_url="https://www.suse.com/security/cve/CVE-2025-38516/" source="CVE"/>
		<reference ref_id="CVE-2025-38520" ref_url="https://www.suse.com/security/cve/CVE-2025-38520/" source="CVE"/>
		<reference ref_id="CVE-2025-38521" ref_url="https://www.suse.com/security/cve/CVE-2025-38521/" source="CVE"/>
		<reference ref_id="CVE-2025-38529" ref_url="https://www.suse.com/security/cve/CVE-2025-38529/" source="CVE"/>
		<reference ref_id="CVE-2025-38530" ref_url="https://www.suse.com/security/cve/CVE-2025-38530/" source="CVE"/>
		<reference ref_id="CVE-2025-38535" ref_url="https://www.suse.com/security/cve/CVE-2025-38535/" source="CVE"/>
		<reference ref_id="CVE-2025-38537" ref_url="https://www.suse.com/security/cve/CVE-2025-38537/" source="CVE"/>
		<reference ref_id="CVE-2025-38538" ref_url="https://www.suse.com/security/cve/CVE-2025-38538/" source="CVE"/>
		<reference ref_id="CVE-2025-38539" ref_url="https://www.suse.com/security/cve/CVE-2025-38539/" source="CVE"/>
		<reference ref_id="CVE-2025-38540" ref_url="https://www.suse.com/security/cve/CVE-2025-38540/" source="CVE"/>
		<reference ref_id="CVE-2025-38541" ref_url="https://www.suse.com/security/cve/CVE-2025-38541/" source="CVE"/>
		<reference ref_id="CVE-2025-38543" ref_url="https://www.suse.com/security/cve/CVE-2025-38543/" source="CVE"/>
		<reference ref_id="CVE-2025-38547" ref_url="https://www.suse.com/security/cve/CVE-2025-38547/" source="CVE"/>
		<reference ref_id="CVE-2025-38548" ref_url="https://www.suse.com/security/cve/CVE-2025-38548/" source="CVE"/>
		<reference ref_id="CVE-2025-38550" ref_url="https://www.suse.com/security/cve/CVE-2025-38550/" source="CVE"/>
		<reference ref_id="CVE-2025-38551" ref_url="https://www.suse.com/security/cve/CVE-2025-38551/" source="CVE"/>
		<reference ref_id="CVE-2025-38569" ref_url="https://www.suse.com/security/cve/CVE-2025-38569/" source="CVE"/>
		<reference ref_id="CVE-2025-38589" ref_url="https://www.suse.com/security/cve/CVE-2025-38589/" source="CVE"/>
		<reference ref_id="CVE-2025-38590" ref_url="https://www.suse.com/security/cve/CVE-2025-38590/" source="CVE"/>
		<reference ref_id="CVE-2025-38645" ref_url="https://www.suse.com/security/cve/CVE-2025-38645/" source="CVE"/>
		<reference ref_id="CVE-2025-39689" ref_url="https://www.suse.com/security/cve/CVE-2025-39689/" source="CVE"/>
		<reference ref_id="CVE-2025-39795" ref_url="https://www.suse.com/security/cve/CVE-2025-39795/" source="CVE"/>
		<reference ref_id="CVE-2025-39813" ref_url="https://www.suse.com/security/cve/CVE-2025-39813/" source="CVE"/>
		<reference ref_id="CVE-2025-39814" ref_url="https://www.suse.com/security/cve/CVE-2025-39814/" source="CVE"/>
		<reference ref_id="CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817/" source="CVE"/>
		<reference ref_id="CVE-2025-39829" ref_url="https://www.suse.com/security/cve/CVE-2025-39829/" source="CVE"/>
		<reference ref_id="CVE-2025-39880" ref_url="https://www.suse.com/security/cve/CVE-2025-39880/" source="CVE"/>
		<reference ref_id="CVE-2025-39913" ref_url="https://www.suse.com/security/cve/CVE-2025-39913/" source="CVE"/>
		<reference ref_id="CVE-2025-39927" ref_url="https://www.suse.com/security/cve/CVE-2025-39927/" source="CVE"/>
		<reference ref_id="CVE-2025-40030" ref_url="https://www.suse.com/security/cve/CVE-2025-40030/" source="CVE"/>
		<reference ref_id="CVE-2025-40045" ref_url="https://www.suse.com/security/cve/CVE-2025-40045/" source="CVE"/>
		<reference ref_id="CVE-2025-40097" ref_url="https://www.suse.com/security/cve/CVE-2025-40097/" source="CVE"/>
		<reference ref_id="CVE-2025-40106" ref_url="https://www.suse.com/security/cve/CVE-2025-40106/" source="CVE"/>
		<reference ref_id="CVE-2025-40147" ref_url="https://www.suse.com/security/cve/CVE-2025-40147/" source="CVE"/>
		<reference ref_id="CVE-2025-40195" ref_url="https://www.suse.com/security/cve/CVE-2025-40195/" source="CVE"/>
		<reference ref_id="CVE-2025-40257" ref_url="https://www.suse.com/security/cve/CVE-2025-40257/" source="CVE"/>
		<reference ref_id="CVE-2025-40259" ref_url="https://www.suse.com/security/cve/CVE-2025-40259/" source="CVE"/>
		<reference ref_id="CVE-2025-40261" ref_url="https://www.suse.com/security/cve/CVE-2025-40261/" source="CVE"/>
		<reference ref_id="CVE-2025-40363" ref_url="https://www.suse.com/security/cve/CVE-2025-40363/" source="CVE"/>
		<reference ref_id="CVE-2025-68174" ref_url="https://www.suse.com/security/cve/CVE-2025-68174/" source="CVE"/>
		<reference ref_id="CVE-2025-68178" ref_url="https://www.suse.com/security/cve/CVE-2025-68178/" source="CVE"/>
		<reference ref_id="CVE-2025-68188" ref_url="https://www.suse.com/security/cve/CVE-2025-68188/" source="CVE"/>
		<reference ref_id="CVE-2025-68200" ref_url="https://www.suse.com/security/cve/CVE-2025-68200/" source="CVE"/>
		<reference ref_id="CVE-2025-68211" ref_url="https://www.suse.com/security/cve/CVE-2025-68211/" source="CVE"/>
		<reference ref_id="CVE-2025-68218" ref_url="https://www.suse.com/security/cve/CVE-2025-68218/" source="CVE"/>
		<reference ref_id="CVE-2025-68227" ref_url="https://www.suse.com/security/cve/CVE-2025-68227/" source="CVE"/>
		<reference ref_id="CVE-2025-68241" ref_url="https://www.suse.com/security/cve/CVE-2025-68241/" source="CVE"/>
		<reference ref_id="CVE-2025-68245" ref_url="https://www.suse.com/security/cve/CVE-2025-68245/" source="CVE"/>
		<reference ref_id="CVE-2025-68261" ref_url="https://www.suse.com/security/cve/CVE-2025-68261/" source="CVE"/>
		<reference ref_id="CVE-2025-68296" ref_url="https://www.suse.com/security/cve/CVE-2025-68296/" source="CVE"/>
		<reference ref_id="CVE-2025-68297" ref_url="https://www.suse.com/security/cve/CVE-2025-68297/" source="CVE"/>
		<reference ref_id="CVE-2025-68320" ref_url="https://www.suse.com/security/cve/CVE-2025-68320/" source="CVE"/>
		<reference ref_id="CVE-2025-68325" ref_url="https://www.suse.com/security/cve/CVE-2025-68325/" source="CVE"/>
		<reference ref_id="CVE-2025-68337" ref_url="https://www.suse.com/security/cve/CVE-2025-68337/" source="CVE"/>
		<reference ref_id="CVE-2025-68341" ref_url="https://www.suse.com/security/cve/CVE-2025-68341/" source="CVE"/>
		<reference ref_id="CVE-2025-68348" ref_url="https://www.suse.com/security/cve/CVE-2025-68348/" source="CVE"/>
		<reference ref_id="CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349/" source="CVE"/>
		<reference ref_id="CVE-2025-68356" ref_url="https://www.suse.com/security/cve/CVE-2025-68356/" source="CVE"/>
		<reference ref_id="CVE-2025-68359" ref_url="https://www.suse.com/security/cve/CVE-2025-68359/" source="CVE"/>
		<reference ref_id="CVE-2025-68360" ref_url="https://www.suse.com/security/cve/CVE-2025-68360/" source="CVE"/>
		<reference ref_id="CVE-2025-68361" ref_url="https://www.suse.com/security/cve/CVE-2025-68361/" source="CVE"/>
		<reference ref_id="CVE-2025-68366" ref_url="https://www.suse.com/security/cve/CVE-2025-68366/" source="CVE"/>
		<reference ref_id="CVE-2025-68367" ref_url="https://www.suse.com/security/cve/CVE-2025-68367/" source="CVE"/>
		<reference ref_id="CVE-2025-68368" ref_url="https://www.suse.com/security/cve/CVE-2025-68368/" source="CVE"/>
		<reference ref_id="CVE-2025-68372" ref_url="https://www.suse.com/security/cve/CVE-2025-68372/" source="CVE"/>
		<reference ref_id="CVE-2025-68374" ref_url="https://www.suse.com/security/cve/CVE-2025-68374/" source="CVE"/>
		<reference ref_id="CVE-2025-68376" ref_url="https://www.suse.com/security/cve/CVE-2025-68376/" source="CVE"/>
		<reference ref_id="CVE-2025-68379" ref_url="https://www.suse.com/security/cve/CVE-2025-68379/" source="CVE"/>
		<reference ref_id="CVE-2025-68725" ref_url="https://www.suse.com/security/cve/CVE-2025-68725/" source="CVE"/>
		<reference ref_id="CVE-2025-68735" ref_url="https://www.suse.com/security/cve/CVE-2025-68735/" source="CVE"/>
		<reference ref_id="CVE-2025-68741" ref_url="https://www.suse.com/security/cve/CVE-2025-68741/" source="CVE"/>
		<reference ref_id="CVE-2025-68743" ref_url="https://www.suse.com/security/cve/CVE-2025-68743/" source="CVE"/>
		<reference ref_id="CVE-2025-68764" ref_url="https://www.suse.com/security/cve/CVE-2025-68764/" source="CVE"/>
		<reference ref_id="CVE-2025-68768" ref_url="https://www.suse.com/security/cve/CVE-2025-68768/" source="CVE"/>
		<reference ref_id="CVE-2025-68770" ref_url="https://www.suse.com/security/cve/CVE-2025-68770/" source="CVE"/>
		<reference ref_id="CVE-2025-68771" ref_url="https://www.suse.com/security/cve/CVE-2025-68771/" source="CVE"/>
		<reference ref_id="CVE-2025-68773" ref_url="https://www.suse.com/security/cve/CVE-2025-68773/" source="CVE"/>
		<reference ref_id="CVE-2025-68775" ref_url="https://www.suse.com/security/cve/CVE-2025-68775/" source="CVE"/>
		<reference ref_id="CVE-2025-68776" ref_url="https://www.suse.com/security/cve/CVE-2025-68776/" source="CVE"/>
		<reference ref_id="CVE-2025-68777" ref_url="https://www.suse.com/security/cve/CVE-2025-68777/" source="CVE"/>
		<reference ref_id="CVE-2025-68778" ref_url="https://www.suse.com/security/cve/CVE-2025-68778/" source="CVE"/>
		<reference ref_id="CVE-2025-68783" ref_url="https://www.suse.com/security/cve/CVE-2025-68783/" source="CVE"/>
		<reference ref_id="CVE-2025-68784" ref_url="https://www.suse.com/security/cve/CVE-2025-68784/" source="CVE"/>
		<reference ref_id="CVE-2025-68788" ref_url="https://www.suse.com/security/cve/CVE-2025-68788/" source="CVE"/>
		<reference ref_id="CVE-2025-68789" ref_url="https://www.suse.com/security/cve/CVE-2025-68789/" source="CVE"/>
		<reference ref_id="CVE-2025-68792" ref_url="https://www.suse.com/security/cve/CVE-2025-68792/" source="CVE"/>
		<reference ref_id="CVE-2025-68795" ref_url="https://www.suse.com/security/cve/CVE-2025-68795/" source="CVE"/>
		<reference ref_id="CVE-2025-68797" ref_url="https://www.suse.com/security/cve/CVE-2025-68797/" source="CVE"/>
		<reference ref_id="CVE-2025-68798" ref_url="https://www.suse.com/security/cve/CVE-2025-68798/" source="CVE"/>
		<reference ref_id="CVE-2025-68799" ref_url="https://www.suse.com/security/cve/CVE-2025-68799/" source="CVE"/>
		<reference ref_id="CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800/" source="CVE"/>
		<reference ref_id="CVE-2025-68801" ref_url="https://www.suse.com/security/cve/CVE-2025-68801/" source="CVE"/>
		<reference ref_id="CVE-2025-68802" ref_url="https://www.suse.com/security/cve/CVE-2025-68802/" source="CVE"/>
		<reference ref_id="CVE-2025-68803" ref_url="https://www.suse.com/security/cve/CVE-2025-68803/" source="CVE"/>
		<reference ref_id="CVE-2025-68804" ref_url="https://www.suse.com/security/cve/CVE-2025-68804/" source="CVE"/>
		<reference ref_id="CVE-2025-68808" ref_url="https://www.suse.com/security/cve/CVE-2025-68808/" source="CVE"/>
		<reference ref_id="CVE-2025-68811" ref_url="https://www.suse.com/security/cve/CVE-2025-68811/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-68814" ref_url="https://www.suse.com/security/cve/CVE-2025-68814/" source="CVE"/>
		<reference ref_id="CVE-2025-68815" ref_url="https://www.suse.com/security/cve/CVE-2025-68815/" source="CVE"/>
		<reference ref_id="CVE-2025-68816" ref_url="https://www.suse.com/security/cve/CVE-2025-68816/" source="CVE"/>
		<reference ref_id="CVE-2025-68819" ref_url="https://www.suse.com/security/cve/CVE-2025-68819/" source="CVE"/>
		<reference ref_id="CVE-2025-68820" ref_url="https://www.suse.com/security/cve/CVE-2025-68820/" source="CVE"/>
		<reference ref_id="CVE-2025-68821" ref_url="https://www.suse.com/security/cve/CVE-2025-68821/" source="CVE"/>
		<reference ref_id="CVE-2025-68822" ref_url="https://www.suse.com/security/cve/CVE-2025-68822/" source="CVE"/>
		<reference ref_id="CVE-2025-71064" ref_url="https://www.suse.com/security/cve/CVE-2025-71064/" source="CVE"/>
		<reference ref_id="CVE-2025-71066" ref_url="https://www.suse.com/security/cve/CVE-2025-71066/" source="CVE"/>
		<reference ref_id="CVE-2025-71073" ref_url="https://www.suse.com/security/cve/CVE-2025-71073/" source="CVE"/>
		<reference ref_id="CVE-2025-71076" ref_url="https://www.suse.com/security/cve/CVE-2025-71076/" source="CVE"/>
		<reference ref_id="CVE-2025-71077" ref_url="https://www.suse.com/security/cve/CVE-2025-71077/" source="CVE"/>
		<reference ref_id="CVE-2025-71078" ref_url="https://www.suse.com/security/cve/CVE-2025-71078/" source="CVE"/>
		<reference ref_id="CVE-2025-71079" ref_url="https://www.suse.com/security/cve/CVE-2025-71079/" source="CVE"/>
		<reference ref_id="CVE-2025-71080" ref_url="https://www.suse.com/security/cve/CVE-2025-71080/" source="CVE"/>
		<reference ref_id="CVE-2025-71081" ref_url="https://www.suse.com/security/cve/CVE-2025-71081/" source="CVE"/>
		<reference ref_id="CVE-2025-71082" ref_url="https://www.suse.com/security/cve/CVE-2025-71082/" source="CVE"/>
		<reference ref_id="CVE-2025-71083" ref_url="https://www.suse.com/security/cve/CVE-2025-71083/" source="CVE"/>
		<reference ref_id="CVE-2025-71084" ref_url="https://www.suse.com/security/cve/CVE-2025-71084/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="CVE-2025-71086" ref_url="https://www.suse.com/security/cve/CVE-2025-71086/" source="CVE"/>
		<reference ref_id="CVE-2025-71087" ref_url="https://www.suse.com/security/cve/CVE-2025-71087/" source="CVE"/>
		<reference ref_id="CVE-2025-71088" ref_url="https://www.suse.com/security/cve/CVE-2025-71088/" source="CVE"/>
		<reference ref_id="CVE-2025-71089" ref_url="https://www.suse.com/security/cve/CVE-2025-71089/" source="CVE"/>
		<reference ref_id="CVE-2025-71091" ref_url="https://www.suse.com/security/cve/CVE-2025-71091/" source="CVE"/>
		<reference ref_id="CVE-2025-71093" ref_url="https://www.suse.com/security/cve/CVE-2025-71093/" source="CVE"/>
		<reference ref_id="CVE-2025-71094" ref_url="https://www.suse.com/security/cve/CVE-2025-71094/" source="CVE"/>
		<reference ref_id="CVE-2025-71095" ref_url="https://www.suse.com/security/cve/CVE-2025-71095/" source="CVE"/>
		<reference ref_id="CVE-2025-71097" ref_url="https://www.suse.com/security/cve/CVE-2025-71097/" source="CVE"/>
		<reference ref_id="CVE-2025-71098" ref_url="https://www.suse.com/security/cve/CVE-2025-71098/" source="CVE"/>
		<reference ref_id="CVE-2025-71099" ref_url="https://www.suse.com/security/cve/CVE-2025-71099/" source="CVE"/>
		<reference ref_id="CVE-2025-71100" ref_url="https://www.suse.com/security/cve/CVE-2025-71100/" source="CVE"/>
		<reference ref_id="CVE-2025-71101" ref_url="https://www.suse.com/security/cve/CVE-2025-71101/" source="CVE"/>
		<reference ref_id="CVE-2025-71108" ref_url="https://www.suse.com/security/cve/CVE-2025-71108/" source="CVE"/>
		<reference ref_id="CVE-2025-71111" ref_url="https://www.suse.com/security/cve/CVE-2025-71111/" source="CVE"/>
		<reference ref_id="CVE-2025-71112" ref_url="https://www.suse.com/security/cve/CVE-2025-71112/" source="CVE"/>
		<reference ref_id="CVE-2025-71113" ref_url="https://www.suse.com/security/cve/CVE-2025-71113/" source="CVE"/>
		<reference ref_id="CVE-2025-71114" ref_url="https://www.suse.com/security/cve/CVE-2025-71114/" source="CVE"/>
		<reference ref_id="CVE-2025-71116" ref_url="https://www.suse.com/security/cve/CVE-2025-71116/" source="CVE"/>
		<reference ref_id="CVE-2025-71118" ref_url="https://www.suse.com/security/cve/CVE-2025-71118/" source="CVE"/>
		<reference ref_id="CVE-2025-71119" ref_url="https://www.suse.com/security/cve/CVE-2025-71119/" source="CVE"/>
		<reference ref_id="CVE-2025-71120" ref_url="https://www.suse.com/security/cve/CVE-2025-71120/" source="CVE"/>
		<reference ref_id="CVE-2025-71123" ref_url="https://www.suse.com/security/cve/CVE-2025-71123/" source="CVE"/>
		<reference ref_id="CVE-2025-71126" ref_url="https://www.suse.com/security/cve/CVE-2025-71126/" source="CVE"/>
		<reference ref_id="CVE-2025-71130" ref_url="https://www.suse.com/security/cve/CVE-2025-71130/" source="CVE"/>
		<reference ref_id="CVE-2025-71131" ref_url="https://www.suse.com/security/cve/CVE-2025-71131/" source="CVE"/>
		<reference ref_id="CVE-2025-71132" ref_url="https://www.suse.com/security/cve/CVE-2025-71132/" source="CVE"/>
		<reference ref_id="CVE-2025-71133" ref_url="https://www.suse.com/security/cve/CVE-2025-71133/" source="CVE"/>
		<reference ref_id="CVE-2025-71135" ref_url="https://www.suse.com/security/cve/CVE-2025-71135/" source="CVE"/>
		<reference ref_id="CVE-2025-71136" ref_url="https://www.suse.com/security/cve/CVE-2025-71136/" source="CVE"/>
		<reference ref_id="CVE-2025-71137" ref_url="https://www.suse.com/security/cve/CVE-2025-71137/" source="CVE"/>
		<reference ref_id="CVE-2025-71138" ref_url="https://www.suse.com/security/cve/CVE-2025-71138/" source="CVE"/>
		<reference ref_id="CVE-2025-71141" ref_url="https://www.suse.com/security/cve/CVE-2025-71141/" source="CVE"/>
		<reference ref_id="CVE-2025-71142" ref_url="https://www.suse.com/security/cve/CVE-2025-71142/" source="CVE"/>
		<reference ref_id="CVE-2025-71143" ref_url="https://www.suse.com/security/cve/CVE-2025-71143/" source="CVE"/>
		<reference ref_id="CVE-2025-71145" ref_url="https://www.suse.com/security/cve/CVE-2025-71145/" source="CVE"/>
		<reference ref_id="CVE-2025-71147" ref_url="https://www.suse.com/security/cve/CVE-2025-71147/" source="CVE"/>
		<reference ref_id="CVE-2025-71148" ref_url="https://www.suse.com/security/cve/CVE-2025-71148/" source="CVE"/>
		<reference ref_id="CVE-2025-71149" ref_url="https://www.suse.com/security/cve/CVE-2025-71149/" source="CVE"/>
		<reference ref_id="CVE-2025-71154" ref_url="https://www.suse.com/security/cve/CVE-2025-71154/" source="CVE"/>
		<reference ref_id="CVE-2025-71156" ref_url="https://www.suse.com/security/cve/CVE-2025-71156/" source="CVE"/>
		<reference ref_id="CVE-2025-71157" ref_url="https://www.suse.com/security/cve/CVE-2025-71157/" source="CVE"/>
		<reference ref_id="CVE-2025-71162" ref_url="https://www.suse.com/security/cve/CVE-2025-71162/" source="CVE"/>
		<reference ref_id="CVE-2025-71163" ref_url="https://www.suse.com/security/cve/CVE-2025-71163/" source="CVE"/>
		<reference ref_id="CVE-2026-22976" ref_url="https://www.suse.com/security/cve/CVE-2026-22976/" source="CVE"/>
		<reference ref_id="CVE-2026-22977" ref_url="https://www.suse.com/security/cve/CVE-2026-22977/" source="CVE"/>
		<reference ref_id="CVE-2026-22978" ref_url="https://www.suse.com/security/cve/CVE-2026-22978/" source="CVE"/>
		<reference ref_id="CVE-2026-22981" ref_url="https://www.suse.com/security/cve/CVE-2026-22981/" source="CVE"/>
		<reference ref_id="CVE-2026-22982" ref_url="https://www.suse.com/security/cve/CVE-2026-22982/" source="CVE"/>
		<reference ref_id="CVE-2026-22984" ref_url="https://www.suse.com/security/cve/CVE-2026-22984/" source="CVE"/>
		<reference ref_id="CVE-2026-22985" ref_url="https://www.suse.com/security/cve/CVE-2026-22985/" source="CVE"/>
		<reference ref_id="CVE-2026-22986" ref_url="https://www.suse.com/security/cve/CVE-2026-22986/" source="CVE"/>
		<reference ref_id="CVE-2026-22988" ref_url="https://www.suse.com/security/cve/CVE-2026-22988/" source="CVE"/>
		<reference ref_id="CVE-2026-22989" ref_url="https://www.suse.com/security/cve/CVE-2026-22989/" source="CVE"/>
		<reference ref_id="CVE-2026-22990" ref_url="https://www.suse.com/security/cve/CVE-2026-22990/" source="CVE"/>
		<reference ref_id="CVE-2026-22991" ref_url="https://www.suse.com/security/cve/CVE-2026-22991/" source="CVE"/>
		<reference ref_id="CVE-2026-22992" ref_url="https://www.suse.com/security/cve/CVE-2026-22992/" source="CVE"/>
		<reference ref_id="CVE-2026-22993" ref_url="https://www.suse.com/security/cve/CVE-2026-22993/" source="CVE"/>
		<reference ref_id="CVE-2026-22996" ref_url="https://www.suse.com/security/cve/CVE-2026-22996/" source="CVE"/>
		<reference ref_id="CVE-2026-22997" ref_url="https://www.suse.com/security/cve/CVE-2026-22997/" source="CVE"/>
		<reference ref_id="CVE-2026-22999" ref_url="https://www.suse.com/security/cve/CVE-2026-22999/" source="CVE"/>
		<reference ref_id="CVE-2026-23000" ref_url="https://www.suse.com/security/cve/CVE-2026-23000/" source="CVE"/>
		<reference ref_id="CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001/" source="CVE"/>
		<reference ref_id="CVE-2026-23002" ref_url="https://www.suse.com/security/cve/CVE-2026-23002/" source="CVE"/>
		<reference ref_id="CVE-2026-23005" ref_url="https://www.suse.com/security/cve/CVE-2026-23005/" source="CVE"/>
		<reference ref_id="CVE-2026-23006" ref_url="https://www.suse.com/security/cve/CVE-2026-23006/" source="CVE"/>
		<reference ref_id="CVE-2026-23011" ref_url="https://www.suse.com/security/cve/CVE-2026-23011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 and SL MIxro 6.2 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-40147: blk-throttle: fix access race during throttle policy activation (bsc#1253344).
- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
- CVE-2025-40261: nvme: nvme-fc: Ensure -&gt;ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839).
- CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102).
- CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327).
- CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266).
- CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269).
- CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).
- CVE-2025-68211: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item (bsc#1255319).
- CVE-2025-68218: nvme-multipath: fix lockdep WARN due to partition scan work (bsc#1255245).
- CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).
- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157).
- CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268).
- CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164).
- CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128).
- CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403).
- CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).
- CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417).
- CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482).
- CVE-2025-68341: veth: reduce XDP no_direct return section to fix race (bsc#1255506).
- CVE-2025-68348: block: fix memory leak in __blkdev_issue_zero_pages (bsc#1255694).
- CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544).
- CVE-2025-68356: gfs2: Prevent recursive memory reclaim (bsc#1255593).
- CVE-2025-68359: btrfs: fix double free of qgroup record after failure to add delayed ref head (bsc#1255542).
- CVE-2025-68360: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks (bsc#1255536).
- CVE-2025-68361: erofs: limit the level of fs stacking for file-backed mounts (bsc#1255526).
- CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
- CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547).
- CVE-2025-68368: md: init bioset in mddev_init (bsc#1255527).
- CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).
- CVE-2025-68376: coresight: ETR: Fix ETR buffer use-after-free issue (bsc#1255529).
- CVE-2025-68379: RDMA/rxe: Fix null deref on srq-&gt;rq.queue after resize failure (bsc#1255695).
- CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811).
- CVE-2025-68741: scsi: qla2xxx: Fix improper freeing of purex item (bsc#1255703).
- CVE-2025-68743: mshv: Fix create memory region overlap check (bsc#1255708).
- CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930).
- CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).
- CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).
- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).
- CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665).
- CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659).
- CVE-2025-68784: xfs: fix a UAF problem in xattr repair (bsc#1256793).
- CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638).
- CVE-2025-68792: tpm2-sessions: Fix out of range indexing in name_size (bsc#1256656).
- CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688).
- CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689).
- CVE-2025-68799: caif: fix integer underflow in cffrml_receive() (bsc#1256643).
- CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646).
- CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653).
- CVE-2025-68803: NFSD: NFSv4 file creation neglects setting ACL (bsc#1256770).
- CVE-2025-68811: svcrdma: use rc_pageoff for memcpy byte offset (bsc#1256677).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).
- CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651).
- CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680).
- CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674).
- CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754).
- CVE-2025-68821: fuse: fix readahead reclaim deadlock (bsc#1256667).
- CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654).
- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645).
- CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).
- CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608).
- CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).
- CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628).
- CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773).
- CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
- CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597).
- CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605).
- CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607).
- CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).
- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).
- CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757).
- CVE-2025-71126: mptcp: avoid deadlock on fallback while reinjecting (bsc#1256755).
- CVE-2025-71132: smc91x: fix broken irq-context in PREEMPT_RT (bsc#1256737).
- CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733).
- CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761).
- CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" (bsc#1256760).
- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).
- CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164).
- CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167).
- CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168).
- CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035).
- CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053).
- CVE-2026-22981: idpf: detach and close netdevs while handling a reset (bsc#1257225).
- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).
- CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217).
- CVE-2026-22986: gpiolib: fix race condition for gdev-&gt;srcu (bsc#1257276).
- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).
- CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220).
- CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218).
- CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180).
- CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv.
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).
- CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234).
- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).
- CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245).
- CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).

The following non security issues were fixed:

- ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).
- Add bugnumber to an existing hv_netvsc change (bsc#1257473).
- Fix locking issue introduced by a CVE backport (bsc#1256975 bsc#1254977).
- Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792)
- arm64: Update config files. Disable DEVPORT (bsc#1256792)
- bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603).
- bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569).
- btrfs: pass fs_info to btrfs_delete_ref_head() (git-fixes).
- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).
- bus: fsl-mc: Constify fsl_mc_device_match() (jsc#PED-10906 git-fixes).
- drm/imagination: Wait for FW trace update command completion (git-fixes).
- drm/msm/a6xx: fix bogus hwcg register updates (git-fixes).
- ice: use netif_get_num_default_rss_queues() (bsc#1247712).
- libbpf: Fix -Wdiscarded-qualifiers under C23 (bsc#1257309).
- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1254447 bsc#1253087).
- net: mana: Fix incorrect speed reported by debugfs (bsc#1255232).
- net: mana: Support HW link state events (bsc#1253049).
- nfsd: adjust WARN_ON_ONCE in revoke_delegation (bsc#1257015).
- nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes).
- powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).
- sched/fair: Disable scheduler feature NEXT_BUDDY (bsc#1255459).
- scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256864).
- scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256864).
- scsi: qla2xxx: Add Speed in SFP print information (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Allow recovery for tape devices (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
- selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346).
- slimbus: core: Constify slim_eaddr_equal() (jsc#PED-10906 git-fixes).
- smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748,bsc#1257154).
- smb: client: update cfid-&gt;last_access_time in open_cached_dir_by_dentry() (git-fixes).
- smb: improve directory cache reuse for readdir operations (bsc#1252712).
- tsm-mr: Add TVM Measurement Register support (bsc#1257504).
- tsm-mr: Add tsm-mr sample code (bsc#1257504).
- virt: tdx-guest: Expose TDX MRs as sysfs attributes (bsc#1257504).
- virt: tdx-guest: Refactor and streamline TDREPORT generation (bsc#1257504).
- virt: tdx-guest: Transition to scoped_cond_guard for mutex operations (bsc#1257504).
- wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).
- x86/tdx: Add tdx_mcall_extend_rtmr() interface (bsc#1257504).
- x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error (bsc#1257504).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215199">SUSE bug 1215199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235905">SUSE bug 1235905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242505">SUSE bug 1242505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242974">SUSE bug 1242974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242986">SUSE bug 1242986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243452">SUSE bug 1243452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243507">SUSE bug 1243507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243662">SUSE bug 1243662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246184">SUSE bug 1246184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246282">SUSE bug 1246282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247030">SUSE bug 1247030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247292">SUSE bug 1247292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247712">SUSE bug 1247712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248166">SUSE bug 1248166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248175">SUSE bug 1248175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248178">SUSE bug 1248178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248179">SUSE bug 1248179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248185">SUSE bug 1248185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248188">SUSE bug 1248188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248196">SUSE bug 1248196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248206">SUSE bug 1248206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248208">SUSE bug 1248208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248209">SUSE bug 1248209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248211">SUSE bug 1248211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248212">SUSE bug 1248212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248213">SUSE bug 1248213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248214">SUSE bug 1248214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248216">SUSE bug 1248216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248217">SUSE bug 1248217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248222">SUSE bug 1248222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248227">SUSE bug 1248227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248228">SUSE bug 1248228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248229">SUSE bug 1248229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248232">SUSE bug 1248232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248234">SUSE bug 1248234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248240">SUSE bug 1248240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248360">SUSE bug 1248360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248366">SUSE bug 1248366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248384">SUSE bug 1248384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248626">SUSE bug 1248626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249307">SUSE bug 1249307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249609">SUSE bug 1249609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249895">SUSE bug 1249895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249998">SUSE bug 1249998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250032">SUSE bug 1250032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250082">SUSE bug 1250082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250388">SUSE bug 1250388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250705">SUSE bug 1250705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250738">SUSE bug 1250738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250748">SUSE bug 1250748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252712">SUSE bug 1252712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252773">SUSE bug 1252773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252784">SUSE bug 1252784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252891">SUSE bug 1252891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252900">SUSE bug 1252900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253049">SUSE bug 1253049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253078">SUSE bug 1253078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253079">SUSE bug 1253079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253087">SUSE bug 1253087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253344">SUSE bug 1253344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253500">SUSE bug 1253500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253739">SUSE bug 1253739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254244">SUSE bug 1254244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254308">SUSE bug 1254308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254447">SUSE bug 1254447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254839">SUSE bug 1254839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254842">SUSE bug 1254842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254845">SUSE bug 1254845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254977">SUSE bug 1254977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255102">SUSE bug 1255102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255128">SUSE bug 1255128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255157">SUSE bug 1255157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255164">SUSE bug 1255164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255172">SUSE bug 1255172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255216">SUSE bug 1255216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255232">SUSE bug 1255232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255241">SUSE bug 1255241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255245">SUSE bug 1255245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255266">SUSE bug 1255266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255268">SUSE bug 1255268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255269">SUSE bug 1255269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255319">SUSE bug 1255319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255327">SUSE bug 1255327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255346">SUSE bug 1255346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255403">SUSE bug 1255403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255417">SUSE bug 1255417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255459">SUSE bug 1255459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255482">SUSE bug 1255482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255506">SUSE bug 1255506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255526">SUSE bug 1255526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255527">SUSE bug 1255527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255529">SUSE bug 1255529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255530">SUSE bug 1255530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255536">SUSE bug 1255536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255537">SUSE bug 1255537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255542">SUSE bug 1255542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255544">SUSE bug 1255544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255547">SUSE bug 1255547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255569">SUSE bug 1255569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255593">SUSE bug 1255593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255622">SUSE bug 1255622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255694">SUSE bug 1255694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255695">SUSE bug 1255695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255703">SUSE bug 1255703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255708">SUSE bug 1255708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255811">SUSE bug 1255811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255930">SUSE bug 1255930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256579">SUSE bug 1256579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256582">SUSE bug 1256582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256584">SUSE bug 1256584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256586">SUSE bug 1256586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256591">SUSE bug 1256591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256592">SUSE bug 1256592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256593">SUSE bug 1256593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256594">SUSE bug 1256594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256597">SUSE bug 1256597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256605">SUSE bug 1256605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256607">SUSE bug 1256607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256608">SUSE bug 1256608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256609">SUSE bug 1256609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256610">SUSE bug 1256610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256611">SUSE bug 1256611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256612">SUSE bug 1256612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256613">SUSE bug 1256613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256616">SUSE bug 1256616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256617">SUSE bug 1256617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256619">SUSE bug 1256619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256622">SUSE bug 1256622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256623">SUSE bug 1256623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256625">SUSE bug 1256625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256627">SUSE bug 1256627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256628">SUSE bug 1256628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256630">SUSE bug 1256630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256632">SUSE bug 1256632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256638">SUSE bug 1256638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256641">SUSE bug 1256641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256643">SUSE bug 1256643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256645">SUSE bug 1256645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256646">SUSE bug 1256646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256650">SUSE bug 1256650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256651">SUSE bug 1256651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256653">SUSE bug 1256653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256654">SUSE bug 1256654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256655">SUSE bug 1256655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256656">SUSE bug 1256656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256659">SUSE bug 1256659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256660">SUSE bug 1256660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256661">SUSE bug 1256661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256664">SUSE bug 1256664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256665">SUSE bug 1256665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256667">SUSE bug 1256667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256668">SUSE bug 1256668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256674">SUSE bug 1256674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256677">SUSE bug 1256677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256680">SUSE bug 1256680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256682">SUSE bug 1256682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256683">SUSE bug 1256683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256688">SUSE bug 1256688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256689">SUSE bug 1256689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256716">SUSE bug 1256716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256726">SUSE bug 1256726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256728">SUSE bug 1256728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256730">SUSE bug 1256730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256733">SUSE bug 1256733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256737">SUSE bug 1256737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256741">SUSE bug 1256741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256742">SUSE bug 1256742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256744">SUSE bug 1256744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256748">SUSE bug 1256748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256749">SUSE bug 1256749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256752">SUSE bug 1256752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256754">SUSE bug 1256754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256755">SUSE bug 1256755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256756">SUSE bug 1256756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256757">SUSE bug 1256757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256759">SUSE bug 1256759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256760">SUSE bug 1256760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256761">SUSE bug 1256761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256763">SUSE bug 1256763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256770">SUSE bug 1256770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256773">SUSE bug 1256773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256774">SUSE bug 1256774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256777">SUSE bug 1256777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256779">SUSE bug 1256779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256781">SUSE bug 1256781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256785">SUSE bug 1256785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256792">SUSE bug 1256792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256793">SUSE bug 1256793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256794">SUSE bug 1256794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256864">SUSE bug 1256864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256865">SUSE bug 1256865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256867">SUSE bug 1256867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256975">SUSE bug 1256975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257015">SUSE bug 1257015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257035">SUSE bug 1257035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257053">SUSE bug 1257053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257154">SUSE bug 1257154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257155">SUSE bug 1257155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257158">SUSE bug 1257158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257159">SUSE bug 1257159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257163">SUSE bug 1257163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257164">SUSE bug 1257164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257167">SUSE bug 1257167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257168">SUSE bug 1257168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257179">SUSE bug 1257179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257180">SUSE bug 1257180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257202">SUSE bug 1257202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257204">SUSE bug 1257204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257207">SUSE bug 1257207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257208">SUSE bug 1257208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257215">SUSE bug 1257215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257217">SUSE bug 1257217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257218">SUSE bug 1257218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257220">SUSE bug 1257220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257221">SUSE bug 1257221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257225">SUSE bug 1257225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257227">SUSE bug 1257227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257232">SUSE bug 1257232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257234">SUSE bug 1257234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257236">SUSE bug 1257236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257243">SUSE bug 1257243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257245">SUSE bug 1257245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257276">SUSE bug 1257276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257277">SUSE bug 1257277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257279">SUSE bug 1257279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257282">SUSE bug 1257282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257296">SUSE bug 1257296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257309">SUSE bug 1257309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257473">SUSE bug 1257473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257504">SUSE bug 1257504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257603">SUSE bug 1257603</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54031/">CVE-2024-54031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37744/">CVE-2025-37744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37744">CVE-2025-37744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37751/">CVE-2025-37751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37751">CVE-2025-37751 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37841/">CVE-2025-37841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37841">CVE-2025-37841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37845/">CVE-2025-37845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37845">CVE-2025-37845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37904/">CVE-2025-37904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37904">CVE-2025-37904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37955/">CVE-2025-37955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37955">CVE-2025-37955 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38243/">CVE-2025-38243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38243">CVE-2025-38243 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38262/">CVE-2025-38262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38262">CVE-2025-38262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38297/">CVE-2025-38297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38297">CVE-2025-38297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38298/">CVE-2025-38298 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38298">CVE-2025-38298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38379/">CVE-2025-38379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38379">CVE-2025-38379 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38423/">CVE-2025-38423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38423">CVE-2025-38423 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38505/">CVE-2025-38505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38505">CVE-2025-38505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38507/">CVE-2025-38507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38507">CVE-2025-38507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38510/">CVE-2025-38510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38510">CVE-2025-38510 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38511/">CVE-2025-38511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38511">CVE-2025-38511 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38512/">CVE-2025-38512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38512">CVE-2025-38512 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38513/">CVE-2025-38513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38513">CVE-2025-38513 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38515/">CVE-2025-38515 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38515">CVE-2025-38515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38516/">CVE-2025-38516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38516">CVE-2025-38516 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38520/">CVE-2025-38520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38521/">CVE-2025-38521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38521">CVE-2025-38521 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38529/">CVE-2025-38529 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38529">CVE-2025-38529 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38530/">CVE-2025-38530 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38530">CVE-2025-38530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38535/">CVE-2025-38535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38535">CVE-2025-38535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38537/">CVE-2025-38537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38537">CVE-2025-38537 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38538/">CVE-2025-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38538">CVE-2025-38538 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38539/">CVE-2025-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38540/">CVE-2025-38540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38540">CVE-2025-38540 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38541/">CVE-2025-38541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38541">CVE-2025-38541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38543/">CVE-2025-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38543">CVE-2025-38543 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38547/">CVE-2025-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38547">CVE-2025-38547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38548/">CVE-2025-38548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38548">CVE-2025-38548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38550/">CVE-2025-38550 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38551/">CVE-2025-38551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38551">CVE-2025-38551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38569/">CVE-2025-38569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38589/">CVE-2025-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38589">CVE-2025-38589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38590/">CVE-2025-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38645/">CVE-2025-38645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39689/">CVE-2025-39689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39795/">CVE-2025-39795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39813/">CVE-2025-39813 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39813">CVE-2025-39813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39814/">CVE-2025-39814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39814">CVE-2025-39814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39829/">CVE-2025-39829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39829">CVE-2025-39829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39880/">CVE-2025-39880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39913/">CVE-2025-39913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913">CVE-2025-39913 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39927/">CVE-2025-39927 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927">CVE-2025-39927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40030/">CVE-2025-40030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40045/">CVE-2025-40045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40097/">CVE-2025-40097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40097">CVE-2025-40097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40106/">CVE-2025-40106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40147/">CVE-2025-40147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40147">CVE-2025-40147 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40195/">CVE-2025-40195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40195">CVE-2025-40195 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-40257/">CVE-2025-40257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40259/">CVE-2025-40259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40259">CVE-2025-40259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40261/">CVE-2025-40261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40261">CVE-2025-40261 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40363/">CVE-2025-40363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40363">CVE-2025-40363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68174/">CVE-2025-68174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68174">CVE-2025-68174 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68178/">CVE-2025-68178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68178">CVE-2025-68178 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68188/">CVE-2025-68188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68188">CVE-2025-68188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68200/">CVE-2025-68200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68200">CVE-2025-68200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68211/">CVE-2025-68211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68211">CVE-2025-68211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68218/">CVE-2025-68218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68218">CVE-2025-68218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68227/">CVE-2025-68227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68227">CVE-2025-68227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68241/">CVE-2025-68241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68241">CVE-2025-68241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68245/">CVE-2025-68245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68245">CVE-2025-68245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68261/">CVE-2025-68261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68296/">CVE-2025-68296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68296">CVE-2025-68296 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68297/">CVE-2025-68297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68297">CVE-2025-68297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68320/">CVE-2025-68320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68320">CVE-2025-68320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68325/">CVE-2025-68325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68337/">CVE-2025-68337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68341/">CVE-2025-68341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68341">CVE-2025-68341 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68348/">CVE-2025-68348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68356/">CVE-2025-68356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68359/">CVE-2025-68359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68359">CVE-2025-68359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68360/">CVE-2025-68360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68360">CVE-2025-68360 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68361/">CVE-2025-68361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68366/">CVE-2025-68366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68367/">CVE-2025-68367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68368/">CVE-2025-68368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68368">CVE-2025-68368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68372/">CVE-2025-68372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68374/">CVE-2025-68374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68376/">CVE-2025-68376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68376">CVE-2025-68376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68379/">CVE-2025-68379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68725/">CVE-2025-68725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68725">CVE-2025-68725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68735/">CVE-2025-68735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68735">CVE-2025-68735 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68741/">CVE-2025-68741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68743/">CVE-2025-68743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68743">CVE-2025-68743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68764/">CVE-2025-68764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68768/">CVE-2025-68768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68768">CVE-2025-68768 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68770/">CVE-2025-68770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68770">CVE-2025-68770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68771/">CVE-2025-68771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68771">CVE-2025-68771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68773/">CVE-2025-68773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68773">CVE-2025-68773 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68775/">CVE-2025-68775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68775">CVE-2025-68775 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68776/">CVE-2025-68776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68776">CVE-2025-68776 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68777/">CVE-2025-68777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68777">CVE-2025-68777 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68778/">CVE-2025-68778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68778">CVE-2025-68778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68783/">CVE-2025-68783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68783">CVE-2025-68783 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68784/">CVE-2025-68784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68784">CVE-2025-68784 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68788/">CVE-2025-68788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68788">CVE-2025-68788 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68789/">CVE-2025-68789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68789">CVE-2025-68789 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68792/">CVE-2025-68792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68792">CVE-2025-68792 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68795/">CVE-2025-68795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68795">CVE-2025-68795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68797/">CVE-2025-68797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68797">CVE-2025-68797 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68798/">CVE-2025-68798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68798">CVE-2025-68798 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68799/">CVE-2025-68799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68799">CVE-2025-68799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68801/">CVE-2025-68801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68801">CVE-2025-68801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68802/">CVE-2025-68802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68802">CVE-2025-68802 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68803/">CVE-2025-68803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68803">CVE-2025-68803 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68804/">CVE-2025-68804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68804">CVE-2025-68804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68808/">CVE-2025-68808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68808">CVE-2025-68808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68811/">CVE-2025-68811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68814/">CVE-2025-68814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68814">CVE-2025-68814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68815/">CVE-2025-68815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68815">CVE-2025-68815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68816/">CVE-2025-68816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68816">CVE-2025-68816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68819/">CVE-2025-68819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68819">CVE-2025-68819 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68820/">CVE-2025-68820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68820">CVE-2025-68820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68821/">CVE-2025-68821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68821">CVE-2025-68821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68822/">CVE-2025-68822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68822">CVE-2025-68822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71064/">CVE-2025-71064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71064">CVE-2025-71064 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-71066/">CVE-2025-71066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71073/">CVE-2025-71073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71073">CVE-2025-71073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71076/">CVE-2025-71076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71076">CVE-2025-71076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71077/">CVE-2025-71077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71077">CVE-2025-71077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71078/">CVE-2025-71078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71078">CVE-2025-71078 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71079/">CVE-2025-71079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71079">CVE-2025-71079 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71080/">CVE-2025-71080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71080">CVE-2025-71080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71081/">CVE-2025-71081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71081">CVE-2025-71081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71082/">CVE-2025-71082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71082">CVE-2025-71082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71083/">CVE-2025-71083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71083">CVE-2025-71083 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71084/">CVE-2025-71084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71084">CVE-2025-71084 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71086/">CVE-2025-71086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71086">CVE-2025-71086 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71087/">CVE-2025-71087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71087">CVE-2025-71087 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71088/">CVE-2025-71088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71088">CVE-2025-71088 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71089/">CVE-2025-71089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71091/">CVE-2025-71091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71091">CVE-2025-71091 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71093/">CVE-2025-71093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71093">CVE-2025-71093 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71094/">CVE-2025-71094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71094">CVE-2025-71094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71095/">CVE-2025-71095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71095">CVE-2025-71095 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71097/">CVE-2025-71097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71097">CVE-2025-71097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71098/">CVE-2025-71098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71098">CVE-2025-71098 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71099/">CVE-2025-71099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71099">CVE-2025-71099 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71100/">CVE-2025-71100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71100">CVE-2025-71100 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71101/">CVE-2025-71101 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71101">CVE-2025-71101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71108/">CVE-2025-71108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71108">CVE-2025-71108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71111/">CVE-2025-71111 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71111">CVE-2025-71111 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71112/">CVE-2025-71112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71113/">CVE-2025-71113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71113">CVE-2025-71113 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71114/">CVE-2025-71114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71114">CVE-2025-71114 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71116/">CVE-2025-71116 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71118/">CVE-2025-71118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71118">CVE-2025-71118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71119/">CVE-2025-71119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71119">CVE-2025-71119 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71120/">CVE-2025-71120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71123/">CVE-2025-71123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71123">CVE-2025-71123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71126/">CVE-2025-71126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71126">CVE-2025-71126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71130/">CVE-2025-71130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71130">CVE-2025-71130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71131/">CVE-2025-71131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71131">CVE-2025-71131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71132/">CVE-2025-71132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71132">CVE-2025-71132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71133/">CVE-2025-71133 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71133">CVE-2025-71133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71135/">CVE-2025-71135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71135">CVE-2025-71135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71136/">CVE-2025-71136 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71136">CVE-2025-71136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71137/">CVE-2025-71137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71137">CVE-2025-71137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71138/">CVE-2025-71138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71138">CVE-2025-71138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71141/">CVE-2025-71141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71141">CVE-2025-71141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71142/">CVE-2025-71142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71142">CVE-2025-71142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71143/">CVE-2025-71143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71143">CVE-2025-71143 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71145/">CVE-2025-71145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71145">CVE-2025-71145 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71147/">CVE-2025-71147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71147">CVE-2025-71147 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71148/">CVE-2025-71148 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71148">CVE-2025-71148 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71149/">CVE-2025-71149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71149">CVE-2025-71149 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71154/">CVE-2025-71154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71154">CVE-2025-71154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71156/">CVE-2025-71156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71156">CVE-2025-71156 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71157/">CVE-2025-71157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71157">CVE-2025-71157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71162/">CVE-2025-71162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71162">CVE-2025-71162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71163/">CVE-2025-71163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71163">CVE-2025-71163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22976/">CVE-2026-22976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22976">CVE-2026-22976 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22977/">CVE-2026-22977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22977">CVE-2026-22977 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22978/">CVE-2026-22978 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22978">CVE-2026-22978 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22981/">CVE-2026-22981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22981">CVE-2026-22981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22982/">CVE-2026-22982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22982">CVE-2026-22982 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22984/">CVE-2026-22984 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22984">CVE-2026-22984 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22985/">CVE-2026-22985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22985">CVE-2026-22985 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22986/">CVE-2026-22986 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22986">CVE-2026-22986 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22988/">CVE-2026-22988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22988">CVE-2026-22988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22989/">CVE-2026-22989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22989">CVE-2026-22989 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22990/">CVE-2026-22990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22990">CVE-2026-22990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22991/">CVE-2026-22991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22991">CVE-2026-22991 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22992/">CVE-2026-22992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22992">CVE-2026-22992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22993/">CVE-2026-22993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22993">CVE-2026-22993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22996/">CVE-2026-22996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22996">CVE-2026-22996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22997/">CVE-2026-22997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22997">CVE-2026-22997 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22999/">CVE-2026-22999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23000/">CVE-2026-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23000">CVE-2026-23000 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23002/">CVE-2026-23002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23002">CVE-2026-23002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23005/">CVE-2026-23005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23005">CVE-2026-23005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23006/">CVE-2026-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23006">CVE-2026-23006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23011/">CVE-2026-23011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23011">CVE-2026-23011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047383" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047384" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047385" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94616" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1257521" ref_url="https://bugzilla.suse.com/1257521" source="BUGZILLA"/>
		<reference ref_id="1257976" ref_url="https://bugzilla.suse.com/1257976" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-26080" ref_url="https://www.suse.com/security/cve/CVE-2026-26080/" source="CVE"/>
		<reference ref_id="CVE-2026-26081" ref_url="https://www.suse.com/security/cve/CVE-2026-26081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024604.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- Update to version 3.2.12+git0.6011f448e
- CVE-2026-26081: Fixed a DOS vulnerability in QUIC. (bsc#1257976)
- CVE-2026-26080: Fixed a DOS vulnerability in QUIC. (bsc#1257976)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257521">SUSE bug 1257521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257976">SUSE bug 1257976</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26080/">CVE-2026-26080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26080">CVE-2026-26080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26081/">CVE-2026-26081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26081">CVE-2026-26081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047386" comment="haproxy-3.2.12+git0.6011f448e-160000.1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94617" version="1" class="patch">
	<metadata>
		<title>Security update for python-azure-core (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1257703" ref_url="https://bugzilla.suse.com/1257703" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-21226" ref_url="https://www.suse.com/security/cve/CVE-2026-21226/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:20617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024603.html" source="SUSE-SU"/>
		<description>
This update for python-azure-core fixes the following issues:

- CVE-2026-21226: Fixed deserialization of untrusted data which may allow an authorized attacker to execute code over a network. (bsc#1257703)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-01"/>
	<updated date="2026-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257703">SUSE bug 1257703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21226/">CVE-2026-21226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21226">CVE-2026-21226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046377" comment="python313-azure-core-1.32.0-160000.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94618" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1234634" ref_url="https://bugzilla.suse.com/1234634" source="BUGZILLA"/>
		<reference ref_id="1249590" ref_url="https://bugzilla.suse.com/1249590" source="BUGZILLA"/>
		<reference ref_id="1250748" ref_url="https://bugzilla.suse.com/1250748" source="BUGZILLA"/>
		<reference ref_id="1251135" ref_url="https://bugzilla.suse.com/1251135" source="BUGZILLA"/>
		<reference ref_id="1251966" ref_url="https://bugzilla.suse.com/1251966" source="BUGZILLA"/>
		<reference ref_id="1251971" ref_url="https://bugzilla.suse.com/1251971" source="BUGZILLA"/>
		<reference ref_id="1252008" ref_url="https://bugzilla.suse.com/1252008" source="BUGZILLA"/>
		<reference ref_id="1252266" ref_url="https://bugzilla.suse.com/1252266" source="BUGZILLA"/>
		<reference ref_id="1252911" ref_url="https://bugzilla.suse.com/1252911" source="BUGZILLA"/>
		<reference ref_id="1252924" ref_url="https://bugzilla.suse.com/1252924" source="BUGZILLA"/>
		<reference ref_id="1253129" ref_url="https://bugzilla.suse.com/1253129" source="BUGZILLA"/>
		<reference ref_id="1253691" ref_url="https://bugzilla.suse.com/1253691" source="BUGZILLA"/>
		<reference ref_id="1254817" ref_url="https://bugzilla.suse.com/1254817" source="BUGZILLA"/>
		<reference ref_id="1254928" ref_url="https://bugzilla.suse.com/1254928" source="BUGZILLA"/>
		<reference ref_id="1255129" ref_url="https://bugzilla.suse.com/1255129" source="BUGZILLA"/>
		<reference ref_id="1255144" ref_url="https://bugzilla.suse.com/1255144" source="BUGZILLA"/>
		<reference ref_id="1255148" ref_url="https://bugzilla.suse.com/1255148" source="BUGZILLA"/>
		<reference ref_id="1255311" ref_url="https://bugzilla.suse.com/1255311" source="BUGZILLA"/>
		<reference ref_id="1255490" ref_url="https://bugzilla.suse.com/1255490" source="BUGZILLA"/>
		<reference ref_id="1255572" ref_url="https://bugzilla.suse.com/1255572" source="BUGZILLA"/>
		<reference ref_id="1255721" ref_url="https://bugzilla.suse.com/1255721" source="BUGZILLA"/>
		<reference ref_id="1255868" ref_url="https://bugzilla.suse.com/1255868" source="BUGZILLA"/>
		<reference ref_id="1256640" ref_url="https://bugzilla.suse.com/1256640" source="BUGZILLA"/>
		<reference ref_id="1256675" ref_url="https://bugzilla.suse.com/1256675" source="BUGZILLA"/>
		<reference ref_id="1256679" ref_url="https://bugzilla.suse.com/1256679" source="BUGZILLA"/>
		<reference ref_id="1256708" ref_url="https://bugzilla.suse.com/1256708" source="BUGZILLA"/>
		<reference ref_id="1256732" ref_url="https://bugzilla.suse.com/1256732" source="BUGZILLA"/>
		<reference ref_id="1256784" ref_url="https://bugzilla.suse.com/1256784" source="BUGZILLA"/>
		<reference ref_id="1256802" ref_url="https://bugzilla.suse.com/1256802" source="BUGZILLA"/>
		<reference ref_id="1256865" ref_url="https://bugzilla.suse.com/1256865" source="BUGZILLA"/>
		<reference ref_id="1256867" ref_url="https://bugzilla.suse.com/1256867" source="BUGZILLA"/>
		<reference ref_id="1257154" ref_url="https://bugzilla.suse.com/1257154" source="BUGZILLA"/>
		<reference ref_id="1257174" ref_url="https://bugzilla.suse.com/1257174" source="BUGZILLA"/>
		<reference ref_id="1257209" ref_url="https://bugzilla.suse.com/1257209" source="BUGZILLA"/>
		<reference ref_id="1257222" ref_url="https://bugzilla.suse.com/1257222" source="BUGZILLA"/>
		<reference ref_id="1257228" ref_url="https://bugzilla.suse.com/1257228" source="BUGZILLA"/>
		<reference ref_id="1257231" ref_url="https://bugzilla.suse.com/1257231" source="BUGZILLA"/>
		<reference ref_id="1257246" ref_url="https://bugzilla.suse.com/1257246" source="BUGZILLA"/>
		<reference ref_id="1257332" ref_url="https://bugzilla.suse.com/1257332" source="BUGZILLA"/>
		<reference ref_id="1257466" ref_url="https://bugzilla.suse.com/1257466" source="BUGZILLA"/>
		<reference ref_id="1257472" ref_url="https://bugzilla.suse.com/1257472" source="BUGZILLA"/>
		<reference ref_id="1257473" ref_url="https://bugzilla.suse.com/1257473" source="BUGZILLA"/>
		<reference ref_id="1257551" ref_url="https://bugzilla.suse.com/1257551" source="BUGZILLA"/>
		<reference ref_id="1257552" ref_url="https://bugzilla.suse.com/1257552" source="BUGZILLA"/>
		<reference ref_id="1257553" ref_url="https://bugzilla.suse.com/1257553" source="BUGZILLA"/>
		<reference ref_id="1257554" ref_url="https://bugzilla.suse.com/1257554" source="BUGZILLA"/>
		<reference ref_id="1257556" ref_url="https://bugzilla.suse.com/1257556" source="BUGZILLA"/>
		<reference ref_id="1257557" ref_url="https://bugzilla.suse.com/1257557" source="BUGZILLA"/>
		<reference ref_id="1257559" ref_url="https://bugzilla.suse.com/1257559" source="BUGZILLA"/>
		<reference ref_id="1257560" ref_url="https://bugzilla.suse.com/1257560" source="BUGZILLA"/>
		<reference ref_id="1257561" ref_url="https://bugzilla.suse.com/1257561" source="BUGZILLA"/>
		<reference ref_id="1257562" ref_url="https://bugzilla.suse.com/1257562" source="BUGZILLA"/>
		<reference ref_id="1257565" ref_url="https://bugzilla.suse.com/1257565" source="BUGZILLA"/>
		<reference ref_id="1257570" ref_url="https://bugzilla.suse.com/1257570" source="BUGZILLA"/>
		<reference ref_id="1257572" ref_url="https://bugzilla.suse.com/1257572" source="BUGZILLA"/>
		<reference ref_id="1257573" ref_url="https://bugzilla.suse.com/1257573" source="BUGZILLA"/>
		<reference ref_id="1257576" ref_url="https://bugzilla.suse.com/1257576" source="BUGZILLA"/>
		<reference ref_id="1257579" ref_url="https://bugzilla.suse.com/1257579" source="BUGZILLA"/>
		<reference ref_id="1257580" ref_url="https://bugzilla.suse.com/1257580" source="BUGZILLA"/>
		<reference ref_id="1257581" ref_url="https://bugzilla.suse.com/1257581" source="BUGZILLA"/>
		<reference ref_id="1257586" ref_url="https://bugzilla.suse.com/1257586" source="BUGZILLA"/>
		<reference ref_id="1257600" ref_url="https://bugzilla.suse.com/1257600" source="BUGZILLA"/>
		<reference ref_id="1257631" ref_url="https://bugzilla.suse.com/1257631" source="BUGZILLA"/>
		<reference ref_id="1257635" ref_url="https://bugzilla.suse.com/1257635" source="BUGZILLA"/>
		<reference ref_id="1257679" ref_url="https://bugzilla.suse.com/1257679" source="BUGZILLA"/>
		<reference ref_id="1257682" ref_url="https://bugzilla.suse.com/1257682" source="BUGZILLA"/>
		<reference ref_id="1257686" ref_url="https://bugzilla.suse.com/1257686" source="BUGZILLA"/>
		<reference ref_id="1257687" ref_url="https://bugzilla.suse.com/1257687" source="BUGZILLA"/>
		<reference ref_id="1257688" ref_url="https://bugzilla.suse.com/1257688" source="BUGZILLA"/>
		<reference ref_id="1257704" ref_url="https://bugzilla.suse.com/1257704" source="BUGZILLA"/>
		<reference ref_id="1257705" ref_url="https://bugzilla.suse.com/1257705" source="BUGZILLA"/>
		<reference ref_id="1257706" ref_url="https://bugzilla.suse.com/1257706" source="BUGZILLA"/>
		<reference ref_id="1257707" ref_url="https://bugzilla.suse.com/1257707" source="BUGZILLA"/>
		<reference ref_id="1257709" ref_url="https://bugzilla.suse.com/1257709" source="BUGZILLA"/>
		<reference ref_id="1257714" ref_url="https://bugzilla.suse.com/1257714" source="BUGZILLA"/>
		<reference ref_id="1257715" ref_url="https://bugzilla.suse.com/1257715" source="BUGZILLA"/>
		<reference ref_id="1257716" ref_url="https://bugzilla.suse.com/1257716" source="BUGZILLA"/>
		<reference ref_id="1257718" ref_url="https://bugzilla.suse.com/1257718" source="BUGZILLA"/>
		<reference ref_id="1257722" ref_url="https://bugzilla.suse.com/1257722" source="BUGZILLA"/>
		<reference ref_id="1257723" ref_url="https://bugzilla.suse.com/1257723" source="BUGZILLA"/>
		<reference ref_id="1257726" ref_url="https://bugzilla.suse.com/1257726" source="BUGZILLA"/>
		<reference ref_id="1257729" ref_url="https://bugzilla.suse.com/1257729" source="BUGZILLA"/>
		<reference ref_id="1257730" ref_url="https://bugzilla.suse.com/1257730" source="BUGZILLA"/>
		<reference ref_id="1257732" ref_url="https://bugzilla.suse.com/1257732" source="BUGZILLA"/>
		<reference ref_id="1257734" ref_url="https://bugzilla.suse.com/1257734" source="BUGZILLA"/>
		<reference ref_id="1257735" ref_url="https://bugzilla.suse.com/1257735" source="BUGZILLA"/>
		<reference ref_id="1257737" ref_url="https://bugzilla.suse.com/1257737" source="BUGZILLA"/>
		<reference ref_id="1257739" ref_url="https://bugzilla.suse.com/1257739" source="BUGZILLA"/>
		<reference ref_id="1257740" ref_url="https://bugzilla.suse.com/1257740" source="BUGZILLA"/>
		<reference ref_id="1257741" ref_url="https://bugzilla.suse.com/1257741" source="BUGZILLA"/>
		<reference ref_id="1257742" ref_url="https://bugzilla.suse.com/1257742" source="BUGZILLA"/>
		<reference ref_id="1257743" ref_url="https://bugzilla.suse.com/1257743" source="BUGZILLA"/>
		<reference ref_id="1257745" ref_url="https://bugzilla.suse.com/1257745" source="BUGZILLA"/>
		<reference ref_id="1257749" ref_url="https://bugzilla.suse.com/1257749" source="BUGZILLA"/>
		<reference ref_id="1257750" ref_url="https://bugzilla.suse.com/1257750" source="BUGZILLA"/>
		<reference ref_id="1257755" ref_url="https://bugzilla.suse.com/1257755" source="BUGZILLA"/>
		<reference ref_id="1257757" ref_url="https://bugzilla.suse.com/1257757" source="BUGZILLA"/>
		<reference ref_id="1257758" ref_url="https://bugzilla.suse.com/1257758" source="BUGZILLA"/>
		<reference ref_id="1257759" ref_url="https://bugzilla.suse.com/1257759" source="BUGZILLA"/>
		<reference ref_id="1257761" ref_url="https://bugzilla.suse.com/1257761" source="BUGZILLA"/>
		<reference ref_id="1257762" ref_url="https://bugzilla.suse.com/1257762" source="BUGZILLA"/>
		<reference ref_id="1257763" ref_url="https://bugzilla.suse.com/1257763" source="BUGZILLA"/>
		<reference ref_id="1257765" ref_url="https://bugzilla.suse.com/1257765" source="BUGZILLA"/>
		<reference ref_id="1257768" ref_url="https://bugzilla.suse.com/1257768" source="BUGZILLA"/>
		<reference ref_id="1257770" ref_url="https://bugzilla.suse.com/1257770" source="BUGZILLA"/>
		<reference ref_id="1257772" ref_url="https://bugzilla.suse.com/1257772" source="BUGZILLA"/>
		<reference ref_id="1257775" ref_url="https://bugzilla.suse.com/1257775" source="BUGZILLA"/>
		<reference ref_id="1257776" ref_url="https://bugzilla.suse.com/1257776" source="BUGZILLA"/>
		<reference ref_id="1257788" ref_url="https://bugzilla.suse.com/1257788" source="BUGZILLA"/>
		<reference ref_id="1257789" ref_url="https://bugzilla.suse.com/1257789" source="BUGZILLA"/>
		<reference ref_id="1257790" ref_url="https://bugzilla.suse.com/1257790" source="BUGZILLA"/>
		<reference ref_id="1257805" ref_url="https://bugzilla.suse.com/1257805" source="BUGZILLA"/>
		<reference ref_id="1257808" ref_url="https://bugzilla.suse.com/1257808" source="BUGZILLA"/>
		<reference ref_id="1257809" ref_url="https://bugzilla.suse.com/1257809" source="BUGZILLA"/>
		<reference ref_id="1257811" ref_url="https://bugzilla.suse.com/1257811" source="BUGZILLA"/>
		<reference ref_id="1257813" ref_url="https://bugzilla.suse.com/1257813" source="BUGZILLA"/>
		<reference ref_id="1257814" ref_url="https://bugzilla.suse.com/1257814" source="BUGZILLA"/>
		<reference ref_id="1257815" ref_url="https://bugzilla.suse.com/1257815" source="BUGZILLA"/>
		<reference ref_id="1257816" ref_url="https://bugzilla.suse.com/1257816" source="BUGZILLA"/>
		<reference ref_id="1257817" ref_url="https://bugzilla.suse.com/1257817" source="BUGZILLA"/>
		<reference ref_id="1257818" ref_url="https://bugzilla.suse.com/1257818" source="BUGZILLA"/>
		<reference ref_id="1257830" ref_url="https://bugzilla.suse.com/1257830" source="BUGZILLA"/>
		<reference ref_id="1257942" ref_url="https://bugzilla.suse.com/1257942" source="BUGZILLA"/>
		<reference ref_id="1257952" ref_url="https://bugzilla.suse.com/1257952" source="BUGZILLA"/>
		<reference ref_id="1258153" ref_url="https://bugzilla.suse.com/1258153" source="BUGZILLA"/>
		<reference ref_id="1258181" ref_url="https://bugzilla.suse.com/1258181" source="BUGZILLA"/>
		<reference ref_id="1258184" ref_url="https://bugzilla.suse.com/1258184" source="BUGZILLA"/>
		<reference ref_id="1258222" ref_url="https://bugzilla.suse.com/1258222" source="BUGZILLA"/>
		<reference ref_id="1258232" ref_url="https://bugzilla.suse.com/1258232" source="BUGZILLA"/>
		<reference ref_id="1258234" ref_url="https://bugzilla.suse.com/1258234" source="BUGZILLA"/>
		<reference ref_id="1258237" ref_url="https://bugzilla.suse.com/1258237" source="BUGZILLA"/>
		<reference ref_id="1258245" ref_url="https://bugzilla.suse.com/1258245" source="BUGZILLA"/>
		<reference ref_id="1258249" ref_url="https://bugzilla.suse.com/1258249" source="BUGZILLA"/>
		<reference ref_id="1258252" ref_url="https://bugzilla.suse.com/1258252" source="BUGZILLA"/>
		<reference ref_id="1258256" ref_url="https://bugzilla.suse.com/1258256" source="BUGZILLA"/>
		<reference ref_id="1258258" ref_url="https://bugzilla.suse.com/1258258" source="BUGZILLA"/>
		<reference ref_id="1258259" ref_url="https://bugzilla.suse.com/1258259" source="BUGZILLA"/>
		<reference ref_id="1258272" ref_url="https://bugzilla.suse.com/1258272" source="BUGZILLA"/>
		<reference ref_id="1258273" ref_url="https://bugzilla.suse.com/1258273" source="BUGZILLA"/>
		<reference ref_id="1258276" ref_url="https://bugzilla.suse.com/1258276" source="BUGZILLA"/>
		<reference ref_id="1258277" ref_url="https://bugzilla.suse.com/1258277" source="BUGZILLA"/>
		<reference ref_id="1258279" ref_url="https://bugzilla.suse.com/1258279" source="BUGZILLA"/>
		<reference ref_id="1258286" ref_url="https://bugzilla.suse.com/1258286" source="BUGZILLA"/>
		<reference ref_id="1258289" ref_url="https://bugzilla.suse.com/1258289" source="BUGZILLA"/>
		<reference ref_id="1258290" ref_url="https://bugzilla.suse.com/1258290" source="BUGZILLA"/>
		<reference ref_id="1258297" ref_url="https://bugzilla.suse.com/1258297" source="BUGZILLA"/>
		<reference ref_id="1258298" ref_url="https://bugzilla.suse.com/1258298" source="BUGZILLA"/>
		<reference ref_id="1258299" ref_url="https://bugzilla.suse.com/1258299" source="BUGZILLA"/>
		<reference ref_id="1258303" ref_url="https://bugzilla.suse.com/1258303" source="BUGZILLA"/>
		<reference ref_id="1258304" ref_url="https://bugzilla.suse.com/1258304" source="BUGZILLA"/>
		<reference ref_id="1258308" ref_url="https://bugzilla.suse.com/1258308" source="BUGZILLA"/>
		<reference ref_id="1258309" ref_url="https://bugzilla.suse.com/1258309" source="BUGZILLA"/>
		<reference ref_id="1258313" ref_url="https://bugzilla.suse.com/1258313" source="BUGZILLA"/>
		<reference ref_id="1258317" ref_url="https://bugzilla.suse.com/1258317" source="BUGZILLA"/>
		<reference ref_id="1258321" ref_url="https://bugzilla.suse.com/1258321" source="BUGZILLA"/>
		<reference ref_id="1258323" ref_url="https://bugzilla.suse.com/1258323" source="BUGZILLA"/>
		<reference ref_id="1258324" ref_url="https://bugzilla.suse.com/1258324" source="BUGZILLA"/>
		<reference ref_id="1258326" ref_url="https://bugzilla.suse.com/1258326" source="BUGZILLA"/>
		<reference ref_id="1258331" ref_url="https://bugzilla.suse.com/1258331" source="BUGZILLA"/>
		<reference ref_id="1258338" ref_url="https://bugzilla.suse.com/1258338" source="BUGZILLA"/>
		<reference ref_id="1258349" ref_url="https://bugzilla.suse.com/1258349" source="BUGZILLA"/>
		<reference ref_id="1258354" ref_url="https://bugzilla.suse.com/1258354" source="BUGZILLA"/>
		<reference ref_id="1258355" ref_url="https://bugzilla.suse.com/1258355" source="BUGZILLA"/>
		<reference ref_id="1258358" ref_url="https://bugzilla.suse.com/1258358" source="BUGZILLA"/>
		<reference ref_id="1258374" ref_url="https://bugzilla.suse.com/1258374" source="BUGZILLA"/>
		<reference ref_id="1258376" ref_url="https://bugzilla.suse.com/1258376" source="BUGZILLA"/>
		<reference ref_id="1258377" ref_url="https://bugzilla.suse.com/1258377" source="BUGZILLA"/>
		<reference ref_id="1258379" ref_url="https://bugzilla.suse.com/1258379" source="BUGZILLA"/>
		<reference ref_id="1258389" ref_url="https://bugzilla.suse.com/1258389" source="BUGZILLA"/>
		<reference ref_id="1258394" ref_url="https://bugzilla.suse.com/1258394" source="BUGZILLA"/>
		<reference ref_id="1258395" ref_url="https://bugzilla.suse.com/1258395" source="BUGZILLA"/>
		<reference ref_id="1258397" ref_url="https://bugzilla.suse.com/1258397" source="BUGZILLA"/>
		<reference ref_id="1258411" ref_url="https://bugzilla.suse.com/1258411" source="BUGZILLA"/>
		<reference ref_id="1258415" ref_url="https://bugzilla.suse.com/1258415" source="BUGZILLA"/>
		<reference ref_id="1258419" ref_url="https://bugzilla.suse.com/1258419" source="BUGZILLA"/>
		<reference ref_id="1258421" ref_url="https://bugzilla.suse.com/1258421" source="BUGZILLA"/>
		<reference ref_id="1258422" ref_url="https://bugzilla.suse.com/1258422" source="BUGZILLA"/>
		<reference ref_id="1258424" ref_url="https://bugzilla.suse.com/1258424" source="BUGZILLA"/>
		<reference ref_id="1258429" ref_url="https://bugzilla.suse.com/1258429" source="BUGZILLA"/>
		<reference ref_id="1258430" ref_url="https://bugzilla.suse.com/1258430" source="BUGZILLA"/>
		<reference ref_id="1258442" ref_url="https://bugzilla.suse.com/1258442" source="BUGZILLA"/>
		<reference ref_id="1258455" ref_url="https://bugzilla.suse.com/1258455" source="BUGZILLA"/>
		<reference ref_id="1258461" ref_url="https://bugzilla.suse.com/1258461" source="BUGZILLA"/>
		<reference ref_id="1258464" ref_url="https://bugzilla.suse.com/1258464" source="BUGZILLA"/>
		<reference ref_id="1258465" ref_url="https://bugzilla.suse.com/1258465" source="BUGZILLA"/>
		<reference ref_id="1258468" ref_url="https://bugzilla.suse.com/1258468" source="BUGZILLA"/>
		<reference ref_id="1258469" ref_url="https://bugzilla.suse.com/1258469" source="BUGZILLA"/>
		<reference ref_id="1258483" ref_url="https://bugzilla.suse.com/1258483" source="BUGZILLA"/>
		<reference ref_id="1258484" ref_url="https://bugzilla.suse.com/1258484" source="BUGZILLA"/>
		<reference ref_id="1258489" ref_url="https://bugzilla.suse.com/1258489" source="BUGZILLA"/>
		<reference ref_id="1258517" ref_url="https://bugzilla.suse.com/1258517" source="BUGZILLA"/>
		<reference ref_id="1258518" ref_url="https://bugzilla.suse.com/1258518" source="BUGZILLA"/>
		<reference ref_id="1258519" ref_url="https://bugzilla.suse.com/1258519" source="BUGZILLA"/>
		<reference ref_id="1258520" ref_url="https://bugzilla.suse.com/1258520" source="BUGZILLA"/>
		<reference ref_id="1258524" ref_url="https://bugzilla.suse.com/1258524" source="BUGZILLA"/>
		<reference ref_id="1258544" ref_url="https://bugzilla.suse.com/1258544" source="BUGZILLA"/>
		<reference ref_id="1258660" ref_url="https://bugzilla.suse.com/1258660" source="BUGZILLA"/>
		<reference ref_id="1258672" ref_url="https://bugzilla.suse.com/1258672" source="BUGZILLA"/>
		<reference ref_id="1258824" ref_url="https://bugzilla.suse.com/1258824" source="BUGZILLA"/>
		<reference ref_id="1259329" ref_url="https://bugzilla.suse.com/1259329" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-39753" ref_url="https://www.suse.com/security/cve/CVE-2025-39753/" source="CVE"/>
		<reference ref_id="CVE-2025-39964" ref_url="https://www.suse.com/security/cve/CVE-2025-39964/" source="CVE"/>
		<reference ref_id="CVE-2025-40099" ref_url="https://www.suse.com/security/cve/CVE-2025-40099/" source="CVE"/>
		<reference ref_id="CVE-2025-40103" ref_url="https://www.suse.com/security/cve/CVE-2025-40103/" source="CVE"/>
		<reference ref_id="CVE-2025-40230" ref_url="https://www.suse.com/security/cve/CVE-2025-40230/" source="CVE"/>
		<reference ref_id="CVE-2025-68173" ref_url="https://www.suse.com/security/cve/CVE-2025-68173/" source="CVE"/>
		<reference ref_id="CVE-2025-68186" ref_url="https://www.suse.com/security/cve/CVE-2025-68186/" source="CVE"/>
		<reference ref_id="CVE-2025-68292" ref_url="https://www.suse.com/security/cve/CVE-2025-68292/" source="CVE"/>
		<reference ref_id="CVE-2025-68295" ref_url="https://www.suse.com/security/cve/CVE-2025-68295/" source="CVE"/>
		<reference ref_id="CVE-2025-68329" ref_url="https://www.suse.com/security/cve/CVE-2025-68329/" source="CVE"/>
		<reference ref_id="CVE-2025-68371" ref_url="https://www.suse.com/security/cve/CVE-2025-68371/" source="CVE"/>
		<reference ref_id="CVE-2025-68745" ref_url="https://www.suse.com/security/cve/CVE-2025-68745/" source="CVE"/>
		<reference ref_id="CVE-2025-68785" ref_url="https://www.suse.com/security/cve/CVE-2025-68785/" source="CVE"/>
		<reference ref_id="CVE-2025-68810" ref_url="https://www.suse.com/security/cve/CVE-2025-68810/" source="CVE"/>
		<reference ref_id="CVE-2025-68818" ref_url="https://www.suse.com/security/cve/CVE-2025-68818/" source="CVE"/>
		<reference ref_id="CVE-2025-71071" ref_url="https://www.suse.com/security/cve/CVE-2025-71071/" source="CVE"/>
		<reference ref_id="CVE-2025-71104" ref_url="https://www.suse.com/security/cve/CVE-2025-71104/" source="CVE"/>
		<reference ref_id="CVE-2025-71125" ref_url="https://www.suse.com/security/cve/CVE-2025-71125/" source="CVE"/>
		<reference ref_id="CVE-2025-71134" ref_url="https://www.suse.com/security/cve/CVE-2025-71134/" source="CVE"/>
		<reference ref_id="CVE-2025-71161" ref_url="https://www.suse.com/security/cve/CVE-2025-71161/" source="CVE"/>
		<reference ref_id="CVE-2025-71182" ref_url="https://www.suse.com/security/cve/CVE-2025-71182/" source="CVE"/>
		<reference ref_id="CVE-2025-71183" ref_url="https://www.suse.com/security/cve/CVE-2025-71183/" source="CVE"/>
		<reference ref_id="CVE-2025-71184" ref_url="https://www.suse.com/security/cve/CVE-2025-71184/" source="CVE"/>
		<reference ref_id="CVE-2025-71185" ref_url="https://www.suse.com/security/cve/CVE-2025-71185/" source="CVE"/>
		<reference ref_id="CVE-2025-71186" ref_url="https://www.suse.com/security/cve/CVE-2025-71186/" source="CVE"/>
		<reference ref_id="CVE-2025-71188" ref_url="https://www.suse.com/security/cve/CVE-2025-71188/" source="CVE"/>
		<reference ref_id="CVE-2025-71189" ref_url="https://www.suse.com/security/cve/CVE-2025-71189/" source="CVE"/>
		<reference ref_id="CVE-2025-71190" ref_url="https://www.suse.com/security/cve/CVE-2025-71190/" source="CVE"/>
		<reference ref_id="CVE-2025-71191" ref_url="https://www.suse.com/security/cve/CVE-2025-71191/" source="CVE"/>
		<reference ref_id="CVE-2025-71192" ref_url="https://www.suse.com/security/cve/CVE-2025-71192/" source="CVE"/>
		<reference ref_id="CVE-2025-71193" ref_url="https://www.suse.com/security/cve/CVE-2025-71193/" source="CVE"/>
		<reference ref_id="CVE-2025-71194" ref_url="https://www.suse.com/security/cve/CVE-2025-71194/" source="CVE"/>
		<reference ref_id="CVE-2025-71195" ref_url="https://www.suse.com/security/cve/CVE-2025-71195/" source="CVE"/>
		<reference ref_id="CVE-2025-71196" ref_url="https://www.suse.com/security/cve/CVE-2025-71196/" source="CVE"/>
		<reference ref_id="CVE-2025-71197" ref_url="https://www.suse.com/security/cve/CVE-2025-71197/" source="CVE"/>
		<reference ref_id="CVE-2025-71198" ref_url="https://www.suse.com/security/cve/CVE-2025-71198/" source="CVE"/>
		<reference ref_id="CVE-2025-71199" ref_url="https://www.suse.com/security/cve/CVE-2025-71199/" source="CVE"/>
		<reference ref_id="CVE-2025-71200" ref_url="https://www.suse.com/security/cve/CVE-2025-71200/" source="CVE"/>
		<reference ref_id="CVE-2025-71222" ref_url="https://www.suse.com/security/cve/CVE-2025-71222/" source="CVE"/>
		<reference ref_id="CVE-2025-71224" ref_url="https://www.suse.com/security/cve/CVE-2025-71224/" source="CVE"/>
		<reference ref_id="CVE-2025-71225" ref_url="https://www.suse.com/security/cve/CVE-2025-71225/" source="CVE"/>
		<reference ref_id="CVE-2025-71229" ref_url="https://www.suse.com/security/cve/CVE-2025-71229/" source="CVE"/>
		<reference ref_id="CVE-2025-71231" ref_url="https://www.suse.com/security/cve/CVE-2025-71231/" source="CVE"/>
		<reference ref_id="CVE-2025-71232" ref_url="https://www.suse.com/security/cve/CVE-2025-71232/" source="CVE"/>
		<reference ref_id="CVE-2025-71233" ref_url="https://www.suse.com/security/cve/CVE-2025-71233/" source="CVE"/>
		<reference ref_id="CVE-2025-71234" ref_url="https://www.suse.com/security/cve/CVE-2025-71234/" source="CVE"/>
		<reference ref_id="CVE-2025-71235" ref_url="https://www.suse.com/security/cve/CVE-2025-71235/" source="CVE"/>
		<reference ref_id="CVE-2025-71236" ref_url="https://www.suse.com/security/cve/CVE-2025-71236/" source="CVE"/>
		<reference ref_id="CVE-2026-22979" ref_url="https://www.suse.com/security/cve/CVE-2026-22979/" source="CVE"/>
		<reference ref_id="CVE-2026-22980" ref_url="https://www.suse.com/security/cve/CVE-2026-22980/" source="CVE"/>
		<reference ref_id="CVE-2026-22998" ref_url="https://www.suse.com/security/cve/CVE-2026-22998/" source="CVE"/>
		<reference ref_id="CVE-2026-23003" ref_url="https://www.suse.com/security/cve/CVE-2026-23003/" source="CVE"/>
		<reference ref_id="CVE-2026-23004" ref_url="https://www.suse.com/security/cve/CVE-2026-23004/" source="CVE"/>
		<reference ref_id="CVE-2026-23010" ref_url="https://www.suse.com/security/cve/CVE-2026-23010/" source="CVE"/>
		<reference ref_id="CVE-2026-23017" ref_url="https://www.suse.com/security/cve/CVE-2026-23017/" source="CVE"/>
		<reference ref_id="CVE-2026-23018" ref_url="https://www.suse.com/security/cve/CVE-2026-23018/" source="CVE"/>
		<reference ref_id="CVE-2026-23021" ref_url="https://www.suse.com/security/cve/CVE-2026-23021/" source="CVE"/>
		<reference ref_id="CVE-2026-23022" ref_url="https://www.suse.com/security/cve/CVE-2026-23022/" source="CVE"/>
		<reference ref_id="CVE-2026-23023" ref_url="https://www.suse.com/security/cve/CVE-2026-23023/" source="CVE"/>
		<reference ref_id="CVE-2026-23024" ref_url="https://www.suse.com/security/cve/CVE-2026-23024/" source="CVE"/>
		<reference ref_id="CVE-2026-23026" ref_url="https://www.suse.com/security/cve/CVE-2026-23026/" source="CVE"/>
		<reference ref_id="CVE-2026-23030" ref_url="https://www.suse.com/security/cve/CVE-2026-23030/" source="CVE"/>
		<reference ref_id="CVE-2026-23031" ref_url="https://www.suse.com/security/cve/CVE-2026-23031/" source="CVE"/>
		<reference ref_id="CVE-2026-23033" ref_url="https://www.suse.com/security/cve/CVE-2026-23033/" source="CVE"/>
		<reference ref_id="CVE-2026-23035" ref_url="https://www.suse.com/security/cve/CVE-2026-23035/" source="CVE"/>
		<reference ref_id="CVE-2026-23037" ref_url="https://www.suse.com/security/cve/CVE-2026-23037/" source="CVE"/>
		<reference ref_id="CVE-2026-23038" ref_url="https://www.suse.com/security/cve/CVE-2026-23038/" source="CVE"/>
		<reference ref_id="CVE-2026-23042" ref_url="https://www.suse.com/security/cve/CVE-2026-23042/" source="CVE"/>
		<reference ref_id="CVE-2026-23047" ref_url="https://www.suse.com/security/cve/CVE-2026-23047/" source="CVE"/>
		<reference ref_id="CVE-2026-23049" ref_url="https://www.suse.com/security/cve/CVE-2026-23049/" source="CVE"/>
		<reference ref_id="CVE-2026-23050" ref_url="https://www.suse.com/security/cve/CVE-2026-23050/" source="CVE"/>
		<reference ref_id="CVE-2026-23053" ref_url="https://www.suse.com/security/cve/CVE-2026-23053/" source="CVE"/>
		<reference ref_id="CVE-2026-23054" ref_url="https://www.suse.com/security/cve/CVE-2026-23054/" source="CVE"/>
		<reference ref_id="CVE-2026-23055" ref_url="https://www.suse.com/security/cve/CVE-2026-23055/" source="CVE"/>
		<reference ref_id="CVE-2026-23056" ref_url="https://www.suse.com/security/cve/CVE-2026-23056/" source="CVE"/>
		<reference ref_id="CVE-2026-23057" ref_url="https://www.suse.com/security/cve/CVE-2026-23057/" source="CVE"/>
		<reference ref_id="CVE-2026-23058" ref_url="https://www.suse.com/security/cve/CVE-2026-23058/" source="CVE"/>
		<reference ref_id="CVE-2026-23059" ref_url="https://www.suse.com/security/cve/CVE-2026-23059/" source="CVE"/>
		<reference ref_id="CVE-2026-23060" ref_url="https://www.suse.com/security/cve/CVE-2026-23060/" source="CVE"/>
		<reference ref_id="CVE-2026-23061" ref_url="https://www.suse.com/security/cve/CVE-2026-23061/" source="CVE"/>
		<reference ref_id="CVE-2026-23062" ref_url="https://www.suse.com/security/cve/CVE-2026-23062/" source="CVE"/>
		<reference ref_id="CVE-2026-23063" ref_url="https://www.suse.com/security/cve/CVE-2026-23063/" source="CVE"/>
		<reference ref_id="CVE-2026-23064" ref_url="https://www.suse.com/security/cve/CVE-2026-23064/" source="CVE"/>
		<reference ref_id="CVE-2026-23065" ref_url="https://www.suse.com/security/cve/CVE-2026-23065/" source="CVE"/>
		<reference ref_id="CVE-2026-23066" ref_url="https://www.suse.com/security/cve/CVE-2026-23066/" source="CVE"/>
		<reference ref_id="CVE-2026-23068" ref_url="https://www.suse.com/security/cve/CVE-2026-23068/" source="CVE"/>
		<reference ref_id="CVE-2026-23069" ref_url="https://www.suse.com/security/cve/CVE-2026-23069/" source="CVE"/>
		<reference ref_id="CVE-2026-23070" ref_url="https://www.suse.com/security/cve/CVE-2026-23070/" source="CVE"/>
		<reference ref_id="CVE-2026-23071" ref_url="https://www.suse.com/security/cve/CVE-2026-23071/" source="CVE"/>
		<reference ref_id="CVE-2026-23073" ref_url="https://www.suse.com/security/cve/CVE-2026-23073/" source="CVE"/>
		<reference ref_id="CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074/" source="CVE"/>
		<reference ref_id="CVE-2026-23076" ref_url="https://www.suse.com/security/cve/CVE-2026-23076/" source="CVE"/>
		<reference ref_id="CVE-2026-23078" ref_url="https://www.suse.com/security/cve/CVE-2026-23078/" source="CVE"/>
		<reference ref_id="CVE-2026-23080" ref_url="https://www.suse.com/security/cve/CVE-2026-23080/" source="CVE"/>
		<reference ref_id="CVE-2026-23082" ref_url="https://www.suse.com/security/cve/CVE-2026-23082/" source="CVE"/>
		<reference ref_id="CVE-2026-23083" ref_url="https://www.suse.com/security/cve/CVE-2026-23083/" source="CVE"/>
		<reference ref_id="CVE-2026-23084" ref_url="https://www.suse.com/security/cve/CVE-2026-23084/" source="CVE"/>
		<reference ref_id="CVE-2026-23085" ref_url="https://www.suse.com/security/cve/CVE-2026-23085/" source="CVE"/>
		<reference ref_id="CVE-2026-23086" ref_url="https://www.suse.com/security/cve/CVE-2026-23086/" source="CVE"/>
		<reference ref_id="CVE-2026-23088" ref_url="https://www.suse.com/security/cve/CVE-2026-23088/" source="CVE"/>
		<reference ref_id="CVE-2026-23089" ref_url="https://www.suse.com/security/cve/CVE-2026-23089/" source="CVE"/>
		<reference ref_id="CVE-2026-23090" ref_url="https://www.suse.com/security/cve/CVE-2026-23090/" source="CVE"/>
		<reference ref_id="CVE-2026-23091" ref_url="https://www.suse.com/security/cve/CVE-2026-23091/" source="CVE"/>
		<reference ref_id="CVE-2026-23094" ref_url="https://www.suse.com/security/cve/CVE-2026-23094/" source="CVE"/>
		<reference ref_id="CVE-2026-23095" ref_url="https://www.suse.com/security/cve/CVE-2026-23095/" source="CVE"/>
		<reference ref_id="CVE-2026-23096" ref_url="https://www.suse.com/security/cve/CVE-2026-23096/" source="CVE"/>
		<reference ref_id="CVE-2026-23097" ref_url="https://www.suse.com/security/cve/CVE-2026-23097/" source="CVE"/>
		<reference ref_id="CVE-2026-23099" ref_url="https://www.suse.com/security/cve/CVE-2026-23099/" source="CVE"/>
		<reference ref_id="CVE-2026-23100" ref_url="https://www.suse.com/security/cve/CVE-2026-23100/" source="CVE"/>
		<reference ref_id="CVE-2026-23101" ref_url="https://www.suse.com/security/cve/CVE-2026-23101/" source="CVE"/>
		<reference ref_id="CVE-2026-23102" ref_url="https://www.suse.com/security/cve/CVE-2026-23102/" source="CVE"/>
		<reference ref_id="CVE-2026-23104" ref_url="https://www.suse.com/security/cve/CVE-2026-23104/" source="CVE"/>
		<reference ref_id="CVE-2026-23105" ref_url="https://www.suse.com/security/cve/CVE-2026-23105/" source="CVE"/>
		<reference ref_id="CVE-2026-23107" ref_url="https://www.suse.com/security/cve/CVE-2026-23107/" source="CVE"/>
		<reference ref_id="CVE-2026-23108" ref_url="https://www.suse.com/security/cve/CVE-2026-23108/" source="CVE"/>
		<reference ref_id="CVE-2026-23110" ref_url="https://www.suse.com/security/cve/CVE-2026-23110/" source="CVE"/>
		<reference ref_id="CVE-2026-23111" ref_url="https://www.suse.com/security/cve/CVE-2026-23111/" source="CVE"/>
		<reference ref_id="CVE-2026-23112" ref_url="https://www.suse.com/security/cve/CVE-2026-23112/" source="CVE"/>
		<reference ref_id="CVE-2026-23116" ref_url="https://www.suse.com/security/cve/CVE-2026-23116/" source="CVE"/>
		<reference ref_id="CVE-2026-23119" ref_url="https://www.suse.com/security/cve/CVE-2026-23119/" source="CVE"/>
		<reference ref_id="CVE-2026-23121" ref_url="https://www.suse.com/security/cve/CVE-2026-23121/" source="CVE"/>
		<reference ref_id="CVE-2026-23123" ref_url="https://www.suse.com/security/cve/CVE-2026-23123/" source="CVE"/>
		<reference ref_id="CVE-2026-23128" ref_url="https://www.suse.com/security/cve/CVE-2026-23128/" source="CVE"/>
		<reference ref_id="CVE-2026-23129" ref_url="https://www.suse.com/security/cve/CVE-2026-23129/" source="CVE"/>
		<reference ref_id="CVE-2026-23131" ref_url="https://www.suse.com/security/cve/CVE-2026-23131/" source="CVE"/>
		<reference ref_id="CVE-2026-23133" ref_url="https://www.suse.com/security/cve/CVE-2026-23133/" source="CVE"/>
		<reference ref_id="CVE-2026-23135" ref_url="https://www.suse.com/security/cve/CVE-2026-23135/" source="CVE"/>
		<reference ref_id="CVE-2026-23136" ref_url="https://www.suse.com/security/cve/CVE-2026-23136/" source="CVE"/>
		<reference ref_id="CVE-2026-23137" ref_url="https://www.suse.com/security/cve/CVE-2026-23137/" source="CVE"/>
		<reference ref_id="CVE-2026-23139" ref_url="https://www.suse.com/security/cve/CVE-2026-23139/" source="CVE"/>
		<reference ref_id="CVE-2026-23141" ref_url="https://www.suse.com/security/cve/CVE-2026-23141/" source="CVE"/>
		<reference ref_id="CVE-2026-23142" ref_url="https://www.suse.com/security/cve/CVE-2026-23142/" source="CVE"/>
		<reference ref_id="CVE-2026-23144" ref_url="https://www.suse.com/security/cve/CVE-2026-23144/" source="CVE"/>
		<reference ref_id="CVE-2026-23145" ref_url="https://www.suse.com/security/cve/CVE-2026-23145/" source="CVE"/>
		<reference ref_id="CVE-2026-23146" ref_url="https://www.suse.com/security/cve/CVE-2026-23146/" source="CVE"/>
		<reference ref_id="CVE-2026-23148" ref_url="https://www.suse.com/security/cve/CVE-2026-23148/" source="CVE"/>
		<reference ref_id="CVE-2026-23150" ref_url="https://www.suse.com/security/cve/CVE-2026-23150/" source="CVE"/>
		<reference ref_id="CVE-2026-23151" ref_url="https://www.suse.com/security/cve/CVE-2026-23151/" source="CVE"/>
		<reference ref_id="CVE-2026-23152" ref_url="https://www.suse.com/security/cve/CVE-2026-23152/" source="CVE"/>
		<reference ref_id="CVE-2026-23154" ref_url="https://www.suse.com/security/cve/CVE-2026-23154/" source="CVE"/>
		<reference ref_id="CVE-2026-23155" ref_url="https://www.suse.com/security/cve/CVE-2026-23155/" source="CVE"/>
		<reference ref_id="CVE-2026-23156" ref_url="https://www.suse.com/security/cve/CVE-2026-23156/" source="CVE"/>
		<reference ref_id="CVE-2026-23157" ref_url="https://www.suse.com/security/cve/CVE-2026-23157/" source="CVE"/>
		<reference ref_id="CVE-2026-23158" ref_url="https://www.suse.com/security/cve/CVE-2026-23158/" source="CVE"/>
		<reference ref_id="CVE-2026-23161" ref_url="https://www.suse.com/security/cve/CVE-2026-23161/" source="CVE"/>
		<reference ref_id="CVE-2026-23163" ref_url="https://www.suse.com/security/cve/CVE-2026-23163/" source="CVE"/>
		<reference ref_id="CVE-2026-23166" ref_url="https://www.suse.com/security/cve/CVE-2026-23166/" source="CVE"/>
		<reference ref_id="CVE-2026-23167" ref_url="https://www.suse.com/security/cve/CVE-2026-23167/" source="CVE"/>
		<reference ref_id="CVE-2026-23169" ref_url="https://www.suse.com/security/cve/CVE-2026-23169/" source="CVE"/>
		<reference ref_id="CVE-2026-23170" ref_url="https://www.suse.com/security/cve/CVE-2026-23170/" source="CVE"/>
		<reference ref_id="CVE-2026-23171" ref_url="https://www.suse.com/security/cve/CVE-2026-23171/" source="CVE"/>
		<reference ref_id="CVE-2026-23172" ref_url="https://www.suse.com/security/cve/CVE-2026-23172/" source="CVE"/>
		<reference ref_id="CVE-2026-23173" ref_url="https://www.suse.com/security/cve/CVE-2026-23173/" source="CVE"/>
		<reference ref_id="CVE-2026-23176" ref_url="https://www.suse.com/security/cve/CVE-2026-23176/" source="CVE"/>
		<reference ref_id="CVE-2026-23177" ref_url="https://www.suse.com/security/cve/CVE-2026-23177/" source="CVE"/>
		<reference ref_id="CVE-2026-23178" ref_url="https://www.suse.com/security/cve/CVE-2026-23178/" source="CVE"/>
		<reference ref_id="CVE-2026-23179" ref_url="https://www.suse.com/security/cve/CVE-2026-23179/" source="CVE"/>
		<reference ref_id="CVE-2026-23182" ref_url="https://www.suse.com/security/cve/CVE-2026-23182/" source="CVE"/>
		<reference ref_id="CVE-2026-23188" ref_url="https://www.suse.com/security/cve/CVE-2026-23188/" source="CVE"/>
		<reference ref_id="CVE-2026-23189" ref_url="https://www.suse.com/security/cve/CVE-2026-23189/" source="CVE"/>
		<reference ref_id="CVE-2026-23190" ref_url="https://www.suse.com/security/cve/CVE-2026-23190/" source="CVE"/>
		<reference ref_id="CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191/" source="CVE"/>
		<reference ref_id="CVE-2026-23198" ref_url="https://www.suse.com/security/cve/CVE-2026-23198/" source="CVE"/>
		<reference ref_id="CVE-2026-23202" ref_url="https://www.suse.com/security/cve/CVE-2026-23202/" source="CVE"/>
		<reference ref_id="CVE-2026-23207" ref_url="https://www.suse.com/security/cve/CVE-2026-23207/" source="CVE"/>
		<reference ref_id="CVE-2026-23208" ref_url="https://www.suse.com/security/cve/CVE-2026-23208/" source="CVE"/>
		<reference ref_id="CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209/" source="CVE"/>
		<reference ref_id="CVE-2026-23210" ref_url="https://www.suse.com/security/cve/CVE-2026-23210/" source="CVE"/>
		<reference ref_id="CVE-2026-23213" ref_url="https://www.suse.com/security/cve/CVE-2026-23213/" source="CVE"/>
		<reference ref_id="CVE-2026-23214" ref_url="https://www.suse.com/security/cve/CVE-2026-23214/" source="CVE"/>
		<reference ref_id="CVE-2026-23221" ref_url="https://www.suse.com/security/cve/CVE-2026-23221/" source="CVE"/>
		<reference ref_id="CVE-2026-23222" ref_url="https://www.suse.com/security/cve/CVE-2026-23222/" source="CVE"/>
		<reference ref_id="CVE-2026-23223" ref_url="https://www.suse.com/security/cve/CVE-2026-23223/" source="CVE"/>
		<reference ref_id="CVE-2026-23224" ref_url="https://www.suse.com/security/cve/CVE-2026-23224/" source="CVE"/>
		<reference ref_id="CVE-2026-23229" ref_url="https://www.suse.com/security/cve/CVE-2026-23229/" source="CVE"/>
		<reference ref_id="CVE-2026-23230" ref_url="https://www.suse.com/security/cve/CVE-2026-23230/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues.

The following security issues were fixed:

- CVE-2025-39753: gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops (bsc#1249590).
- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).
- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).
- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).
- CVE-2025-40230: mm: prevent poison consumption when splitting THP (bsc#1254817).
- CVE-2025-68173: ftrace: Fix softlockup in ftrace_module_enable (bsc#1255311).
- CVE-2025-68186: ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up (bsc#1255144).
- CVE-2025-68292: mm/memfd: fix information leak in hugetlb folios (bsc#1255148).
- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).
- CVE-2025-68329: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs (bsc#1255490).
- CVE-2025-68371: scsi: smartpqi: Fix device resources accessed after device removal (bsc#1255572).
- CVE-2025-68745: scsi: qla2xxx: Clear cmds after chip reset (bsc#1255721).
- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).
- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).
- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).
- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).
- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).
- CVE-2025-71134: mm/page_alloc: change all pageblocks migrate type on coalescing (bsc#1256732).
- CVE-2025-71161: dm-verity: disable recursive forward error correction (bsc#1257174).
- CVE-2025-71184: btrfs: tracepoints: use btrfs_root_id() to get the id of a root (bsc#1257635).
- CVE-2025-71193: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend (bsc#1257686).
- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).
- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).
- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).
- CVE-2026-23003: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() (bsc#1257246).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).
- CVE-2026-23022: idpf: fix memory leak in idpf_vc_core_deinit() (bsc#1257581).
- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).
- CVE-2026-23024: idpf: fix memory leak of flow steer list on rmmod (bsc#1257572).
- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).
- CVE-2026-23042: idpf: fix aux device unplugging when rdma is not supported by vport (bsc#1257705).
- CVE-2026-23047: libceph: make calc_target() set t-&gt;paused, not just clear it (bsc#1257682).
- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).
- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).
- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
- CVE-2026-23066: rxrpc: Fix recvmsg() unconditional requeue (bsc#1257726).
- CVE-2026-23068: spi: spi-sprd-adi: Fix double free in probe error path (bsc#1257805).
- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).
- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23083: tools: ynl-gen: use big-endian netlink attribute types (bsc#1257745).
- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).
- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).
- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).
- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).
- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
- CVE-2026-23097: migrate: correct lock ordering for hugetlb file folios (bsc#1257815).
- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).
- CVE-2026-23100: mm/hugetlb: fix hugetlb_pmd_shared() (bsc#1257817).
- CVE-2026-23102: arm64/fpsimd: signal: Fix restoration of SVE context (bsc#1257772).
- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).
- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).
- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).
- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).
- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).
- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).
- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).
- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).
- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).
- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).
- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).
- CVE-2026-23142: mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure (bsc#1258289).
- CVE-2026-23144: mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure (bsc#1258290).
- CVE-2026-23148: nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference (bsc#1258258).
- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).
- CVE-2026-23161: mm/shmem, swap: fix race of truncate and swap entry split (bsc#1258355).
- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).
- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).
- CVE-2026-23171: bonding: fix use-after-free due to enslave fail after slave array update (bsc#1258349).
- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).
- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).
- CVE-2026-23189: ceph: fix NULL pointer dereference in ceph_mds_auth_match() (bsc#1258308).
- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).
- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).
- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).
- CVE-2026-23223: xfs: fix UAF in xchk_btree_check_block_owner (bsc#1258483).
- CVE-2026-23224: erofs: fix UAF issue for file-backed mounts w/ directio option (bsc#1258461).

The following non security issues were fixed:

- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).
- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).
- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).
- Add bugnumber to existing mana and mana_ib changes (bsc#1251135 bsc#1251971).
- HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list (bsc#1258455).
- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).
- PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1255868).
- PCI: Add ASPEED vendor ID to pci_ids.h (bsc#1258672)
- PCI: Add PCI_BRIDGE_NO_ALIAS quirk for ASPEED AST1150 (bsc#1258672)
- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).
- Refresh and move upstreamed ath12k patch into sorted section
- Update "drm/mgag200: fix mgag200_bmc_stop_scanout()" bug number (bsc#1258153)
- add bugnumber to existing mana change (bsc#1252266).
- arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS (bsc#1259329)
- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).
- can: bcm: fix locking for bcm_op runtime updates (git-fixes).
- clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops (git-fixes).
- clocksource: Fix the CPUs' choice in the watchdog per CPU verification (bsc#1257818).
- clocksource: Print durations for sync check unconditionally (bsc#1257818).
- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1257818).
- clocksource: Use pr_info() for "Checking clocksource synchronization" message (bsc#1257818).
- dm: Fix deadlock when reloading a multipath table (bsc#1254928).
- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).
- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).
- gpiolib-acpi: Update file references in the Documentation and MAINTAINERS (git-fixes).
- i3c: master: Update hot-join flag only on success (git-fixes).
- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).
- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).
- modpost: Ensure exported symbol namespaces are not quoted (bsc#1258489).
- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).
- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).
- platform/x86/amd: amd_3d_vcache: Add AMD 3D V-Cache optimizer driver (jsc#PED-11563).
- sched/core: Avoid direct access to hrtimer clockbase (bsc#1234634).
- sched/deadline: Fix race in push_dl_task() (bsc#1234634).
- sched/deadline: Stop dl_server before CPU goes offline (bsc#1234634).
- sched/fair: Fix pelt clock sync when entering idle (bsc#1234634).
- sched/fair: Fix pelt lost idle time detection (bsc#1234634).
- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).
- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234634">SUSE bug 1234634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249590">SUSE bug 1249590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250748">SUSE bug 1250748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251135">SUSE bug 1251135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251966">SUSE bug 1251966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251971">SUSE bug 1251971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252008">SUSE bug 1252008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252266">SUSE bug 1252266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252911">SUSE bug 1252911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252924">SUSE bug 1252924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253129">SUSE bug 1253129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253691">SUSE bug 1253691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254817">SUSE bug 1254817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254928">SUSE bug 1254928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255129">SUSE bug 1255129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255144">SUSE bug 1255144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255148">SUSE bug 1255148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255311">SUSE bug 1255311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255490">SUSE bug 1255490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255572">SUSE bug 1255572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255721">SUSE bug 1255721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255868">SUSE bug 1255868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256640">SUSE bug 1256640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256675">SUSE bug 1256675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256679">SUSE bug 1256679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256708">SUSE bug 1256708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256732">SUSE bug 1256732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256784">SUSE bug 1256784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256802">SUSE bug 1256802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256865">SUSE bug 1256865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256867">SUSE bug 1256867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257154">SUSE bug 1257154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257174">SUSE bug 1257174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257209">SUSE bug 1257209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257222">SUSE bug 1257222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257228">SUSE bug 1257228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257231">SUSE bug 1257231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257246">SUSE bug 1257246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257332">SUSE bug 1257332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257466">SUSE bug 1257466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257472">SUSE bug 1257472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257473">SUSE bug 1257473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257551">SUSE bug 1257551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257552">SUSE bug 1257552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257553">SUSE bug 1257553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257554">SUSE bug 1257554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257556">SUSE bug 1257556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257557">SUSE bug 1257557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257559">SUSE bug 1257559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257560">SUSE bug 1257560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257561">SUSE bug 1257561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257562">SUSE bug 1257562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257565">SUSE bug 1257565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257570">SUSE bug 1257570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257572">SUSE bug 1257572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257573">SUSE bug 1257573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257576">SUSE bug 1257576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257579">SUSE bug 1257579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257580">SUSE bug 1257580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257581">SUSE bug 1257581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257586">SUSE bug 1257586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257600">SUSE bug 1257600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257631">SUSE bug 1257631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257635">SUSE bug 1257635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257679">SUSE bug 1257679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257682">SUSE bug 1257682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257686">SUSE bug 1257686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257687">SUSE bug 1257687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257688">SUSE bug 1257688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257704">SUSE bug 1257704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257705">SUSE bug 1257705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257706">SUSE bug 1257706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257707">SUSE bug 1257707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257709">SUSE bug 1257709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257714">SUSE bug 1257714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257715">SUSE bug 1257715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257716">SUSE bug 1257716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257718">SUSE bug 1257718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257722">SUSE bug 1257722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257723">SUSE bug 1257723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257726">SUSE bug 1257726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257729">SUSE bug 1257729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257730">SUSE bug 1257730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257732">SUSE bug 1257732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257734">SUSE bug 1257734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257735">SUSE bug 1257735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257737">SUSE bug 1257737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257739">SUSE bug 1257739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257740">SUSE bug 1257740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257741">SUSE bug 1257741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257742">SUSE bug 1257742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257743">SUSE bug 1257743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257745">SUSE bug 1257745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257750">SUSE bug 1257750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257755">SUSE bug 1257755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257757">SUSE bug 1257757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257758">SUSE bug 1257758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257759">SUSE bug 1257759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257761">SUSE bug 1257761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257762">SUSE bug 1257762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257763">SUSE bug 1257763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257765">SUSE bug 1257765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257768">SUSE bug 1257768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257770">SUSE bug 1257770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257772">SUSE bug 1257772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257775">SUSE bug 1257775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257776">SUSE bug 1257776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257788">SUSE bug 1257788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257789">SUSE bug 1257789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257790">SUSE bug 1257790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257805">SUSE bug 1257805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257808">SUSE bug 1257808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257809">SUSE bug 1257809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257811">SUSE bug 1257811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257813">SUSE bug 1257813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257814">SUSE bug 1257814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257815">SUSE bug 1257815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257816">SUSE bug 1257816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257817">SUSE bug 1257817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257818">SUSE bug 1257818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257830">SUSE bug 1257830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257942">SUSE bug 1257942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257952">SUSE bug 1257952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258153">SUSE bug 1258153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258181">SUSE bug 1258181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258184">SUSE bug 1258184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258222">SUSE bug 1258222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258232">SUSE bug 1258232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258234">SUSE bug 1258234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258237">SUSE bug 1258237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258245">SUSE bug 1258245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258249">SUSE bug 1258249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258252">SUSE bug 1258252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258256">SUSE bug 1258256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258258">SUSE bug 1258258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258259">SUSE bug 1258259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258272">SUSE bug 1258272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258273">SUSE bug 1258273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258276">SUSE bug 1258276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258277">SUSE bug 1258277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258279">SUSE bug 1258279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258286">SUSE bug 1258286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258289">SUSE bug 1258289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258290">SUSE bug 1258290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258297">SUSE bug 1258297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258298">SUSE bug 1258298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258299">SUSE bug 1258299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258303">SUSE bug 1258303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258304">SUSE bug 1258304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258308">SUSE bug 1258308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258309">SUSE bug 1258309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258313">SUSE bug 1258313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258317">SUSE bug 1258317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258321">SUSE bug 1258321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258323">SUSE bug 1258323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258324">SUSE bug 1258324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258326">SUSE bug 1258326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258331">SUSE bug 1258331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258338">SUSE bug 1258338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258349">SUSE bug 1258349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258354">SUSE bug 1258354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258355">SUSE bug 1258355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258358">SUSE bug 1258358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258374">SUSE bug 1258374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258376">SUSE bug 1258376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258377">SUSE bug 1258377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258379">SUSE bug 1258379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258389">SUSE bug 1258389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258394">SUSE bug 1258394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258397">SUSE bug 1258397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258411">SUSE bug 1258411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258415">SUSE bug 1258415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258419">SUSE bug 1258419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258421">SUSE bug 1258421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258422">SUSE bug 1258422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258424">SUSE bug 1258424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258429">SUSE bug 1258429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258430">SUSE bug 1258430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258442">SUSE bug 1258442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258455">SUSE bug 1258455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258461">SUSE bug 1258461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258464">SUSE bug 1258464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258465">SUSE bug 1258465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258468">SUSE bug 1258468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258469">SUSE bug 1258469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258483">SUSE bug 1258483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258484">SUSE bug 1258484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258489">SUSE bug 1258489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258517">SUSE bug 1258517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258518">SUSE bug 1258518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258519">SUSE bug 1258519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258520">SUSE bug 1258520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258524">SUSE bug 1258524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258544">SUSE bug 1258544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258660">SUSE bug 1258660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258672">SUSE bug 1258672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258824">SUSE bug 1258824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259329">SUSE bug 1259329</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39753/">CVE-2025-39753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39964/">CVE-2025-39964 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39964">CVE-2025-39964 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40099/">CVE-2025-40099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40103/">CVE-2025-40103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40230/">CVE-2025-40230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40230">CVE-2025-40230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68173/">CVE-2025-68173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68173">CVE-2025-68173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68186/">CVE-2025-68186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68186">CVE-2025-68186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68292/">CVE-2025-68292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68292">CVE-2025-68292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68295/">CVE-2025-68295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68295">CVE-2025-68295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68329/">CVE-2025-68329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68329">CVE-2025-68329 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68371/">CVE-2025-68371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68745/">CVE-2025-68745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68745">CVE-2025-68745 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68785/">CVE-2025-68785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68785">CVE-2025-68785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68810/">CVE-2025-68810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68810">CVE-2025-68810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68818/">CVE-2025-68818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68818">CVE-2025-68818 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71071/">CVE-2025-71071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71071">CVE-2025-71071 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-71104/">CVE-2025-71104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71104">CVE-2025-71104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71125/">CVE-2025-71125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71125">CVE-2025-71125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71134/">CVE-2025-71134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71134">CVE-2025-71134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71161/">CVE-2025-71161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71161">CVE-2025-71161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71182/">CVE-2025-71182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71182">CVE-2025-71182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71183/">CVE-2025-71183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71183">CVE-2025-71183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71184/">CVE-2025-71184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71184">CVE-2025-71184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71185/">CVE-2025-71185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71185">CVE-2025-71185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71186/">CVE-2025-71186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71186">CVE-2025-71186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71188/">CVE-2025-71188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71188">CVE-2025-71188 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71189/">CVE-2025-71189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71189">CVE-2025-71189 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71190/">CVE-2025-71190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71190">CVE-2025-71190 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71191/">CVE-2025-71191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71191">CVE-2025-71191 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71192/">CVE-2025-71192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71192">CVE-2025-71192 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71193/">CVE-2025-71193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71193">CVE-2025-71193 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71194/">CVE-2025-71194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71194">CVE-2025-71194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71195/">CVE-2025-71195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71195">CVE-2025-71195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71196/">CVE-2025-71196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71196">CVE-2025-71196 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71197/">CVE-2025-71197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71197">CVE-2025-71197 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71198/">CVE-2025-71198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71198">CVE-2025-71198 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71199/">CVE-2025-71199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71199">CVE-2025-71199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71200/">CVE-2025-71200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71200">CVE-2025-71200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71222/">CVE-2025-71222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71222">CVE-2025-71222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71224/">CVE-2025-71224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71224">CVE-2025-71224 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71225/">CVE-2025-71225 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71225">CVE-2025-71225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71229/">CVE-2025-71229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71229">CVE-2025-71229 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71231/">CVE-2025-71231 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71231">CVE-2025-71231 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71232/">CVE-2025-71232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71232">CVE-2025-71232 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71233/">CVE-2025-71233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71233">CVE-2025-71233 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71234/">CVE-2025-71234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71234">CVE-2025-71234 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71235/">CVE-2025-71235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71235">CVE-2025-71235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71236/">CVE-2025-71236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71236">CVE-2025-71236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22979/">CVE-2026-22979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22979">CVE-2026-22979 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-22980/">CVE-2026-22980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22980">CVE-2026-22980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22998/">CVE-2026-22998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23003/">CVE-2026-23003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23003">CVE-2026-23003 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23004/">CVE-2026-23004 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23004">CVE-2026-23004 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23010/">CVE-2026-23010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23010">CVE-2026-23010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23017/">CVE-2026-23017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23017">CVE-2026-23017 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23018/">CVE-2026-23018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23018">CVE-2026-23018 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23021/">CVE-2026-23021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23021">CVE-2026-23021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23022/">CVE-2026-23022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23022">CVE-2026-23022 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23023/">CVE-2026-23023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23023">CVE-2026-23023 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23024/">CVE-2026-23024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23024">CVE-2026-23024 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23026/">CVE-2026-23026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23026">CVE-2026-23026 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23030/">CVE-2026-23030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23030">CVE-2026-23030 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23031/">CVE-2026-23031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23031">CVE-2026-23031 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23033/">CVE-2026-23033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23033">CVE-2026-23033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23035/">CVE-2026-23035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23035">CVE-2026-23035 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23037/">CVE-2026-23037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23037">CVE-2026-23037 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23038/">CVE-2026-23038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23038">CVE-2026-23038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23042/">CVE-2026-23042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23042">CVE-2026-23042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23047/">CVE-2026-23047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23047">CVE-2026-23047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23049/">CVE-2026-23049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23049">CVE-2026-23049 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23050/">CVE-2026-23050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23050">CVE-2026-23050 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23053/">CVE-2026-23053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23053">CVE-2026-23053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23054/">CVE-2026-23054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23055/">CVE-2026-23055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23055">CVE-2026-23055 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23056/">CVE-2026-23056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23056">CVE-2026-23056 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23057/">CVE-2026-23057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23057">CVE-2026-23057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23058/">CVE-2026-23058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23058">CVE-2026-23058 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23059/">CVE-2026-23059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23059">CVE-2026-23059 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23060/">CVE-2026-23060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23061/">CVE-2026-23061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23061">CVE-2026-23061 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23062/">CVE-2026-23062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23062">CVE-2026-23062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23063/">CVE-2026-23063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23063">CVE-2026-23063 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23064/">CVE-2026-23064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23064">CVE-2026-23064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23065/">CVE-2026-23065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23065">CVE-2026-23065 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23066/">CVE-2026-23066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23066">CVE-2026-23066 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23068/">CVE-2026-23068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23068">CVE-2026-23068 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23069/">CVE-2026-23069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23069">CVE-2026-23069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23070/">CVE-2026-23070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23070">CVE-2026-23070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23071/">CVE-2026-23071 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23071">CVE-2026-23071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23073/">CVE-2026-23073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23073">CVE-2026-23073 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23076/">CVE-2026-23076 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23076">CVE-2026-23076 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23078/">CVE-2026-23078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23078">CVE-2026-23078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23080/">CVE-2026-23080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23080">CVE-2026-23080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23082/">CVE-2026-23082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23082">CVE-2026-23082 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23083/">CVE-2026-23083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23083">CVE-2026-23083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23084/">CVE-2026-23084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23084">CVE-2026-23084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23085/">CVE-2026-23085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23085">CVE-2026-23085 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2026-23086/">CVE-2026-23086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23086">CVE-2026-23086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23088/">CVE-2026-23088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23088">CVE-2026-23088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23089/">CVE-2026-23089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23090/">CVE-2026-23090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23090">CVE-2026-23090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23091/">CVE-2026-23091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23091">CVE-2026-23091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23094/">CVE-2026-23094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23094">CVE-2026-23094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23095/">CVE-2026-23095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23095">CVE-2026-23095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23096/">CVE-2026-23096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23096">CVE-2026-23096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23097/">CVE-2026-23097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23099/">CVE-2026-23099 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23099">CVE-2026-23099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23100/">CVE-2026-23100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23100">CVE-2026-23100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23101/">CVE-2026-23101 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23101">CVE-2026-23101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23102/">CVE-2026-23102 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23102">CVE-2026-23102 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23104/">CVE-2026-23104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23104">CVE-2026-23104 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23105/">CVE-2026-23105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23105">CVE-2026-23105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23107/">CVE-2026-23107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23107">CVE-2026-23107 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23108/">CVE-2026-23108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23108">CVE-2026-23108 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23110/">CVE-2026-23110 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23110">CVE-2026-23110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23111/">CVE-2026-23111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23112/">CVE-2026-23112 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23112">CVE-2026-23112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23116/">CVE-2026-23116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23116">CVE-2026-23116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23119/">CVE-2026-23119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23119">CVE-2026-23119 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23121/">CVE-2026-23121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23121">CVE-2026-23121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23123/">CVE-2026-23123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23123">CVE-2026-23123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23128/">CVE-2026-23128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23128">CVE-2026-23128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23129/">CVE-2026-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23129">CVE-2026-23129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23131/">CVE-2026-23131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23131">CVE-2026-23131 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23133/">CVE-2026-23133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23133">CVE-2026-23133 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23135/">CVE-2026-23135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23135">CVE-2026-23135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23136/">CVE-2026-23136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23136">CVE-2026-23136 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23137/">CVE-2026-23137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23137">CVE-2026-23137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23139/">CVE-2026-23139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23139">CVE-2026-23139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23141/">CVE-2026-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23141">CVE-2026-23141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23142/">CVE-2026-23142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23142">CVE-2026-23142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23144/">CVE-2026-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23145/">CVE-2026-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23145">CVE-2026-23145 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23146/">CVE-2026-23146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23146">CVE-2026-23146 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23148/">CVE-2026-23148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23148">CVE-2026-23148 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23150/">CVE-2026-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23150">CVE-2026-23150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23151/">CVE-2026-23151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23151">CVE-2026-23151 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23152/">CVE-2026-23152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23152">CVE-2026-23152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23154/">CVE-2026-23154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23154">CVE-2026-23154 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23155/">CVE-2026-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23155">CVE-2026-23155 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23156/">CVE-2026-23156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23156">CVE-2026-23156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23157/">CVE-2026-23157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23157">CVE-2026-23157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23158/">CVE-2026-23158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23158">CVE-2026-23158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23161/">CVE-2026-23161 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23161">CVE-2026-23161 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23163/">CVE-2026-23163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23163">CVE-2026-23163 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23166/">CVE-2026-23166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23166">CVE-2026-23166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23167/">CVE-2026-23167 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23167">CVE-2026-23167 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23169/">CVE-2026-23169 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23169">CVE-2026-23169 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23170/">CVE-2026-23170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23170">CVE-2026-23170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23171/">CVE-2026-23171 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23171">CVE-2026-23171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23172/">CVE-2026-23172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23172">CVE-2026-23172 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23173/">CVE-2026-23173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23173">CVE-2026-23173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23176/">CVE-2026-23176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23176">CVE-2026-23176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23177/">CVE-2026-23177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23177">CVE-2026-23177 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23178/">CVE-2026-23178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23178">CVE-2026-23178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23179/">CVE-2026-23179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23179">CVE-2026-23179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23182/">CVE-2026-23182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23182">CVE-2026-23182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23188/">CVE-2026-23188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23188">CVE-2026-23188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23189/">CVE-2026-23189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23189">CVE-2026-23189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23190/">CVE-2026-23190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23190">CVE-2026-23190 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23198/">CVE-2026-23198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23198">CVE-2026-23198 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23202/">CVE-2026-23202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23202">CVE-2026-23202 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23207/">CVE-2026-23207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23207">CVE-2026-23207 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23208/">CVE-2026-23208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23208">CVE-2026-23208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23210/">CVE-2026-23210 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23210">CVE-2026-23210 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23213/">CVE-2026-23213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23213">CVE-2026-23213 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23214/">CVE-2026-23214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23214">CVE-2026-23214 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23221/">CVE-2026-23221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23221">CVE-2026-23221 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23222/">CVE-2026-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23222">CVE-2026-23222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23223/">CVE-2026-23223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23223">CVE-2026-23223 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23224/">CVE-2026-23224 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23224">CVE-2026-23224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23229/">CVE-2026-23229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23229">CVE-2026-23229 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23230/">CVE-2026-23230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23230">CVE-2026-23230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052279" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052280" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052281" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94619" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1215199" ref_url="https://bugzilla.suse.com/1215199" source="BUGZILLA"/>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1230062" ref_url="https://bugzilla.suse.com/1230062" source="BUGZILLA"/>
		<reference ref_id="1234634" ref_url="https://bugzilla.suse.com/1234634" source="BUGZILLA"/>
		<reference ref_id="1234693" ref_url="https://bugzilla.suse.com/1234693" source="BUGZILLA"/>
		<reference ref_id="1234863" ref_url="https://bugzilla.suse.com/1234863" source="BUGZILLA"/>
		<reference ref_id="1235953" ref_url="https://bugzilla.suse.com/1235953" source="BUGZILLA"/>
		<reference ref_id="1236897" ref_url="https://bugzilla.suse.com/1236897" source="BUGZILLA"/>
		<reference ref_id="1237108" ref_url="https://bugzilla.suse.com/1237108" source="BUGZILLA"/>
		<reference ref_id="1237131" ref_url="https://bugzilla.suse.com/1237131" source="BUGZILLA"/>
		<reference ref_id="1237542" ref_url="https://bugzilla.suse.com/1237542" source="BUGZILLA"/>
		<reference ref_id="1237776" ref_url="https://bugzilla.suse.com/1237776" source="BUGZILLA"/>
		<reference ref_id="1238972" ref_url="https://bugzilla.suse.com/1238972" source="BUGZILLA"/>
		<reference ref_id="1239206" ref_url="https://bugzilla.suse.com/1239206" source="BUGZILLA"/>
		<reference ref_id="1240324" ref_url="https://bugzilla.suse.com/1240324" source="BUGZILLA"/>
		<reference ref_id="1240696" ref_url="https://bugzilla.suse.com/1240696" source="BUGZILLA"/>
		<reference ref_id="1240966" ref_url="https://bugzilla.suse.com/1240966" source="BUGZILLA"/>
		<reference ref_id="1240998" ref_url="https://bugzilla.suse.com/1240998" source="BUGZILLA"/>
		<reference ref_id="1241166" ref_url="https://bugzilla.suse.com/1241166" source="BUGZILLA"/>
		<reference ref_id="1241353" ref_url="https://bugzilla.suse.com/1241353" source="BUGZILLA"/>
		<reference ref_id="1241403" ref_url="https://bugzilla.suse.com/1241403" source="BUGZILLA"/>
		<reference ref_id="1241435" ref_url="https://bugzilla.suse.com/1241435" source="BUGZILLA"/>
		<reference ref_id="1242034" ref_url="https://bugzilla.suse.com/1242034" source="BUGZILLA"/>
		<reference ref_id="1242086" ref_url="https://bugzilla.suse.com/1242086" source="BUGZILLA"/>
		<reference ref_id="1242414" ref_url="https://bugzilla.suse.com/1242414" source="BUGZILLA"/>
		<reference ref_id="1242782" ref_url="https://bugzilla.suse.com/1242782" source="BUGZILLA"/>
		<reference ref_id="1242864" ref_url="https://bugzilla.suse.com/1242864" source="BUGZILLA"/>
		<reference ref_id="1242965" ref_url="https://bugzilla.suse.com/1242965" source="BUGZILLA"/>
		<reference ref_id="1242995" ref_url="https://bugzilla.suse.com/1242995" source="BUGZILLA"/>
		<reference ref_id="1243000" ref_url="https://bugzilla.suse.com/1243000" source="BUGZILLA"/>
		<reference ref_id="1243055" ref_url="https://bugzilla.suse.com/1243055" source="BUGZILLA"/>
		<reference ref_id="1243068" ref_url="https://bugzilla.suse.com/1243068" source="BUGZILLA"/>
		<reference ref_id="1243100" ref_url="https://bugzilla.suse.com/1243100" source="BUGZILLA"/>
		<reference ref_id="1243112" ref_url="https://bugzilla.suse.com/1243112" source="BUGZILLA"/>
		<reference ref_id="1243774" ref_url="https://bugzilla.suse.com/1243774" source="BUGZILLA"/>
		<reference ref_id="1244309" ref_url="https://bugzilla.suse.com/1244309" source="BUGZILLA"/>
		<reference ref_id="1244723" ref_url="https://bugzilla.suse.com/1244723" source="BUGZILLA"/>
		<reference ref_id="1244734" ref_url="https://bugzilla.suse.com/1244734" source="BUGZILLA"/>
		<reference ref_id="1244749" ref_url="https://bugzilla.suse.com/1244749" source="BUGZILLA"/>
		<reference ref_id="1244792" ref_url="https://bugzilla.suse.com/1244792" source="BUGZILLA"/>
		<reference ref_id="1244812" ref_url="https://bugzilla.suse.com/1244812" source="BUGZILLA"/>
		<reference ref_id="1244930" ref_url="https://bugzilla.suse.com/1244930" source="BUGZILLA"/>
		<reference ref_id="1244939" ref_url="https://bugzilla.suse.com/1244939" source="BUGZILLA"/>
		<reference ref_id="1245000" ref_url="https://bugzilla.suse.com/1245000" source="BUGZILLA"/>
		<reference ref_id="1245151" ref_url="https://bugzilla.suse.com/1245151" source="BUGZILLA"/>
		<reference ref_id="1245193" ref_url="https://bugzilla.suse.com/1245193" source="BUGZILLA"/>
		<reference ref_id="1245206" ref_url="https://bugzilla.suse.com/1245206" source="BUGZILLA"/>
		<reference ref_id="1245216" ref_url="https://bugzilla.suse.com/1245216" source="BUGZILLA"/>
		<reference ref_id="1245260" ref_url="https://bugzilla.suse.com/1245260" source="BUGZILLA"/>
		<reference ref_id="1245410" ref_url="https://bugzilla.suse.com/1245410" source="BUGZILLA"/>
		<reference ref_id="1245457" ref_url="https://bugzilla.suse.com/1245457" source="BUGZILLA"/>
		<reference ref_id="1245504" ref_url="https://bugzilla.suse.com/1245504" source="BUGZILLA"/>
		<reference ref_id="1245506" ref_url="https://bugzilla.suse.com/1245506" source="BUGZILLA"/>
		<reference ref_id="1245508" ref_url="https://bugzilla.suse.com/1245508" source="BUGZILLA"/>
		<reference ref_id="1245510" ref_url="https://bugzilla.suse.com/1245510" source="BUGZILLA"/>
		<reference ref_id="1245596" ref_url="https://bugzilla.suse.com/1245596" source="BUGZILLA"/>
		<reference ref_id="1245621" ref_url="https://bugzilla.suse.com/1245621" source="BUGZILLA"/>
		<reference ref_id="1245630" ref_url="https://bugzilla.suse.com/1245630" source="BUGZILLA"/>
		<reference ref_id="1245654" ref_url="https://bugzilla.suse.com/1245654" source="BUGZILLA"/>
		<reference ref_id="1245657" ref_url="https://bugzilla.suse.com/1245657" source="BUGZILLA"/>
		<reference ref_id="1245658" ref_url="https://bugzilla.suse.com/1245658" source="BUGZILLA"/>
		<reference ref_id="1245659" ref_url="https://bugzilla.suse.com/1245659" source="BUGZILLA"/>
		<reference ref_id="1245663" ref_url="https://bugzilla.suse.com/1245663" source="BUGZILLA"/>
		<reference ref_id="1245664" ref_url="https://bugzilla.suse.com/1245664" source="BUGZILLA"/>
		<reference ref_id="1245665" ref_url="https://bugzilla.suse.com/1245665" source="BUGZILLA"/>
		<reference ref_id="1245666" ref_url="https://bugzilla.suse.com/1245666" source="BUGZILLA"/>
		<reference ref_id="1245668" ref_url="https://bugzilla.suse.com/1245668" source="BUGZILLA"/>
		<reference ref_id="1245669" ref_url="https://bugzilla.suse.com/1245669" source="BUGZILLA"/>
		<reference ref_id="1245670" ref_url="https://bugzilla.suse.com/1245670" source="BUGZILLA"/>
		<reference ref_id="1245671" ref_url="https://bugzilla.suse.com/1245671" source="BUGZILLA"/>
		<reference ref_id="1245675" ref_url="https://bugzilla.suse.com/1245675" source="BUGZILLA"/>
		<reference ref_id="1245676" ref_url="https://bugzilla.suse.com/1245676" source="BUGZILLA"/>
		<reference ref_id="1245678" ref_url="https://bugzilla.suse.com/1245678" source="BUGZILLA"/>
		<reference ref_id="1245683" ref_url="https://bugzilla.suse.com/1245683" source="BUGZILLA"/>
		<reference ref_id="1245684" ref_url="https://bugzilla.suse.com/1245684" source="BUGZILLA"/>
		<reference ref_id="1245686" ref_url="https://bugzilla.suse.com/1245686" source="BUGZILLA"/>
		<reference ref_id="1245688" ref_url="https://bugzilla.suse.com/1245688" source="BUGZILLA"/>
		<reference ref_id="1245690" ref_url="https://bugzilla.suse.com/1245690" source="BUGZILLA"/>
		<reference ref_id="1245691" ref_url="https://bugzilla.suse.com/1245691" source="BUGZILLA"/>
		<reference ref_id="1245695" ref_url="https://bugzilla.suse.com/1245695" source="BUGZILLA"/>
		<reference ref_id="1245700" ref_url="https://bugzilla.suse.com/1245700" source="BUGZILLA"/>
		<reference ref_id="1245703" ref_url="https://bugzilla.suse.com/1245703" source="BUGZILLA"/>
		<reference ref_id="1245705" ref_url="https://bugzilla.suse.com/1245705" source="BUGZILLA"/>
		<reference ref_id="1245710" ref_url="https://bugzilla.suse.com/1245710" source="BUGZILLA"/>
		<reference ref_id="1245711" ref_url="https://bugzilla.suse.com/1245711" source="BUGZILLA"/>
		<reference ref_id="1245713" ref_url="https://bugzilla.suse.com/1245713" source="BUGZILLA"/>
		<reference ref_id="1245714" ref_url="https://bugzilla.suse.com/1245714" source="BUGZILLA"/>
		<reference ref_id="1245715" ref_url="https://bugzilla.suse.com/1245715" source="BUGZILLA"/>
		<reference ref_id="1245717" ref_url="https://bugzilla.suse.com/1245717" source="BUGZILLA"/>
		<reference ref_id="1245719" ref_url="https://bugzilla.suse.com/1245719" source="BUGZILLA"/>
		<reference ref_id="1245721" ref_url="https://bugzilla.suse.com/1245721" source="BUGZILLA"/>
		<reference ref_id="1245723" ref_url="https://bugzilla.suse.com/1245723" source="BUGZILLA"/>
		<reference ref_id="1245726" ref_url="https://bugzilla.suse.com/1245726" source="BUGZILLA"/>
		<reference ref_id="1245728" ref_url="https://bugzilla.suse.com/1245728" source="BUGZILLA"/>
		<reference ref_id="1245729" ref_url="https://bugzilla.suse.com/1245729" source="BUGZILLA"/>
		<reference ref_id="1245730" ref_url="https://bugzilla.suse.com/1245730" source="BUGZILLA"/>
		<reference ref_id="1245731" ref_url="https://bugzilla.suse.com/1245731" source="BUGZILLA"/>
		<reference ref_id="1245735" ref_url="https://bugzilla.suse.com/1245735" source="BUGZILLA"/>
		<reference ref_id="1245737" ref_url="https://bugzilla.suse.com/1245737" source="BUGZILLA"/>
		<reference ref_id="1245744" ref_url="https://bugzilla.suse.com/1245744" source="BUGZILLA"/>
		<reference ref_id="1245745" ref_url="https://bugzilla.suse.com/1245745" source="BUGZILLA"/>
		<reference ref_id="1245746" ref_url="https://bugzilla.suse.com/1245746" source="BUGZILLA"/>
		<reference ref_id="1245747" ref_url="https://bugzilla.suse.com/1245747" source="BUGZILLA"/>
		<reference ref_id="1245748" ref_url="https://bugzilla.suse.com/1245748" source="BUGZILLA"/>
		<reference ref_id="1245749" ref_url="https://bugzilla.suse.com/1245749" source="BUGZILLA"/>
		<reference ref_id="1245751" ref_url="https://bugzilla.suse.com/1245751" source="BUGZILLA"/>
		<reference ref_id="1245757" ref_url="https://bugzilla.suse.com/1245757" source="BUGZILLA"/>
		<reference ref_id="1245763" ref_url="https://bugzilla.suse.com/1245763" source="BUGZILLA"/>
		<reference ref_id="1245765" ref_url="https://bugzilla.suse.com/1245765" source="BUGZILLA"/>
		<reference ref_id="1245767" ref_url="https://bugzilla.suse.com/1245767" source="BUGZILLA"/>
		<reference ref_id="1245769" ref_url="https://bugzilla.suse.com/1245769" source="BUGZILLA"/>
		<reference ref_id="1245777" ref_url="https://bugzilla.suse.com/1245777" source="BUGZILLA"/>
		<reference ref_id="1245780" ref_url="https://bugzilla.suse.com/1245780" source="BUGZILLA"/>
		<reference ref_id="1245781" ref_url="https://bugzilla.suse.com/1245781" source="BUGZILLA"/>
		<reference ref_id="1245784" ref_url="https://bugzilla.suse.com/1245784" source="BUGZILLA"/>
		<reference ref_id="1245785" ref_url="https://bugzilla.suse.com/1245785" source="BUGZILLA"/>
		<reference ref_id="1245787" ref_url="https://bugzilla.suse.com/1245787" source="BUGZILLA"/>
		<reference ref_id="1245812" ref_url="https://bugzilla.suse.com/1245812" source="BUGZILLA"/>
		<reference ref_id="1245814" ref_url="https://bugzilla.suse.com/1245814" source="BUGZILLA"/>
		<reference ref_id="1245815" ref_url="https://bugzilla.suse.com/1245815" source="BUGZILLA"/>
		<reference ref_id="1245937" ref_url="https://bugzilla.suse.com/1245937" source="BUGZILLA"/>
		<reference ref_id="1245945" ref_url="https://bugzilla.suse.com/1245945" source="BUGZILLA"/>
		<reference ref_id="1245952" ref_url="https://bugzilla.suse.com/1245952" source="BUGZILLA"/>
		<reference ref_id="1245955" ref_url="https://bugzilla.suse.com/1245955" source="BUGZILLA"/>
		<reference ref_id="1245956" ref_url="https://bugzilla.suse.com/1245956" source="BUGZILLA"/>
		<reference ref_id="1245963" ref_url="https://bugzilla.suse.com/1245963" source="BUGZILLA"/>
		<reference ref_id="1245966" ref_url="https://bugzilla.suse.com/1245966" source="BUGZILLA"/>
		<reference ref_id="1245970" ref_url="https://bugzilla.suse.com/1245970" source="BUGZILLA"/>
		<reference ref_id="1245973" ref_url="https://bugzilla.suse.com/1245973" source="BUGZILLA"/>
		<reference ref_id="1245976" ref_url="https://bugzilla.suse.com/1245976" source="BUGZILLA"/>
		<reference ref_id="1245977" ref_url="https://bugzilla.suse.com/1245977" source="BUGZILLA"/>
		<reference ref_id="1245986" ref_url="https://bugzilla.suse.com/1245986" source="BUGZILLA"/>
		<reference ref_id="1246000" ref_url="https://bugzilla.suse.com/1246000" source="BUGZILLA"/>
		<reference ref_id="1246002" ref_url="https://bugzilla.suse.com/1246002" source="BUGZILLA"/>
		<reference ref_id="1246005" ref_url="https://bugzilla.suse.com/1246005" source="BUGZILLA"/>
		<reference ref_id="1246008" ref_url="https://bugzilla.suse.com/1246008" source="BUGZILLA"/>
		<reference ref_id="1246012" ref_url="https://bugzilla.suse.com/1246012" source="BUGZILLA"/>
		<reference ref_id="1246022" ref_url="https://bugzilla.suse.com/1246022" source="BUGZILLA"/>
		<reference ref_id="1246023" ref_url="https://bugzilla.suse.com/1246023" source="BUGZILLA"/>
		<reference ref_id="1246031" ref_url="https://bugzilla.suse.com/1246031" source="BUGZILLA"/>
		<reference ref_id="1246034" ref_url="https://bugzilla.suse.com/1246034" source="BUGZILLA"/>
		<reference ref_id="1246037" ref_url="https://bugzilla.suse.com/1246037" source="BUGZILLA"/>
		<reference ref_id="1246041" ref_url="https://bugzilla.suse.com/1246041" source="BUGZILLA"/>
		<reference ref_id="1246042" ref_url="https://bugzilla.suse.com/1246042" source="BUGZILLA"/>
		<reference ref_id="1246047" ref_url="https://bugzilla.suse.com/1246047" source="BUGZILLA"/>
		<reference ref_id="1246049" ref_url="https://bugzilla.suse.com/1246049" source="BUGZILLA"/>
		<reference ref_id="1246050" ref_url="https://bugzilla.suse.com/1246050" source="BUGZILLA"/>
		<reference ref_id="1246053" ref_url="https://bugzilla.suse.com/1246053" source="BUGZILLA"/>
		<reference ref_id="1246054" ref_url="https://bugzilla.suse.com/1246054" source="BUGZILLA"/>
		<reference ref_id="1246055" ref_url="https://bugzilla.suse.com/1246055" source="BUGZILLA"/>
		<reference ref_id="1246057" ref_url="https://bugzilla.suse.com/1246057" source="BUGZILLA"/>
		<reference ref_id="1246098" ref_url="https://bugzilla.suse.com/1246098" source="BUGZILLA"/>
		<reference ref_id="1246109" ref_url="https://bugzilla.suse.com/1246109" source="BUGZILLA"/>
		<reference ref_id="1246125" ref_url="https://bugzilla.suse.com/1246125" source="BUGZILLA"/>
		<reference ref_id="1246166" ref_url="https://bugzilla.suse.com/1246166" source="BUGZILLA"/>
		<reference ref_id="1246171" ref_url="https://bugzilla.suse.com/1246171" source="BUGZILLA"/>
		<reference ref_id="1246176" ref_url="https://bugzilla.suse.com/1246176" source="BUGZILLA"/>
		<reference ref_id="1246181" ref_url="https://bugzilla.suse.com/1246181" source="BUGZILLA"/>
		<reference ref_id="1246183" ref_url="https://bugzilla.suse.com/1246183" source="BUGZILLA"/>
		<reference ref_id="1246185" ref_url="https://bugzilla.suse.com/1246185" source="BUGZILLA"/>
		<reference ref_id="1246186" ref_url="https://bugzilla.suse.com/1246186" source="BUGZILLA"/>
		<reference ref_id="1246188" ref_url="https://bugzilla.suse.com/1246188" source="BUGZILLA"/>
		<reference ref_id="1246190" ref_url="https://bugzilla.suse.com/1246190" source="BUGZILLA"/>
		<reference ref_id="1246192" ref_url="https://bugzilla.suse.com/1246192" source="BUGZILLA"/>
		<reference ref_id="1246193" ref_url="https://bugzilla.suse.com/1246193" source="BUGZILLA"/>
		<reference ref_id="1246195" ref_url="https://bugzilla.suse.com/1246195" source="BUGZILLA"/>
		<reference ref_id="1246220" ref_url="https://bugzilla.suse.com/1246220" source="BUGZILLA"/>
		<reference ref_id="1246234" ref_url="https://bugzilla.suse.com/1246234" source="BUGZILLA"/>
		<reference ref_id="1246236" ref_url="https://bugzilla.suse.com/1246236" source="BUGZILLA"/>
		<reference ref_id="1246240" ref_url="https://bugzilla.suse.com/1246240" source="BUGZILLA"/>
		<reference ref_id="1246243" ref_url="https://bugzilla.suse.com/1246243" source="BUGZILLA"/>
		<reference ref_id="1246244" ref_url="https://bugzilla.suse.com/1246244" source="BUGZILLA"/>
		<reference ref_id="1246245" ref_url="https://bugzilla.suse.com/1246245" source="BUGZILLA"/>
		<reference ref_id="1246246" ref_url="https://bugzilla.suse.com/1246246" source="BUGZILLA"/>
		<reference ref_id="1246248" ref_url="https://bugzilla.suse.com/1246248" source="BUGZILLA"/>
		<reference ref_id="1246250" ref_url="https://bugzilla.suse.com/1246250" source="BUGZILLA"/>
		<reference ref_id="1246252" ref_url="https://bugzilla.suse.com/1246252" source="BUGZILLA"/>
		<reference ref_id="1246253" ref_url="https://bugzilla.suse.com/1246253" source="BUGZILLA"/>
		<reference ref_id="1246255" ref_url="https://bugzilla.suse.com/1246255" source="BUGZILLA"/>
		<reference ref_id="1246258" ref_url="https://bugzilla.suse.com/1246258" source="BUGZILLA"/>
		<reference ref_id="1246259" ref_url="https://bugzilla.suse.com/1246259" source="BUGZILLA"/>
		<reference ref_id="1246260" ref_url="https://bugzilla.suse.com/1246260" source="BUGZILLA"/>
		<reference ref_id="1246262" ref_url="https://bugzilla.suse.com/1246262" source="BUGZILLA"/>
		<reference ref_id="1246266" ref_url="https://bugzilla.suse.com/1246266" source="BUGZILLA"/>
		<reference ref_id="1246268" ref_url="https://bugzilla.suse.com/1246268" source="BUGZILLA"/>
		<reference ref_id="1246283" ref_url="https://bugzilla.suse.com/1246283" source="BUGZILLA"/>
		<reference ref_id="1246285" ref_url="https://bugzilla.suse.com/1246285" source="BUGZILLA"/>
		<reference ref_id="1246286" ref_url="https://bugzilla.suse.com/1246286" source="BUGZILLA"/>
		<reference ref_id="1246287" ref_url="https://bugzilla.suse.com/1246287" source="BUGZILLA"/>
		<reference ref_id="1246290" ref_url="https://bugzilla.suse.com/1246290" source="BUGZILLA"/>
		<reference ref_id="1246292" ref_url="https://bugzilla.suse.com/1246292" source="BUGZILLA"/>
		<reference ref_id="1246293" ref_url="https://bugzilla.suse.com/1246293" source="BUGZILLA"/>
		<reference ref_id="1246295" ref_url="https://bugzilla.suse.com/1246295" source="BUGZILLA"/>
		<reference ref_id="1246297" ref_url="https://bugzilla.suse.com/1246297" source="BUGZILLA"/>
		<reference ref_id="1246333" ref_url="https://bugzilla.suse.com/1246333" source="BUGZILLA"/>
		<reference ref_id="1246334" ref_url="https://bugzilla.suse.com/1246334" source="BUGZILLA"/>
		<reference ref_id="1246337" ref_url="https://bugzilla.suse.com/1246337" source="BUGZILLA"/>
		<reference ref_id="1246342" ref_url="https://bugzilla.suse.com/1246342" source="BUGZILLA"/>
		<reference ref_id="1246349" ref_url="https://bugzilla.suse.com/1246349" source="BUGZILLA"/>
		<reference ref_id="1246351" ref_url="https://bugzilla.suse.com/1246351" source="BUGZILLA"/>
		<reference ref_id="1246353" ref_url="https://bugzilla.suse.com/1246353" source="BUGZILLA"/>
		<reference ref_id="1246354" ref_url="https://bugzilla.suse.com/1246354" source="BUGZILLA"/>
		<reference ref_id="1246358" ref_url="https://bugzilla.suse.com/1246358" source="BUGZILLA"/>
		<reference ref_id="1246364" ref_url="https://bugzilla.suse.com/1246364" source="BUGZILLA"/>
		<reference ref_id="1246366" ref_url="https://bugzilla.suse.com/1246366" source="BUGZILLA"/>
		<reference ref_id="1246370" ref_url="https://bugzilla.suse.com/1246370" source="BUGZILLA"/>
		<reference ref_id="1246375" ref_url="https://bugzilla.suse.com/1246375" source="BUGZILLA"/>
		<reference ref_id="1246376" ref_url="https://bugzilla.suse.com/1246376" source="BUGZILLA"/>
		<reference ref_id="1246385" ref_url="https://bugzilla.suse.com/1246385" source="BUGZILLA"/>
		<reference ref_id="1246386" ref_url="https://bugzilla.suse.com/1246386" source="BUGZILLA"/>
		<reference ref_id="1246387" ref_url="https://bugzilla.suse.com/1246387" source="BUGZILLA"/>
		<reference ref_id="1246438" ref_url="https://bugzilla.suse.com/1246438" source="BUGZILLA"/>
		<reference ref_id="1246443" ref_url="https://bugzilla.suse.com/1246443" source="BUGZILLA"/>
		<reference ref_id="1246444" ref_url="https://bugzilla.suse.com/1246444" source="BUGZILLA"/>
		<reference ref_id="1246447" ref_url="https://bugzilla.suse.com/1246447" source="BUGZILLA"/>
		<reference ref_id="1246450" ref_url="https://bugzilla.suse.com/1246450" source="BUGZILLA"/>
		<reference ref_id="1246453" ref_url="https://bugzilla.suse.com/1246453" source="BUGZILLA"/>
		<reference ref_id="1246473" ref_url="https://bugzilla.suse.com/1246473" source="BUGZILLA"/>
		<reference ref_id="1246490" ref_url="https://bugzilla.suse.com/1246490" source="BUGZILLA"/>
		<reference ref_id="1246509" ref_url="https://bugzilla.suse.com/1246509" source="BUGZILLA"/>
		<reference ref_id="1246547" ref_url="https://bugzilla.suse.com/1246547" source="BUGZILLA"/>
		<reference ref_id="1246631" ref_url="https://bugzilla.suse.com/1246631" source="BUGZILLA"/>
		<reference ref_id="1246651" ref_url="https://bugzilla.suse.com/1246651" source="BUGZILLA"/>
		<reference ref_id="1246688" ref_url="https://bugzilla.suse.com/1246688" source="BUGZILLA"/>
		<reference ref_id="1246777" ref_url="https://bugzilla.suse.com/1246777" source="BUGZILLA"/>
		<reference ref_id="1246781" ref_url="https://bugzilla.suse.com/1246781" source="BUGZILLA"/>
		<reference ref_id="1246782" ref_url="https://bugzilla.suse.com/1246782" source="BUGZILLA"/>
		<reference ref_id="1246868" ref_url="https://bugzilla.suse.com/1246868" source="BUGZILLA"/>
		<reference ref_id="1246896" ref_url="https://bugzilla.suse.com/1246896" source="BUGZILLA"/>
		<reference ref_id="1246911" ref_url="https://bugzilla.suse.com/1246911" source="BUGZILLA"/>
		<reference ref_id="1246979" ref_url="https://bugzilla.suse.com/1246979" source="BUGZILLA"/>
		<reference ref_id="1247018" ref_url="https://bugzilla.suse.com/1247018" source="BUGZILLA"/>
		<reference ref_id="1247020" ref_url="https://bugzilla.suse.com/1247020" source="BUGZILLA"/>
		<reference ref_id="1247022" ref_url="https://bugzilla.suse.com/1247022" source="BUGZILLA"/>
		<reference ref_id="1247023" ref_url="https://bugzilla.suse.com/1247023" source="BUGZILLA"/>
		<reference ref_id="1247024" ref_url="https://bugzilla.suse.com/1247024" source="BUGZILLA"/>
		<reference ref_id="1247027" ref_url="https://bugzilla.suse.com/1247027" source="BUGZILLA"/>
		<reference ref_id="1247028" ref_url="https://bugzilla.suse.com/1247028" source="BUGZILLA"/>
		<reference ref_id="1247031" ref_url="https://bugzilla.suse.com/1247031" source="BUGZILLA"/>
		<reference ref_id="1247033" ref_url="https://bugzilla.suse.com/1247033" source="BUGZILLA"/>
		<reference ref_id="1247035" ref_url="https://bugzilla.suse.com/1247035" source="BUGZILLA"/>
		<reference ref_id="1247061" ref_url="https://bugzilla.suse.com/1247061" source="BUGZILLA"/>
		<reference ref_id="1247062" ref_url="https://bugzilla.suse.com/1247062" source="BUGZILLA"/>
		<reference ref_id="1247064" ref_url="https://bugzilla.suse.com/1247064" source="BUGZILLA"/>
		<reference ref_id="1247076" ref_url="https://bugzilla.suse.com/1247076" source="BUGZILLA"/>
		<reference ref_id="1247078" ref_url="https://bugzilla.suse.com/1247078" source="BUGZILLA"/>
		<reference ref_id="1247079" ref_url="https://bugzilla.suse.com/1247079" source="BUGZILLA"/>
		<reference ref_id="1247088" ref_url="https://bugzilla.suse.com/1247088" source="BUGZILLA"/>
		<reference ref_id="1247089" ref_url="https://bugzilla.suse.com/1247089" source="BUGZILLA"/>
		<reference ref_id="1247091" ref_url="https://bugzilla.suse.com/1247091" source="BUGZILLA"/>
		<reference ref_id="1247097" ref_url="https://bugzilla.suse.com/1247097" source="BUGZILLA"/>
		<reference ref_id="1247098" ref_url="https://bugzilla.suse.com/1247098" source="BUGZILLA"/>
		<reference ref_id="1247099" ref_url="https://bugzilla.suse.com/1247099" source="BUGZILLA"/>
		<reference ref_id="1247101" ref_url="https://bugzilla.suse.com/1247101" source="BUGZILLA"/>
		<reference ref_id="1247102" ref_url="https://bugzilla.suse.com/1247102" source="BUGZILLA"/>
		<reference ref_id="1247103" ref_url="https://bugzilla.suse.com/1247103" source="BUGZILLA"/>
		<reference ref_id="1247104" ref_url="https://bugzilla.suse.com/1247104" source="BUGZILLA"/>
		<reference ref_id="1247112" ref_url="https://bugzilla.suse.com/1247112" source="BUGZILLA"/>
		<reference ref_id="1247113" ref_url="https://bugzilla.suse.com/1247113" source="BUGZILLA"/>
		<reference ref_id="1247116" ref_url="https://bugzilla.suse.com/1247116" source="BUGZILLA"/>
		<reference ref_id="1247118" ref_url="https://bugzilla.suse.com/1247118" source="BUGZILLA"/>
		<reference ref_id="1247119" ref_url="https://bugzilla.suse.com/1247119" source="BUGZILLA"/>
		<reference ref_id="1247123" ref_url="https://bugzilla.suse.com/1247123" source="BUGZILLA"/>
		<reference ref_id="1247125" ref_url="https://bugzilla.suse.com/1247125" source="BUGZILLA"/>
		<reference ref_id="1247126" ref_url="https://bugzilla.suse.com/1247126" source="BUGZILLA"/>
		<reference ref_id="1247128" ref_url="https://bugzilla.suse.com/1247128" source="BUGZILLA"/>
		<reference ref_id="1247130" ref_url="https://bugzilla.suse.com/1247130" source="BUGZILLA"/>
		<reference ref_id="1247131" ref_url="https://bugzilla.suse.com/1247131" source="BUGZILLA"/>
		<reference ref_id="1247132" ref_url="https://bugzilla.suse.com/1247132" source="BUGZILLA"/>
		<reference ref_id="1247136" ref_url="https://bugzilla.suse.com/1247136" source="BUGZILLA"/>
		<reference ref_id="1247137" ref_url="https://bugzilla.suse.com/1247137" source="BUGZILLA"/>
		<reference ref_id="1247138" ref_url="https://bugzilla.suse.com/1247138" source="BUGZILLA"/>
		<reference ref_id="1247141" ref_url="https://bugzilla.suse.com/1247141" source="BUGZILLA"/>
		<reference ref_id="1247143" ref_url="https://bugzilla.suse.com/1247143" source="BUGZILLA"/>
		<reference ref_id="1247145" ref_url="https://bugzilla.suse.com/1247145" source="BUGZILLA"/>
		<reference ref_id="1247146" ref_url="https://bugzilla.suse.com/1247146" source="BUGZILLA"/>
		<reference ref_id="1247147" ref_url="https://bugzilla.suse.com/1247147" source="BUGZILLA"/>
		<reference ref_id="1247149" ref_url="https://bugzilla.suse.com/1247149" source="BUGZILLA"/>
		<reference ref_id="1247150" ref_url="https://bugzilla.suse.com/1247150" source="BUGZILLA"/>
		<reference ref_id="1247151" ref_url="https://bugzilla.suse.com/1247151" source="BUGZILLA"/>
		<reference ref_id="1247152" ref_url="https://bugzilla.suse.com/1247152" source="BUGZILLA"/>
		<reference ref_id="1247153" ref_url="https://bugzilla.suse.com/1247153" source="BUGZILLA"/>
		<reference ref_id="1247154" ref_url="https://bugzilla.suse.com/1247154" source="BUGZILLA"/>
		<reference ref_id="1247155" ref_url="https://bugzilla.suse.com/1247155" source="BUGZILLA"/>
		<reference ref_id="1247156" ref_url="https://bugzilla.suse.com/1247156" source="BUGZILLA"/>
		<reference ref_id="1247157" ref_url="https://bugzilla.suse.com/1247157" source="BUGZILLA"/>
		<reference ref_id="1247160" ref_url="https://bugzilla.suse.com/1247160" source="BUGZILLA"/>
		<reference ref_id="1247162" ref_url="https://bugzilla.suse.com/1247162" source="BUGZILLA"/>
		<reference ref_id="1247163" ref_url="https://bugzilla.suse.com/1247163" source="BUGZILLA"/>
		<reference ref_id="1247164" ref_url="https://bugzilla.suse.com/1247164" source="BUGZILLA"/>
		<reference ref_id="1247167" ref_url="https://bugzilla.suse.com/1247167" source="BUGZILLA"/>
		<reference ref_id="1247169" ref_url="https://bugzilla.suse.com/1247169" source="BUGZILLA"/>
		<reference ref_id="1247170" ref_url="https://bugzilla.suse.com/1247170" source="BUGZILLA"/>
		<reference ref_id="1247171" ref_url="https://bugzilla.suse.com/1247171" source="BUGZILLA"/>
		<reference ref_id="1247174" ref_url="https://bugzilla.suse.com/1247174" source="BUGZILLA"/>
		<reference ref_id="1247176" ref_url="https://bugzilla.suse.com/1247176" source="BUGZILLA"/>
		<reference ref_id="1247177" ref_url="https://bugzilla.suse.com/1247177" source="BUGZILLA"/>
		<reference ref_id="1247178" ref_url="https://bugzilla.suse.com/1247178" source="BUGZILLA"/>
		<reference ref_id="1247181" ref_url="https://bugzilla.suse.com/1247181" source="BUGZILLA"/>
		<reference ref_id="1247209" ref_url="https://bugzilla.suse.com/1247209" source="BUGZILLA"/>
		<reference ref_id="1247210" ref_url="https://bugzilla.suse.com/1247210" source="BUGZILLA"/>
		<reference ref_id="1247220" ref_url="https://bugzilla.suse.com/1247220" source="BUGZILLA"/>
		<reference ref_id="1247223" ref_url="https://bugzilla.suse.com/1247223" source="BUGZILLA"/>
		<reference ref_id="1247227" ref_url="https://bugzilla.suse.com/1247227" source="BUGZILLA"/>
		<reference ref_id="1247229" ref_url="https://bugzilla.suse.com/1247229" source="BUGZILLA"/>
		<reference ref_id="1247231" ref_url="https://bugzilla.suse.com/1247231" source="BUGZILLA"/>
		<reference ref_id="1247233" ref_url="https://bugzilla.suse.com/1247233" source="BUGZILLA"/>
		<reference ref_id="1247234" ref_url="https://bugzilla.suse.com/1247234" source="BUGZILLA"/>
		<reference ref_id="1247235" ref_url="https://bugzilla.suse.com/1247235" source="BUGZILLA"/>
		<reference ref_id="1247236" ref_url="https://bugzilla.suse.com/1247236" source="BUGZILLA"/>
		<reference ref_id="1247238" ref_url="https://bugzilla.suse.com/1247238" source="BUGZILLA"/>
		<reference ref_id="1247239" ref_url="https://bugzilla.suse.com/1247239" source="BUGZILLA"/>
		<reference ref_id="1247241" ref_url="https://bugzilla.suse.com/1247241" source="BUGZILLA"/>
		<reference ref_id="1247243" ref_url="https://bugzilla.suse.com/1247243" source="BUGZILLA"/>
		<reference ref_id="1247250" ref_url="https://bugzilla.suse.com/1247250" source="BUGZILLA"/>
		<reference ref_id="1247251" ref_url="https://bugzilla.suse.com/1247251" source="BUGZILLA"/>
		<reference ref_id="1247252" ref_url="https://bugzilla.suse.com/1247252" source="BUGZILLA"/>
		<reference ref_id="1247253" ref_url="https://bugzilla.suse.com/1247253" source="BUGZILLA"/>
		<reference ref_id="1247255" ref_url="https://bugzilla.suse.com/1247255" source="BUGZILLA"/>
		<reference ref_id="1247262" ref_url="https://bugzilla.suse.com/1247262" source="BUGZILLA"/>
		<reference ref_id="1247265" ref_url="https://bugzilla.suse.com/1247265" source="BUGZILLA"/>
		<reference ref_id="1247270" ref_url="https://bugzilla.suse.com/1247270" source="BUGZILLA"/>
		<reference ref_id="1247271" ref_url="https://bugzilla.suse.com/1247271" source="BUGZILLA"/>
		<reference ref_id="1247273" ref_url="https://bugzilla.suse.com/1247273" source="BUGZILLA"/>
		<reference ref_id="1247274" ref_url="https://bugzilla.suse.com/1247274" source="BUGZILLA"/>
		<reference ref_id="1247276" ref_url="https://bugzilla.suse.com/1247276" source="BUGZILLA"/>
		<reference ref_id="1247277" ref_url="https://bugzilla.suse.com/1247277" source="BUGZILLA"/>
		<reference ref_id="1247278" ref_url="https://bugzilla.suse.com/1247278" source="BUGZILLA"/>
		<reference ref_id="1247279" ref_url="https://bugzilla.suse.com/1247279" source="BUGZILLA"/>
		<reference ref_id="1247280" ref_url="https://bugzilla.suse.com/1247280" source="BUGZILLA"/>
		<reference ref_id="1247282" ref_url="https://bugzilla.suse.com/1247282" source="BUGZILLA"/>
		<reference ref_id="1247283" ref_url="https://bugzilla.suse.com/1247283" source="BUGZILLA"/>
		<reference ref_id="1247284" ref_url="https://bugzilla.suse.com/1247284" source="BUGZILLA"/>
		<reference ref_id="1247285" ref_url="https://bugzilla.suse.com/1247285" source="BUGZILLA"/>
		<reference ref_id="1247288" ref_url="https://bugzilla.suse.com/1247288" source="BUGZILLA"/>
		<reference ref_id="1247289" ref_url="https://bugzilla.suse.com/1247289" source="BUGZILLA"/>
		<reference ref_id="1247290" ref_url="https://bugzilla.suse.com/1247290" source="BUGZILLA"/>
		<reference ref_id="1247293" ref_url="https://bugzilla.suse.com/1247293" source="BUGZILLA"/>
		<reference ref_id="1247308" ref_url="https://bugzilla.suse.com/1247308" source="BUGZILLA"/>
		<reference ref_id="1247311" ref_url="https://bugzilla.suse.com/1247311" source="BUGZILLA"/>
		<reference ref_id="1247313" ref_url="https://bugzilla.suse.com/1247313" source="BUGZILLA"/>
		<reference ref_id="1247314" ref_url="https://bugzilla.suse.com/1247314" source="BUGZILLA"/>
		<reference ref_id="1247317" ref_url="https://bugzilla.suse.com/1247317" source="BUGZILLA"/>
		<reference ref_id="1247325" ref_url="https://bugzilla.suse.com/1247325" source="BUGZILLA"/>
		<reference ref_id="1247347" ref_url="https://bugzilla.suse.com/1247347" source="BUGZILLA"/>
		<reference ref_id="1247348" ref_url="https://bugzilla.suse.com/1247348" source="BUGZILLA"/>
		<reference ref_id="1247349" ref_url="https://bugzilla.suse.com/1247349" source="BUGZILLA"/>
		<reference ref_id="1247366" ref_url="https://bugzilla.suse.com/1247366" source="BUGZILLA"/>
		<reference ref_id="1247372" ref_url="https://bugzilla.suse.com/1247372" source="BUGZILLA"/>
		<reference ref_id="1247376" ref_url="https://bugzilla.suse.com/1247376" source="BUGZILLA"/>
		<reference ref_id="1247426" ref_url="https://bugzilla.suse.com/1247426" source="BUGZILLA"/>
		<reference ref_id="1247437" ref_url="https://bugzilla.suse.com/1247437" source="BUGZILLA"/>
		<reference ref_id="1247442" ref_url="https://bugzilla.suse.com/1247442" source="BUGZILLA"/>
		<reference ref_id="1247483" ref_url="https://bugzilla.suse.com/1247483" source="BUGZILLA"/>
		<reference ref_id="1247500" ref_url="https://bugzilla.suse.com/1247500" source="BUGZILLA"/>
		<reference ref_id="1247712" ref_url="https://bugzilla.suse.com/1247712" source="BUGZILLA"/>
		<reference ref_id="1247837" ref_url="https://bugzilla.suse.com/1247837" source="BUGZILLA"/>
		<reference ref_id="1247838" ref_url="https://bugzilla.suse.com/1247838" source="BUGZILLA"/>
		<reference ref_id="1247935" ref_url="https://bugzilla.suse.com/1247935" source="BUGZILLA"/>
		<reference ref_id="1247936" ref_url="https://bugzilla.suse.com/1247936" source="BUGZILLA"/>
		<reference ref_id="1247949" ref_url="https://bugzilla.suse.com/1247949" source="BUGZILLA"/>
		<reference ref_id="1247950" ref_url="https://bugzilla.suse.com/1247950" source="BUGZILLA"/>
		<reference ref_id="1247963" ref_url="https://bugzilla.suse.com/1247963" source="BUGZILLA"/>
		<reference ref_id="1247976" ref_url="https://bugzilla.suse.com/1247976" source="BUGZILLA"/>
		<reference ref_id="1248088" ref_url="https://bugzilla.suse.com/1248088" source="BUGZILLA"/>
		<reference ref_id="1248111" ref_url="https://bugzilla.suse.com/1248111" source="BUGZILLA"/>
		<reference ref_id="1248121" ref_url="https://bugzilla.suse.com/1248121" source="BUGZILLA"/>
		<reference ref_id="1248183" ref_url="https://bugzilla.suse.com/1248183" source="BUGZILLA"/>
		<reference ref_id="1248186" ref_url="https://bugzilla.suse.com/1248186" source="BUGZILLA"/>
		<reference ref_id="1248190" ref_url="https://bugzilla.suse.com/1248190" source="BUGZILLA"/>
		<reference ref_id="1248192" ref_url="https://bugzilla.suse.com/1248192" source="BUGZILLA"/>
		<reference ref_id="1248194" ref_url="https://bugzilla.suse.com/1248194" source="BUGZILLA"/>
		<reference ref_id="1248198" ref_url="https://bugzilla.suse.com/1248198" source="BUGZILLA"/>
		<reference ref_id="1248199" ref_url="https://bugzilla.suse.com/1248199" source="BUGZILLA"/>
		<reference ref_id="1248200" ref_url="https://bugzilla.suse.com/1248200" source="BUGZILLA"/>
		<reference ref_id="1248202" ref_url="https://bugzilla.suse.com/1248202" source="BUGZILLA"/>
		<reference ref_id="1248205" ref_url="https://bugzilla.suse.com/1248205" source="BUGZILLA"/>
		<reference ref_id="1248211" ref_url="https://bugzilla.suse.com/1248211" source="BUGZILLA"/>
		<reference ref_id="1248223" ref_url="https://bugzilla.suse.com/1248223" source="BUGZILLA"/>
		<reference ref_id="1248224" ref_url="https://bugzilla.suse.com/1248224" source="BUGZILLA"/>
		<reference ref_id="1248225" ref_url="https://bugzilla.suse.com/1248225" source="BUGZILLA"/>
		<reference ref_id="1248230" ref_url="https://bugzilla.suse.com/1248230" source="BUGZILLA"/>
		<reference ref_id="1248235" ref_url="https://bugzilla.suse.com/1248235" source="BUGZILLA"/>
		<reference ref_id="1248255" ref_url="https://bugzilla.suse.com/1248255" source="BUGZILLA"/>
		<reference ref_id="1248296" ref_url="https://bugzilla.suse.com/1248296" source="BUGZILLA"/>
		<reference ref_id="1248297" ref_url="https://bugzilla.suse.com/1248297" source="BUGZILLA"/>
		<reference ref_id="1248299" ref_url="https://bugzilla.suse.com/1248299" source="BUGZILLA"/>
		<reference ref_id="1248302" ref_url="https://bugzilla.suse.com/1248302" source="BUGZILLA"/>
		<reference ref_id="1248304" ref_url="https://bugzilla.suse.com/1248304" source="BUGZILLA"/>
		<reference ref_id="1248306" ref_url="https://bugzilla.suse.com/1248306" source="BUGZILLA"/>
		<reference ref_id="1248312" ref_url="https://bugzilla.suse.com/1248312" source="BUGZILLA"/>
		<reference ref_id="1248333" ref_url="https://bugzilla.suse.com/1248333" source="BUGZILLA"/>
		<reference ref_id="1248334" ref_url="https://bugzilla.suse.com/1248334" source="BUGZILLA"/>
		<reference ref_id="1248337" ref_url="https://bugzilla.suse.com/1248337" source="BUGZILLA"/>
		<reference ref_id="1248338" ref_url="https://bugzilla.suse.com/1248338" source="BUGZILLA"/>
		<reference ref_id="1248340" ref_url="https://bugzilla.suse.com/1248340" source="BUGZILLA"/>
		<reference ref_id="1248341" ref_url="https://bugzilla.suse.com/1248341" source="BUGZILLA"/>
		<reference ref_id="1248343" ref_url="https://bugzilla.suse.com/1248343" source="BUGZILLA"/>
		<reference ref_id="1248345" ref_url="https://bugzilla.suse.com/1248345" source="BUGZILLA"/>
		<reference ref_id="1248349" ref_url="https://bugzilla.suse.com/1248349" source="BUGZILLA"/>
		<reference ref_id="1248350" ref_url="https://bugzilla.suse.com/1248350" source="BUGZILLA"/>
		<reference ref_id="1248354" ref_url="https://bugzilla.suse.com/1248354" source="BUGZILLA"/>
		<reference ref_id="1248355" ref_url="https://bugzilla.suse.com/1248355" source="BUGZILLA"/>
		<reference ref_id="1248357" ref_url="https://bugzilla.suse.com/1248357" source="BUGZILLA"/>
		<reference ref_id="1248359" ref_url="https://bugzilla.suse.com/1248359" source="BUGZILLA"/>
		<reference ref_id="1248361" ref_url="https://bugzilla.suse.com/1248361" source="BUGZILLA"/>
		<reference ref_id="1248363" ref_url="https://bugzilla.suse.com/1248363" source="BUGZILLA"/>
		<reference ref_id="1248365" ref_url="https://bugzilla.suse.com/1248365" source="BUGZILLA"/>
		<reference ref_id="1248367" ref_url="https://bugzilla.suse.com/1248367" source="BUGZILLA"/>
		<reference ref_id="1248368" ref_url="https://bugzilla.suse.com/1248368" source="BUGZILLA"/>
		<reference ref_id="1248374" ref_url="https://bugzilla.suse.com/1248374" source="BUGZILLA"/>
		<reference ref_id="1248377" ref_url="https://bugzilla.suse.com/1248377" source="BUGZILLA"/>
		<reference ref_id="1248378" ref_url="https://bugzilla.suse.com/1248378" source="BUGZILLA"/>
		<reference ref_id="1248380" ref_url="https://bugzilla.suse.com/1248380" source="BUGZILLA"/>
		<reference ref_id="1248386" ref_url="https://bugzilla.suse.com/1248386" source="BUGZILLA"/>
		<reference ref_id="1248390" ref_url="https://bugzilla.suse.com/1248390" source="BUGZILLA"/>
		<reference ref_id="1248392" ref_url="https://bugzilla.suse.com/1248392" source="BUGZILLA"/>
		<reference ref_id="1248395" ref_url="https://bugzilla.suse.com/1248395" source="BUGZILLA"/>
		<reference ref_id="1248396" ref_url="https://bugzilla.suse.com/1248396" source="BUGZILLA"/>
		<reference ref_id="1248399" ref_url="https://bugzilla.suse.com/1248399" source="BUGZILLA"/>
		<reference ref_id="1248401" ref_url="https://bugzilla.suse.com/1248401" source="BUGZILLA"/>
		<reference ref_id="1248511" ref_url="https://bugzilla.suse.com/1248511" source="BUGZILLA"/>
		<reference ref_id="1248512" ref_url="https://bugzilla.suse.com/1248512" source="BUGZILLA"/>
		<reference ref_id="1248573" ref_url="https://bugzilla.suse.com/1248573" source="BUGZILLA"/>
		<reference ref_id="1248575" ref_url="https://bugzilla.suse.com/1248575" source="BUGZILLA"/>
		<reference ref_id="1248577" ref_url="https://bugzilla.suse.com/1248577" source="BUGZILLA"/>
		<reference ref_id="1248609" ref_url="https://bugzilla.suse.com/1248609" source="BUGZILLA"/>
		<reference ref_id="1248610" ref_url="https://bugzilla.suse.com/1248610" source="BUGZILLA"/>
		<reference ref_id="1248616" ref_url="https://bugzilla.suse.com/1248616" source="BUGZILLA"/>
		<reference ref_id="1248617" ref_url="https://bugzilla.suse.com/1248617" source="BUGZILLA"/>
		<reference ref_id="1248619" ref_url="https://bugzilla.suse.com/1248619" source="BUGZILLA"/>
		<reference ref_id="1248621" ref_url="https://bugzilla.suse.com/1248621" source="BUGZILLA"/>
		<reference ref_id="1248622" ref_url="https://bugzilla.suse.com/1248622" source="BUGZILLA"/>
		<reference ref_id="1248624" ref_url="https://bugzilla.suse.com/1248624" source="BUGZILLA"/>
		<reference ref_id="1248627" ref_url="https://bugzilla.suse.com/1248627" source="BUGZILLA"/>
		<reference ref_id="1248628" ref_url="https://bugzilla.suse.com/1248628" source="BUGZILLA"/>
		<reference ref_id="1248634" ref_url="https://bugzilla.suse.com/1248634" source="BUGZILLA"/>
		<reference ref_id="1248635" ref_url="https://bugzilla.suse.com/1248635" source="BUGZILLA"/>
		<reference ref_id="1248639" ref_url="https://bugzilla.suse.com/1248639" source="BUGZILLA"/>
		<reference ref_id="1248643" ref_url="https://bugzilla.suse.com/1248643" source="BUGZILLA"/>
		<reference ref_id="1248647" ref_url="https://bugzilla.suse.com/1248647" source="BUGZILLA"/>
		<reference ref_id="1248648" ref_url="https://bugzilla.suse.com/1248648" source="BUGZILLA"/>
		<reference ref_id="1248652" ref_url="https://bugzilla.suse.com/1248652" source="BUGZILLA"/>
		<reference ref_id="1248655" ref_url="https://bugzilla.suse.com/1248655" source="BUGZILLA"/>
		<reference ref_id="1248662" ref_url="https://bugzilla.suse.com/1248662" source="BUGZILLA"/>
		<reference ref_id="1248664" ref_url="https://bugzilla.suse.com/1248664" source="BUGZILLA"/>
		<reference ref_id="1248666" ref_url="https://bugzilla.suse.com/1248666" source="BUGZILLA"/>
		<reference ref_id="1248669" ref_url="https://bugzilla.suse.com/1248669" source="BUGZILLA"/>
		<reference ref_id="1248674" ref_url="https://bugzilla.suse.com/1248674" source="BUGZILLA"/>
		<reference ref_id="1248681" ref_url="https://bugzilla.suse.com/1248681" source="BUGZILLA"/>
		<reference ref_id="1248727" ref_url="https://bugzilla.suse.com/1248727" source="BUGZILLA"/>
		<reference ref_id="1248728" ref_url="https://bugzilla.suse.com/1248728" source="BUGZILLA"/>
		<reference ref_id="1248748" ref_url="https://bugzilla.suse.com/1248748" source="BUGZILLA"/>
		<reference ref_id="1248754" ref_url="https://bugzilla.suse.com/1248754" source="BUGZILLA"/>
		<reference ref_id="1248775" ref_url="https://bugzilla.suse.com/1248775" source="BUGZILLA"/>
		<reference ref_id="1249022" ref_url="https://bugzilla.suse.com/1249022" source="BUGZILLA"/>
		<reference ref_id="1249038" ref_url="https://bugzilla.suse.com/1249038" source="BUGZILLA"/>
		<reference ref_id="1249060" ref_url="https://bugzilla.suse.com/1249060" source="BUGZILLA"/>
		<reference ref_id="1249061" ref_url="https://bugzilla.suse.com/1249061" source="BUGZILLA"/>
		<reference ref_id="1249062" ref_url="https://bugzilla.suse.com/1249062" source="BUGZILLA"/>
		<reference ref_id="1249064" ref_url="https://bugzilla.suse.com/1249064" source="BUGZILLA"/>
		<reference ref_id="1249065" ref_url="https://bugzilla.suse.com/1249065" source="BUGZILLA"/>
		<reference ref_id="1249066" ref_url="https://bugzilla.suse.com/1249066" source="BUGZILLA"/>
		<reference ref_id="1249126" ref_url="https://bugzilla.suse.com/1249126" source="BUGZILLA"/>
		<reference ref_id="1249143" ref_url="https://bugzilla.suse.com/1249143" source="BUGZILLA"/>
		<reference ref_id="1249156" ref_url="https://bugzilla.suse.com/1249156" source="BUGZILLA"/>
		<reference ref_id="1249159" ref_url="https://bugzilla.suse.com/1249159" source="BUGZILLA"/>
		<reference ref_id="1249160" ref_url="https://bugzilla.suse.com/1249160" source="BUGZILLA"/>
		<reference ref_id="1249163" ref_url="https://bugzilla.suse.com/1249163" source="BUGZILLA"/>
		<reference ref_id="1249164" ref_url="https://bugzilla.suse.com/1249164" source="BUGZILLA"/>
		<reference ref_id="1249166" ref_url="https://bugzilla.suse.com/1249166" source="BUGZILLA"/>
		<reference ref_id="1249167" ref_url="https://bugzilla.suse.com/1249167" source="BUGZILLA"/>
		<reference ref_id="1249169" ref_url="https://bugzilla.suse.com/1249169" source="BUGZILLA"/>
		<reference ref_id="1249170" ref_url="https://bugzilla.suse.com/1249170" source="BUGZILLA"/>
		<reference ref_id="1249172" ref_url="https://bugzilla.suse.com/1249172" source="BUGZILLA"/>
		<reference ref_id="1249176" ref_url="https://bugzilla.suse.com/1249176" source="BUGZILLA"/>
		<reference ref_id="1249177" ref_url="https://bugzilla.suse.com/1249177" source="BUGZILLA"/>
		<reference ref_id="1249182" ref_url="https://bugzilla.suse.com/1249182" source="BUGZILLA"/>
		<reference ref_id="1249186" ref_url="https://bugzilla.suse.com/1249186" source="BUGZILLA"/>
		<reference ref_id="1249190" ref_url="https://bugzilla.suse.com/1249190" source="BUGZILLA"/>
		<reference ref_id="1249193" ref_url="https://bugzilla.suse.com/1249193" source="BUGZILLA"/>
		<reference ref_id="1249195" ref_url="https://bugzilla.suse.com/1249195" source="BUGZILLA"/>
		<reference ref_id="1249199" ref_url="https://bugzilla.suse.com/1249199" source="BUGZILLA"/>
		<reference ref_id="1249201" ref_url="https://bugzilla.suse.com/1249201" source="BUGZILLA"/>
		<reference ref_id="1249202" ref_url="https://bugzilla.suse.com/1249202" source="BUGZILLA"/>
		<reference ref_id="1249203" ref_url="https://bugzilla.suse.com/1249203" source="BUGZILLA"/>
		<reference ref_id="1249204" ref_url="https://bugzilla.suse.com/1249204" source="BUGZILLA"/>
		<reference ref_id="1249206" ref_url="https://bugzilla.suse.com/1249206" source="BUGZILLA"/>
		<reference ref_id="1249215" ref_url="https://bugzilla.suse.com/1249215" source="BUGZILLA"/>
		<reference ref_id="1249220" ref_url="https://bugzilla.suse.com/1249220" source="BUGZILLA"/>
		<reference ref_id="1249221" ref_url="https://bugzilla.suse.com/1249221" source="BUGZILLA"/>
		<reference ref_id="1249254" ref_url="https://bugzilla.suse.com/1249254" source="BUGZILLA"/>
		<reference ref_id="1249258" ref_url="https://bugzilla.suse.com/1249258" source="BUGZILLA"/>
		<reference ref_id="1249262" ref_url="https://bugzilla.suse.com/1249262" source="BUGZILLA"/>
		<reference ref_id="1249263" ref_url="https://bugzilla.suse.com/1249263" source="BUGZILLA"/>
		<reference ref_id="1249265" ref_url="https://bugzilla.suse.com/1249265" source="BUGZILLA"/>
		<reference ref_id="1249266" ref_url="https://bugzilla.suse.com/1249266" source="BUGZILLA"/>
		<reference ref_id="1249269" ref_url="https://bugzilla.suse.com/1249269" source="BUGZILLA"/>
		<reference ref_id="1249271" ref_url="https://bugzilla.suse.com/1249271" source="BUGZILLA"/>
		<reference ref_id="1249272" ref_url="https://bugzilla.suse.com/1249272" source="BUGZILLA"/>
		<reference ref_id="1249273" ref_url="https://bugzilla.suse.com/1249273" source="BUGZILLA"/>
		<reference ref_id="1249274" ref_url="https://bugzilla.suse.com/1249274" source="BUGZILLA"/>
		<reference ref_id="1249278" ref_url="https://bugzilla.suse.com/1249278" source="BUGZILLA"/>
		<reference ref_id="1249279" ref_url="https://bugzilla.suse.com/1249279" source="BUGZILLA"/>
		<reference ref_id="1249281" ref_url="https://bugzilla.suse.com/1249281" source="BUGZILLA"/>
		<reference ref_id="1249282" ref_url="https://bugzilla.suse.com/1249282" source="BUGZILLA"/>
		<reference ref_id="1249284" ref_url="https://bugzilla.suse.com/1249284" source="BUGZILLA"/>
		<reference ref_id="1249285" ref_url="https://bugzilla.suse.com/1249285" source="BUGZILLA"/>
		<reference ref_id="1249286" ref_url="https://bugzilla.suse.com/1249286" source="BUGZILLA"/>
		<reference ref_id="1249288" ref_url="https://bugzilla.suse.com/1249288" source="BUGZILLA"/>
		<reference ref_id="1249290" ref_url="https://bugzilla.suse.com/1249290" source="BUGZILLA"/>
		<reference ref_id="1249292" ref_url="https://bugzilla.suse.com/1249292" source="BUGZILLA"/>
		<reference ref_id="1249295" ref_url="https://bugzilla.suse.com/1249295" source="BUGZILLA"/>
		<reference ref_id="1249296" ref_url="https://bugzilla.suse.com/1249296" source="BUGZILLA"/>
		<reference ref_id="1249297" ref_url="https://bugzilla.suse.com/1249297" source="BUGZILLA"/>
		<reference ref_id="1249299" ref_url="https://bugzilla.suse.com/1249299" source="BUGZILLA"/>
		<reference ref_id="1249300" ref_url="https://bugzilla.suse.com/1249300" source="BUGZILLA"/>
		<reference ref_id="1249301" ref_url="https://bugzilla.suse.com/1249301" source="BUGZILLA"/>
		<reference ref_id="1249303" ref_url="https://bugzilla.suse.com/1249303" source="BUGZILLA"/>
		<reference ref_id="1249304" ref_url="https://bugzilla.suse.com/1249304" source="BUGZILLA"/>
		<reference ref_id="1249305" ref_url="https://bugzilla.suse.com/1249305" source="BUGZILLA"/>
		<reference ref_id="1249306" ref_url="https://bugzilla.suse.com/1249306" source="BUGZILLA"/>
		<reference ref_id="1249308" ref_url="https://bugzilla.suse.com/1249308" source="BUGZILLA"/>
		<reference ref_id="1249309" ref_url="https://bugzilla.suse.com/1249309" source="BUGZILLA"/>
		<reference ref_id="1249312" ref_url="https://bugzilla.suse.com/1249312" source="BUGZILLA"/>
		<reference ref_id="1249313" ref_url="https://bugzilla.suse.com/1249313" source="BUGZILLA"/>
		<reference ref_id="1249314" ref_url="https://bugzilla.suse.com/1249314" source="BUGZILLA"/>
		<reference ref_id="1249315" ref_url="https://bugzilla.suse.com/1249315" source="BUGZILLA"/>
		<reference ref_id="1249316" ref_url="https://bugzilla.suse.com/1249316" source="BUGZILLA"/>
		<reference ref_id="1249318" ref_url="https://bugzilla.suse.com/1249318" source="BUGZILLA"/>
		<reference ref_id="1249319" ref_url="https://bugzilla.suse.com/1249319" source="BUGZILLA"/>
		<reference ref_id="1249320" ref_url="https://bugzilla.suse.com/1249320" source="BUGZILLA"/>
		<reference ref_id="1249321" ref_url="https://bugzilla.suse.com/1249321" source="BUGZILLA"/>
		<reference ref_id="1249322" ref_url="https://bugzilla.suse.com/1249322" source="BUGZILLA"/>
		<reference ref_id="1249323" ref_url="https://bugzilla.suse.com/1249323" source="BUGZILLA"/>
		<reference ref_id="1249324" ref_url="https://bugzilla.suse.com/1249324" source="BUGZILLA"/>
		<reference ref_id="1249333" ref_url="https://bugzilla.suse.com/1249333" source="BUGZILLA"/>
		<reference ref_id="1249334" ref_url="https://bugzilla.suse.com/1249334" source="BUGZILLA"/>
		<reference ref_id="1249338" ref_url="https://bugzilla.suse.com/1249338" source="BUGZILLA"/>
		<reference ref_id="1249346" ref_url="https://bugzilla.suse.com/1249346" source="BUGZILLA"/>
		<reference ref_id="1249374" ref_url="https://bugzilla.suse.com/1249374" source="BUGZILLA"/>
		<reference ref_id="1249413" ref_url="https://bugzilla.suse.com/1249413" source="BUGZILLA"/>
		<reference ref_id="1249477" ref_url="https://bugzilla.suse.com/1249477" source="BUGZILLA"/>
		<reference ref_id="1249478" ref_url="https://bugzilla.suse.com/1249478" source="BUGZILLA"/>
		<reference ref_id="1249479" ref_url="https://bugzilla.suse.com/1249479" source="BUGZILLA"/>
		<reference ref_id="1249486" ref_url="https://bugzilla.suse.com/1249486" source="BUGZILLA"/>
		<reference ref_id="1249490" ref_url="https://bugzilla.suse.com/1249490" source="BUGZILLA"/>
		<reference ref_id="1249494" ref_url="https://bugzilla.suse.com/1249494" source="BUGZILLA"/>
		<reference ref_id="1249500" ref_url="https://bugzilla.suse.com/1249500" source="BUGZILLA"/>
		<reference ref_id="1249504" ref_url="https://bugzilla.suse.com/1249504" source="BUGZILLA"/>
		<reference ref_id="1249506" ref_url="https://bugzilla.suse.com/1249506" source="BUGZILLA"/>
		<reference ref_id="1249508" ref_url="https://bugzilla.suse.com/1249508" source="BUGZILLA"/>
		<reference ref_id="1249509" ref_url="https://bugzilla.suse.com/1249509" source="BUGZILLA"/>
		<reference ref_id="1249510" ref_url="https://bugzilla.suse.com/1249510" source="BUGZILLA"/>
		<reference ref_id="1249513" ref_url="https://bugzilla.suse.com/1249513" source="BUGZILLA"/>
		<reference ref_id="1249515" ref_url="https://bugzilla.suse.com/1249515" source="BUGZILLA"/>
		<reference ref_id="1249516" ref_url="https://bugzilla.suse.com/1249516" source="BUGZILLA"/>
		<reference ref_id="1249522" ref_url="https://bugzilla.suse.com/1249522" source="BUGZILLA"/>
		<reference ref_id="1249523" ref_url="https://bugzilla.suse.com/1249523" source="BUGZILLA"/>
		<reference ref_id="1249524" ref_url="https://bugzilla.suse.com/1249524" source="BUGZILLA"/>
		<reference ref_id="1249526" ref_url="https://bugzilla.suse.com/1249526" source="BUGZILLA"/>
		<reference ref_id="1249533" ref_url="https://bugzilla.suse.com/1249533" source="BUGZILLA"/>
		<reference ref_id="1249538" ref_url="https://bugzilla.suse.com/1249538" source="BUGZILLA"/>
		<reference ref_id="1249540" ref_url="https://bugzilla.suse.com/1249540" source="BUGZILLA"/>
		<reference ref_id="1249542" ref_url="https://bugzilla.suse.com/1249542" source="BUGZILLA"/>
		<reference ref_id="1249545" ref_url="https://bugzilla.suse.com/1249545" source="BUGZILLA"/>
		<reference ref_id="1249547" ref_url="https://bugzilla.suse.com/1249547" source="BUGZILLA"/>
		<reference ref_id="1249548" ref_url="https://bugzilla.suse.com/1249548" source="BUGZILLA"/>
		<reference ref_id="1249550" ref_url="https://bugzilla.suse.com/1249550" source="BUGZILLA"/>
		<reference ref_id="1249552" ref_url="https://bugzilla.suse.com/1249552" source="BUGZILLA"/>
		<reference ref_id="1249554" ref_url="https://bugzilla.suse.com/1249554" source="BUGZILLA"/>
		<reference ref_id="1249562" ref_url="https://bugzilla.suse.com/1249562" source="BUGZILLA"/>
		<reference ref_id="1249566" ref_url="https://bugzilla.suse.com/1249566" source="BUGZILLA"/>
		<reference ref_id="1249587" ref_url="https://bugzilla.suse.com/1249587" source="BUGZILLA"/>
		<reference ref_id="1249598" ref_url="https://bugzilla.suse.com/1249598" source="BUGZILLA"/>
		<reference ref_id="1249604" ref_url="https://bugzilla.suse.com/1249604" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249615" ref_url="https://bugzilla.suse.com/1249615" source="BUGZILLA"/>
		<reference ref_id="1249618" ref_url="https://bugzilla.suse.com/1249618" source="BUGZILLA"/>
		<reference ref_id="1249774" ref_url="https://bugzilla.suse.com/1249774" source="BUGZILLA"/>
		<reference ref_id="1249833" ref_url="https://bugzilla.suse.com/1249833" source="BUGZILLA"/>
		<reference ref_id="1249887" ref_url="https://bugzilla.suse.com/1249887" source="BUGZILLA"/>
		<reference ref_id="1249888" ref_url="https://bugzilla.suse.com/1249888" source="BUGZILLA"/>
		<reference ref_id="1249901" ref_url="https://bugzilla.suse.com/1249901" source="BUGZILLA"/>
		<reference ref_id="1249904" ref_url="https://bugzilla.suse.com/1249904" source="BUGZILLA"/>
		<reference ref_id="1249906" ref_url="https://bugzilla.suse.com/1249906" source="BUGZILLA"/>
		<reference ref_id="1249915" ref_url="https://bugzilla.suse.com/1249915" source="BUGZILLA"/>
		<reference ref_id="1249974" ref_url="https://bugzilla.suse.com/1249974" source="BUGZILLA"/>
		<reference ref_id="1249975" ref_url="https://bugzilla.suse.com/1249975" source="BUGZILLA"/>
		<reference ref_id="1250002" ref_url="https://bugzilla.suse.com/1250002" source="BUGZILLA"/>
		<reference ref_id="1250007" ref_url="https://bugzilla.suse.com/1250007" source="BUGZILLA"/>
		<reference ref_id="1250021" ref_url="https://bugzilla.suse.com/1250021" source="BUGZILLA"/>
		<reference ref_id="1250025" ref_url="https://bugzilla.suse.com/1250025" source="BUGZILLA"/>
		<reference ref_id="1250028" ref_url="https://bugzilla.suse.com/1250028" source="BUGZILLA"/>
		<reference ref_id="1250032" ref_url="https://bugzilla.suse.com/1250032" source="BUGZILLA"/>
		<reference ref_id="1250087" ref_url="https://bugzilla.suse.com/1250087" source="BUGZILLA"/>
		<reference ref_id="1250088" ref_url="https://bugzilla.suse.com/1250088" source="BUGZILLA"/>
		<reference ref_id="1250119" ref_url="https://bugzilla.suse.com/1250119" source="BUGZILLA"/>
		<reference ref_id="1250123" ref_url="https://bugzilla.suse.com/1250123" source="BUGZILLA"/>
		<reference ref_id="1250124" ref_url="https://bugzilla.suse.com/1250124" source="BUGZILLA"/>
		<reference ref_id="1250177" ref_url="https://bugzilla.suse.com/1250177" source="BUGZILLA"/>
		<reference ref_id="1250179" ref_url="https://bugzilla.suse.com/1250179" source="BUGZILLA"/>
		<reference ref_id="1250203" ref_url="https://bugzilla.suse.com/1250203" source="BUGZILLA"/>
		<reference ref_id="1250204" ref_url="https://bugzilla.suse.com/1250204" source="BUGZILLA"/>
		<reference ref_id="1250205" ref_url="https://bugzilla.suse.com/1250205" source="BUGZILLA"/>
		<reference ref_id="1250237" ref_url="https://bugzilla.suse.com/1250237" source="BUGZILLA"/>
		<reference ref_id="1250242" ref_url="https://bugzilla.suse.com/1250242" source="BUGZILLA"/>
		<reference ref_id="1250247" ref_url="https://bugzilla.suse.com/1250247" source="BUGZILLA"/>
		<reference ref_id="1250249" ref_url="https://bugzilla.suse.com/1250249" source="BUGZILLA"/>
		<reference ref_id="1250251" ref_url="https://bugzilla.suse.com/1250251" source="BUGZILLA"/>
		<reference ref_id="1250258" ref_url="https://bugzilla.suse.com/1250258" source="BUGZILLA"/>
		<reference ref_id="1250262" ref_url="https://bugzilla.suse.com/1250262" source="BUGZILLA"/>
		<reference ref_id="1250266" ref_url="https://bugzilla.suse.com/1250266" source="BUGZILLA"/>
		<reference ref_id="1250267" ref_url="https://bugzilla.suse.com/1250267" source="BUGZILLA"/>
		<reference ref_id="1250268" ref_url="https://bugzilla.suse.com/1250268" source="BUGZILLA"/>
		<reference ref_id="1250275" ref_url="https://bugzilla.suse.com/1250275" source="BUGZILLA"/>
		<reference ref_id="1250276" ref_url="https://bugzilla.suse.com/1250276" source="BUGZILLA"/>
		<reference ref_id="1250281" ref_url="https://bugzilla.suse.com/1250281" source="BUGZILLA"/>
		<reference ref_id="1250291" ref_url="https://bugzilla.suse.com/1250291" source="BUGZILLA"/>
		<reference ref_id="1250292" ref_url="https://bugzilla.suse.com/1250292" source="BUGZILLA"/>
		<reference ref_id="1250294" ref_url="https://bugzilla.suse.com/1250294" source="BUGZILLA"/>
		<reference ref_id="1250296" ref_url="https://bugzilla.suse.com/1250296" source="BUGZILLA"/>
		<reference ref_id="1250297" ref_url="https://bugzilla.suse.com/1250297" source="BUGZILLA"/>
		<reference ref_id="1250298" ref_url="https://bugzilla.suse.com/1250298" source="BUGZILLA"/>
		<reference ref_id="1250334" ref_url="https://bugzilla.suse.com/1250334" source="BUGZILLA"/>
		<reference ref_id="1250344" ref_url="https://bugzilla.suse.com/1250344" source="BUGZILLA"/>
		<reference ref_id="1250365" ref_url="https://bugzilla.suse.com/1250365" source="BUGZILLA"/>
		<reference ref_id="1250371" ref_url="https://bugzilla.suse.com/1250371" source="BUGZILLA"/>
		<reference ref_id="1250377" ref_url="https://bugzilla.suse.com/1250377" source="BUGZILLA"/>
		<reference ref_id="1250386" ref_url="https://bugzilla.suse.com/1250386" source="BUGZILLA"/>
		<reference ref_id="1250389" ref_url="https://bugzilla.suse.com/1250389" source="BUGZILLA"/>
		<reference ref_id="1250398" ref_url="https://bugzilla.suse.com/1250398" source="BUGZILLA"/>
		<reference ref_id="1250402" ref_url="https://bugzilla.suse.com/1250402" source="BUGZILLA"/>
		<reference ref_id="1250406" ref_url="https://bugzilla.suse.com/1250406" source="BUGZILLA"/>
		<reference ref_id="1250407" ref_url="https://bugzilla.suse.com/1250407" source="BUGZILLA"/>
		<reference ref_id="1250408" ref_url="https://bugzilla.suse.com/1250408" source="BUGZILLA"/>
		<reference ref_id="1250450" ref_url="https://bugzilla.suse.com/1250450" source="BUGZILLA"/>
		<reference ref_id="1250491" ref_url="https://bugzilla.suse.com/1250491" source="BUGZILLA"/>
		<reference ref_id="1250519" ref_url="https://bugzilla.suse.com/1250519" source="BUGZILLA"/>
		<reference ref_id="1250522" ref_url="https://bugzilla.suse.com/1250522" source="BUGZILLA"/>
		<reference ref_id="1250650" ref_url="https://bugzilla.suse.com/1250650" source="BUGZILLA"/>
		<reference ref_id="1250655" ref_url="https://bugzilla.suse.com/1250655" source="BUGZILLA"/>
		<reference ref_id="1250671" ref_url="https://bugzilla.suse.com/1250671" source="BUGZILLA"/>
		<reference ref_id="1250702" ref_url="https://bugzilla.suse.com/1250702" source="BUGZILLA"/>
		<reference ref_id="1250711" ref_url="https://bugzilla.suse.com/1250711" source="BUGZILLA"/>
		<reference ref_id="1250712" ref_url="https://bugzilla.suse.com/1250712" source="BUGZILLA"/>
		<reference ref_id="1250713" ref_url="https://bugzilla.suse.com/1250713" source="BUGZILLA"/>
		<reference ref_id="1250716" ref_url="https://bugzilla.suse.com/1250716" source="BUGZILLA"/>
		<reference ref_id="1250719" ref_url="https://bugzilla.suse.com/1250719" source="BUGZILLA"/>
		<reference ref_id="1250722" ref_url="https://bugzilla.suse.com/1250722" source="BUGZILLA"/>
		<reference ref_id="1250729" ref_url="https://bugzilla.suse.com/1250729" source="BUGZILLA"/>
		<reference ref_id="1250736" ref_url="https://bugzilla.suse.com/1250736" source="BUGZILLA"/>
		<reference ref_id="1250737" ref_url="https://bugzilla.suse.com/1250737" source="BUGZILLA"/>
		<reference ref_id="1250739" ref_url="https://bugzilla.suse.com/1250739" source="BUGZILLA"/>
		<reference ref_id="1250741" ref_url="https://bugzilla.suse.com/1250741" source="BUGZILLA"/>
		<reference ref_id="1250742" ref_url="https://bugzilla.suse.com/1250742" source="BUGZILLA"/>
		<reference ref_id="1250758" ref_url="https://bugzilla.suse.com/1250758" source="BUGZILLA"/>
		<reference ref_id="1250952" ref_url="https://bugzilla.suse.com/1250952" source="BUGZILLA"/>
		<reference ref_id="1251100" ref_url="https://bugzilla.suse.com/1251100" source="BUGZILLA"/>
		<reference ref_id="1251114" ref_url="https://bugzilla.suse.com/1251114" source="BUGZILLA"/>
		<reference ref_id="1251134" ref_url="https://bugzilla.suse.com/1251134" source="BUGZILLA"/>
		<reference ref_id="1251135" ref_url="https://bugzilla.suse.com/1251135" source="BUGZILLA"/>
		<reference ref_id="1251143" ref_url="https://bugzilla.suse.com/1251143" source="BUGZILLA"/>
		<reference ref_id="1251146" ref_url="https://bugzilla.suse.com/1251146" source="BUGZILLA"/>
		<reference ref_id="1251186" ref_url="https://bugzilla.suse.com/1251186" source="BUGZILLA"/>
		<reference ref_id="1251216" ref_url="https://bugzilla.suse.com/1251216" source="BUGZILLA"/>
		<reference ref_id="1251230" ref_url="https://bugzilla.suse.com/1251230" source="BUGZILLA"/>
		<reference ref_id="1251810" ref_url="https://bugzilla.suse.com/1251810" source="BUGZILLA"/>
		<reference ref_id="1252084" ref_url="https://bugzilla.suse.com/1252084" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164/" source="CVE"/>
		<reference ref_id="CVE-2024-57891" ref_url="https://www.suse.com/security/cve/CVE-2024-57891/" source="CVE"/>
		<reference ref_id="CVE-2024-57951" ref_url="https://www.suse.com/security/cve/CVE-2024-57951/" source="CVE"/>
		<reference ref_id="CVE-2024-57952" ref_url="https://www.suse.com/security/cve/CVE-2024-57952/" source="CVE"/>
		<reference ref_id="CVE-2024-58090" ref_url="https://www.suse.com/security/cve/CVE-2024-58090/" source="CVE"/>
		<reference ref_id="CVE-2025-22034" ref_url="https://www.suse.com/security/cve/CVE-2025-22034/" source="CVE"/>
		<reference ref_id="CVE-2025-22077" ref_url="https://www.suse.com/security/cve/CVE-2025-22077/" source="CVE"/>
		<reference ref_id="CVE-2025-23141" ref_url="https://www.suse.com/security/cve/CVE-2025-23141/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-37821" ref_url="https://www.suse.com/security/cve/CVE-2025-37821/" source="CVE"/>
		<reference ref_id="CVE-2025-37849" ref_url="https://www.suse.com/security/cve/CVE-2025-37849/" source="CVE"/>
		<reference ref_id="CVE-2025-37856" ref_url="https://www.suse.com/security/cve/CVE-2025-37856/" source="CVE"/>
		<reference ref_id="CVE-2025-37861" ref_url="https://www.suse.com/security/cve/CVE-2025-37861/" source="CVE"/>
		<reference ref_id="CVE-2025-37864" ref_url="https://www.suse.com/security/cve/CVE-2025-37864/" source="CVE"/>
		<reference ref_id="CVE-2025-38006" ref_url="https://www.suse.com/security/cve/CVE-2025-38006/" source="CVE"/>
		<reference ref_id="CVE-2025-38008" ref_url="https://www.suse.com/security/cve/CVE-2025-38008/" source="CVE"/>
		<reference ref_id="CVE-2025-38019" ref_url="https://www.suse.com/security/cve/CVE-2025-38019/" source="CVE"/>
		<reference ref_id="CVE-2025-38034" ref_url="https://www.suse.com/security/cve/CVE-2025-38034/" source="CVE"/>
		<reference ref_id="CVE-2025-38038" ref_url="https://www.suse.com/security/cve/CVE-2025-38038/" source="CVE"/>
		<reference ref_id="CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052/" source="CVE"/>
		<reference ref_id="CVE-2025-38058" ref_url="https://www.suse.com/security/cve/CVE-2025-38058/" source="CVE"/>
		<reference ref_id="CVE-2025-38062" ref_url="https://www.suse.com/security/cve/CVE-2025-38062/" source="CVE"/>
		<reference ref_id="CVE-2025-38075" ref_url="https://www.suse.com/security/cve/CVE-2025-38075/" source="CVE"/>
		<reference ref_id="CVE-2025-38087" ref_url="https://www.suse.com/security/cve/CVE-2025-38087/" source="CVE"/>
		<reference ref_id="CVE-2025-38088" ref_url="https://www.suse.com/security/cve/CVE-2025-38088/" source="CVE"/>
		<reference ref_id="CVE-2025-38089" ref_url="https://www.suse.com/security/cve/CVE-2025-38089/" source="CVE"/>
		<reference ref_id="CVE-2025-38090" ref_url="https://www.suse.com/security/cve/CVE-2025-38090/" source="CVE"/>
		<reference ref_id="CVE-2025-38091" ref_url="https://www.suse.com/security/cve/CVE-2025-38091/" source="CVE"/>
		<reference ref_id="CVE-2025-38095" ref_url="https://www.suse.com/security/cve/CVE-2025-38095/" source="CVE"/>
		<reference ref_id="CVE-2025-38096" ref_url="https://www.suse.com/security/cve/CVE-2025-38096/" source="CVE"/>
		<reference ref_id="CVE-2025-38098" ref_url="https://www.suse.com/security/cve/CVE-2025-38098/" source="CVE"/>
		<reference ref_id="CVE-2025-38099" ref_url="https://www.suse.com/security/cve/CVE-2025-38099/" source="CVE"/>
		<reference ref_id="CVE-2025-38101" ref_url="https://www.suse.com/security/cve/CVE-2025-38101/" source="CVE"/>
		<reference ref_id="CVE-2025-38102" ref_url="https://www.suse.com/security/cve/CVE-2025-38102/" source="CVE"/>
		<reference ref_id="CVE-2025-38103" ref_url="https://www.suse.com/security/cve/CVE-2025-38103/" source="CVE"/>
		<reference ref_id="CVE-2025-38106" ref_url="https://www.suse.com/security/cve/CVE-2025-38106/" source="CVE"/>
		<reference ref_id="CVE-2025-38107" ref_url="https://www.suse.com/security/cve/CVE-2025-38107/" source="CVE"/>
		<reference ref_id="CVE-2025-38108" ref_url="https://www.suse.com/security/cve/CVE-2025-38108/" source="CVE"/>
		<reference ref_id="CVE-2025-38109" ref_url="https://www.suse.com/security/cve/CVE-2025-38109/" source="CVE"/>
		<reference ref_id="CVE-2025-38110" ref_url="https://www.suse.com/security/cve/CVE-2025-38110/" source="CVE"/>
		<reference ref_id="CVE-2025-38111" ref_url="https://www.suse.com/security/cve/CVE-2025-38111/" source="CVE"/>
		<reference ref_id="CVE-2025-38112" ref_url="https://www.suse.com/security/cve/CVE-2025-38112/" source="CVE"/>
		<reference ref_id="CVE-2025-38113" ref_url="https://www.suse.com/security/cve/CVE-2025-38113/" source="CVE"/>
		<reference ref_id="CVE-2025-38114" ref_url="https://www.suse.com/security/cve/CVE-2025-38114/" source="CVE"/>
		<reference ref_id="CVE-2025-38117" ref_url="https://www.suse.com/security/cve/CVE-2025-38117/" source="CVE"/>
		<reference ref_id="CVE-2025-38118" ref_url="https://www.suse.com/security/cve/CVE-2025-38118/" source="CVE"/>
		<reference ref_id="CVE-2025-38119" ref_url="https://www.suse.com/security/cve/CVE-2025-38119/" source="CVE"/>
		<reference ref_id="CVE-2025-38120" ref_url="https://www.suse.com/security/cve/CVE-2025-38120/" source="CVE"/>
		<reference ref_id="CVE-2025-38122" ref_url="https://www.suse.com/security/cve/CVE-2025-38122/" source="CVE"/>
		<reference ref_id="CVE-2025-38123" ref_url="https://www.suse.com/security/cve/CVE-2025-38123/" source="CVE"/>
		<reference ref_id="CVE-2025-38124" ref_url="https://www.suse.com/security/cve/CVE-2025-38124/" source="CVE"/>
		<reference ref_id="CVE-2025-38125" ref_url="https://www.suse.com/security/cve/CVE-2025-38125/" source="CVE"/>
		<reference ref_id="CVE-2025-38127" ref_url="https://www.suse.com/security/cve/CVE-2025-38127/" source="CVE"/>
		<reference ref_id="CVE-2025-38128" ref_url="https://www.suse.com/security/cve/CVE-2025-38128/" source="CVE"/>
		<reference ref_id="CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129/" source="CVE"/>
		<reference ref_id="CVE-2025-38134" ref_url="https://www.suse.com/security/cve/CVE-2025-38134/" source="CVE"/>
		<reference ref_id="CVE-2025-38135" ref_url="https://www.suse.com/security/cve/CVE-2025-38135/" source="CVE"/>
		<reference ref_id="CVE-2025-38136" ref_url="https://www.suse.com/security/cve/CVE-2025-38136/" source="CVE"/>
		<reference ref_id="CVE-2025-38137" ref_url="https://www.suse.com/security/cve/CVE-2025-38137/" source="CVE"/>
		<reference ref_id="CVE-2025-38138" ref_url="https://www.suse.com/security/cve/CVE-2025-38138/" source="CVE"/>
		<reference ref_id="CVE-2025-38140" ref_url="https://www.suse.com/security/cve/CVE-2025-38140/" source="CVE"/>
		<reference ref_id="CVE-2025-38141" ref_url="https://www.suse.com/security/cve/CVE-2025-38141/" source="CVE"/>
		<reference ref_id="CVE-2025-38142" ref_url="https://www.suse.com/security/cve/CVE-2025-38142/" source="CVE"/>
		<reference ref_id="CVE-2025-38143" ref_url="https://www.suse.com/security/cve/CVE-2025-38143/" source="CVE"/>
		<reference ref_id="CVE-2025-38145" ref_url="https://www.suse.com/security/cve/CVE-2025-38145/" source="CVE"/>
		<reference ref_id="CVE-2025-38146" ref_url="https://www.suse.com/security/cve/CVE-2025-38146/" source="CVE"/>
		<reference ref_id="CVE-2025-38148" ref_url="https://www.suse.com/security/cve/CVE-2025-38148/" source="CVE"/>
		<reference ref_id="CVE-2025-38149" ref_url="https://www.suse.com/security/cve/CVE-2025-38149/" source="CVE"/>
		<reference ref_id="CVE-2025-38151" ref_url="https://www.suse.com/security/cve/CVE-2025-38151/" source="CVE"/>
		<reference ref_id="CVE-2025-38153" ref_url="https://www.suse.com/security/cve/CVE-2025-38153/" source="CVE"/>
		<reference ref_id="CVE-2025-38154" ref_url="https://www.suse.com/security/cve/CVE-2025-38154/" source="CVE"/>
		<reference ref_id="CVE-2025-38155" ref_url="https://www.suse.com/security/cve/CVE-2025-38155/" source="CVE"/>
		<reference ref_id="CVE-2025-38156" ref_url="https://www.suse.com/security/cve/CVE-2025-38156/" source="CVE"/>
		<reference ref_id="CVE-2025-38157" ref_url="https://www.suse.com/security/cve/CVE-2025-38157/" source="CVE"/>
		<reference ref_id="CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159/" source="CVE"/>
		<reference ref_id="CVE-2025-38160" ref_url="https://www.suse.com/security/cve/CVE-2025-38160/" source="CVE"/>
		<reference ref_id="CVE-2025-38161" ref_url="https://www.suse.com/security/cve/CVE-2025-38161/" source="CVE"/>
		<reference ref_id="CVE-2025-38165" ref_url="https://www.suse.com/security/cve/CVE-2025-38165/" source="CVE"/>
		<reference ref_id="CVE-2025-38168" ref_url="https://www.suse.com/security/cve/CVE-2025-38168/" source="CVE"/>
		<reference ref_id="CVE-2025-38169" ref_url="https://www.suse.com/security/cve/CVE-2025-38169/" source="CVE"/>
		<reference ref_id="CVE-2025-38170" ref_url="https://www.suse.com/security/cve/CVE-2025-38170/" source="CVE"/>
		<reference ref_id="CVE-2025-38172" ref_url="https://www.suse.com/security/cve/CVE-2025-38172/" source="CVE"/>
		<reference ref_id="CVE-2025-38173" ref_url="https://www.suse.com/security/cve/CVE-2025-38173/" source="CVE"/>
		<reference ref_id="CVE-2025-38174" ref_url="https://www.suse.com/security/cve/CVE-2025-38174/" source="CVE"/>
		<reference ref_id="CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177/" source="CVE"/>
		<reference ref_id="CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180/" source="CVE"/>
		<reference ref_id="CVE-2025-38181" ref_url="https://www.suse.com/security/cve/CVE-2025-38181/" source="CVE"/>
		<reference ref_id="CVE-2025-38182" ref_url="https://www.suse.com/security/cve/CVE-2025-38182/" source="CVE"/>
		<reference ref_id="CVE-2025-38184" ref_url="https://www.suse.com/security/cve/CVE-2025-38184/" source="CVE"/>
		<reference ref_id="CVE-2025-38185" ref_url="https://www.suse.com/security/cve/CVE-2025-38185/" source="CVE"/>
		<reference ref_id="CVE-2025-38186" ref_url="https://www.suse.com/security/cve/CVE-2025-38186/" source="CVE"/>
		<reference ref_id="CVE-2025-38188" ref_url="https://www.suse.com/security/cve/CVE-2025-38188/" source="CVE"/>
		<reference ref_id="CVE-2025-38189" ref_url="https://www.suse.com/security/cve/CVE-2025-38189/" source="CVE"/>
		<reference ref_id="CVE-2025-38190" ref_url="https://www.suse.com/security/cve/CVE-2025-38190/" source="CVE"/>
		<reference ref_id="CVE-2025-38193" ref_url="https://www.suse.com/security/cve/CVE-2025-38193/" source="CVE"/>
		<reference ref_id="CVE-2025-38197" ref_url="https://www.suse.com/security/cve/CVE-2025-38197/" source="CVE"/>
		<reference ref_id="CVE-2025-38198" ref_url="https://www.suse.com/security/cve/CVE-2025-38198/" source="CVE"/>
		<reference ref_id="CVE-2025-38201" ref_url="https://www.suse.com/security/cve/CVE-2025-38201/" source="CVE"/>
		<reference ref_id="CVE-2025-38205" ref_url="https://www.suse.com/security/cve/CVE-2025-38205/" source="CVE"/>
		<reference ref_id="CVE-2025-38208" ref_url="https://www.suse.com/security/cve/CVE-2025-38208/" source="CVE"/>
		<reference ref_id="CVE-2025-38209" ref_url="https://www.suse.com/security/cve/CVE-2025-38209/" source="CVE"/>
		<reference ref_id="CVE-2025-38211" ref_url="https://www.suse.com/security/cve/CVE-2025-38211/" source="CVE"/>
		<reference ref_id="CVE-2025-38213" ref_url="https://www.suse.com/security/cve/CVE-2025-38213/" source="CVE"/>
		<reference ref_id="CVE-2025-38214" ref_url="https://www.suse.com/security/cve/CVE-2025-38214/" source="CVE"/>
		<reference ref_id="CVE-2025-38215" ref_url="https://www.suse.com/security/cve/CVE-2025-38215/" source="CVE"/>
		<reference ref_id="CVE-2025-38216" ref_url="https://www.suse.com/security/cve/CVE-2025-38216/" source="CVE"/>
		<reference ref_id="CVE-2025-38217" ref_url="https://www.suse.com/security/cve/CVE-2025-38217/" source="CVE"/>
		<reference ref_id="CVE-2025-38220" ref_url="https://www.suse.com/security/cve/CVE-2025-38220/" source="CVE"/>
		<reference ref_id="CVE-2025-38222" ref_url="https://www.suse.com/security/cve/CVE-2025-38222/" source="CVE"/>
		<reference ref_id="CVE-2025-38224" ref_url="https://www.suse.com/security/cve/CVE-2025-38224/" source="CVE"/>
		<reference ref_id="CVE-2025-38225" ref_url="https://www.suse.com/security/cve/CVE-2025-38225/" source="CVE"/>
		<reference ref_id="CVE-2025-38226" ref_url="https://www.suse.com/security/cve/CVE-2025-38226/" source="CVE"/>
		<reference ref_id="CVE-2025-38227" ref_url="https://www.suse.com/security/cve/CVE-2025-38227/" source="CVE"/>
		<reference ref_id="CVE-2025-38228" ref_url="https://www.suse.com/security/cve/CVE-2025-38228/" source="CVE"/>
		<reference ref_id="CVE-2025-38229" ref_url="https://www.suse.com/security/cve/CVE-2025-38229/" source="CVE"/>
		<reference ref_id="CVE-2025-38231" ref_url="https://www.suse.com/security/cve/CVE-2025-38231/" source="CVE"/>
		<reference ref_id="CVE-2025-38232" ref_url="https://www.suse.com/security/cve/CVE-2025-38232/" source="CVE"/>
		<reference ref_id="CVE-2025-38233" ref_url="https://www.suse.com/security/cve/CVE-2025-38233/" source="CVE"/>
		<reference ref_id="CVE-2025-38234" ref_url="https://www.suse.com/security/cve/CVE-2025-38234/" source="CVE"/>
		<reference ref_id="CVE-2025-38242" ref_url="https://www.suse.com/security/cve/CVE-2025-38242/" source="CVE"/>
		<reference ref_id="CVE-2025-38244" ref_url="https://www.suse.com/security/cve/CVE-2025-38244/" source="CVE"/>
		<reference ref_id="CVE-2025-38245" ref_url="https://www.suse.com/security/cve/CVE-2025-38245/" source="CVE"/>
		<reference ref_id="CVE-2025-38246" ref_url="https://www.suse.com/security/cve/CVE-2025-38246/" source="CVE"/>
		<reference ref_id="CVE-2025-38249" ref_url="https://www.suse.com/security/cve/CVE-2025-38249/" source="CVE"/>
		<reference ref_id="CVE-2025-38251" ref_url="https://www.suse.com/security/cve/CVE-2025-38251/" source="CVE"/>
		<reference ref_id="CVE-2025-38253" ref_url="https://www.suse.com/security/cve/CVE-2025-38253/" source="CVE"/>
		<reference ref_id="CVE-2025-38255" ref_url="https://www.suse.com/security/cve/CVE-2025-38255/" source="CVE"/>
		<reference ref_id="CVE-2025-38256" ref_url="https://www.suse.com/security/cve/CVE-2025-38256/" source="CVE"/>
		<reference ref_id="CVE-2025-38257" ref_url="https://www.suse.com/security/cve/CVE-2025-38257/" source="CVE"/>
		<reference ref_id="CVE-2025-38258" ref_url="https://www.suse.com/security/cve/CVE-2025-38258/" source="CVE"/>
		<reference ref_id="CVE-2025-38259" ref_url="https://www.suse.com/security/cve/CVE-2025-38259/" source="CVE"/>
		<reference ref_id="CVE-2025-38263" ref_url="https://www.suse.com/security/cve/CVE-2025-38263/" source="CVE"/>
		<reference ref_id="CVE-2025-38264" ref_url="https://www.suse.com/security/cve/CVE-2025-38264/" source="CVE"/>
		<reference ref_id="CVE-2025-38265" ref_url="https://www.suse.com/security/cve/CVE-2025-38265/" source="CVE"/>
		<reference ref_id="CVE-2025-38267" ref_url="https://www.suse.com/security/cve/CVE-2025-38267/" source="CVE"/>
		<reference ref_id="CVE-2025-38268" ref_url="https://www.suse.com/security/cve/CVE-2025-38268/" source="CVE"/>
		<reference ref_id="CVE-2025-38270" ref_url="https://www.suse.com/security/cve/CVE-2025-38270/" source="CVE"/>
		<reference ref_id="CVE-2025-38272" ref_url="https://www.suse.com/security/cve/CVE-2025-38272/" source="CVE"/>
		<reference ref_id="CVE-2025-38273" ref_url="https://www.suse.com/security/cve/CVE-2025-38273/" source="CVE"/>
		<reference ref_id="CVE-2025-38274" ref_url="https://www.suse.com/security/cve/CVE-2025-38274/" source="CVE"/>
		<reference ref_id="CVE-2025-38275" ref_url="https://www.suse.com/security/cve/CVE-2025-38275/" source="CVE"/>
		<reference ref_id="CVE-2025-38277" ref_url="https://www.suse.com/security/cve/CVE-2025-38277/" source="CVE"/>
		<reference ref_id="CVE-2025-38278" ref_url="https://www.suse.com/security/cve/CVE-2025-38278/" source="CVE"/>
		<reference ref_id="CVE-2025-38286" ref_url="https://www.suse.com/security/cve/CVE-2025-38286/" source="CVE"/>
		<reference ref_id="CVE-2025-38287" ref_url="https://www.suse.com/security/cve/CVE-2025-38287/" source="CVE"/>
		<reference ref_id="CVE-2025-38288" ref_url="https://www.suse.com/security/cve/CVE-2025-38288/" source="CVE"/>
		<reference ref_id="CVE-2025-38289" ref_url="https://www.suse.com/security/cve/CVE-2025-38289/" source="CVE"/>
		<reference ref_id="CVE-2025-38290" ref_url="https://www.suse.com/security/cve/CVE-2025-38290/" source="CVE"/>
		<reference ref_id="CVE-2025-38291" ref_url="https://www.suse.com/security/cve/CVE-2025-38291/" source="CVE"/>
		<reference ref_id="CVE-2025-38292" ref_url="https://www.suse.com/security/cve/CVE-2025-38292/" source="CVE"/>
		<reference ref_id="CVE-2025-38293" ref_url="https://www.suse.com/security/cve/CVE-2025-38293/" source="CVE"/>
		<reference ref_id="CVE-2025-38299" ref_url="https://www.suse.com/security/cve/CVE-2025-38299/" source="CVE"/>
		<reference ref_id="CVE-2025-38300" ref_url="https://www.suse.com/security/cve/CVE-2025-38300/" source="CVE"/>
		<reference ref_id="CVE-2025-38301" ref_url="https://www.suse.com/security/cve/CVE-2025-38301/" source="CVE"/>
		<reference ref_id="CVE-2025-38302" ref_url="https://www.suse.com/security/cve/CVE-2025-38302/" source="CVE"/>
		<reference ref_id="CVE-2025-38303" ref_url="https://www.suse.com/security/cve/CVE-2025-38303/" source="CVE"/>
		<reference ref_id="CVE-2025-38304" ref_url="https://www.suse.com/security/cve/CVE-2025-38304/" source="CVE"/>
		<reference ref_id="CVE-2025-38305" ref_url="https://www.suse.com/security/cve/CVE-2025-38305/" source="CVE"/>
		<reference ref_id="CVE-2025-38306" ref_url="https://www.suse.com/security/cve/CVE-2025-38306/" source="CVE"/>
		<reference ref_id="CVE-2025-38307" ref_url="https://www.suse.com/security/cve/CVE-2025-38307/" source="CVE"/>
		<reference ref_id="CVE-2025-38311" ref_url="https://www.suse.com/security/cve/CVE-2025-38311/" source="CVE"/>
		<reference ref_id="CVE-2025-38312" ref_url="https://www.suse.com/security/cve/CVE-2025-38312/" source="CVE"/>
		<reference ref_id="CVE-2025-38313" ref_url="https://www.suse.com/security/cve/CVE-2025-38313/" source="CVE"/>
		<reference ref_id="CVE-2025-38315" ref_url="https://www.suse.com/security/cve/CVE-2025-38315/" source="CVE"/>
		<reference ref_id="CVE-2025-38317" ref_url="https://www.suse.com/security/cve/CVE-2025-38317/" source="CVE"/>
		<reference ref_id="CVE-2025-38318" ref_url="https://www.suse.com/security/cve/CVE-2025-38318/" source="CVE"/>
		<reference ref_id="CVE-2025-38319" ref_url="https://www.suse.com/security/cve/CVE-2025-38319/" source="CVE"/>
		<reference ref_id="CVE-2025-38322" ref_url="https://www.suse.com/security/cve/CVE-2025-38322/" source="CVE"/>
		<reference ref_id="CVE-2025-38323" ref_url="https://www.suse.com/security/cve/CVE-2025-38323/" source="CVE"/>
		<reference ref_id="CVE-2025-38326" ref_url="https://www.suse.com/security/cve/CVE-2025-38326/" source="CVE"/>
		<reference ref_id="CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332/" source="CVE"/>
		<reference ref_id="CVE-2025-38335" ref_url="https://www.suse.com/security/cve/CVE-2025-38335/" source="CVE"/>
		<reference ref_id="CVE-2025-38336" ref_url="https://www.suse.com/security/cve/CVE-2025-38336/" source="CVE"/>
		<reference ref_id="CVE-2025-38337" ref_url="https://www.suse.com/security/cve/CVE-2025-38337/" source="CVE"/>
		<reference ref_id="CVE-2025-38338" ref_url="https://www.suse.com/security/cve/CVE-2025-38338/" source="CVE"/>
		<reference ref_id="CVE-2025-38339" ref_url="https://www.suse.com/security/cve/CVE-2025-38339/" source="CVE"/>
		<reference ref_id="CVE-2025-38341" ref_url="https://www.suse.com/security/cve/CVE-2025-38341/" source="CVE"/>
		<reference ref_id="CVE-2025-38342" ref_url="https://www.suse.com/security/cve/CVE-2025-38342/" source="CVE"/>
		<reference ref_id="CVE-2025-38343" ref_url="https://www.suse.com/security/cve/CVE-2025-38343/" source="CVE"/>
		<reference ref_id="CVE-2025-38344" ref_url="https://www.suse.com/security/cve/CVE-2025-38344/" source="CVE"/>
		<reference ref_id="CVE-2025-38345" ref_url="https://www.suse.com/security/cve/CVE-2025-38345/" source="CVE"/>
		<reference ref_id="CVE-2025-38348" ref_url="https://www.suse.com/security/cve/CVE-2025-38348/" source="CVE"/>
		<reference ref_id="CVE-2025-38349" ref_url="https://www.suse.com/security/cve/CVE-2025-38349/" source="CVE"/>
		<reference ref_id="CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350/" source="CVE"/>
		<reference ref_id="CVE-2025-38351" ref_url="https://www.suse.com/security/cve/CVE-2025-38351/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<reference ref_id="CVE-2025-38353" ref_url="https://www.suse.com/security/cve/CVE-2025-38353/" source="CVE"/>
		<reference ref_id="CVE-2025-38354" ref_url="https://www.suse.com/security/cve/CVE-2025-38354/" source="CVE"/>
		<reference ref_id="CVE-2025-38355" ref_url="https://www.suse.com/security/cve/CVE-2025-38355/" source="CVE"/>
		<reference ref_id="CVE-2025-38356" ref_url="https://www.suse.com/security/cve/CVE-2025-38356/" source="CVE"/>
		<reference ref_id="CVE-2025-38359" ref_url="https://www.suse.com/security/cve/CVE-2025-38359/" source="CVE"/>
		<reference ref_id="CVE-2025-38360" ref_url="https://www.suse.com/security/cve/CVE-2025-38360/" source="CVE"/>
		<reference ref_id="CVE-2025-38361" ref_url="https://www.suse.com/security/cve/CVE-2025-38361/" source="CVE"/>
		<reference ref_id="CVE-2025-38362" ref_url="https://www.suse.com/security/cve/CVE-2025-38362/" source="CVE"/>
		<reference ref_id="CVE-2025-38363" ref_url="https://www.suse.com/security/cve/CVE-2025-38363/" source="CVE"/>
		<reference ref_id="CVE-2025-38364" ref_url="https://www.suse.com/security/cve/CVE-2025-38364/" source="CVE"/>
		<reference ref_id="CVE-2025-38365" ref_url="https://www.suse.com/security/cve/CVE-2025-38365/" source="CVE"/>
		<reference ref_id="CVE-2025-38368" ref_url="https://www.suse.com/security/cve/CVE-2025-38368/" source="CVE"/>
		<reference ref_id="CVE-2025-38369" ref_url="https://www.suse.com/security/cve/CVE-2025-38369/" source="CVE"/>
		<reference ref_id="CVE-2025-38371" ref_url="https://www.suse.com/security/cve/CVE-2025-38371/" source="CVE"/>
		<reference ref_id="CVE-2025-38372" ref_url="https://www.suse.com/security/cve/CVE-2025-38372/" source="CVE"/>
		<reference ref_id="CVE-2025-38373" ref_url="https://www.suse.com/security/cve/CVE-2025-38373/" source="CVE"/>
		<reference ref_id="CVE-2025-38374" ref_url="https://www.suse.com/security/cve/CVE-2025-38374/" source="CVE"/>
		<reference ref_id="CVE-2025-38375" ref_url="https://www.suse.com/security/cve/CVE-2025-38375/" source="CVE"/>
		<reference ref_id="CVE-2025-38376" ref_url="https://www.suse.com/security/cve/CVE-2025-38376/" source="CVE"/>
		<reference ref_id="CVE-2025-38377" ref_url="https://www.suse.com/security/cve/CVE-2025-38377/" source="CVE"/>
		<reference ref_id="CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380/" source="CVE"/>
		<reference ref_id="CVE-2025-38381" ref_url="https://www.suse.com/security/cve/CVE-2025-38381/" source="CVE"/>
		<reference ref_id="CVE-2025-38382" ref_url="https://www.suse.com/security/cve/CVE-2025-38382/" source="CVE"/>
		<reference ref_id="CVE-2025-38383" ref_url="https://www.suse.com/security/cve/CVE-2025-38383/" source="CVE"/>
		<reference ref_id="CVE-2025-38384" ref_url="https://www.suse.com/security/cve/CVE-2025-38384/" source="CVE"/>
		<reference ref_id="CVE-2025-38385" ref_url="https://www.suse.com/security/cve/CVE-2025-38385/" source="CVE"/>
		<reference ref_id="CVE-2025-38386" ref_url="https://www.suse.com/security/cve/CVE-2025-38386/" source="CVE"/>
		<reference ref_id="CVE-2025-38387" ref_url="https://www.suse.com/security/cve/CVE-2025-38387/" source="CVE"/>
		<reference ref_id="CVE-2025-38389" ref_url="https://www.suse.com/security/cve/CVE-2025-38389/" source="CVE"/>
		<reference ref_id="CVE-2025-38390" ref_url="https://www.suse.com/security/cve/CVE-2025-38390/" source="CVE"/>
		<reference ref_id="CVE-2025-38391" ref_url="https://www.suse.com/security/cve/CVE-2025-38391/" source="CVE"/>
		<reference ref_id="CVE-2025-38392" ref_url="https://www.suse.com/security/cve/CVE-2025-38392/" source="CVE"/>
		<reference ref_id="CVE-2025-38393" ref_url="https://www.suse.com/security/cve/CVE-2025-38393/" source="CVE"/>
		<reference ref_id="CVE-2025-38395" ref_url="https://www.suse.com/security/cve/CVE-2025-38395/" source="CVE"/>
		<reference ref_id="CVE-2025-38396" ref_url="https://www.suse.com/security/cve/CVE-2025-38396/" source="CVE"/>
		<reference ref_id="CVE-2025-38397" ref_url="https://www.suse.com/security/cve/CVE-2025-38397/" source="CVE"/>
		<reference ref_id="CVE-2025-38399" ref_url="https://www.suse.com/security/cve/CVE-2025-38399/" source="CVE"/>
		<reference ref_id="CVE-2025-38400" ref_url="https://www.suse.com/security/cve/CVE-2025-38400/" source="CVE"/>
		<reference ref_id="CVE-2025-38401" ref_url="https://www.suse.com/security/cve/CVE-2025-38401/" source="CVE"/>
		<reference ref_id="CVE-2025-38402" ref_url="https://www.suse.com/security/cve/CVE-2025-38402/" source="CVE"/>
		<reference ref_id="CVE-2025-38403" ref_url="https://www.suse.com/security/cve/CVE-2025-38403/" source="CVE"/>
		<reference ref_id="CVE-2025-38404" ref_url="https://www.suse.com/security/cve/CVE-2025-38404/" source="CVE"/>
		<reference ref_id="CVE-2025-38405" ref_url="https://www.suse.com/security/cve/CVE-2025-38405/" source="CVE"/>
		<reference ref_id="CVE-2025-38406" ref_url="https://www.suse.com/security/cve/CVE-2025-38406/" source="CVE"/>
		<reference ref_id="CVE-2025-38408" ref_url="https://www.suse.com/security/cve/CVE-2025-38408/" source="CVE"/>
		<reference ref_id="CVE-2025-38409" ref_url="https://www.suse.com/security/cve/CVE-2025-38409/" source="CVE"/>
		<reference ref_id="CVE-2025-38410" ref_url="https://www.suse.com/security/cve/CVE-2025-38410/" source="CVE"/>
		<reference ref_id="CVE-2025-38412" ref_url="https://www.suse.com/security/cve/CVE-2025-38412/" source="CVE"/>
		<reference ref_id="CVE-2025-38413" ref_url="https://www.suse.com/security/cve/CVE-2025-38413/" source="CVE"/>
		<reference ref_id="CVE-2025-38414" ref_url="https://www.suse.com/security/cve/CVE-2025-38414/" source="CVE"/>
		<reference ref_id="CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415/" source="CVE"/>
		<reference ref_id="CVE-2025-38416" ref_url="https://www.suse.com/security/cve/CVE-2025-38416/" source="CVE"/>
		<reference ref_id="CVE-2025-38417" ref_url="https://www.suse.com/security/cve/CVE-2025-38417/" source="CVE"/>
		<reference ref_id="CVE-2025-38418" ref_url="https://www.suse.com/security/cve/CVE-2025-38418/" source="CVE"/>
		<reference ref_id="CVE-2025-38419" ref_url="https://www.suse.com/security/cve/CVE-2025-38419/" source="CVE"/>
		<reference ref_id="CVE-2025-38420" ref_url="https://www.suse.com/security/cve/CVE-2025-38420/" source="CVE"/>
		<reference ref_id="CVE-2025-38421" ref_url="https://www.suse.com/security/cve/CVE-2025-38421/" source="CVE"/>
		<reference ref_id="CVE-2025-38424" ref_url="https://www.suse.com/security/cve/CVE-2025-38424/" source="CVE"/>
		<reference ref_id="CVE-2025-38425" ref_url="https://www.suse.com/security/cve/CVE-2025-38425/" source="CVE"/>
		<reference ref_id="CVE-2025-38426" ref_url="https://www.suse.com/security/cve/CVE-2025-38426/" source="CVE"/>
		<reference ref_id="CVE-2025-38427" ref_url="https://www.suse.com/security/cve/CVE-2025-38427/" source="CVE"/>
		<reference ref_id="CVE-2025-38428" ref_url="https://www.suse.com/security/cve/CVE-2025-38428/" source="CVE"/>
		<reference ref_id="CVE-2025-38429" ref_url="https://www.suse.com/security/cve/CVE-2025-38429/" source="CVE"/>
		<reference ref_id="CVE-2025-38430" ref_url="https://www.suse.com/security/cve/CVE-2025-38430/" source="CVE"/>
		<reference ref_id="CVE-2025-38436" ref_url="https://www.suse.com/security/cve/CVE-2025-38436/" source="CVE"/>
		<reference ref_id="CVE-2025-38438" ref_url="https://www.suse.com/security/cve/CVE-2025-38438/" source="CVE"/>
		<reference ref_id="CVE-2025-38439" ref_url="https://www.suse.com/security/cve/CVE-2025-38439/" source="CVE"/>
		<reference ref_id="CVE-2025-38440" ref_url="https://www.suse.com/security/cve/CVE-2025-38440/" source="CVE"/>
		<reference ref_id="CVE-2025-38441" ref_url="https://www.suse.com/security/cve/CVE-2025-38441/" source="CVE"/>
		<reference ref_id="CVE-2025-38443" ref_url="https://www.suse.com/security/cve/CVE-2025-38443/" source="CVE"/>
		<reference ref_id="CVE-2025-38444" ref_url="https://www.suse.com/security/cve/CVE-2025-38444/" source="CVE"/>
		<reference ref_id="CVE-2025-38445" ref_url="https://www.suse.com/security/cve/CVE-2025-38445/" source="CVE"/>
		<reference ref_id="CVE-2025-38446" ref_url="https://www.suse.com/security/cve/CVE-2025-38446/" source="CVE"/>
		<reference ref_id="CVE-2025-38448" ref_url="https://www.suse.com/security/cve/CVE-2025-38448/" source="CVE"/>
		<reference ref_id="CVE-2025-38449" ref_url="https://www.suse.com/security/cve/CVE-2025-38449/" source="CVE"/>
		<reference ref_id="CVE-2025-38450" ref_url="https://www.suse.com/security/cve/CVE-2025-38450/" source="CVE"/>
		<reference ref_id="CVE-2025-38451" ref_url="https://www.suse.com/security/cve/CVE-2025-38451/" source="CVE"/>
		<reference ref_id="CVE-2025-38453" ref_url="https://www.suse.com/security/cve/CVE-2025-38453/" source="CVE"/>
		<reference ref_id="CVE-2025-38454" ref_url="https://www.suse.com/security/cve/CVE-2025-38454/" source="CVE"/>
		<reference ref_id="CVE-2025-38455" ref_url="https://www.suse.com/security/cve/CVE-2025-38455/" source="CVE"/>
		<reference ref_id="CVE-2025-38456" ref_url="https://www.suse.com/security/cve/CVE-2025-38456/" source="CVE"/>
		<reference ref_id="CVE-2025-38457" ref_url="https://www.suse.com/security/cve/CVE-2025-38457/" source="CVE"/>
		<reference ref_id="CVE-2025-38458" ref_url="https://www.suse.com/security/cve/CVE-2025-38458/" source="CVE"/>
		<reference ref_id="CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459/" source="CVE"/>
		<reference ref_id="CVE-2025-38460" ref_url="https://www.suse.com/security/cve/CVE-2025-38460/" source="CVE"/>
		<reference ref_id="CVE-2025-38461" ref_url="https://www.suse.com/security/cve/CVE-2025-38461/" source="CVE"/>
		<reference ref_id="CVE-2025-38462" ref_url="https://www.suse.com/security/cve/CVE-2025-38462/" source="CVE"/>
		<reference ref_id="CVE-2025-38463" ref_url="https://www.suse.com/security/cve/CVE-2025-38463/" source="CVE"/>
		<reference ref_id="CVE-2025-38464" ref_url="https://www.suse.com/security/cve/CVE-2025-38464/" source="CVE"/>
		<reference ref_id="CVE-2025-38465" ref_url="https://www.suse.com/security/cve/CVE-2025-38465/" source="CVE"/>
		<reference ref_id="CVE-2025-38466" ref_url="https://www.suse.com/security/cve/CVE-2025-38466/" source="CVE"/>
		<reference ref_id="CVE-2025-38467" ref_url="https://www.suse.com/security/cve/CVE-2025-38467/" source="CVE"/>
		<reference ref_id="CVE-2025-38468" ref_url="https://www.suse.com/security/cve/CVE-2025-38468/" source="CVE"/>
		<reference ref_id="CVE-2025-38470" ref_url="https://www.suse.com/security/cve/CVE-2025-38470/" source="CVE"/>
		<reference ref_id="CVE-2025-38472" ref_url="https://www.suse.com/security/cve/CVE-2025-38472/" source="CVE"/>
		<reference ref_id="CVE-2025-38473" ref_url="https://www.suse.com/security/cve/CVE-2025-38473/" source="CVE"/>
		<reference ref_id="CVE-2025-38474" ref_url="https://www.suse.com/security/cve/CVE-2025-38474/" source="CVE"/>
		<reference ref_id="CVE-2025-38475" ref_url="https://www.suse.com/security/cve/CVE-2025-38475/" source="CVE"/>
		<reference ref_id="CVE-2025-38476" ref_url="https://www.suse.com/security/cve/CVE-2025-38476/" source="CVE"/>
		<reference ref_id="CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477/" source="CVE"/>
		<reference ref_id="CVE-2025-38478" ref_url="https://www.suse.com/security/cve/CVE-2025-38478/" source="CVE"/>
		<reference ref_id="CVE-2025-38480" ref_url="https://www.suse.com/security/cve/CVE-2025-38480/" source="CVE"/>
		<reference ref_id="CVE-2025-38481" ref_url="https://www.suse.com/security/cve/CVE-2025-38481/" source="CVE"/>
		<reference ref_id="CVE-2025-38482" ref_url="https://www.suse.com/security/cve/CVE-2025-38482/" source="CVE"/>
		<reference ref_id="CVE-2025-38483" ref_url="https://www.suse.com/security/cve/CVE-2025-38483/" source="CVE"/>
		<reference ref_id="CVE-2025-38484" ref_url="https://www.suse.com/security/cve/CVE-2025-38484/" source="CVE"/>
		<reference ref_id="CVE-2025-38485" ref_url="https://www.suse.com/security/cve/CVE-2025-38485/" source="CVE"/>
		<reference ref_id="CVE-2025-38487" ref_url="https://www.suse.com/security/cve/CVE-2025-38487/" source="CVE"/>
		<reference ref_id="CVE-2025-38488" ref_url="https://www.suse.com/security/cve/CVE-2025-38488/" source="CVE"/>
		<reference ref_id="CVE-2025-38489" ref_url="https://www.suse.com/security/cve/CVE-2025-38489/" source="CVE"/>
		<reference ref_id="CVE-2025-38490" ref_url="https://www.suse.com/security/cve/CVE-2025-38490/" source="CVE"/>
		<reference ref_id="CVE-2025-38491" ref_url="https://www.suse.com/security/cve/CVE-2025-38491/" source="CVE"/>
		<reference ref_id="CVE-2025-38493" ref_url="https://www.suse.com/security/cve/CVE-2025-38493/" source="CVE"/>
		<reference ref_id="CVE-2025-38494" ref_url="https://www.suse.com/security/cve/CVE-2025-38494/" source="CVE"/>
		<reference ref_id="CVE-2025-38495" ref_url="https://www.suse.com/security/cve/CVE-2025-38495/" source="CVE"/>
		<reference ref_id="CVE-2025-38496" ref_url="https://www.suse.com/security/cve/CVE-2025-38496/" source="CVE"/>
		<reference ref_id="CVE-2025-38497" ref_url="https://www.suse.com/security/cve/CVE-2025-38497/" source="CVE"/>
		<reference ref_id="CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499/" source="CVE"/>
		<reference ref_id="CVE-2025-38500" ref_url="https://www.suse.com/security/cve/CVE-2025-38500/" source="CVE"/>
		<reference ref_id="CVE-2025-38503" ref_url="https://www.suse.com/security/cve/CVE-2025-38503/" source="CVE"/>
		<reference ref_id="CVE-2025-38506" ref_url="https://www.suse.com/security/cve/CVE-2025-38506/" source="CVE"/>
		<reference ref_id="CVE-2025-38508" ref_url="https://www.suse.com/security/cve/CVE-2025-38508/" source="CVE"/>
		<reference ref_id="CVE-2025-38514" ref_url="https://www.suse.com/security/cve/CVE-2025-38514/" source="CVE"/>
		<reference ref_id="CVE-2025-38524" ref_url="https://www.suse.com/security/cve/CVE-2025-38524/" source="CVE"/>
		<reference ref_id="CVE-2025-38526" ref_url="https://www.suse.com/security/cve/CVE-2025-38526/" source="CVE"/>
		<reference ref_id="CVE-2025-38527" ref_url="https://www.suse.com/security/cve/CVE-2025-38527/" source="CVE"/>
		<reference ref_id="CVE-2025-38528" ref_url="https://www.suse.com/security/cve/CVE-2025-38528/" source="CVE"/>
		<reference ref_id="CVE-2025-38531" ref_url="https://www.suse.com/security/cve/CVE-2025-38531/" source="CVE"/>
		<reference ref_id="CVE-2025-38533" ref_url="https://www.suse.com/security/cve/CVE-2025-38533/" source="CVE"/>
		<reference ref_id="CVE-2025-38539" ref_url="https://www.suse.com/security/cve/CVE-2025-38539/" source="CVE"/>
		<reference ref_id="CVE-2025-38544" ref_url="https://www.suse.com/security/cve/CVE-2025-38544/" source="CVE"/>
		<reference ref_id="CVE-2025-38545" ref_url="https://www.suse.com/security/cve/CVE-2025-38545/" source="CVE"/>
		<reference ref_id="CVE-2025-38546" ref_url="https://www.suse.com/security/cve/CVE-2025-38546/" source="CVE"/>
		<reference ref_id="CVE-2025-38549" ref_url="https://www.suse.com/security/cve/CVE-2025-38549/" source="CVE"/>
		<reference ref_id="CVE-2025-38552" ref_url="https://www.suse.com/security/cve/CVE-2025-38552/" source="CVE"/>
		<reference ref_id="CVE-2025-38553" ref_url="https://www.suse.com/security/cve/CVE-2025-38553/" source="CVE"/>
		<reference ref_id="CVE-2025-38554" ref_url="https://www.suse.com/security/cve/CVE-2025-38554/" source="CVE"/>
		<reference ref_id="CVE-2025-38555" ref_url="https://www.suse.com/security/cve/CVE-2025-38555/" source="CVE"/>
		<reference ref_id="CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556/" source="CVE"/>
		<reference ref_id="CVE-2025-38557" ref_url="https://www.suse.com/security/cve/CVE-2025-38557/" source="CVE"/>
		<reference ref_id="CVE-2025-38559" ref_url="https://www.suse.com/security/cve/CVE-2025-38559/" source="CVE"/>
		<reference ref_id="CVE-2025-38560" ref_url="https://www.suse.com/security/cve/CVE-2025-38560/" source="CVE"/>
		<reference ref_id="CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563/" source="CVE"/>
		<reference ref_id="CVE-2025-38564" ref_url="https://www.suse.com/security/cve/CVE-2025-38564/" source="CVE"/>
		<reference ref_id="CVE-2025-38565" ref_url="https://www.suse.com/security/cve/CVE-2025-38565/" source="CVE"/>
		<reference ref_id="CVE-2025-38566" ref_url="https://www.suse.com/security/cve/CVE-2025-38566/" source="CVE"/>
		<reference ref_id="CVE-2025-38568" ref_url="https://www.suse.com/security/cve/CVE-2025-38568/" source="CVE"/>
		<reference ref_id="CVE-2025-38571" ref_url="https://www.suse.com/security/cve/CVE-2025-38571/" source="CVE"/>
		<reference ref_id="CVE-2025-38572" ref_url="https://www.suse.com/security/cve/CVE-2025-38572/" source="CVE"/>
		<reference ref_id="CVE-2025-38573" ref_url="https://www.suse.com/security/cve/CVE-2025-38573/" source="CVE"/>
		<reference ref_id="CVE-2025-38574" ref_url="https://www.suse.com/security/cve/CVE-2025-38574/" source="CVE"/>
		<reference ref_id="CVE-2025-38576" ref_url="https://www.suse.com/security/cve/CVE-2025-38576/" source="CVE"/>
		<reference ref_id="CVE-2025-38581" ref_url="https://www.suse.com/security/cve/CVE-2025-38581/" source="CVE"/>
		<reference ref_id="CVE-2025-38582" ref_url="https://www.suse.com/security/cve/CVE-2025-38582/" source="CVE"/>
		<reference ref_id="CVE-2025-38583" ref_url="https://www.suse.com/security/cve/CVE-2025-38583/" source="CVE"/>
		<reference ref_id="CVE-2025-38584" ref_url="https://www.suse.com/security/cve/CVE-2025-38584/" source="CVE"/>
		<reference ref_id="CVE-2025-38585" ref_url="https://www.suse.com/security/cve/CVE-2025-38585/" source="CVE"/>
		<reference ref_id="CVE-2025-38586" ref_url="https://www.suse.com/security/cve/CVE-2025-38586/" source="CVE"/>
		<reference ref_id="CVE-2025-38587" ref_url="https://www.suse.com/security/cve/CVE-2025-38587/" source="CVE"/>
		<reference ref_id="CVE-2025-38588" ref_url="https://www.suse.com/security/cve/CVE-2025-38588/" source="CVE"/>
		<reference ref_id="CVE-2025-38591" ref_url="https://www.suse.com/security/cve/CVE-2025-38591/" source="CVE"/>
		<reference ref_id="CVE-2025-38593" ref_url="https://www.suse.com/security/cve/CVE-2025-38593/" source="CVE"/>
		<reference ref_id="CVE-2025-38595" ref_url="https://www.suse.com/security/cve/CVE-2025-38595/" source="CVE"/>
		<reference ref_id="CVE-2025-38597" ref_url="https://www.suse.com/security/cve/CVE-2025-38597/" source="CVE"/>
		<reference ref_id="CVE-2025-38601" ref_url="https://www.suse.com/security/cve/CVE-2025-38601/" source="CVE"/>
		<reference ref_id="CVE-2025-38602" ref_url="https://www.suse.com/security/cve/CVE-2025-38602/" source="CVE"/>
		<reference ref_id="CVE-2025-38604" ref_url="https://www.suse.com/security/cve/CVE-2025-38604/" source="CVE"/>
		<reference ref_id="CVE-2025-38605" ref_url="https://www.suse.com/security/cve/CVE-2025-38605/" source="CVE"/>
		<reference ref_id="CVE-2025-38608" ref_url="https://www.suse.com/security/cve/CVE-2025-38608/" source="CVE"/>
		<reference ref_id="CVE-2025-38609" ref_url="https://www.suse.com/security/cve/CVE-2025-38609/" source="CVE"/>
		<reference ref_id="CVE-2025-38610" ref_url="https://www.suse.com/security/cve/CVE-2025-38610/" source="CVE"/>
		<reference ref_id="CVE-2025-38612" ref_url="https://www.suse.com/security/cve/CVE-2025-38612/" source="CVE"/>
		<reference ref_id="CVE-2025-38614" ref_url="https://www.suse.com/security/cve/CVE-2025-38614/" source="CVE"/>
		<reference ref_id="CVE-2025-38616" ref_url="https://www.suse.com/security/cve/CVE-2025-38616/" source="CVE"/>
		<reference ref_id="CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617/" source="CVE"/>
		<reference ref_id="CVE-2025-38618" ref_url="https://www.suse.com/security/cve/CVE-2025-38618/" source="CVE"/>
		<reference ref_id="CVE-2025-38619" ref_url="https://www.suse.com/security/cve/CVE-2025-38619/" source="CVE"/>
		<reference ref_id="CVE-2025-38621" ref_url="https://www.suse.com/security/cve/CVE-2025-38621/" source="CVE"/>
		<reference ref_id="CVE-2025-38622" ref_url="https://www.suse.com/security/cve/CVE-2025-38622/" source="CVE"/>
		<reference ref_id="CVE-2025-38623" ref_url="https://www.suse.com/security/cve/CVE-2025-38623/" source="CVE"/>
		<reference ref_id="CVE-2025-38624" ref_url="https://www.suse.com/security/cve/CVE-2025-38624/" source="CVE"/>
		<reference ref_id="CVE-2025-38628" ref_url="https://www.suse.com/security/cve/CVE-2025-38628/" source="CVE"/>
		<reference ref_id="CVE-2025-38630" ref_url="https://www.suse.com/security/cve/CVE-2025-38630/" source="CVE"/>
		<reference ref_id="CVE-2025-38631" ref_url="https://www.suse.com/security/cve/CVE-2025-38631/" source="CVE"/>
		<reference ref_id="CVE-2025-38632" ref_url="https://www.suse.com/security/cve/CVE-2025-38632/" source="CVE"/>
		<reference ref_id="CVE-2025-38634" ref_url="https://www.suse.com/security/cve/CVE-2025-38634/" source="CVE"/>
		<reference ref_id="CVE-2025-38635" ref_url="https://www.suse.com/security/cve/CVE-2025-38635/" source="CVE"/>
		<reference ref_id="CVE-2025-38639" ref_url="https://www.suse.com/security/cve/CVE-2025-38639/" source="CVE"/>
		<reference ref_id="CVE-2025-38640" ref_url="https://www.suse.com/security/cve/CVE-2025-38640/" source="CVE"/>
		<reference ref_id="CVE-2025-38643" ref_url="https://www.suse.com/security/cve/CVE-2025-38643/" source="CVE"/>
		<reference ref_id="CVE-2025-38644" ref_url="https://www.suse.com/security/cve/CVE-2025-38644/" source="CVE"/>
		<reference ref_id="CVE-2025-38646" ref_url="https://www.suse.com/security/cve/CVE-2025-38646/" source="CVE"/>
		<reference ref_id="CVE-2025-38648" ref_url="https://www.suse.com/security/cve/CVE-2025-38648/" source="CVE"/>
		<reference ref_id="CVE-2025-38656" ref_url="https://www.suse.com/security/cve/CVE-2025-38656/" source="CVE"/>
		<reference ref_id="CVE-2025-38658" ref_url="https://www.suse.com/security/cve/CVE-2025-38658/" source="CVE"/>
		<reference ref_id="CVE-2025-38659" ref_url="https://www.suse.com/security/cve/CVE-2025-38659/" source="CVE"/>
		<reference ref_id="CVE-2025-38660" ref_url="https://www.suse.com/security/cve/CVE-2025-38660/" source="CVE"/>
		<reference ref_id="CVE-2025-38662" ref_url="https://www.suse.com/security/cve/CVE-2025-38662/" source="CVE"/>
		<reference ref_id="CVE-2025-38664" ref_url="https://www.suse.com/security/cve/CVE-2025-38664/" source="CVE"/>
		<reference ref_id="CVE-2025-38665" ref_url="https://www.suse.com/security/cve/CVE-2025-38665/" source="CVE"/>
		<reference ref_id="CVE-2025-38668" ref_url="https://www.suse.com/security/cve/CVE-2025-38668/" source="CVE"/>
		<reference ref_id="CVE-2025-38670" ref_url="https://www.suse.com/security/cve/CVE-2025-38670/" source="CVE"/>
		<reference ref_id="CVE-2025-38671" ref_url="https://www.suse.com/security/cve/CVE-2025-38671/" source="CVE"/>
		<reference ref_id="CVE-2025-38676" ref_url="https://www.suse.com/security/cve/CVE-2025-38676/" source="CVE"/>
		<reference ref_id="CVE-2025-38678" ref_url="https://www.suse.com/security/cve/CVE-2025-38678/" source="CVE"/>
		<reference ref_id="CVE-2025-38679" ref_url="https://www.suse.com/security/cve/CVE-2025-38679/" source="CVE"/>
		<reference ref_id="CVE-2025-38680" ref_url="https://www.suse.com/security/cve/CVE-2025-38680/" source="CVE"/>
		<reference ref_id="CVE-2025-38681" ref_url="https://www.suse.com/security/cve/CVE-2025-38681/" source="CVE"/>
		<reference ref_id="CVE-2025-38683" ref_url="https://www.suse.com/security/cve/CVE-2025-38683/" source="CVE"/>
		<reference ref_id="CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684/" source="CVE"/>
		<reference ref_id="CVE-2025-38685" ref_url="https://www.suse.com/security/cve/CVE-2025-38685/" source="CVE"/>
		<reference ref_id="CVE-2025-38686" ref_url="https://www.suse.com/security/cve/CVE-2025-38686/" source="CVE"/>
		<reference ref_id="CVE-2025-38687" ref_url="https://www.suse.com/security/cve/CVE-2025-38687/" source="CVE"/>
		<reference ref_id="CVE-2025-38691" ref_url="https://www.suse.com/security/cve/CVE-2025-38691/" source="CVE"/>
		<reference ref_id="CVE-2025-38692" ref_url="https://www.suse.com/security/cve/CVE-2025-38692/" source="CVE"/>
		<reference ref_id="CVE-2025-38693" ref_url="https://www.suse.com/security/cve/CVE-2025-38693/" source="CVE"/>
		<reference ref_id="CVE-2025-38694" ref_url="https://www.suse.com/security/cve/CVE-2025-38694/" source="CVE"/>
		<reference ref_id="CVE-2025-38695" ref_url="https://www.suse.com/security/cve/CVE-2025-38695/" source="CVE"/>
		<reference ref_id="CVE-2025-38700" ref_url="https://www.suse.com/security/cve/CVE-2025-38700/" source="CVE"/>
		<reference ref_id="CVE-2025-38701" ref_url="https://www.suse.com/security/cve/CVE-2025-38701/" source="CVE"/>
		<reference ref_id="CVE-2025-38702" ref_url="https://www.suse.com/security/cve/CVE-2025-38702/" source="CVE"/>
		<reference ref_id="CVE-2025-38703" ref_url="https://www.suse.com/security/cve/CVE-2025-38703/" source="CVE"/>
		<reference ref_id="CVE-2025-38705" ref_url="https://www.suse.com/security/cve/CVE-2025-38705/" source="CVE"/>
		<reference ref_id="CVE-2025-38706" ref_url="https://www.suse.com/security/cve/CVE-2025-38706/" source="CVE"/>
		<reference ref_id="CVE-2025-38709" ref_url="https://www.suse.com/security/cve/CVE-2025-38709/" source="CVE"/>
		<reference ref_id="CVE-2025-38710" ref_url="https://www.suse.com/security/cve/CVE-2025-38710/" source="CVE"/>
		<reference ref_id="CVE-2025-38717" ref_url="https://www.suse.com/security/cve/CVE-2025-38717/" source="CVE"/>
		<reference ref_id="CVE-2025-38721" ref_url="https://www.suse.com/security/cve/CVE-2025-38721/" source="CVE"/>
		<reference ref_id="CVE-2025-38722" ref_url="https://www.suse.com/security/cve/CVE-2025-38722/" source="CVE"/>
		<reference ref_id="CVE-2025-38724" ref_url="https://www.suse.com/security/cve/CVE-2025-38724/" source="CVE"/>
		<reference ref_id="CVE-2025-38725" ref_url="https://www.suse.com/security/cve/CVE-2025-38725/" source="CVE"/>
		<reference ref_id="CVE-2025-38727" ref_url="https://www.suse.com/security/cve/CVE-2025-38727/" source="CVE"/>
		<reference ref_id="CVE-2025-38729" ref_url="https://www.suse.com/security/cve/CVE-2025-38729/" source="CVE"/>
		<reference ref_id="CVE-2025-38730" ref_url="https://www.suse.com/security/cve/CVE-2025-38730/" source="CVE"/>
		<reference ref_id="CVE-2025-38732" ref_url="https://www.suse.com/security/cve/CVE-2025-38732/" source="CVE"/>
		<reference ref_id="CVE-2025-38733" ref_url="https://www.suse.com/security/cve/CVE-2025-38733/" source="CVE"/>
		<reference ref_id="CVE-2025-38734" ref_url="https://www.suse.com/security/cve/CVE-2025-38734/" source="CVE"/>
		<reference ref_id="CVE-2025-38735" ref_url="https://www.suse.com/security/cve/CVE-2025-38735/" source="CVE"/>
		<reference ref_id="CVE-2025-38736" ref_url="https://www.suse.com/security/cve/CVE-2025-38736/" source="CVE"/>
		<reference ref_id="CVE-2025-39673" ref_url="https://www.suse.com/security/cve/CVE-2025-39673/" source="CVE"/>
		<reference ref_id="CVE-2025-39675" ref_url="https://www.suse.com/security/cve/CVE-2025-39675/" source="CVE"/>
		<reference ref_id="CVE-2025-39677" ref_url="https://www.suse.com/security/cve/CVE-2025-39677/" source="CVE"/>
		<reference ref_id="CVE-2025-39678" ref_url="https://www.suse.com/security/cve/CVE-2025-39678/" source="CVE"/>
		<reference ref_id="CVE-2025-39679" ref_url="https://www.suse.com/security/cve/CVE-2025-39679/" source="CVE"/>
		<reference ref_id="CVE-2025-39681" ref_url="https://www.suse.com/security/cve/CVE-2025-39681/" source="CVE"/>
		<reference ref_id="CVE-2025-39682" ref_url="https://www.suse.com/security/cve/CVE-2025-39682/" source="CVE"/>
		<reference ref_id="CVE-2025-39683" ref_url="https://www.suse.com/security/cve/CVE-2025-39683/" source="CVE"/>
		<reference ref_id="CVE-2025-39684" ref_url="https://www.suse.com/security/cve/CVE-2025-39684/" source="CVE"/>
		<reference ref_id="CVE-2025-39685" ref_url="https://www.suse.com/security/cve/CVE-2025-39685/" source="CVE"/>
		<reference ref_id="CVE-2025-39686" ref_url="https://www.suse.com/security/cve/CVE-2025-39686/" source="CVE"/>
		<reference ref_id="CVE-2025-39687" ref_url="https://www.suse.com/security/cve/CVE-2025-39687/" source="CVE"/>
		<reference ref_id="CVE-2025-39691" ref_url="https://www.suse.com/security/cve/CVE-2025-39691/" source="CVE"/>
		<reference ref_id="CVE-2025-39693" ref_url="https://www.suse.com/security/cve/CVE-2025-39693/" source="CVE"/>
		<reference ref_id="CVE-2025-39694" ref_url="https://www.suse.com/security/cve/CVE-2025-39694/" source="CVE"/>
		<reference ref_id="CVE-2025-39695" ref_url="https://www.suse.com/security/cve/CVE-2025-39695/" source="CVE"/>
		<reference ref_id="CVE-2025-39697" ref_url="https://www.suse.com/security/cve/CVE-2025-39697/" source="CVE"/>
		<reference ref_id="CVE-2025-39698" ref_url="https://www.suse.com/security/cve/CVE-2025-39698/" source="CVE"/>
		<reference ref_id="CVE-2025-39700" ref_url="https://www.suse.com/security/cve/CVE-2025-39700/" source="CVE"/>
		<reference ref_id="CVE-2025-39701" ref_url="https://www.suse.com/security/cve/CVE-2025-39701/" source="CVE"/>
		<reference ref_id="CVE-2025-39703" ref_url="https://www.suse.com/security/cve/CVE-2025-39703/" source="CVE"/>
		<reference ref_id="CVE-2025-39705" ref_url="https://www.suse.com/security/cve/CVE-2025-39705/" source="CVE"/>
		<reference ref_id="CVE-2025-39706" ref_url="https://www.suse.com/security/cve/CVE-2025-39706/" source="CVE"/>
		<reference ref_id="CVE-2025-39707" ref_url="https://www.suse.com/security/cve/CVE-2025-39707/" source="CVE"/>
		<reference ref_id="CVE-2025-39709" ref_url="https://www.suse.com/security/cve/CVE-2025-39709/" source="CVE"/>
		<reference ref_id="CVE-2025-39710" ref_url="https://www.suse.com/security/cve/CVE-2025-39710/" source="CVE"/>
		<reference ref_id="CVE-2025-39711" ref_url="https://www.suse.com/security/cve/CVE-2025-39711/" source="CVE"/>
		<reference ref_id="CVE-2025-39712" ref_url="https://www.suse.com/security/cve/CVE-2025-39712/" source="CVE"/>
		<reference ref_id="CVE-2025-39713" ref_url="https://www.suse.com/security/cve/CVE-2025-39713/" source="CVE"/>
		<reference ref_id="CVE-2025-39714" ref_url="https://www.suse.com/security/cve/CVE-2025-39714/" source="CVE"/>
		<reference ref_id="CVE-2025-39718" ref_url="https://www.suse.com/security/cve/CVE-2025-39718/" source="CVE"/>
		<reference ref_id="CVE-2025-39719" ref_url="https://www.suse.com/security/cve/CVE-2025-39719/" source="CVE"/>
		<reference ref_id="CVE-2025-39721" ref_url="https://www.suse.com/security/cve/CVE-2025-39721/" source="CVE"/>
		<reference ref_id="CVE-2025-39722" ref_url="https://www.suse.com/security/cve/CVE-2025-39722/" source="CVE"/>
		<reference ref_id="CVE-2025-39723" ref_url="https://www.suse.com/security/cve/CVE-2025-39723/" source="CVE"/>
		<reference ref_id="CVE-2025-39724" ref_url="https://www.suse.com/security/cve/CVE-2025-39724/" source="CVE"/>
		<reference ref_id="CVE-2025-39726" ref_url="https://www.suse.com/security/cve/CVE-2025-39726/" source="CVE"/>
		<reference ref_id="CVE-2025-39727" ref_url="https://www.suse.com/security/cve/CVE-2025-39727/" source="CVE"/>
		<reference ref_id="CVE-2025-39730" ref_url="https://www.suse.com/security/cve/CVE-2025-39730/" source="CVE"/>
		<reference ref_id="CVE-2025-39732" ref_url="https://www.suse.com/security/cve/CVE-2025-39732/" source="CVE"/>
		<reference ref_id="CVE-2025-39738" ref_url="https://www.suse.com/security/cve/CVE-2025-39738/" source="CVE"/>
		<reference ref_id="CVE-2025-39739" ref_url="https://www.suse.com/security/cve/CVE-2025-39739/" source="CVE"/>
		<reference ref_id="CVE-2025-39742" ref_url="https://www.suse.com/security/cve/CVE-2025-39742/" source="CVE"/>
		<reference ref_id="CVE-2025-39744" ref_url="https://www.suse.com/security/cve/CVE-2025-39744/" source="CVE"/>
		<reference ref_id="CVE-2025-39746" ref_url="https://www.suse.com/security/cve/CVE-2025-39746/" source="CVE"/>
		<reference ref_id="CVE-2025-39747" ref_url="https://www.suse.com/security/cve/CVE-2025-39747/" source="CVE"/>
		<reference ref_id="CVE-2025-39748" ref_url="https://www.suse.com/security/cve/CVE-2025-39748/" source="CVE"/>
		<reference ref_id="CVE-2025-39749" ref_url="https://www.suse.com/security/cve/CVE-2025-39749/" source="CVE"/>
		<reference ref_id="CVE-2025-39750" ref_url="https://www.suse.com/security/cve/CVE-2025-39750/" source="CVE"/>
		<reference ref_id="CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751/" source="CVE"/>
		<reference ref_id="CVE-2025-39754" ref_url="https://www.suse.com/security/cve/CVE-2025-39754/" source="CVE"/>
		<reference ref_id="CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757/" source="CVE"/>
		<reference ref_id="CVE-2025-39758" ref_url="https://www.suse.com/security/cve/CVE-2025-39758/" source="CVE"/>
		<reference ref_id="CVE-2025-39759" ref_url="https://www.suse.com/security/cve/CVE-2025-39759/" source="CVE"/>
		<reference ref_id="CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760/" source="CVE"/>
		<reference ref_id="CVE-2025-39761" ref_url="https://www.suse.com/security/cve/CVE-2025-39761/" source="CVE"/>
		<reference ref_id="CVE-2025-39763" ref_url="https://www.suse.com/security/cve/CVE-2025-39763/" source="CVE"/>
		<reference ref_id="CVE-2025-39764" ref_url="https://www.suse.com/security/cve/CVE-2025-39764/" source="CVE"/>
		<reference ref_id="CVE-2025-39765" ref_url="https://www.suse.com/security/cve/CVE-2025-39765/" source="CVE"/>
		<reference ref_id="CVE-2025-39766" ref_url="https://www.suse.com/security/cve/CVE-2025-39766/" source="CVE"/>
		<reference ref_id="CVE-2025-39770" ref_url="https://www.suse.com/security/cve/CVE-2025-39770/" source="CVE"/>
		<reference ref_id="CVE-2025-39772" ref_url="https://www.suse.com/security/cve/CVE-2025-39772/" source="CVE"/>
		<reference ref_id="CVE-2025-39773" ref_url="https://www.suse.com/security/cve/CVE-2025-39773/" source="CVE"/>
		<reference ref_id="CVE-2025-39775" ref_url="https://www.suse.com/security/cve/CVE-2025-39775/" source="CVE"/>
		<reference ref_id="CVE-2025-39782" ref_url="https://www.suse.com/security/cve/CVE-2025-39782/" source="CVE"/>
		<reference ref_id="CVE-2025-39783" ref_url="https://www.suse.com/security/cve/CVE-2025-39783/" source="CVE"/>
		<reference ref_id="CVE-2025-39787" ref_url="https://www.suse.com/security/cve/CVE-2025-39787/" source="CVE"/>
		<reference ref_id="CVE-2025-39788" ref_url="https://www.suse.com/security/cve/CVE-2025-39788/" source="CVE"/>
		<reference ref_id="CVE-2025-39790" ref_url="https://www.suse.com/security/cve/CVE-2025-39790/" source="CVE"/>
		<reference ref_id="CVE-2025-39791" ref_url="https://www.suse.com/security/cve/CVE-2025-39791/" source="CVE"/>
		<reference ref_id="CVE-2025-39792" ref_url="https://www.suse.com/security/cve/CVE-2025-39792/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39798" ref_url="https://www.suse.com/security/cve/CVE-2025-39798/" source="CVE"/>
		<reference ref_id="CVE-2025-39800" ref_url="https://www.suse.com/security/cve/CVE-2025-39800/" source="CVE"/>
		<reference ref_id="CVE-2025-39801" ref_url="https://www.suse.com/security/cve/CVE-2025-39801/" source="CVE"/>
		<reference ref_id="CVE-2025-39806" ref_url="https://www.suse.com/security/cve/CVE-2025-39806/" source="CVE"/>
		<reference ref_id="CVE-2025-39807" ref_url="https://www.suse.com/security/cve/CVE-2025-39807/" source="CVE"/>
		<reference ref_id="CVE-2025-39808" ref_url="https://www.suse.com/security/cve/CVE-2025-39808/" source="CVE"/>
		<reference ref_id="CVE-2025-39810" ref_url="https://www.suse.com/security/cve/CVE-2025-39810/" source="CVE"/>
		<reference ref_id="CVE-2025-39811" ref_url="https://www.suse.com/security/cve/CVE-2025-39811/" source="CVE"/>
		<reference ref_id="CVE-2025-39813" ref_url="https://www.suse.com/security/cve/CVE-2025-39813/" source="CVE"/>
		<reference ref_id="CVE-2025-39816" ref_url="https://www.suse.com/security/cve/CVE-2025-39816/" source="CVE"/>
		<reference ref_id="CVE-2025-39823" ref_url="https://www.suse.com/security/cve/CVE-2025-39823/" source="CVE"/>
		<reference ref_id="CVE-2025-39824" ref_url="https://www.suse.com/security/cve/CVE-2025-39824/" source="CVE"/>
		<reference ref_id="CVE-2025-39825" ref_url="https://www.suse.com/security/cve/CVE-2025-39825/" source="CVE"/>
		<reference ref_id="CVE-2025-39826" ref_url="https://www.suse.com/security/cve/CVE-2025-39826/" source="CVE"/>
		<reference ref_id="CVE-2025-39827" ref_url="https://www.suse.com/security/cve/CVE-2025-39827/" source="CVE"/>
		<reference ref_id="CVE-2025-39828" ref_url="https://www.suse.com/security/cve/CVE-2025-39828/" source="CVE"/>
		<reference ref_id="CVE-2025-39830" ref_url="https://www.suse.com/security/cve/CVE-2025-39830/" source="CVE"/>
		<reference ref_id="CVE-2025-39832" ref_url="https://www.suse.com/security/cve/CVE-2025-39832/" source="CVE"/>
		<reference ref_id="CVE-2025-39833" ref_url="https://www.suse.com/security/cve/CVE-2025-39833/" source="CVE"/>
		<reference ref_id="CVE-2025-39834" ref_url="https://www.suse.com/security/cve/CVE-2025-39834/" source="CVE"/>
		<reference ref_id="CVE-2025-39835" ref_url="https://www.suse.com/security/cve/CVE-2025-39835/" source="CVE"/>
		<reference ref_id="CVE-2025-39836" ref_url="https://www.suse.com/security/cve/CVE-2025-39836/" source="CVE"/>
		<reference ref_id="CVE-2025-39838" ref_url="https://www.suse.com/security/cve/CVE-2025-39838/" source="CVE"/>
		<reference ref_id="CVE-2025-39839" ref_url="https://www.suse.com/security/cve/CVE-2025-39839/" source="CVE"/>
		<reference ref_id="CVE-2025-39841" ref_url="https://www.suse.com/security/cve/CVE-2025-39841/" source="CVE"/>
		<reference ref_id="CVE-2025-39842" ref_url="https://www.suse.com/security/cve/CVE-2025-39842/" source="CVE"/>
		<reference ref_id="CVE-2025-39844" ref_url="https://www.suse.com/security/cve/CVE-2025-39844/" source="CVE"/>
		<reference ref_id="CVE-2025-39845" ref_url="https://www.suse.com/security/cve/CVE-2025-39845/" source="CVE"/>
		<reference ref_id="CVE-2025-39847" ref_url="https://www.suse.com/security/cve/CVE-2025-39847/" source="CVE"/>
		<reference ref_id="CVE-2025-39848" ref_url="https://www.suse.com/security/cve/CVE-2025-39848/" source="CVE"/>
		<reference ref_id="CVE-2025-39849" ref_url="https://www.suse.com/security/cve/CVE-2025-39849/" source="CVE"/>
		<reference ref_id="CVE-2025-39850" ref_url="https://www.suse.com/security/cve/CVE-2025-39850/" source="CVE"/>
		<reference ref_id="CVE-2025-39851" ref_url="https://www.suse.com/security/cve/CVE-2025-39851/" source="CVE"/>
		<reference ref_id="CVE-2025-39852" ref_url="https://www.suse.com/security/cve/CVE-2025-39852/" source="CVE"/>
		<reference ref_id="CVE-2025-39853" ref_url="https://www.suse.com/security/cve/CVE-2025-39853/" source="CVE"/>
		<reference ref_id="CVE-2025-39854" ref_url="https://www.suse.com/security/cve/CVE-2025-39854/" source="CVE"/>
		<reference ref_id="CVE-2025-39857" ref_url="https://www.suse.com/security/cve/CVE-2025-39857/" source="CVE"/>
		<reference ref_id="CVE-2025-39860" ref_url="https://www.suse.com/security/cve/CVE-2025-39860/" source="CVE"/>
		<reference ref_id="CVE-2025-39861" ref_url="https://www.suse.com/security/cve/CVE-2025-39861/" source="CVE"/>
		<reference ref_id="CVE-2025-39863" ref_url="https://www.suse.com/security/cve/CVE-2025-39863/" source="CVE"/>
		<reference ref_id="CVE-2025-39864" ref_url="https://www.suse.com/security/cve/CVE-2025-39864/" source="CVE"/>
		<reference ref_id="CVE-2025-39865" ref_url="https://www.suse.com/security/cve/CVE-2025-39865/" source="CVE"/>
		<reference ref_id="CVE-2025-39869" ref_url="https://www.suse.com/security/cve/CVE-2025-39869/" source="CVE"/>
		<reference ref_id="CVE-2025-39870" ref_url="https://www.suse.com/security/cve/CVE-2025-39870/" source="CVE"/>
		<reference ref_id="CVE-2025-39871" ref_url="https://www.suse.com/security/cve/CVE-2025-39871/" source="CVE"/>
		<reference ref_id="CVE-2025-39873" ref_url="https://www.suse.com/security/cve/CVE-2025-39873/" source="CVE"/>
		<reference ref_id="CVE-2025-39875" ref_url="https://www.suse.com/security/cve/CVE-2025-39875/" source="CVE"/>
		<reference ref_id="CVE-2025-39877" ref_url="https://www.suse.com/security/cve/CVE-2025-39877/" source="CVE"/>
		<reference ref_id="CVE-2025-39882" ref_url="https://www.suse.com/security/cve/CVE-2025-39882/" source="CVE"/>
		<reference ref_id="CVE-2025-39884" ref_url="https://www.suse.com/security/cve/CVE-2025-39884/" source="CVE"/>
		<reference ref_id="CVE-2025-39885" ref_url="https://www.suse.com/security/cve/CVE-2025-39885/" source="CVE"/>
		<reference ref_id="CVE-2025-39889" ref_url="https://www.suse.com/security/cve/CVE-2025-39889/" source="CVE"/>
		<reference ref_id="CVE-2025-39890" ref_url="https://www.suse.com/security/cve/CVE-2025-39890/" source="CVE"/>
		<reference ref_id="CVE-2025-39891" ref_url="https://www.suse.com/security/cve/CVE-2025-39891/" source="CVE"/>
		<reference ref_id="CVE-2025-39896" ref_url="https://www.suse.com/security/cve/CVE-2025-39896/" source="CVE"/>
		<reference ref_id="CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898/" source="CVE"/>
		<reference ref_id="CVE-2025-39899" ref_url="https://www.suse.com/security/cve/CVE-2025-39899/" source="CVE"/>
		<reference ref_id="CVE-2025-39900" ref_url="https://www.suse.com/security/cve/CVE-2025-39900/" source="CVE"/>
		<reference ref_id="CVE-2025-39902" ref_url="https://www.suse.com/security/cve/CVE-2025-39902/" source="CVE"/>
		<reference ref_id="CVE-2025-39907" ref_url="https://www.suse.com/security/cve/CVE-2025-39907/" source="CVE"/>
		<reference ref_id="CVE-2025-39909" ref_url="https://www.suse.com/security/cve/CVE-2025-39909/" source="CVE"/>
		<reference ref_id="CVE-2025-39916" ref_url="https://www.suse.com/security/cve/CVE-2025-39916/" source="CVE"/>
		<reference ref_id="CVE-2025-39918" ref_url="https://www.suse.com/security/cve/CVE-2025-39918/" source="CVE"/>
		<reference ref_id="CVE-2025-39922" ref_url="https://www.suse.com/security/cve/CVE-2025-39922/" source="CVE"/>
		<reference ref_id="CVE-2025-39923" ref_url="https://www.suse.com/security/cve/CVE-2025-39923/" source="CVE"/>
		<reference ref_id="CVE-2025-39925" ref_url="https://www.suse.com/security/cve/CVE-2025-39925/" source="CVE"/>
		<reference ref_id="CVE-2025-39926" ref_url="https://www.suse.com/security/cve/CVE-2025-39926/" source="CVE"/>
		<reference ref_id="CVE-2025-39931" ref_url="https://www.suse.com/security/cve/CVE-2025-39931/" source="CVE"/>
		<reference ref_id="CVE-2025-39934" ref_url="https://www.suse.com/security/cve/CVE-2025-39934/" source="CVE"/>
		<reference ref_id="CVE-2025-39937" ref_url="https://www.suse.com/security/cve/CVE-2025-39937/" source="CVE"/>
		<reference ref_id="CVE-2025-39938" ref_url="https://www.suse.com/security/cve/CVE-2025-39938/" source="CVE"/>
		<reference ref_id="CVE-2025-39945" ref_url="https://www.suse.com/security/cve/CVE-2025-39945/" source="CVE"/>
		<reference ref_id="CVE-2025-39946" ref_url="https://www.suse.com/security/cve/CVE-2025-39946/" source="CVE"/>
		<reference ref_id="CVE-2025-39952" ref_url="https://www.suse.com/security/cve/CVE-2025-39952/" source="CVE"/>
		<reference ref_id="CVE-2025-39957" ref_url="https://www.suse.com/security/cve/CVE-2025-39957/" source="CVE"/>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass() (bsc#1235953).
- CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug (bsc#1237108).
- CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir" (bsc#1237131).
- CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324).
- CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive() (bsc#1241435).
- CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod" (bsc#1241403).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37821: sched/eevdf: Fix se-&gt;slice being set to U64_MAX and resulting (bsc#1242864).
- CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation (bsc#1243000).
- CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068).
- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).
- CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965).
- CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930).
- CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939).
- CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices (bsc#1245000).
- CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792).
- CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost (bsc#1244812).
- CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151).
- CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216).
- CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734).
- CVE-2025-38101: ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set() (bsc#1245659).
- CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663).
- CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup failure (bsc#1245664).
- CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695).
- CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700).
- CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710).
- CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767).
- CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780).
- CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure (bsc#1245763).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012).
- CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973).
- CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977).
- CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005).
- CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815).
- CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963).
- CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966).
- CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976).
- CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache (bsc#1246176).
- CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183).
- CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193).
- CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181).
- CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188).
- CVE-2025-38258: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter-&gt;memcg_path on write (bsc#1246185).
- CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).
- CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a commit_overrun (bsc#1246245).
- CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll (bsc#1246252).
- CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268).
- CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup (bsc#1246351).
- CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children() (bsc#1246366).
- CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376).
- CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata() (bsc#1246444).
- CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event() (bsc#1246447).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253).
- CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg (bsc#1246260).
- CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).
- CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078).
- CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023).
- CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024).
- CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031).
- CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250).
- CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169).
- CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156).
- CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097).
- CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262).
- CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126).
- CVE-2025-38418: remoteproc: core: Release rproc-&gt;clean_table after rproc_attach() fails (bsc#1247137).
- CVE-2025-38419: remoteproc: core: Cleanup acquired resources when
  rproc_handle_resources() fails in rproc_attach() (bsc#1247136).
- CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252).
- CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155).
- CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290).
- CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167).
- CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162).
- CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229).
- CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102).
- CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247234).
- CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099).
- CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098).
- CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116).
- CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113).
- CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).
- CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288).
- CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313).
- CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion (bsc#1247308).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243).
- CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280).
- CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack() (bsc#1247283).
- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088).
- CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (bsc#1248190).
- CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202).
- CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194).
- CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192).
- CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199).
- CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200).
- CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace event (bsc#1248211).
- CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225).
- CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info (bsc#1248224).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths (bsc#1248235).
- CVE-2025-38554: mm: fix a UAF when vma-&gt;mm is freed after vma-&gt;vm_refcnt got dropped (bsc#1248299).
- CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248374).
- CVE-2025-38571: sunrpc: fix client side handling of tls alerts (bsc#1248401).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365).
- CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343).
- CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1248368).
- CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357).
- CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392).
- CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619).
- CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610).
- CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616).
- CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null-terminated (bsc#1248674).
- CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622).
- CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156).
- CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry (bsc#1249160).
- CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn-&gt;dd_data only if memory is allocated (bsc#1249182).
- CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258).
- CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199).
- CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201).
- CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320).
- CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300).
- CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303).
- CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284).
- CVE-2025-39683: tracing: Limit access to parser-&gt;buffer when trace_get_user failed (bsc#1249286).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1249322).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314).
- CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494).
- CVE-2025-39749: rcu: Protect -&gt;defer_qs_iw_pending from data race (bsc#1249533).
- CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524).
- CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510).
- CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508).
- CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504).
- CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled (bsc#1249500).
- CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526).
- CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned targets (bsc#1249550).
- CVE-2025-39792: dm: Always split write BIOs to zoned device limits (bsc#1249618).
- CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608).
- CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter files (bsc#1250032).
- CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179).
- CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205).
- CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974).
- CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365).
- CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267).
- CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292).
- CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276).
- CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296).
- CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 (bsc#1250258).
- CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275).
- CVE-2025-39854: ice: fix NULL access of tx-&gt;in_use in ice_ll_ts_intr (bsc#1250297).
- CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251).
- CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294).
- CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test (bsc#1250398).
- CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407).
- CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742).
- CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758).
- CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702).
- CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722).
- CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM (bsc#1250737).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114).
- CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483).
- CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387).

The following non-security bugs were fixed:

- ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
- ACPI/processor_idle: Add FFH state handling (jsc#PED-13815).
- ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815).
- ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes).
- ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes).
- ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes).
- ACPI: LPSS: Remove AudioDSP related ID (git-fixes).
- ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git-fixes).
- ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes).
- ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled (stable-fixes).
- ACPI: Suppress misleading SPCR console message when SPCR table is absent (stable-fixes).
- ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes).
- ACPI: battery: Add synchronization between interface updates (git-fixes).
- ACPI: debug: fix signedness issues in read/write helpers (git-fixes).
- ACPI: pfr_update: Fix the driver update version check (git-fixes).
- ACPI: processor: Rescan "dead" SMT siblings during initialization (jsc#PED-13815).
- ACPI: processor: fix acpi_object initialization (stable-fixes).
- ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes).
- ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes).
- ACPI: processor: perflib: Move problematic pr-&gt;performance check (git-fixes).
- ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
- ACPICA: Fix largest possible resource descriptor index (git-fixes).
- ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes).
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes).
- ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes).
- ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX (stable-fixes).
- ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable-fixes).
- ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable-fixes).
- ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes).
- ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes).
- ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes).
- ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable-fixes).
- ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes).
- ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes).
- ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes).
- ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes).
- ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes).
- ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes).
- ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes).
- ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable-fixes).
- ALSA: hda: Disable jack polling at shutdown (stable-fixes).
- ALSA: hda: Handle the jack polling always via a work (stable-fixes).
- ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git-fixes).
- ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable-fixes).
- ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git-fixes).
- ALSA: lx_core: use int type to store negative error codes (git-fixes).
- ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes).
- ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable-fixes).
- ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes).
- ALSA: timer: fix ida_free call while not allocated (git-fixes).
- ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable-fixes).
- ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable-fixes).
- ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes).
- ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable-fixes).
- ALSA: usb-audio: Convert comma to semicolon (git-fixes).
- ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes).
- ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes).
- ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes).
- ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git-fixes).
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes).
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes).
- ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes).
- ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable-fixes).
- ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes).
- ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes).
- ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes).
- ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes).
- ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes).
- ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes).
- ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git-fixes).
- ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of buffer time (git-fixes).
- ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes).
- ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes).
- ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes).
- ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size (git-fixes).
- ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git-fixes).
- ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode (stable-fixes).
- ASoC: amd: acp: Adjust pdm gain value (stable-fixes).
- ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes).
- ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes).
- ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes).
- ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes).
- ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes).
- ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes).
- ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes).
- ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable-fixes).
- ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes).
- ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes).
- ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable-fixes).
- ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes).
- ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv (git-fixes).
- ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git-fixes).
- ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes).
- ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes).
- ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes).
- ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes).
- ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git-fixes).
- ASoC: qcom: use drvdata instead of component to keep id (stable-fixes).
- ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes).
- ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git-fixes).
- ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes).
- ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes).
- ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes).
- ASoC: wm8940: Correct PLL rate rounding (git-fixes).
- ASoC: wm8940: Correct typo in control name (git-fixes).
- ASoC: wm8974: Correct PLL rate rounding (git-fixes).
- Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes).
- Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes).
- Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes).
- Bluetooth: ISO: free rx_skb if not consumed (git-fixes).
- Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes).
- Bluetooth: MGMT: Fix possible UAFs (git-fixes).
- Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git-fixes).
- Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable-fixes).
- Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes).
- Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes).
- Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git-fixes).
- Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git-fixes).
- Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git-fixes).
- Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes).
- Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes).
- Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes).
- Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git-fixes).
- Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes).
- Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable-fixes).
- Bluetooth: hci_sync: Avoid adding default advertising on startup (stable-fixes).
- Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes).
- Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git-fixes).
- Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes).
- Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git-fixes).
- Bluetooth: hci_sync: fix set_local_name race condition (git-fixes).
- Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes).
- CONFIG &amp; no reference -&gt; OK temporarily, must be resolved eventually
- Disable CET before shutdown by tboot (bsc#1247950).
- Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes).
- Documentation/x86: Document new attack vector controls (git-fixes).
- Documentation: ACPI: Fix parent device references (git-fixes).
- Documentation: KVM: Fix unexpected unindent warning (git-fixes).
- Documentation: KVM: Fix unexpected unindent warnings (git-fixes).
- Documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes).
- Drop ath12k patch that was reverted in the upstream (git-fixes)
- EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693).
- Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone
  using CMA or investigating CMA issues, with a small and simple code base
  and no runtime overhead.
- Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325)
- Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256).
- Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked in 6.12 kernel itself.
- Fix dma_unmap_sg() nents value (git-fixes)
- HID: amd_sfh: Add sync across amd sfh work functions (git-fixes).
- HID: apple: avoid setting up battery timer for devices without battery (git-fixes).
- HID: apple: validate feature-report field count to prevent NULL pointer dereference (git-fixes).
- HID: asus: add support for missing PX series fn keys (stable-fixes).
- HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes).
- HID: core: do not bypass hid_hw_raw_request (stable-fixes).
- HID: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes).
- HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes).
- HID: hidraw: tighten ioctl command parsing (git-fixes).
- HID: input: rename hidinput_set_battery_charge_status() (stable-fixes).
- HID: input: report battery status changes immediately (git-fixes).
- HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes).
- HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes).
- HID: magicmouse: avoid setting up battery timer when not needed (git-fixes).
- HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git-fixes).
- HID: quirks: add support for Legion Go dual dinput modes (stable-fixes).
- HID: wacom: Add a new Art Pen 2 (stable-fixes).
- IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes)
- IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes)
- Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes).
- Input: iqs7222 - avoid enabling unused interrupts (stable-fixes).
- Input: psxpad-spi - add a check for the return value of spi_setup() (git-fixes).
- Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes).
- KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes).
- KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
- KVM: Allow CPU to reschedule while setting per-page memory attributes (git-fixes).
- KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes).
- KVM: Bound the number of dirty ring entries in a single reset at INT_MAX (git-fixes).
- KVM: Conditionally reschedule when resetting the dirty ring (git-fixes).
- KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199).
- KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes).
- KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
- KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (git-fixes).
- KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs (jsc#PED-13302).
- KVM: TDX: Do not report base TDVMCALLs (git-fixes).
- KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302).
- KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302).
- KVM: TDX: Handle TDG.VP.VMCALL&amp;lt;GetQuote&gt; (jsc#PED-13302).
- KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (jsc#PED-13302).
- KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL (git-fixes).
- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).
- KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out (jsc#PED-13302).
- KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes).
- KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes).
- KVM: arm64: Fix error path in init_hyp_mode() (git-fixes).
- KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes).
- KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes).
- KVM: s390: Fix access to unavailable adapter indicator pages during postcopy (git-fixes bsc#1250124).
- KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250123).
- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).
- KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes).
- KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL (git-fixes).
- KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes).
- KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes).
- KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git-fixes).
- KVM: x86: avoid underflow when scaling TSC frequency (git-fixes).
- Limit patch filenames to 100 characters (bsc#1249604).
- Move upstreamed SPI patch into sorted section
- NFS: Fix a race when updating an existing write (git-fixes).
- NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes).
- NFS: Fix the setting of capabilities when automounting a new filesystem (git-fixes).
- NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git-fixes).
- NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes).
- NFS: nfs_invalidate_folio() must observe the offset and size arguments (git-fixes).
- NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes).
- NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes).
- NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git-fixes).
- NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes).
- NFSv4.2: another fix for listxattr (git-fixes).
- NFSv4/flexfiles: Fix layout merge mirror check (git-fixes).
- NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git-fixes).
- NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes).
- NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git-fixes).
- NFSv4: Do not clear capabilities that won't be reset (git-fixes).
- Octeontx2-af: Skip overlap check for SPI field (git-fixes).
- PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes).
- PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-fixes).
- PCI/AER: Fix missing uevent on recovery when a reset is requested (git-fixes).
- PCI/ERR: Fix uevent on failure to recover (git-fixes).
- PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git-fixes).
- PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457).
- PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes).
- PCI/pwrctrl: Fix device leak at registration (git-fixes).
- PCI/sysfs: Ensure devices are powered for config reads (git-fixes).
- PCI: Extend isolated function probing to LoongArch (git-fixes).
- PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS (git-fixes).
- PCI: Support Immediate Readiness on devices without PM capabilities (git-fixes).
- PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes).
- PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes).
- PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up (stable-fixes).
- PCI: endpoint: Fix configfs group list head handling (git-fixes).
- PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes).
- PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes).
- PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes).
- PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457).
- PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes).
- PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes).
- PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes).
- PCI: imx6: Delay link start until configfs 'start' written (git-fixes).
- PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes).
- PCI: j721e: Fix incorrect error message in probe() (git-fixes).
- PCI: j721e: Fix programming sequence of "strap" settings (git-fixes).
- PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes).
- PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199).
- PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199).
- PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes).
- PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes).
- PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes).
- PCI: rcar-gen4: Fix PHY initialization (git-fixes).
- PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git-fixes).
- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).
- PCI: rcar-host: Drop PMSR spinlock (git-fixes).
- PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes).
- PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git-fixes).
- PCI: rockchip: Use standard PCIe definitions (git-fixes).
- PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes).
- PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes).
- PCI: tegra194: Handle errors in BPMP response (git-fixes).
- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).
- PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git-fixes).
- PCI: tegra: Fix devm_kcalloc() argument order for port-&gt;phys allocation (git-fixes).
- PCI: xilinx-nwl: Fix ECAM programming (git-fixes).
- PM / devfreq: Check governor before using governor-&gt;name (git-fixes).
- PM / devfreq: Fix a index typo in trans_stat (git-fixes).
- PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes).
- PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes).
- PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes).
- PM: EM: use kfree_rcu() to simplify the code (stable-fixes).
- PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes).
- PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112).
- PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112).
- PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112).
- PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112).
- PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable-fixes).
- PM: runtime: Take active children into account in pm_runtime_get_if_in_use() (git-fixes).
- PM: sleep: console: Fix the black screen issue (stable-fixes).
- PM: sleep: core: Clear power.must_resume in noirq suspend error path (git-fixes).
- RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034).
- RAS/AMD/FMPM: Get masked address (bsc#1242034).
- RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes)
- RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM (git-fixes)
- RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes)
- RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes)
- RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes)
- RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes)
- RDMA/core: Rate limit GID cache warning messages (git-fixes)
- RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes)
- RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes)
- RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes)
- RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes)
- RDMA/hns: Drop GFP_NOWARN (git-fixes)
- RDMA/hns: Fix -Wframe-larger-than issue (git-fixes)
- RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes)
- RDMA/hns: Fix accessing uninitialized resources (git-fixes)
- RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes)
- RDMA/hns: Fix double destruction of rsv_qp (git-fixes)
- RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes)
- RDMA/hns: Get message length of ack_req from FW (git-fixes)
- RDMA/mana_ib: Add device statistics support (bsc#1246651).
- RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135).
- RDMA/mana_ib: Extend modify QP (bsc#1251135).
- RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes).
- RDMA/mana_ib: add additional port counters (git-fixes).
- RDMA/mana_ib: add support of multiple ports (git-fixes).
- RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes)
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes)
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes)
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
- RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes)
- RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes)
- RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes)
- RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes)
- RDMA/rxe: Fix race in do_task() when draining (git-fixes)
- RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes)
- RDMA/siw: Always report immediate post SQ errors (git-fixes)
- RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes)
- RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes)
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes)
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-fixes)
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
- RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes)
- README.BRANCH: mfranc@suse.cz leaving SUSE
- RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348).
- Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes).
- Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815).
- Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes).
- Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes).
- Revert "drm/nouveau: check ioctl command codes better" (git-fixes).
- Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes).
- Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" (git-fixes).
- Revert "mac80211: Dynamically set CoDel parameters per station" (stable-fixes).
- Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes).
- Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" (stable-fixes).
- Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git-fixes).
- SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes).
- Squashfs: add additional inode sanity checking (git-fixes).
- Squashfs: fix uninit-value in squashfs_get_parent (git-fixes).
- Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes).
- USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes).
- USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes).
- USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes).
- USB: serial: option: add Foxconn T99W640 (stable-fixes).
- USB: serial: option: add Foxconn T99W709 (stable-fixes).
- USB: serial: option: add SIMCom 8230C compositions (stable-fixes).
- USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable-fixes).
- USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes).
- USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes).
- USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes).
- USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes).
- Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps.
- Update config files: revive pwc driver for Leap (bsc#1249060)
- accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes).
- accel/ivpu: Correct DCT interrupt handling (git-fixes).
- accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes).
- accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes).
- accel/ivpu: Prevent recovery work from being queued during device removal (git-fixes).
- amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable-fixes).
- aoe: defer rexmit timer downdev work to workqueue (git-fixes).
- arch/powerpc: Remove .interp section in vmlinux (bsc#1215199).
- arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes)
- arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes)
- arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes)
- arm64/mm: Close theoretical race where stale TLB entry remains valid (git-fixes)
- arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes)
- arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes)
- arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes)
- arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes)
- arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes)
- arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes)
- arm64: Handle KCOV __init vs inline mismatches (git-fixes)
- arm64: Mark kernel as tainted on SAE and SError panic (git-fixes)
- arm64: Restrict pagetable teardown to avoid false warning (git-fixes)
- arm64: config: Make tpm_tis_spi module build-in (bsc#1246896)
- arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes)
- arm64: dts: add big-endian property back into watchdog node (git-fixes)
- arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes)
- arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes)
- arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes)
- arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git-fixes)
- arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes)
- arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes)
- arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes)
- arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes)
- arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git-fixes)
- arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes)
- arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git-fixes)
- arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes)
- arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes)
- arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git-fixes)
- arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes)
- arm64: dts: imx8mp: Correct thermal sensor index (git-fixes)
- arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git-fixes)
- arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes)
- arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes)
- arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes)
- arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git-fixes)
- arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes)
- arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git-fixes)
- arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git-fixes)
- arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git-fixes).
- arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git-fixes)
- arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes)
- arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git-fixes)
- arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git-fixes)
- arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git-fixes)
- arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git-fixes)
- arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes)
- arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git-fixes)
- arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma (git-fixes)
- arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes)
- arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git-fixes)
- arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes)
- arm64: dts: st: fix timer used for ticks (git-fixes)
- arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git-fixes)
- arm64: map [_text, _stext) virtual address range (git-fixes)
- arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes)
- arm64: poe: Handle spurious Overlay faults (git-fixes)
- arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes)
- arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes)
- arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes)
- arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes)
- arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes)
- arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes)
- arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes)
- ata: ahci: Disable DIPM if host lacks support (stable-fixes).
- ata: ahci: Disallow LPM policy control if not supported (stable-fixes).
- ata: libata-sata: Add link_power_management_supported sysfs attribute (git-fixes).
- ata: libata-sata: Disallow changing LPM state if not supported (stable-fixes).
- ata: libata-scsi: Fix CDL control (git-fixes).
- audit,module: restore audit logging in load failure case (git-fixes).
- ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes).
- batman-adv: fix OOB read/write in network-coding decode (git-fixes).
- benet: fix BUG when creating VFs (git-fixes).
- block: Introduce bio_needs_zone_write_plugging() (git-fixes).
- block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552).
- block: ensure discard_granularity is zero when discard is not supported (git-fixes).
- block: fix kobject leak in blk_unregister_queue (git-fixes).
- block: mtip32xx: Fix usage of dma_map_sg() (git-fixes).
- block: sanitize chunk_sectors for atomic write limits (git-fixes).
- bnxt_en: Add a helper function to configure MRU and RSS (git-fixes).
- bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes).
- bnxt_en: Fix DCB ETS validation (git-fixes).
- bnxt_en: Fix memory corruption when FW resources change during ifdown (git-fixes).
- bnxt_en: Fix stats context reservation logic (git-fixes).
- bnxt_en: Flush FW trace before copying to the coredump (git-fixes).
- bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git-fixes).
- bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL (git-fixes).
- bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git-fixes)
- bpf, arm64: Fix fp initialization for exception boundary (git-fixes)
- bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes).
- bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes).
- bpf: Adjust free target to avoid global starvation of LRU map (git-fixes).
- bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git-fixes).
- bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes).
- bpf: Check link_create.flags parameter for multi_kprobe (git-fixes).
- bpf: Check link_create.flags parameter for multi_uprobe (git-fixes).
- bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes).
- bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes).
- bpf: Forget ranges when refining tnum after JSET (git-fixes).
- bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes).
- bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates storage (git-fixes).
- bpf: Reject %p% format string in bprintf-like helpers (git-fixes).
- bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes).
- bpf: Reject narrower access to pointer ctx fields (git-fixes).
- bpf: Return prog btf_id without capable check (git-fixes).
- bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes).
- bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git-fixes).
- bpf: fix possible endless loop in BPF map iteration (git-fixes).
- btrfs: abort transaction during log replay if walk_log_tree() failed (git-fixes).
- btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes).
- btrfs: add assertions and comment about path expectations to btrfs_cross_ref_exist() (git-fixes).
- btrfs: add debug build only WARN (bsc#1249038).
- btrfs: add function comment for check_committed_ref() (git-fixes).
- btrfs: always abort transaction on failure to add block group to free space tree (git-fixes).
- btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes).
- btrfs: avoid redundant call to get inline ref type at check_committed_ref() (git-fixes).
- btrfs: avoid starting new transaction when cleaning qgroup during subvolume drop (git-fixes).
- btrfs: clear dirty status from extent buffer on error at insert_new_root() (git-fixes).
- btrfs: codify pattern for adding block_group to bg_list (git-fixes).
- btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038).
- btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes).
- btrfs: correctly escape subvol in btrfs_show_options() (git-fixes).
- btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540).
- btrfs: do not ignore inode missing when replaying log tree (git-fixes).
- btrfs: do not output error message if a qgroup has been already cleaned up (git-fixes).
- btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap write (bsc#1247949).
- btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes).
- btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes).
- btrfs: enhance ASSERT() to take optional format string (bsc#1249038).
- btrfs: error on missing block group when unaccounting log tree extent buffers (git-fixes).
- btrfs: exit after state split error at set_extent_bit() (git-fixes).
- btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068)
- btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949).
- btrfs: fix assertion when building free space tree (git-fixes).
- btrfs: fix corruption reading compressed range when block size is smaller than page size (git-fixes).
- btrfs: fix data overwriting bug during buffered write when block size &amp;lt; page size (git-fixes).
- btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes).
- btrfs: fix incorrect log message for nobarrier mount option (git-fixes).
- btrfs: fix inode lookup error handling during log replay (git-fixes).
- btrfs: fix invalid extref key setup when replaying dentry (git-fixes).
- btrfs: fix invalid inode pointer after failure to create reloc inode (git-fixes).
- btrfs: fix invalid inode pointer dereferences during log replay (git-fixes).
- btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes).
- btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes).
- btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes).
- btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes).
- btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git-fixes).
- btrfs: fix race between logging inode and checking if it was logged before (git-fixes).
- btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes).
- btrfs: fix squota compressed stats leak (git-fixes).
- btrfs: fix ssd_spread overallocation (git-fixes).
- btrfs: fix subvolume deletion lockup caused by inodes xarray race (git-fixes).
- btrfs: fix the inode leak in btrfs_iget() (git-fixes).
- btrfs: fix two misuses of folio_shift() (git-fixes).
- btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git-fixes).
- btrfs: handle unaligned EOF truncation correctly for subpage cases (bsc#1249038).
- btrfs: initialize inode::file_extent_tree after i_mode has been set (git-fixes).
- btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068)
- btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes).
- btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes).
- btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes).
- btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes).
- btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes).
- btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes).
- btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes).
- btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git-fixes).
- btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes).
- btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes).
- btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite() (bsc#1247949).
- btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes).
- btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes).
- btrfs: props: switch prop_handler::extract to struct btrfs_inode (git-fixes).
- btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes).
- btrfs: qgroup: fix qgroup create ioctl returning success after quotas disabled (git-fixes).
- btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git-fixes).
- btrfs: qgroup: remove no longer used fs_info-&gt;qgroup_ulist (git-fixes).
- btrfs: qgroup: set quota enabled bit if quota disable fails flushing reservations (git-fixes).
- btrfs: record new subvolume in parent dir earlier to avoid dir logging races (git-fixes).
- btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git-fixes).
- btrfs: remove no longer needed strict argument from can_nocow_extent() (git-fixes).
- btrfs: remove redundant path release when replaying a log tree (git-fixes).
- btrfs: remove the snapshot check from check_committed_ref() (git-fixes).
- btrfs: restore mount option info messages during mount (git-fixes).
- btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes).
- btrfs: return a btrfs_inode from read_one_inode() (git-fixes).
- btrfs: return any hit error from extent_writepage_io() (git-fixes).
- btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent() (git-fixes).
- btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes).
- btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949).
- btrfs: simplify error detection flow during log replay (git-fixes).
- btrfs: simplify return logic at check_committed_ref() (git-fixes).
- btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes).
- btrfs: tests: fix chunk map leak after failure to add it to the tree (git-fixes).
- btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes).
- btrfs: unfold transaction aborts when replaying log trees (git-fixes).
- btrfs: unify ordering of btrfs_key initializations (git-fixes).
- btrfs: update superblock's device bytes_used when dropping chunk (git-fixes).
- btrfs: use a single variable to track return value at btrfs_page_mkwrite() (bsc#1247949).
- btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes).
- btrfs: use filemap_get_folio() helper (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes).
- btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git-fixes).
- btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes).
- btrfs: use verbose ASSERT() in volumes.c (bsc#1249038).
- build_bug.h: Add KABI assert (bsc#1249186).
- bus: firewall: Fix missing static inline annotations for stubs (git-fixes).
- bus: fsl-mc: Check return value of platform_get_resource() (git-fixes).
- bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes).
- bus: mhi: ep: Fix chained transfer handling in read path (git-fixes).
- bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes).
- bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes).
- bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git-fixes).
- can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes).
- can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes).
- can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes).
- can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes).
- can: kvaser_pciefd: Store device channel index (git-fixes).
- can: kvaser_usb: Assign netdev.dev_port based on device channel index (git-fixes).
- can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes).
- can: peak_usb: fix USB FD devices potential malfunction (git-fixes).
- can: peak_usb: fix shift-out-of-bounds issue (git-fixes).
- can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes).
- can: rcar_canfd: Fix controller mode setting (stable-fixes).
- can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git-fixes).
- can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes).
- cdc-acm: fix race between initial clearing halt and open (git-fixes).
- cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes).
- cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes).
- cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166).
- cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166).
- cgroup: Add compatibility option for content of /proc/cgroups (jsc#PED-12405).
- cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405).
- cgroup: llist: avoid memory tears for llist_node (bsc#1247963).
- cgroup: make css_rstat_updated nmi safe (bsc#1247963).
- cgroup: remove per-cpu per-subsystem locks (bsc#1247963).
- cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963).
- char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes).
- clk: at91: peripheral: fix return value (git-fixes).
- clk: at91: sam9x7: update pll clk ranges (git-fixes).
- clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes).
- clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes).
- clk: imx95-blk-ctl: Fix synchronous abort (git-fixes).
- clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes).
- clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git-fixes).
- clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register() (git-fixes).
- clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git-fixes).
- clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git-fixes).
- clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git-fixes).
- clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks (git-fixes).
- clk: samsung: exynos850: fix a comment (git-fixes).
- clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes).
- clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git-fixes).
- clk: sunxi-ng: v3s: Fix de clock definition (git-fixes).
- clk: tegra: do not overallocate memory for bpmp clocks (git-fixes).
- clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes).
- clk: xilinx: vcu: unregister pll_post only if registered correctly (git-fixes).
- comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes).
- comedi: Make insn_rw_emulate_bits() do insn-&gt;n samples (git-fixes).
- comedi: fix race between polling and detaching (git-fixes).
- comedi: pcl726: Prevent invalid irq number (git-fixes).
- compiler-clang.h: define __SANITIZE_*__ macros only when undefined (stable-fixes).
- compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes).
- config.sh: SLFO 1.2 branched in IBS
- config: arm64: default: enable mtu3 dual-role support for MediaTek platforms (bsc#1245206)
- coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
- cpu: Define attack vectors (git-fixes).
- cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git-fixes).
- cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for performance governor (git-fixes).
- cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes)
- cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes)
- cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes).
- cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable-fixes).
- cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes).
- cpufreq: Exit governor when failed to start old governor (stable-fixes).
- cpufreq: Init policy-&gt;rwsem before it may be possibly used (git-fixes).
- cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes).
- cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes).
- cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency (stable-fixes git-fixes).
- cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes).
- cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes).
- cpufreq: armada-8k: make both cpu masks static (git-fixes).
- cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes).
- cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git-fixes).
- cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable-fixes).
- cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git-fixes).
- cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (git-fixes).
- cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes).
- cpufreq: mediatek: fix device leak on probe failure (git-fixes).
- cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git-fixes).
- cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable-fixes).
- cpufreq: scpi: compare kHz instead of Hz (git-fixes).
- cpufreq: sun50i: prevent out-of-bounds access (git-fixes).
- cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes).
- cpufreq: tegra186: Share policy per cluster (stable-fixes).
- cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes).
- crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes).
- crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes).
- crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes).
- crypto: atmel - Fix dma_unmap_sg() direction (git-fixes).
- crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes).
- crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes).
- crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes).
- crypto: ccp - Fix locking on alloc failure handling (git-fixes).
- crypto: essiv - Check ssize for decryption and in-place encryption (git-fixes).
- crypto: hisilicon - re-enable address prefetch after device resuming (git-fixes).
- crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes).
- crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes).
- crypto: hisilicon/qm - set NULL to qm-&gt;debug.qm_diff_regs (git-fixes).
- crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes).
- crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes).
- crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes).
- crypto: jitter - fix intermediary handling (stable-fixes).
- crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes).
- crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes).
- crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes).
- crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes).
- crypto: octeontx2 - Fix address alignment issue on ucode loading (stable-fixes).
- crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2 (stable-fixes).
- crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable-fixes).
- crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes).
- crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes).
- crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes).
- crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes).
- crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes).
- crypto: qat - fix state restore for banks with exceptions (git-fixes).
- crypto: qat - flush misc workqueue during device shutdown (git-fixes).
- crypto: qat - lower priority for skcipher and aead algorithms (stable-fixes).
- crypto: qat - use unmanaged allocation for dc_data (git-fixes).
- crypto: rng - Ensure set_ent is always present (git-fixes).
- crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes).
- crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes).
- devlink: Add support for u64 parameters (jsc#PED-13331).
- devlink: avoid param type value translations (jsc#PED-13331).
- devlink: define enum for attr types of dynamic attributes (jsc#PED-13331).
- devlink: introduce devlink_nl_put_u64() (jsc#PED-13331).
- devlink: let driver opt out of automatic phys_port_name generation (git-fixes).
- dm-mpath: do not print the "loaded" message if registering fails (git-fixes).
- dm-stripe: limit chunk_sectors to the stripe size (git-fixes).
- dm-table: fix checking for rq stackable devices (git-fixes).
- dm: Check for forbidden splitting of zone write operations (git-fixes).
- dm: split write BIOs on zone boundaries when zone append is not emulated (git-fixes).
- dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes).
- dmaengine: Fix dma_async_tx_descriptor-&gt;tx_submit documentation (git-fixes).
- dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes).
- dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes).
- dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes).
- dmaengine: idxd: Fix refcount underflow on module unload (git-fixes).
- dmaengine: idxd: Remove improper idxd_free (git-fixes).
- dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git-fixes).
- dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes).
- dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git-fixes).
- dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes).
- dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git-fixes).
- dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes).
- dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs (stable-fixes).
- dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git-fixes).
- docs: admin-guide: update to current minimum pipe size default (git-fixes).
- dpll: Add basic Microchip ZL3073x support (jsc#PED-13331).
- dpll: Make ZL3073X invisible (jsc#PED-13331).
- dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331).
- dpll: zl3073x: Add support to get/set priority on input pins (jsc#PED-13331).
- dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331).
- dpll: zl3073x: Fix build failure (jsc#PED-13331).
- dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331).
- dpll: zl3073x: Implement input pin state setting in automatic mode (jsc#PED-13331).
- dpll: zl3073x: Read DPLL types and pin properties from system firmware (jsc#PED-13331).
- dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331).
- dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (jsc#PED-13331).
- driver core/PM: Set power.no_callbacks along with power.no_pm (stable-fixes).
- drivers/base/node: fix double free in register_one_node() (git-fixes).
- drivers/base/node: handle error properly in register_one_node() (git-fixes).
- drivers: base: handle module_kobject creation (git-fixes).
- drm/amd : Update MES API header file for v11 &amp; v12 (stable-fixes).
- drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes).
- drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes).
- drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112).
- drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable-fixes).
- drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112).
- drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes).
- drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes).
- drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes).
- drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes).
- drm/amd/display: Allow DCN301 to clear update flags (git-fixes).
- drm/amd/display: Allow RX6xxx &amp; RX7700 to invoke amdgpu_irq_get/put (git-fixes).
- drm/amd/display: Avoid a NULL pointer dereference (stable-fixes).
- drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes).
- drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes).
- drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes).
- drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes).
- drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes).
- drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121).
- drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable-fixes).
- drm/amd/display: Disable scaling on DCE6 for now (git-fixes).
- drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes).
- drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes).
- drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes).
- drm/amd/display: Do not print errors for nonexistent connectors (git-fixes).
- drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes).
- drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112).
- drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes).
- drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes).
- drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes).
- drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes).
- drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable-fixes).
- drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git-fixes).
- drm/amd/display: Fix mismatch type comparison (stable-fixes).
- drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112).
- drm/amd/display: Free memory allocation (stable-fixes).
- drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes).
- drm/amd/display: Initialize mode_select to 0 (stable-fixes).
- drm/amd/display: Only finalize atomic_obj if it was initialized (stable-fixes).
- drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes).
- drm/amd/display: Properly disable scaling on DCE6 (git-fixes).
- drm/amd/display: Remove redundant semicolons (git-fixes).
- drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes).
- drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes).
- drm/amd/display: add workaround flag to link to force FFE preset (stable-fixes).
- drm/amd/display: fix a Null pointer dereference vulnerability (stable-fixes).
- drm/amd/display: fix dmub access race condition (bsc#1243112).
- drm/amd/display: fix initial backlight brightness calculation (git-fixes).
- drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes).
- drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112).
- drm/amd/display: remove output_tf_change flag (git-fixes).
- drm/amd/display: use udelay rather than fsleep (git-fixes).
- drm/amd/include : MES v11 and v12 API header update (stable-fixes).
- drm/amd/include : Update MES v12 API for fence update (stable-fixes).
- drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git-fixes).
- drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes).
- drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes).
- drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes).
- drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes).
- drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes).
- drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes).
- drm/amd/pm: fix null pointer access (stable-fixes).
- drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes).
- drm/amd: Avoid evicting resources at S5 (bsc#1243112).
- drm/amd: Check whether secure display TA loaded successfully (bsc#1243112).
- drm/amd: Fix hybrid sleep (bsc#1243112).
- drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112).
- drm/amd: Restore cached manual clock settings during resume (bsc#1243112).
- drm/amd: Restore cached power limit during resume (stable-fixes).
- drm/amdgpu/discovery: fix fw based ip discovery (git-fixes).
- drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes).
- drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes).
- drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes).
- drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes).
- drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes).
- drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112).
- drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112).
- drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112).
- drm/amdgpu/mes: add missing locking in helper functions (stable-fixes).
- drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes).
- drm/amdgpu/mes: optimize compute loop handling (stable-fixes).
- drm/amdgpu/swm14: Update power limit logic (stable-fixes).
- drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable-fixes).
- drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes).
- drm/amdgpu/vcn: fix ref counting for ring based profile handling (git-fixes).
- drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112).
- drm/amdgpu: Add additional DCE6 SCL registers (git-fixes).
- drm/amdgpu: Avoid extra evict-restore process (stable-fixes).
- drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112).
- drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes).
- drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes).
- drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112).
- drm/amdgpu: Increase reset counter only on success (stable-fixes).
- drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git-fixes).
- drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes).
- drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes).
- drm/amdgpu: Report individual reset error (bsc#1243112).
- drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes).
- drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes).
- drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable-fixes).
- drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes).
- drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes).
- drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112).
- drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes).
- drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes).
- drm/amdgpu: fix incorrect vm flags to map bo (git-fixes).
- drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112).
- drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes).
- drm/amdgpu: fix vram reservation issue (git-fixes).
- drm/amdgpu: remove the redeclaration of variable i (git-fixes).
- drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes).
- drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes).
- drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes).
- drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes).
- drm/amdkfd: Fix mmap write lock not release (bsc#1243112).
- drm/ast: Use msleep instead of mdelay for edid read (git-fixes).
- drm/bridge: fix OF node leak (git-fixes).
- drm/bridge: it6505: select REGMAP_I2C (git-fixes).
- drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes).
- drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes).
- drm/cirrus-qemu: Fix pitch programming (git-fixes).
- drm/connector: hdmi: Evaluate limited range after computing format (git-fixes).
- drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121).
- drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes).
- drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121).
- drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121).
- drm/edid: Define the quirks in an enum list (bsc#1248121).
- drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes).
- drm/gem: Internally test import_attach for imported objects (git-fixes).
- drm/gem: Test for imported GEM buffers with helper (stable-fixes).
- drm/gma500: Fix null dereference in hdmi teardown (git-fixes).
- drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes).
- drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes).
- drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes).
- drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes).
- drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes).
- drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes).
- drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes).
- drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git-fixes).
- drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes).
- drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes).
- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).
- drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes).
- drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable-fixes).
- drm/i915/icl+/tc: Cache the max lane count value (stable-fixes).
- drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable-fixes).
- drm/i915/power: fix size for for_each_set_bit() in abox iteration (git-fixes).
- drm/imagination: Clear runtime PM errors while resetting the GPU (stable-fixes).
- drm/mediatek: Add error handling for old state CRTC in atomic_disable (git-fixes).
- drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes).
- drm/mediatek: fix potential OF node use-after-free (git-fixes).
- drm/msm/dp: account for widebus and yuv420 during mode validation (git-fixes).
- drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes).
- drm/msm/dpu: fix incorrect type for ret (git-fixes).
- drm/msm/kms: move snapshot init earlier in KMS init (git-fixes).
- drm/msm: Add error handling for krealloc in metadata setup (stable-fixes).
- drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes).
- drm/msm: update the high bitfield of certain DSI registers (git-fixes).
- drm/msm: use trylock for debugfs (stable-fixes).
- drm/nouveau/disp: Always accept linear modifier (git-fixes).
- drm/nouveau/gsp: fix potential leak of memory used during acpi init (git-fixes).
- drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes).
- drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes).
- drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes).
- drm/nouveau: fix typos in comments (git-fixes).
- drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes).
- drm/nouveau: remove unused memory target test (git-fixes).
- drm/panel: novatek-nt35560: Fix invalid return value (git-fixes).
- drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes).
- drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git-fixes).
- drm/panthor: Defer scheduler entitiy destruction to queue release (git-fixes).
- drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes).
- drm/panthor: validate group queue count (git-fixes).
- drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes).
- drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes).
- drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes).
- drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes).
- drm/simpledrm: Do not upcast in release helpers (git-fixes).
- drm/tests: Fix endian warning (git-fixes).
- drm/ttm: Respect the shrinker core free target (stable-fixes).
- drm/ttm: Should to return the evict error (stable-fixes).
- drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes).
- drm/vmwgfx: Fix Use-after-free in validation (git-fixes).
- drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes).
- drm/vmwgfx: Fix copy-paste typo in validation (git-fixes).
- drm/xe/bmg: Add new PCI IDs (stable-fixes).
- drm/xe/bmg: Add one additional PCI ID (stable-fixes).
- drm/xe/bmg: Update Wa_22019338487 (git-fixes).
- drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes).
- drm/xe/hw_engine_group: Fix double write lock release in error path (git-fixes).
- drm/xe/mocs: Initialize MOCS index early (stable-fixes).
- drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes).
- drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes).
- drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes).
- drm/xe/tile: Release kobject for the failure path (git-fixes).
- drm/xe/uapi: Correct sync type definition in comments (git-fixes).
- drm/xe/uapi: loosen used tracking restriction (git-fixes).
- drm/xe/vf: Disable CSC support on VF (git-fixes).
- drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes).
- drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes).
- drm/xe/xe_sync: avoid race during ufence signaling (git-fixes).
- drm/xe: Allow dropping kunit dependency as built-in (git-fixes).
- drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes).
- drm/xe: Carve out wopcm portion from the stolen memory (git-fixes).
- drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes).
- drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes).
- drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git-fixes).
- drm/xe: Fix build without debugfs (git-fixes).
- drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes).
- drm/xe: Move page fault init after topology init (git-fixes).
- drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git-fixes).
- drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes).
- dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331).
- dt-bindings: dpll: Add support for Microchip Azurite chip family (jsc#PED-13331).
- e1000e: disregard NVM checksum on tgp when valid checksum bit is not set (git-fixes).
- e1000e: ignore uninitialized checksum word on tgp (git-fixes).
- efi: stmm: Fix incorrect buffer allocation method (git-fixes).
- erofs: avoid reading more for fragment maps (git-fixes).
- erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git-fixes).
- execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes).
- exfat: add cluster chain loop check for dir (git-fixes).
- exfat: fdatasync flag should be same like generic_write_sync() (git-fixes).
- ext4: fix checks for orphan inodes (bsc#1250119).
- ext4: remove writable userspace mappings before truncating page cache (bsc#1247223).
- fbcon: Fix OOB access in font allocation (git-fixes).
- fbcon: Fix outdated registered_fb reference in comment (git-fixes).
- fbcon: fix integer overflow in fbcon_do_set_font (git-fixes).
- fbdev: Fix logic error in "offb" name match (git-fixes).
- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes).
- fbdev: fix potential buffer overflow in do_register_framebuffer() (stable-fixes).
- fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes).
- fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes).
- fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git-fixes).
- firewire: core: fix overlooked update of subsystem ABI version (git-fixes).
- firewire: ohci: correct code comments about bus_reset tasklet (git-fixes).
- firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall (stable-fixes).
- firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes).
- firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes).
- firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver (git-fixes).
- firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early during resume (stable-fixes).
- firmware: firmware: meson-sm: fix compile-test default (git-fixes).
- firmware: meson_sm: fix device leak at probe (git-fixes).
- firmware: tegra: Fix IVC dependency problems (stable-fixes).
- flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes).
- fs/nfs/io: make nfs_start_io_*() killable (git-fixes).
- fs/proc/task_mmu: check p-&gt;vec_buf for NULL (git-fixes).
- fs/proc: Use inode_get_dev() for device numbers in procmap_query References: bsc#1246450
- ftrace: Fix function profiler's filtering functionality (git-fixes).
- ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes).
- gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220).
- gfs2: Clean up delete work processing (bsc#1247220).
- gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220).
- gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220).
- gfs2: Minor delete_work_func cleanup (bsc#1247220).
- gfs2: Only defer deletes when we have an iopen glock (bsc#1247220).
- gfs2: Prevent inode creation race (2) (bsc#1247220).
- gfs2: Prevent inode creation race (bsc#1247220).
- gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220).
- gfs2: Rename GIF_{DEFERRED -&gt; DEFER}_DELETE (bsc#1247220).
- gfs2: Rename dinode_demise to evict_behavior (bsc#1247220).
- gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220).
- gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (bsc#1247220).
- gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220).
- gfs2: Update to the evict / remote delete documentation (bsc#1247220).
- gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220).
- gfs2: gfs2_evict_inode clarification (bsc#1247220).
- gfs2: minor evict fix (bsc#1247220).
- gfs2: skip if we cannot defer delete (bsc#1247220).
- gpio: mlxbf2: use platform_get_irq_optional() (git-fixes).
- gpio: mlxbf3: use platform_get_irq_optional() (git-fixes).
- gpio: tps65912: check the return value of regmap_update_bits() (stable-fixes).
- gpio: virtio: Fix config space reading (git-fixes).
- gpio: wcd934x: check the return value of regmap_update_bits() (stable-fixes).
- gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes).
- gpiolib: Extend software-node support to support secondary software-nodes (git-fixes).
- gve: Fix stuck TX queue for DQ queue format (git-fixes).
- gve: prevent ethtool ops after shutdown (git-fixes).
- habanalabs: fix UAF in export_dmabuf() (git-fixes).
- hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes).
- hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
- hv_netvsc: Link queues to NAPIs (git-fixes).
- hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes).
- hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes).
- hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes).
- hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes).
- hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes).
- hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes).
- hwrng: nomadik - add ARM_AMBA dependency (git-fixes).
- i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes).
- i2c: designware: Add disabling clocks when probe fails (git-fixes).
- i2c: designware: Add quirk for Intel Xe (stable-fixes).
- i2c: designware: Fix clock issue when PM is disabled (git-fixes).
- i2c: designware: Use temporary variable for struct device (stable-fixes).
- i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes).
- i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes).
- i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git-fixes).
- i2c: omap: Add support for setting mux (stable-fixes).
- i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes).
- i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes).
- i2c: omap: fix deprecated of_property_read_bool() use (git-fixes).
- i2c: qup: jump out of the loop in case of timeout (git-fixes).
- i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes).
- i2c: tegra: Fix reset error handling with ACPI (git-fixes).
- i2c: tegra: Use internal reset when reset property is not available (bsc#1249143)
- i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes).
- i3c: Fix default I2C adapter timeout value (git-fixes).
- i3c: add missing include to internal header (stable-fixes).
- i3c: do not fail if GETHDRCAP is unsupported (stable-fixes).
- i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes).
- i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes).
- i3c: master: svc: Recycle unused IBI slot (git-fixes).
- i3c: master: svc: Use manual response for IBI events (git-fixes).
- i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes).
- i40e: report VF tx_dropped with tx_errors instead of tx_discards (git-fixes).
- ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git-fixes).
- ice, irdma: fix an off by one in error handling code (bsc#1247712).
- ice, irdma: move interrupts code to irdma (bsc#1247712).
- ice/ptp: fix crosstimestamp reporting (git-fixes).
- ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712).
- ice: Replace ice specific DSCP mapping num with a kernel define (jsc#PED-13728 jsc#PED-13762).
- ice: check correct pointer in fwlog debugfs (git-fixes).
- ice: count combined queues using Rx/Tx count (bsc#1247712).
- ice: devlink PF MSI-X max and min parameter (bsc#1247712).
- ice: do not leave device non-functional if Tx scheduler config fails (git-fixes).
- ice: enable_rdma devlink param (bsc#1247712).
- ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset (jsc#PED-13728).
- ice: fix incorrect counter for buffer allocation failures (git-fixes).
- ice: get rid of num_lan_msix field (bsc#1247712).
- ice: init flow director before RDMA (bsc#1247712).
- ice: remove splitting MSI-X between features (bsc#1247712).
- ice: simplify VF MSI-X managing (bsc#1247712).
- ice: treat dyn_allowed only as suggestion (bsc#1247712).
- ice: use fixed adapter index for E825C embedded devices (git-fixes).
- idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762).
- idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728 jsc#PED-13762).
- idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762).
- idpf: add cross timestamping (jsc#PED-13728).
- idpf: add flow steering support (jsc#PED-13728).
- idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762).
- idpf: add mailbox access to read PTP clock time (jsc#PED-13728 jsc#PED-13762).
- idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762).
- idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728).
- idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728 jsc#PED-13762).
- idpf: change the method for mailbox workqueue allocation (jsc#PED-13728 jsc#PED-13762).
- idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728).
- idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728 jsc#PED-13762).
- idpf: implement RDMA vport auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762).
- idpf: implement core RDMA auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762).
- idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762).
- idpf: implement remaining IDC RDMA core callbacks and handlers (jsc#PED-13728 jsc#PED-13762).
- idpf: improve when to set RE bit logic (jsc#PED-13728).
- idpf: move virtchnl structures to the header file (jsc#PED-13728 jsc#PED-13762).
- idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728 jsc#PED-13762).
- idpf: preserve coalescing settings across resets (jsc#PED-13728).
- idpf: remove obsolete stashing code (jsc#PED-13728).
- idpf: remove unreachable code from setting mailbox (jsc#PED-13728 jsc#PED-13762).
- idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728).
- idpf: set mac type when adding and removing MAC filters (jsc#PED-13728).
- idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728).
- idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728).
- idpf: use reserved RDMA vectors from control plane (jsc#PED-13728 jsc#PED-13762).
- igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes).
- igc: disable L1.2 PCI-E link substate to avoid performance issue (git-fixes).
- igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes).
- iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762).
- iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762).
- iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762).
- iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728 jsc#PED-13762).
- iio/adc/pac1934: fix channel disable configuration (git-fixes).
- iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git-fixes).
- iio: accel: fxls8962af: Fix temperature calculation (git-fixes).
- iio: adc: ad7173: fix setting ODR in probe (git-fixes).
- iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes).
- iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable-fixes).
- iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes).
- iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes).
- iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes).
- iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes).
- iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes).
- iio: adc: max1363: Reorder mode_list[] entries (stable-fixes).
- iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes).
- iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes).
- iio: common: st_sensors: Fix use of uninitialize device structs (stable-fixes).
- iio: consumers: Fix handling of negative channel scale in iio_convert_raw_to_processed() (git-fixes).
- iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git-fixes).
- iio: dac: ad5360: use int type to store negative error codes (git-fixes).
- iio: dac: ad5421: use int type to store negative error codes (git-fixes).
- iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes).
- iio: frequency: adf4350: Fix prescaler usage (git-fixes).
- iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes).
- iio: hid-sensor-prox: Restore lost scale assignments (git-fixes).
- iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes).
- iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes).
- iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes).
- iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes).
- iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes).
- iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes).
- iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes).
- iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes).
- iio: light: as73211: Ensure buffer holes are zeroed (git-fixes).
- iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes).
- iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes).
- iio: proximity: isl29501: fix buffered read on big-endian systems (git-fixes).
- iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() (git-fixes).
- iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes).
- iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes).
- integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343).
- intel_idle: Provide the default enter_dead() handler (jsc#PED-13815).
- intel_idle: Rescan "dead" SMT siblings during initialization (jsc#PED-13815).
- intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815).
- interconnect: qcom: sc8180x: specify num_nodes (git-fixes).
- interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git-fixes).
- io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop blacklisting.
- io_uring: expose read/write attribute capability (jsc#PED-12882 bsc#1237542).
- io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes).
- iommu/amd: Enable PASID and ATS capabilities in the correct order (git-fixes).
- iommu/amd: Fix alias device DTE setting (git-fixes).
- iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes).
- iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes).
- iommu/arm-smmu-v3: Fix smmu_domain-&gt;nr_ats_masters decrement (git-fixes).
- iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git-fixes).
- iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes).
- iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git-fixes).
- iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all (git-fixes).
- iommu/vt-d: Fix possible circular locking dependency (git-fixes).
- iommu/vt-d: Fix system hang on reboot -f (git-fixes).
- iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes).
- iommu: Handle race with default domain setup (git-fixes).
- iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes).
- ipmi: Fix strcpy source and destination the same (stable-fixes).
- ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable-fixes).
- ipv6: annotate data-races around rt-&gt;fib6_nsiblings (git-fixes).
- ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes).
- ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes).
- ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes).
- ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes).
- irdma: free iwdev-&gt;rf after removing MSI-X (bsc#1247712).
- isolcpus: add missing hunk back (bsc#1236897 bsc#1249206).
- iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes).
- ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410).
- ixgbe: prevent from unwanted interface name changes (git-fixes).
- ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git-fixes).
- kABI fix after Add TDX support for vSphere (jsc#PED-13302).
- kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
- kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).
- kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes).
- kABI fix after vhost: Reintroduce kthread API and add mode selection (git-fixes).
- kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121).
- kABI workaround for amd_sfh (git-fixes).
- kABI workaround for drm_gem.h (git-fixes).
- kABI workaround for struct mtk_base_afe changes (git-fixes).
- kABI: Fix the module::name type in audit_context (git-fixes).
- kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-fixes).
- kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes).
- kABI: fix for struct devlink_port_attrs: move new member to the end (git-fixes).
- kABI: netfilter: supress warnings for nft_set_ops (git-fixes).
- kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git-fixes).
- kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They are used only locally
- kabi/severities: ignore two unused/dropped symbols from MEI
- kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745).
- kabi: Restore layout of parallel_data (bsc1248343).
- kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963).
- kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes).
- kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655).
- kbuild: rust: add rustc-min-version support function (git-fixes)
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- kernel: globalize lookup_or_create_module_kobject() (stable-fixes).
- kernel: param: rename locate_module_kobject (stable-fixes).
- leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes).
- leds: flash: leds-qcom-flash: Update torch current clamp setting (git-fixes).
- leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes).
- leds: leds-lp55xx: Use correct address for memory programming (git-fixes).
- lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897).
- libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes).
- libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728 jsc#PED-13762).
- livepatch: Add stack_order sysfs attribute (poo#187320).
- loop: use kiocb helpers to fix lockdep warning (git-fixes).
- lpfc: do not use file-&gt;f_path.dentry for comparisons (bsc#1250519).
- mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes).
- mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes).
- mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes).
- mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git-fixes).
- mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes).
- mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable-fixes).
- mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes).
- mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes).
- mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git-fixes).
- mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git-fixes).
- mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes).
- maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes).
- maple_tree: fix status setup on restore to active (git-fixes).
- maple_tree: fix testing for 32 bit builds (git-fixes).
- mctp: no longer rely on net-&gt;dev_index_head (git-fixes).
- md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes).
- md: allow removing faulty rdev during resync (git-fixes).
- md: dm-zoned-target: Initialize return variable r to avoid uninitialized use (git-fixes).
- md: make rdev_addable usable for rcu mode (git-fixes).
- media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes).
- media: cec: extron-da-hd-4k-plus: drop external-module make commands (git-fixes).
- media: cx18: Add missing check after DMA map (git-fixes).
- media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes).
- media: dvb-frontends: w7090p: fix null-ptr-deref in
  w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes).
- media: gspca: Add bounds checking to firmware parser (git-fixes).
- media: hi556: Fix reset GPIO timings (stable-fixes).
- media: hi556: correct the test pattern configuration (git-fixes).
- media: i2c: mt9v111: fix incorrect type for ret (git-fixes).
- media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes).
- media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes).
- media: ipu-bridge: Add _HID for OV5670 (stable-fixes).
- media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes).
- media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls (git-fixes).
- media: lirc: Fix error handling in lirc_register() (git-fixes).
- media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes).
- media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git-fixes).
- media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes).
- media: pci: ivtv: Add missing check after DMA map (git-fixes).
- media: pci: mg4b: fix uninitialized iio scan data (git-fixes).
- media: pisp_be: Fix pm_runtime underrun in probe (git-fixes).
- media: qcom: camss: cleanup media device allocated resource on error path (git-fixes).
- media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git-fixes).
- media: rc: fix races with imon_disconnect() (git-fixes).
- media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes).
- media: s5p-mfc: remove an unused/uninitialized variable (git-fixes).
- media: st-delta: avoid excessive stack usage (git-fixes).
- media: tc358743: Check I2C succeeded during probe (stable-fixes).
- media: tc358743: Increase FIFO trigger level to 374 (stable-fixes).
- media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes).
- media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes).
- media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes).
- media: ti: j721e-csi2rx: fix list_del corruption (git-fixes).
- media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes).
- media: usb: hdpvr: disable zero-length read messages (stable-fixes).
- media: usbtv: Lock resolution while streaming (git-fixes).
- media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes).
- media: uvcvideo: Do not mark valid metadata as invalid (git-fixes).
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git-fixes).
- media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes).
- media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git-fixes).
- media: uvcvideo: Rollback non processed entities on error (git-fixes).
- media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes).
- media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes).
- media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes).
- media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes).
- media: v4l2: Add support for NV12M tiled variants to v4l2_format_info() (git-fixes).
- media: venus: Add a check for packet size after reading from shared memory (git-fixes).
- media: venus: Fix MSM8998 frequency table (git-fixes).
- media: venus: Fix OOB read due to missing payload bound check (git-fixes).
- media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes).
- media: venus: hfi: explicitly release IRQ during teardown (git-fixes).
- media: venus: protect against spurious interrupts during probe (git-fixes).
- media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git-fixes).
- media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git-fixes).
- media: verisilicon: Fix AV1 decoder clock frequency (git-fixes).
- media: vivid: fix wrong pixel_array control size (git-fixes).
- media: zoran: Remove zoran_fh structure (git-fixes).
- mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes).
- mei: vsc: Destroy mutex after freeing the IRQ (git-fixes).
- mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes).
- mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable-fixes).
- mei: vsc: Event notifier fixes (git-fixes).
- mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes).
- mei: vsc: Run event callback from a workqueue (git-fixes).
- mei: vsc: Unset the event callback on remove and probe errors (git-fixes).
- memory: mtk-smi: Add ostd setting for mt8186 (git-fixes).
- memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git-fixes).
- memstick: Fix deadlock by moving removing flag earlier (git-fixes).
- mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes).
- mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes).
- mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() (git-fixes).
- mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes).
- mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes).
- microchip: lan865x: Fix LAN8651 autoloading (git-fixes).
- microchip: lan865x: Fix module autoloading (git-fixes).
- microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git-fixes).
- microchip: lan865x: fix missing netif_start_queue() call on device open (git-fixes).
- misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes).
- misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes).
- misc: fastrpc: Skip reference for DMA handles (git-fixes).
- misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes).
- misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes).
- misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git-fixes).
- misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable-fixes).
- misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes).
- mm/damon/core: avoid destroyed target reference from DAMOS quota (git-fixes).
- mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota() (git-fixes).
- mm/damon/core: set quota-&gt;charged_from to jiffies at first charge window (git-fixes).
- mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() (git-fixes).
- mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes).
- mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() (git-fixes).
- mm/damon/sysfs: fix use-after-free in state_show() (git-fixes).
- mm/memory-failure: fix redundant updates for already poisoned pages (bsc#1250087).
- mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes)
- mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes).
- mm: close theoretical race where stale TLB entries could linger (git-fixes).
- mm: fault in complete folios instead of individual pages for tmpfs (git-fixes).
- mm: fix the inaccurate memory statistics issue for users (bsc#1244723).
- mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes).
- mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git-fixes).
- mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630).
- mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630).
- mm: move page table sync declarations to linux/pgtable.h (git-fixes).
- mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes).
- mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes).
- mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes).
- mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes).
- mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes).
- mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable-fixes).
- mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable-fixes).
- mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes).
- mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes).
- mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes).
- mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes).
- module: Fix memory deallocation on error path in move_module() (git-fixes).
- module: Prevent silent truncation of module name in delete_module(2) (git-fixes).
- module: Remove unnecessary +1 from last_unloaded_module::name size (git-fixes).
- module: Restore the moduleparam prefix length check (git-fixes).
- most: core: Drop device reference after usage in get_channel() (git-fixes).
- mptcp: fix spurious wake-up on under memory pressure (git-fixes).
- mtd: fix possible integer overflow in erase_xfer() (git-fixes).
- mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes).
- mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes).
- mtd: rawnand: atmel: Fix error handling path in atmel_nand_controller_add_nands (git-fixes).
- mtd: rawnand: atmel: set pmecc data setup time (git-fixes).
- mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes).
- mtd: rawnand: omap2: fix device leak on probe failure (git-fixes).
- mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() (git-fixes).
- mtd: rawnand: renesas: Add missing check after DMA map (git-fixes).
- mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes).
- mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git-fixes).
- mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes).
- mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes).
- mtd: spi-nor: spansion: Fixup params-&gt;set_4byte_addr_mode for SEMPER (git-fixes).
- mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes).
- mwl8k: Add missing check after DMA map (git-fixes).
- neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes).
- net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes).
- net/mlx5: CT: Use the correct counter offset (git-fixes).
- net/mlx5: Check device memory pointer before usage (git-fixes).
- net/mlx5: Correctly set gso_segs when LRO is used (git-fixes).
- net/mlx5: Correctly set gso_size when LRO is used (git-fixes).
- net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes).
- net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes).
- net/mlx5: Fix memory leak in cmd_exec() (git-fixes).
- net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (git-fixes).
- net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path (git-fixes).
- net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes).
- net/mlx5: Nack sync reset when SFs are present (git-fixes).
- net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes).
- net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes).
- net/mlx5e: Add new prio for promiscuous mode (git-fixes).
- net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git-fixes).
- net/mlx5e: Preserve shared buffer capacity during headroom updates (git-fixes).
- net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes).
- net/mlx5e: Set local Xoff after FW update (git-fixes).
- net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes).
- net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes).
- net/packet: fix a race in packet_set_ring() and packet_notifier() (git-fixes).
- net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes).
- net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git-fixes).
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes).
- net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes).
- net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll (git-fixes).
- net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes).
- net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN-untagged traffic (git-fixes).
- net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes).
- net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes).
- net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes).
- net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes).
- net: ieee8021q: fix insufficient table-size assertion (stable-fixes).
- net: llc: reset skb-&gt;transport_header (git-fixes).
- net: mana: Add handler for hardware servicing events (bsc#1245730).
- net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726).
- net: mana: Add support for net_shaper_ops (bsc#1245726).
- net: mana: Allocate MSI-X vectors dynamically (bsc#1245457).
- net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457).
- net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729).
- net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes).
- net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726).
- net: mana: Handle Reset Request from MANA NIC (bsc#1245728).
- net: mana: Handle unsupported HWC commands (bsc#1245726).
- net: mana: Set tx_packets to post gso processing packet count (bsc#1245731).
- net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754).
- net: mana: explain irq_setup() algorithm (bsc#1245457).
- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).
- net: mctp: handle skb cleanup on sock_queue failures (git-fixes).
- net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes).
- net: nfc: nci: Add parameter validation for packet data (git-fixes).
- net: page_pool: allow enabling recycling late, fix false positive warning (git-fixes).
- net: phy: bcm54811: PHY initialization (stable-fixes).
- net: phy: fix phy_uses_state_machine() (git-fixes).
- net: phy: micrel: Add ksz9131_resume() (stable-fixes).
- net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes).
- net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes).
- net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes).
- net: rose: convert 'use' field to refcount_t (git-fixes).
- net: rose: fix a typo in rose_clear_routes() (git-fixes).
- net: rose: include node references in rose_neigh refcount (git-fixes).
- net: rose: split remove and free operations in rose_remove_neigh() (stable-fixes).
- net: thunderbolt: Enable end-to-end flow control also in transmit (stable-fixes).
- net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes).
- net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git-fixes).
- net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git-fixes).
- net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes).
- net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes).
- net: usb: cdc-ncm: check for filtering capability (git-fixes).
- net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable-fixes).
- net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git-fixes).
- net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes).
- net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes).
- net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes).
- net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes).
- netfilter: ctnetlink: fix refcount leak on table dump (git-fixes).
- netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes).
- netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around (git-fixes).
- netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git-fixes).
- netfilter: nf_reject: do not leak dst refcount for loopback packets (git-fixes).
- netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes).
- netfilter: nf_tables: adjust lockdep assertions handling (git-fixes).
- netfilter: nf_tables: fix set size with rbtree backend (git-fixes).
- netfilter: nf_tables: imbalance in flowtable binding (git-fixes).
- netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template (git-fixes).
- netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes).
- netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237).
- netfilter: nft_set_hash: skip duplicated elements pending gc run (git-fixes).
- netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git-fixes).
- netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes).
- netfilter: nft_tunnel: fix geneve_opt dump (git-fixes).
- netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds (git-fixes).
- netlink: fix policy dump for int with validation callback (jsc#PED-13331).
- netlink: specs: devlink: replace underscores with dashes in names (jsc#PED-13331).
- netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes).
- nfs/localio: add direct IO enablement with sync and async IO support (git-fixes).
- nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter (git-fixes).
- nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes).
- nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes).
- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes).
- nouveau: fix disabling the nonstall irq due to storm code (git-fixes).
- nvme-auth: update bi_directional flag (git-fixes).
- nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500).
- nvme-pci: try function level reset on init failure (git-fixes).
- nvme-tcp: log TLS handshake failures at error level (git-fixes).
- nvme-tcp: send only permitted commands for secure concat (git-fixes).
- nvme: fix PI insert on write (git-fixes).
- nvme: fix endianness of command word prints in nvme_log_err_passthru() (git-fixes).
- nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes).
- nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes).
- nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500).
- nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500).
- nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500).
- nvmet-tcp: fix callback lock for TLS handshake (git-fixes).
- nvmet: exit debugfs after discovery subsystem exits (git-fixes).
- nvmet: initialize discovery subsys after debugfs is initialized (git-fixes).
- nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails (git-fixes).
- objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() (stable-fixes).
- objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes).
- objtool, regulator: rk808: Remove potential undefined behavior in rk806_set_mode_dcdc() (stable-fixes).
- of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes).
- of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git-fixes).
- of: resolver: Fix device node refcount leakage in of_resolve_phandles() (git-fixes).
- of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes).
- of: unittest: Fix device reference count leak in of_unittest_pci_node_verify (git-fixes).
- of: unittest: Unlock on error in unittest_data_add() (git-fixes).
- pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes).
- pNFS: Fix disk addr range check in block/scsi layout (git-fixes).
- pNFS: Fix stripe mapping in block/scsi layout (git-fixes).
- pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes).
- pNFS: Handle RPC size limit for layoutcommits (git-fixes).
- percpu: fix race on alloc failed warning limit (git-fixes).
- perf bpf-event: Fix use-after-free in synthesis (git-fixes).
- perf bpf-utils: Constify bpil_array_desc (git-fixes).
- perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes).
- perf dso: Add missed dso__put to dso__load_kcore (git-fixes).
- perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes).
- perf parse-events: Set default GH modifier properly (git-fixes).
- perf record: Cache build-ID of hit DSOs only (git-fixes).
- perf sched: Fix memory leaks for evsel-&gt;priv in timehist (git-fixes).
- perf sched: Fix memory leaks in 'perf sched latency' (git-fixes).
- perf sched: Fix memory leaks in 'perf sched map' (git-fixes).
- perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes).
- perf sched: Free thread-&gt;priv using priv_destructor (git-fixes).
- perf sched: Make sure it frees the usage string (git-fixes).
- perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes).
- perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git-fixes).
- perf test: Fix a build error in x86 topdown test (git-fixes).
- perf tests bp_account: Fix leaked file descriptor (git-fixes).
- perf tools: Remove libtraceevent in .gitignore (git-fixes).
- perf topdown: Use attribute to see an event is a topdown metic or slots (git-fixes).
- perf trace: Remove --map-dump documentation (git-fixes).
- phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes).
- phy: mscc: Fix parsing of unicast frames (git-fixes).
- phy: mscc: Fix timestamping for vsc8584 (git-fixes).
- phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence (git-fixes).
- phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git-fixes).
- phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes).
- phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable-fixes).
- phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes).
- phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy-&gt;rate in case of errors (git-fixes).
- phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes).
- phy: tegra: xusb: fix device and OF node leak at probe (git-fixes).
- phy: ti-pipe3: fix device leak at unbind (git-fixes).
- phy: ti: omap-usb2: fix device leak at unbind (git-fixes).
- pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113).
- pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562).
- pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes).
- pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git-fixes).
- pinctrl: equilibrium: Remove redundant semicolons (git-fixes).
- pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes).
- pinctrl: renesas: Use int type to store negative error codes (git-fixes).
- pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read() (git-fixes).
- pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes).
- pinctrl: stm32: Manage irq affinity settings (stable-fixes).
- pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes).
- pinmux: fix race causing mux_owner NULL with active mux_usecount (git-fixes).
- platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git-fixes).
- platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready (stable-fixes).
- platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable-fixes).
- platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes).
- platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git-fixes).
- platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes).
- platform/x86/amd/hsmp: Ensure sock-&gt;metric_tbl_addr is non-NULL (git-fixes).
- platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes).
- platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes).
- platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes).
- platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes).
- platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable-fixes).
- platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes).
- platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes).
- platform/x86: Fix initialization order for firmware_attributes_class (git-fixes).
- platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA (stable-fixes).
- platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 (stable-fixes).
- platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git-fixes).
- platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git-fixes).
- platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git-fixes).
- platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes).
- platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes).
- pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes).
- pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable-fixes).
- power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes).
- power: supply: bq27xxx: restrict no-battery detection to bq27000 (git-fixes).
- power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes).
- power: supply: cw2015: Fix a alignment coding style issue (git-fixes).
- power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git-fixes).
- power: supply: max77976_charger: fix constant current reporting (git-fixes).
- power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes).
- powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git-fixes).
- powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199).
- powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199).
- powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git-fixes).
- powerpc/ftrace: ensure ftrace record ops are always set for NOPs (jsc#PED-10909 git-fixes).
- powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199).
- powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199).
- powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199).
- powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199).
- powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343).
- powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343).
- powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (jsc#PED-10909 git-fixes).
- powerpc: do not build ppc_save_regs.o always (bsc#1215199).
- powerpc: floppy: Add missing checks after DMA map (bsc#1215199).
- pptp: fix pptp_xmit() error path (git-fixes).
- printk: nbcon: Allow reacquire during panic (bsc#1246688).
- psample: adjust size if rate_as_probability is set (git-fixes).
- ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes).
- pwm: berlin: Fix wrong register in suspend/resume (git-fixes).
- pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes).
- pwm: mediatek: Fix duty and period setting (git-fixes).
- pwm: mediatek: Handle hardware enable and clock enable separately (stable-fixes).
- pwm: rockchip: Round period/duty down on apply, up on get (git-fixes).
- pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes).
- pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes).
- pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git-fixes).
- pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes).
- r8169: add support for RTL8125D (stable-fixes).
- r8169: disable RTL8126 ZRX-DC timeout (stable-fixes).
- r8169: do not scan PHY addresses &gt; 0 (stable-fixes).
- rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes)
- regmap: Remove superfluous check for !config in __regmap_init() (git-fixes).
- regulator: core: fix NULL dereference on unbind due to stale coupling data (stable-fixes).
- regulator: scmi: Use int type to store negative error codes (git-fixes).
- regulator: sy7636a: fix lifecycle of power good gpio (git-fixes).
- reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes).
- reset: eyeq: fix OF node leak (git-fixes).
- resource: Add resource set range and size helpers (jsc#PED-13728 jsc#PED-13762).
- resource: fix false warning in __request_region() (git-fixes).
- ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes).
- ring-buffer: Make reading page consistent with the code logic (git-fixes).
- rpm/config.sh: SLFO 1.2 is now synced to OBS as well
- rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes).
- rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes).
- rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable-fixes).
- rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes).
- rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes).
- rtc: optee: fix memory leak on driver removal (git-fixes).
- rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes).
- rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes).
- rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes).
- rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes).
- s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1247837).
- s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246868).
- s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249477).
- s390/early: Copy last breaking event address to pt_regs (git-fixes bsc#1249061).
- s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727 git-fixes).
- s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes).
- s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372).
- s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes bsc#1247838).
- s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066).
- s390/mm: Remove possible false-positive warning in pte_free_defer() (git-fixes bsc#1247366).
- s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478).
- s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728 git-fixes).
- s390/sclp: Fix SCCB present check (git-fixes bsc#1249065).
- s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062).
- s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064).
- samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes).
- samples: mei: Fix building on musl libc (git-fixes).
- sched/deadline: Always stop dl-server before changing parameters (bsc#1247936).
- sched/deadline: Do not count nr_running for dl_server proxy tasks (git-fixes, bsc#1247936).
- sched/deadline: Fix RT task potential starvation when expiry time passed (git-fixes, bsc#1247936).
- sched/deadline: Fix dl_server_stopped() (bsc#1247936).
- sched/deadline: Initialize dl_servers after SMP (git-fixes)
- sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes)
- scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes).
- scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes).
- scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519).
- scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: isci: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519).
- scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519).
- scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519).
- scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519).
- scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int (bsc#1250519).
- scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519).
- scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519).
- scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519).
- scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519).
- scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519).
- scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519).
- scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519).
- scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519).
- scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519).
- scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519).
- scsi: lpfc: Use int type to store negative error codes (bsc#1250519).
- scsi: lpfc: Use switch case statements in DIF debugfs handlers (bsc#1250519).
- scsi: lpfc: use min() to improve code (bsc#1250519).
- scsi: mpi3mr: Event processing debug improvement (bsc#1251186).
- scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186).
- scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251186).
- scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251186).
- scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes).
- scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186).
- scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes).
- scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git-fixes).
- scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186).
- scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186).
- scsi: mpt3sas: Fix a fw_event memory leak (git-fixes).
- scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes).
- scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes).
- scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes).
- scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes).
- scsi: qla2xxx: Remove firmware URL (git-fixes).
- scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git-fixes).
- scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes).
- scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes).
- scsi: smartpqi: Enhance WWID logging logic (bsc#1246631).
- scsi: smartpqi: Take drives offline when controller is offline (bsc#1246631).
- scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631).
- scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed (git-fixes).
- scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git-fixes).
- scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes).
- scsi: ufs: core: Add missing post notify for power mode change (git-fixes).
- scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes).
- scsi: ufs: core: Always initialize the UIC done completion (git-fixes).
- scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git-fixes).
- scsi: ufs: core: Fix clk scaling to be conditional in reset and restore (git-fixes).
- scsi: ufs: core: Fix error return with query response (git-fixes).
- scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes).
- scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out() (git-fixes).
- scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers (git-fixes).
- scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes).
- scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes).
- scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes).
- scsi: ufs: core: Remove redundant query_complete trace (git-fixes).
- scsi: ufs: core: Set default runtime/system PM levels before ufshcd_hba_init() (git-fixes).
- scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe (git-fixes).
- scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume (git-fixes).
- scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes).
- scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster (git-fixes).
- scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git-fixes).
- scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes).
- scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init() (git-fixes).
- scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes).
- scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes).
- scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes).
- scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes).
- scsi: ufs: exynos: Remove empty drv_init method (git-fixes).
- scsi: ufs: exynos: Remove superfluous function parameter (git-fixes).
- scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes).
- scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git-fixes).
- scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git-fixes).
- scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove() (git-fixes).
- scsi: ufs: qcom: Fix crypto key eviction (git-fixes).
- scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git-fixes).
- scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes).
- scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers (git-fixes).
- seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes bsc#1250671).
- selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE (poo#187320).
- selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344).
- selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320).
- selftests/livepatch: Replace hardcoded module name with variable in test-callbacks.sh (poo#187320).
- selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320).
- selftests/run_kselftest.sh: Use readlink if realpath is not available (poo#187320).
- selftests/tracing: Fix false failure of subsystem event test (git-fixes).
- selftests: ALSA: fix memory leak in utimer test (git-fixes).
- selftests: livepatch: add new ftrace helpers functions (poo#187320).
- selftests: livepatch: add test cases of stack_order sysfs interface (poo#187320).
- selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320).
- selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320).
- selftests: livepatch: save and restore kprobe state (poo#187320).
- selftests: livepatch: test if ftrace can trace a livepatched function (poo#187320).
- selftests: livepatch: test livepatching a kprobed function (poo#187320).
- selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443).
- selinux: change security_compute_sid to return the ssid or tsid on match (git-fixes).
- selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable-fixes).
- serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688).
- serial: 8250: fix panic due to PSLVERR (git-fixes).
- serial: max310x: Add error checking in probe() (git-fixes).
- serial: sc16is7xx: fix bug in flow control levels init (git-fixes).
- skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
- slab: Decouple slab_debug and no_hash_pointers (bsc#1249022).
- smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206).
- smb: client: fix netns refcount leak after net_passive changes (git-fixes).
- soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes).
- soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes).
- soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git-fixes).
- soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git-fixes).
- soc: qcom: QMI encoding/decoding for big endian (git-fixes).
- soc: qcom: fix endianness for QMI header (git-fixes).
- soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes).
- soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes).
- soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git-fixes).
- soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git-fixes).
- soc: qcom: pmic_glink: fix OF node leak (git-fixes).
- soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes).
- soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes).
- soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes).
- soundwire: amd: cancel pending slave status handling workqueue during remove sequence (stable-fixes).
- soundwire: amd: fix for handling slave alerts after link is down (git-fixes).
- soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes).
- soundwire: stream: restore params when prepare ports fail (git-fixes).
- spi: bcm2835: Remove redundant semicolons (git-fixes).
- spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes).
- spi: cadence-quadspi: Flush posted register writes before DAC access (git-fixes).
- spi: cadence-quadspi: Flush posted register writes before INDAC access (git-fixes).
- spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable-fixes).
- spi: cs42l43: Property entry should be a null-terminated array (bsc#1246979).
- spi: fix return code when spi device has too many chipselects (git-fixes).
- spi: mtk-snfi: Remove redundant semicolons (git-fixes).
- spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes).
- spi: spi-fsl-lpspi: Clear status register after disabling the module (git-fixes).
- spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes).
- spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git-fixes).
- spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes).
- spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes).
- sprintf.h requires stdarg.h (git-fixes).
- sprintf.h: mask additional include (git-fixes).
- squashfs: fix memory leak in squashfs_fill_super (git-fixes).
- staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes).
- staging: axis-fifo: fix maximum TX packet length check (git-fixes).
- staging: axis-fifo: flush RX FIFO on read errors (git-fixes).
- staging: axis-fifo: remove sysfs interface (git-fixes).
- staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git-fixes).
- staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (git-fixes).
- staging: nvec: Fix incorrect null termination of battery manufacturer (git-fixes).
- staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes).
- struct cdc_ncm_ctx: move new member to end (git-fixes).
- sunrpc: fix client side handling of tls alerts (git-fixes).
- sunrpc: fix handling of server side tls alerts (git-fixes).
- sunrpc: fix null pointer dereference on zero-length checksum (git-fixes).
- sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes).
- supported.conf: Mark ZL3073X modules supported
- supported.conf: mark hyperv_drm as external
- tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes).
- tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
- thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data (stable-fixes).
- thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable-fixes).
- thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const (stable-fixes).
- thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes).
- thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes).
- thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes).
- thunderbolt: Compare HMAC values in constant time (git-fixes).
- thunderbolt: Fix copy+paste error in match_service_id() (git-fixes).
- tools/power turbostat: Clustered Uncore MHz counters should honor show/hide options (stable-fixes).
- tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes).
- tools/power turbostat: Fix build with musl (stable-fixes).
- tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes).
- tools/power turbostat: Handle non-root legacy-uncore sysfs permissions (stable-fixes).
- tools/resolve_btfids: Fix build when cross compiling kernel with clang (git-fixes).
- tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes).
- trace/fgraph: Fix error handling (git-fixes).
- trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (git-fixes).
- tracepoint: Print the function symbol when tracepoint_debug is set (jsc#PED-13631).
- tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes).
- tracing/kprobes: Fix to free objects when failed to copy a symbol (git-fixes).
- tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes).
- tracing: Fix filter string testing (git-fixes).
- tracing: Fix using ret variable in tracing_set_tracer() (git-fixes).
- tracing: Remove unneeded goto out logic (bsc#1249286).
- tracing: Switch trace.c code over to use guard() (git-fixes).
- tracing: Switch trace_events_hist.c code over to use guard() (git-fixes).
- tracing: fprobe events: Fix possible UAF on modules (git-fixes).
- tracing: tprobe-events: Fix leakage of module refcount (git-fixes).
- tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062).
- tty: n_gsm: Do not block input queue by waiting MSC (git-fixes).
- tty: serial: fix print format specifiers (stable-fixes).
- ublk: sanity check add_dev input for underflow (git-fixes).
- ublk: use vmalloc for ublk_device's __queues (git-fixes).
- ucount: fix atomic_long_inc_below() argument type (git-fixes).
- uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes).
- usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes).
- usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git-fixes).
- usb: core: Add 0x prefix to quirks debug output (stable-fixes).
- usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes).
- usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes).
- usb: core: usb_submit_urb: downgrade type check (stable-fixes).
- usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git-fixes).
- usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable-fixes).
- usb: dwc3: imx8mp: fix device leak at unbind (git-fixes).
- usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes).
- usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes).
- usb: dwc3: qcom: Do not leave BCR asserted (git-fixes).
- usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes).
- usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes).
- usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
- usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes).
- usb: gadget: midi2: Fix missing UMP group attributes initialization (git-fixes).
- usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes).
- usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git-fixes).
- usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes).
- usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes).
- usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git-fixes).
- usb: musb: omap2430: fix device leak at unbind (git-fixes).
- usb: phy: twl6030: Fix incorrect type for ret (git-fixes).
- usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes).
- usb: renesas-xhci: Fix External ROM access timeouts (git-fixes).
- usb: storage: realtek_cr: Use correct byte order for bcs-&gt;Residue (git-fixes).
- usb: typec: fusb302: cache PD RX state (git-fixes).
- usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable-fixes).
- usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes).
- usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes).
- usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes).
- usb: typec: tcpm: allow switching to mode accessory to mux properly (stable-fixes).
- usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes).
- usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git-fixes).
- usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git-fixes).
- usb: typec: tipd: Clear interrupts first (git-fixes).
- usb: typec: ucsi: Update power_supply on power role change (git-fixes).
- usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes).
- usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes).
- usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
- usb: xhci: Avoid showing errors during surprise removal (stable-fixes).
- usb: xhci: Avoid showing warnings for dying controller (stable-fixes).
- usb: xhci: Fix slot_id resource race conflict (git-fixes).
- usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes).
- usb: xhci: print xhci-&gt;xhc_state when queue_command failed (stable-fixes).
- use uniform permission checks for all mount propagation changes (git-fixes).
- vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes).
- vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes).
- vhost-scsi: Fix log flooding with target does not exist errors (git-fixes).
- vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git-fixes).
- vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes).
- vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes).
- vhost: Reintroduce kthread API and add mode selection (git-fixes).
- vhost: fail early when __vhost_add_used() fails (git-fixes).
- virtchnl2: add flow steering support (jsc#PED-13728).
- virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728).
- virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762).
- virtio_net: Enforce minimum TX ring size for reliability (git-fixes).
- virtio_ring: Fix error reporting in virtqueue_resize (git-fixes).
- vmci: Prevent the dispatching of uninitialized payloads (git-fixes).
- vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes).
- vsock/virtio: Validate length in packet header before skb_put() (git-fixes).
- vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes).
- vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes).
- watchdog: dw_wdt: Fix default timeout (stable-fixes).
- watchdog: iTCO_wdt: Report error if timeout configuration fails (stable-fixes).
- watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes).
- watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes).
- watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git-fixes).
- wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes).
- wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes).
- wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git-fixes).
- wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes).
- wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes).
- wifi: ath11k: fix dest ring-buffer corruption (git-fixes).
- wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes).
- wifi: ath11k: fix group data packet drops during rekey (git-fixes).
- wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes).
- wifi: ath11k: fix source ring-buffer corruption (git-fixes).
- wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes).
- wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952).
- wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes).
- wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes).
- wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable-fixes).
- wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes).
- wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes).
- wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (git-fixes).
- wifi: ath12k: fix dest ring-buffer corruption (git-fixes).
- wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes).
- wifi: ath12k: fix endianness handling while accessing wmi service bit (git-fixes).
- wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes).
- wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes).
- wifi: ath12k: fix source ring-buffer corruption (git-fixes).
- wifi: ath12k: fix the fetching of combined rssi (git-fixes).
- wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
- wifi: ath12k: fix wrong logging ID used for CE (git-fixes).
- wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes).
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes).
- wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes).
- wifi: cfg80211: Fix interface type validation (stable-fixes).
- wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes).
- wifi: cfg80211: reject HTC bit for management frames (stable-fixes).
- wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git-fixes).
- wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes).
- wifi: iwlegacy: Check rate_idx range after addition (stable-fixes).
- wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084).
- wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes).
- wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes).
- wifi: iwlwifi: Remove redundant header files (git-fixes).
- wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084).
- wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable-fixes).
- wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable-fixes).
- wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes).
- wifi: iwlwifi: mvm: fix scan request validation (stable-fixes).
- wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes).
- wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes).
- wifi: iwlwifi: uefi: check DSM item validity (git-fixes).
- wifi: libertas: cap SSID len in lbs_associate() (git-fixes).
- wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes).
- wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes).
- wifi: mac80211: Do not schedule stopped TXQs (git-fixes).
- wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() (git-fixes).
- wifi: mac80211: avoid weird state in error path (stable-fixes).
- wifi: mac80211: do not complete management TX on SAE commit (stable-fixes).
- wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes).
- wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes).
- wifi: mac80211: fix incorrect type for ret (stable-fixes).
- wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes).
- wifi: mac80211: increase scan_ies_len for S1G (stable-fixes).
- wifi: mac80211: reject TDLS operations when station is not associated (git-fixes).
- wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes).
- wifi: mt76: fix linked list corruption (git-fixes).
- wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes).
- wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes).
- wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes).
- wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes).
- wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure (git-fixes).
- wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes).
- wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes).
- wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes).
- wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes).
- wifi: mt76: mt7996: Fix RX packets configuration for primary WED device (git-fixes).
- wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git-fixes).
- wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes).
- wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes).
- wifi: mwifiex: send world regulatory domain to driver (git-fixes).
- wifi: nl80211: Set num_sub_specs before looping through sub_specs (git-fixes).
- wifi: plfxlc: Fix error handling in usb driver probe (git-fixes).
- wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes).
- wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes).
- wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes).
- wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes).
- wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes).
- wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes).
- wifi: rtw88: Fix macid assigned to TDLS station (git-fixes).
- wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes).
- wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable-fixes).
- wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes).
- wifi: rtw89: avoid circular locking dependency in ser_state_run() (git-fixes).
- wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes).
- wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode (stable-fixes).
- wifi: virt_wifi: Fix page fault on connect (stable-fixes).
- wifi: wilc1000: avoid buffer overflow in WID string configuration (stable-fixes).
- writeback: Avoid contention on wb-&gt;list_lock when switching inodes (bsc#1237776).
- writeback: Avoid contention on wb-&gt;list_lock when switching inodes (kABI fixup) (bsc#1237776).
- writeback: Avoid excessively long inode switching times (bsc#1237776).
- writeback: Avoid softlockup when switching many inodes (bsc#1237776).
- x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704).
- x86/Kconfig: Add arch attack vector support (git-fixes).
- x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes).
- x86/boot: Sanitize boot params before parsing command line (git-fixes).
- x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes).
- x86/bugs: Add attack vector controls for BHI (git-fixes).
- x86/bugs: Add attack vector controls for GDS (git-fixes).
- x86/bugs: Add attack vector controls for ITS (git-fixes).
- x86/bugs: Add attack vector controls for L1TF (git-fixes).
- x86/bugs: Add attack vector controls for MDS (git-fixes).
- x86/bugs: Add attack vector controls for MMIO (git-fixes).
- x86/bugs: Add attack vector controls for RFDS (git-fixes).
- x86/bugs: Add attack vector controls for SRBDS (git-fixes).
- x86/bugs: Add attack vector controls for SRSO (git-fixes).
- x86/bugs: Add attack vector controls for SSB (git-fixes).
- x86/bugs: Add attack vector controls for TAA (git-fixes).
- x86/bugs: Add attack vector controls for TSA (git-fixes).
- x86/bugs: Add attack vector controls for retbleed (git-fixes).
- x86/bugs: Add attack vector controls for spectre_v1 (git-fixes).
- x86/bugs: Add attack vector controls for spectre_v2 (git-fixes).
- x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes).
- x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes).
- x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git-fixes).
- x86/bugs: Avoid warning when overriding return thunk (git-fixes).
- x86/bugs: Clean up SRSO microcode handling (git-fixes).
- x86/bugs: Define attack vectors relevant for each bug (git-fixes).
- x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes).
- x86/bugs: Introduce cdt_possible() (git-fixes).
- x86/bugs: Print enabled attack vectors (git-fixes).
- x86/bugs: Remove its=stuff dependency on retbleed (git-fixes).
- x86/bugs: Select best SRSO mitigation (git-fixes).
- x86/bugs: Simplify the retbleed=stuff checks (git-fixes).
- x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes).
- x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes).
- x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git-fixes).
- x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git-fixes).
- x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes).
- x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes).
- x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes).
- x86/fpu: Avoid copying dynamic FP state from init_task in arch_dup_task_struct() (git-fixes).
- x86/fpu: Delay instruction pointer fixup until after warning (git-fixes).
- x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
- x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes).
- x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git-fixes).
- x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler (git-fixes).
- x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in UAPI headers (git-fixes).
- x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op() (git-fixes).
- x86/mce/amd: Add default names for MCA banks and blocks (git-fixes).
- x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes).
- x86/mce: Ensure user polling settings are honored when restarting timer (git-fixes).
- x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git-fixes).
- x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes).
- x86/microcode: Consolidate the loader enablement checking (git-fixes).
- x86/microcode: Update the Intel processor flag scan check (git-fixes).
- x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes).
- x86/mm/pat: do not collapse pages without PSE set (git-fixes).
- x86/nmi: Add an emergency handler in nmi_desc &amp; use it in nmi_shootdown_cpus() (git-fixes).
- x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC &amp;lt; 14.2 (git-fixes).
- x86/pkeys: Simplify PKRU update in signal frame (git-fixes).
- x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes).
- x86/pti: Add attack vector controls for PTI (git-fixes).
- x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes).
- x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815).
- x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815).
- x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815).
- x86/smpboot: Fix INIT delay assignment for extended Intel Families (git-fixes).
- x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815).
- x86/traps: Initialize DR6 by writing its architectural reset value (git-fixes).
- xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes).
- xen/netfront: Fix TX response spurious interrupts (git-fixes).
- xen: fix UAF in dmabuf_exp_from_pages() (git-fixes).
- xfrm: replay: Fix the update of replay_esn-&gt;oseq_hi for GSO (git-fixes).
- xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS() (git-fixes).
- xfs: do not propagate ENODATA disk errors into xattr code (git-fixes).
- xfs: fix scrub trace with null pointer in quotacheck (git-fixes).
- xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes).
- xfs: remove unused event xfs_alloc_near_error (git-fixes).
- xfs: remove unused event xfs_alloc_near_nominleft (git-fixes).
- xfs: remove unused event xfs_attr_node_removename (git-fixes).
- xfs: remove unused event xfs_ioctl_clone (git-fixes).
- xfs: remove unused event xfs_pagecache_inval (git-fixes).
- xfs: remove unused event xlog_iclog_want_sync (git-fixes).
- xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes).
- xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes).
- xfs: remove unused trace event xfs_discard_rtrelax (git-fixes).
- xfs: remove unused trace event xfs_log_cil_return (git-fixes).
- xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes).
- xfs: remove unused xfs_attr events (git-fixes).
- xfs: remove unused xfs_reflink_compare_extents events (git-fixes).
- xfs: remove usused xfs_end_io_direct events (git-fixes).
- xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes).
- xhci: dbc: decouple endpoint allocation from initialization (git-fixes).
- xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes).
- xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes).
- zram: permit only one post-processing operation at a time (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215199">SUSE bug 1215199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230062">SUSE bug 1230062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234634">SUSE bug 1234634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234693">SUSE bug 1234693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235953">SUSE bug 1235953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236897">SUSE bug 1236897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237108">SUSE bug 1237108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237131">SUSE bug 1237131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237542">SUSE bug 1237542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237776">SUSE bug 1237776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238972">SUSE bug 1238972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239206">SUSE bug 1239206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240324">SUSE bug 1240324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240696">SUSE bug 1240696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240966">SUSE bug 1240966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240998">SUSE bug 1240998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241166">SUSE bug 1241166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241353">SUSE bug 1241353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241403">SUSE bug 1241403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241435">SUSE bug 1241435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242034">SUSE bug 1242034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242086">SUSE bug 1242086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242782">SUSE bug 1242782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242864">SUSE bug 1242864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242965">SUSE bug 1242965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242995">SUSE bug 1242995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243000">SUSE bug 1243000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243055">SUSE bug 1243055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243068">SUSE bug 1243068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243100">SUSE bug 1243100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243112">SUSE bug 1243112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243774">SUSE bug 1243774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244309">SUSE bug 1244309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244723">SUSE bug 1244723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244734">SUSE bug 1244734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244749">SUSE bug 1244749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244792">SUSE bug 1244792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244812">SUSE bug 1244812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244930">SUSE bug 1244930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244939">SUSE bug 1244939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245000">SUSE bug 1245000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245151">SUSE bug 1245151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245193">SUSE bug 1245193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245206">SUSE bug 1245206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245216">SUSE bug 1245216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245260">SUSE bug 1245260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245410">SUSE bug 1245410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245457">SUSE bug 1245457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245504">SUSE bug 1245504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245506">SUSE bug 1245506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245508">SUSE bug 1245508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245510">SUSE bug 1245510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245596">SUSE bug 1245596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245621">SUSE bug 1245621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245630">SUSE bug 1245630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245654">SUSE bug 1245654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245657">SUSE bug 1245657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245658">SUSE bug 1245658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245659">SUSE bug 1245659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245663">SUSE bug 1245663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245664">SUSE bug 1245664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245665">SUSE bug 1245665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245666">SUSE bug 1245666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245668">SUSE bug 1245668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245669">SUSE bug 1245669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245670">SUSE bug 1245670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245671">SUSE bug 1245671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245675">SUSE bug 1245675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245676">SUSE bug 1245676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245678">SUSE bug 1245678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245683">SUSE bug 1245683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245684">SUSE bug 1245684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245686">SUSE bug 1245686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245688">SUSE bug 1245688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245690">SUSE bug 1245690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245691">SUSE bug 1245691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245695">SUSE bug 1245695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245700">SUSE bug 1245700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245703">SUSE bug 1245703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245705">SUSE bug 1245705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245710">SUSE bug 1245710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245711">SUSE bug 1245711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245713">SUSE bug 1245713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245714">SUSE bug 1245714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245715">SUSE bug 1245715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245717">SUSE bug 1245717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245719">SUSE bug 1245719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245721">SUSE bug 1245721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245723">SUSE bug 1245723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245726">SUSE bug 1245726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245728">SUSE bug 1245728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245729">SUSE bug 1245729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245730">SUSE bug 1245730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245731">SUSE bug 1245731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245735">SUSE bug 1245735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245737">SUSE bug 1245737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245744">SUSE bug 1245744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245745">SUSE bug 1245745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245746">SUSE bug 1245746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245747">SUSE bug 1245747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245748">SUSE bug 1245748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245749">SUSE bug 1245749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245751">SUSE bug 1245751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245757">SUSE bug 1245757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245763">SUSE bug 1245763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245765">SUSE bug 1245765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245767">SUSE bug 1245767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245769">SUSE bug 1245769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245777">SUSE bug 1245777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245780">SUSE bug 1245780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245781">SUSE bug 1245781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245784">SUSE bug 1245784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245785">SUSE bug 1245785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245787">SUSE bug 1245787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245812">SUSE bug 1245812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245814">SUSE bug 1245814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245815">SUSE bug 1245815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245937">SUSE bug 1245937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245945">SUSE bug 1245945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245952">SUSE bug 1245952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245955">SUSE bug 1245955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245956">SUSE bug 1245956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245963">SUSE bug 1245963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245966">SUSE bug 1245966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245970">SUSE bug 1245970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245973">SUSE bug 1245973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245976">SUSE bug 1245976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245977">SUSE bug 1245977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246000">SUSE bug 1246000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246002">SUSE bug 1246002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246005">SUSE bug 1246005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246008">SUSE bug 1246008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246012">SUSE bug 1246012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246022">SUSE bug 1246022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246023">SUSE bug 1246023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246031">SUSE bug 1246031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246034">SUSE bug 1246034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246037">SUSE bug 1246037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246041">SUSE bug 1246041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246042">SUSE bug 1246042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246047">SUSE bug 1246047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246049">SUSE bug 1246049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246050">SUSE bug 1246050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246053">SUSE bug 1246053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246054">SUSE bug 1246054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246055">SUSE bug 1246055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246057">SUSE bug 1246057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246098">SUSE bug 1246098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246109">SUSE bug 1246109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246125">SUSE bug 1246125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246166">SUSE bug 1246166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246171">SUSE bug 1246171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246176">SUSE bug 1246176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246181">SUSE bug 1246181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246183">SUSE bug 1246183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246185">SUSE bug 1246185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246186">SUSE bug 1246186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246188">SUSE bug 1246188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246190">SUSE bug 1246190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246192">SUSE bug 1246192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246193">SUSE bug 1246193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246195">SUSE bug 1246195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246220">SUSE bug 1246220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246234">SUSE bug 1246234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246236">SUSE bug 1246236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246240">SUSE bug 1246240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246243">SUSE bug 1246243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246244">SUSE bug 1246244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246245">SUSE bug 1246245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246246">SUSE bug 1246246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246248">SUSE bug 1246248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246250">SUSE bug 1246250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246252">SUSE bug 1246252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246253">SUSE bug 1246253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246255">SUSE bug 1246255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246258">SUSE bug 1246258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246259">SUSE bug 1246259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246260">SUSE bug 1246260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246262">SUSE bug 1246262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246266">SUSE bug 1246266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246268">SUSE bug 1246268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246283">SUSE bug 1246283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246285">SUSE bug 1246285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246286">SUSE bug 1246286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246287">SUSE bug 1246287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246290">SUSE bug 1246290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246292">SUSE bug 1246292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246293">SUSE bug 1246293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246295">SUSE bug 1246295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246297">SUSE bug 1246297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246333">SUSE bug 1246333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246334">SUSE bug 1246334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246337">SUSE bug 1246337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246342">SUSE bug 1246342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246349">SUSE bug 1246349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246351">SUSE bug 1246351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246353">SUSE bug 1246353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246354">SUSE bug 1246354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246358">SUSE bug 1246358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246364">SUSE bug 1246364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246366">SUSE bug 1246366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246370">SUSE bug 1246370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246375">SUSE bug 1246375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246376">SUSE bug 1246376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246385">SUSE bug 1246385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246386">SUSE bug 1246386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246387">SUSE bug 1246387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246438">SUSE bug 1246438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246443">SUSE bug 1246443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246444">SUSE bug 1246444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246447">SUSE bug 1246447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246450">SUSE bug 1246450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246453">SUSE bug 1246453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246473">SUSE bug 1246473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246490">SUSE bug 1246490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246509">SUSE bug 1246509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246547">SUSE bug 1246547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246631">SUSE bug 1246631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246651">SUSE bug 1246651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246688">SUSE bug 1246688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246777">SUSE bug 1246777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246782">SUSE bug 1246782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246868">SUSE bug 1246868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246896">SUSE bug 1246896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246979">SUSE bug 1246979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247018">SUSE bug 1247018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247020">SUSE bug 1247020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247022">SUSE bug 1247022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247023">SUSE bug 1247023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247024">SUSE bug 1247024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247027">SUSE bug 1247027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247028">SUSE bug 1247028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247031">SUSE bug 1247031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247033">SUSE bug 1247033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247035">SUSE bug 1247035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247061">SUSE bug 1247061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247062">SUSE bug 1247062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247064">SUSE bug 1247064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247076">SUSE bug 1247076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247078">SUSE bug 1247078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247079">SUSE bug 1247079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247088">SUSE bug 1247088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247089">SUSE bug 1247089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247091">SUSE bug 1247091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247097">SUSE bug 1247097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247098">SUSE bug 1247098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247099">SUSE bug 1247099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247101">SUSE bug 1247101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247102">SUSE bug 1247102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247103">SUSE bug 1247103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247104">SUSE bug 1247104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247112">SUSE bug 1247112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247113">SUSE bug 1247113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247116">SUSE bug 1247116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247118">SUSE bug 1247118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247119">SUSE bug 1247119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247123">SUSE bug 1247123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247125">SUSE bug 1247125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247126">SUSE bug 1247126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247128">SUSE bug 1247128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247130">SUSE bug 1247130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247131">SUSE bug 1247131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247132">SUSE bug 1247132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247136">SUSE bug 1247136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247137">SUSE bug 1247137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247138">SUSE bug 1247138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247141">SUSE bug 1247141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247143">SUSE bug 1247143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247145">SUSE bug 1247145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247146">SUSE bug 1247146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247147">SUSE bug 1247147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247149">SUSE bug 1247149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247150">SUSE bug 1247150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247151">SUSE bug 1247151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247152">SUSE bug 1247152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247153">SUSE bug 1247153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247154">SUSE bug 1247154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247155">SUSE bug 1247155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247156">SUSE bug 1247156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247157">SUSE bug 1247157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247160">SUSE bug 1247160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247162">SUSE bug 1247162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247163">SUSE bug 1247163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247164">SUSE bug 1247164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247167">SUSE bug 1247167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247169">SUSE bug 1247169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247170">SUSE bug 1247170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247171">SUSE bug 1247171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247174">SUSE bug 1247174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247176">SUSE bug 1247176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247177">SUSE bug 1247177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247178">SUSE bug 1247178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247181">SUSE bug 1247181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247209">SUSE bug 1247209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247210">SUSE bug 1247210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247220">SUSE bug 1247220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247223">SUSE bug 1247223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247227">SUSE bug 1247227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247229">SUSE bug 1247229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247231">SUSE bug 1247231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247233">SUSE bug 1247233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247234">SUSE bug 1247234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247235">SUSE bug 1247235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247236">SUSE bug 1247236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247238">SUSE bug 1247238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247239">SUSE bug 1247239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247241">SUSE bug 1247241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247243">SUSE bug 1247243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247250">SUSE bug 1247250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247251">SUSE bug 1247251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247252">SUSE bug 1247252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247253">SUSE bug 1247253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247255">SUSE bug 1247255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247262">SUSE bug 1247262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247265">SUSE bug 1247265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247270">SUSE bug 1247270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247271">SUSE bug 1247271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247273">SUSE bug 1247273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247274">SUSE bug 1247274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247276">SUSE bug 1247276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247277">SUSE bug 1247277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247278">SUSE bug 1247278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247279">SUSE bug 1247279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247280">SUSE bug 1247280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247282">SUSE bug 1247282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247283">SUSE bug 1247283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247284">SUSE bug 1247284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247285">SUSE bug 1247285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247288">SUSE bug 1247288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247289">SUSE bug 1247289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247290">SUSE bug 1247290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247293">SUSE bug 1247293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247308">SUSE bug 1247308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247311">SUSE bug 1247311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247313">SUSE bug 1247313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247314">SUSE bug 1247314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247317">SUSE bug 1247317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247325">SUSE bug 1247325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247347">SUSE bug 1247347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247348">SUSE bug 1247348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247349">SUSE bug 1247349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247366">SUSE bug 1247366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247372">SUSE bug 1247372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247376">SUSE bug 1247376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247426">SUSE bug 1247426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247437">SUSE bug 1247437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247442">SUSE bug 1247442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247483">SUSE bug 1247483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247500">SUSE bug 1247500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247712">SUSE bug 1247712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247837">SUSE bug 1247837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247838">SUSE bug 1247838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247935">SUSE bug 1247935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247936">SUSE bug 1247936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247949">SUSE bug 1247949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247950">SUSE bug 1247950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247963">SUSE bug 1247963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247976">SUSE bug 1247976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248088">SUSE bug 1248088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248111">SUSE bug 1248111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248121">SUSE bug 1248121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248183">SUSE bug 1248183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248186">SUSE bug 1248186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248190">SUSE bug 1248190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248192">SUSE bug 1248192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248194">SUSE bug 1248194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248198">SUSE bug 1248198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248199">SUSE bug 1248199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248200">SUSE bug 1248200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248202">SUSE bug 1248202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248205">SUSE bug 1248205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248211">SUSE bug 1248211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248223">SUSE bug 1248223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248224">SUSE bug 1248224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248225">SUSE bug 1248225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248230">SUSE bug 1248230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248235">SUSE bug 1248235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248255">SUSE bug 1248255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248296">SUSE bug 1248296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248297">SUSE bug 1248297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248299">SUSE bug 1248299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248302">SUSE bug 1248302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248304">SUSE bug 1248304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248312">SUSE bug 1248312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248333">SUSE bug 1248333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248334">SUSE bug 1248334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248337">SUSE bug 1248337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248338">SUSE bug 1248338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248340">SUSE bug 1248340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248341">SUSE bug 1248341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248343">SUSE bug 1248343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248345">SUSE bug 1248345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248349">SUSE bug 1248349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248350">SUSE bug 1248350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248354">SUSE bug 1248354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248355">SUSE bug 1248355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248357">SUSE bug 1248357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248359">SUSE bug 1248359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248361">SUSE bug 1248361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248363">SUSE bug 1248363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248365">SUSE bug 1248365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248367">SUSE bug 1248367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248368">SUSE bug 1248368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248374">SUSE bug 1248374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248377">SUSE bug 1248377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248378">SUSE bug 1248378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248380">SUSE bug 1248380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248386">SUSE bug 1248386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248390">SUSE bug 1248390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248392">SUSE bug 1248392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248395">SUSE bug 1248395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248396">SUSE bug 1248396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248399">SUSE bug 1248399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248401">SUSE bug 1248401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248511">SUSE bug 1248511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248512">SUSE bug 1248512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248573">SUSE bug 1248573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248575">SUSE bug 1248575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248577">SUSE bug 1248577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248609">SUSE bug 1248609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248610">SUSE bug 1248610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248616">SUSE bug 1248616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248617">SUSE bug 1248617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248619">SUSE bug 1248619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248621">SUSE bug 1248621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248622">SUSE bug 1248622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248624">SUSE bug 1248624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248627">SUSE bug 1248627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248628">SUSE bug 1248628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248634">SUSE bug 1248634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248635">SUSE bug 1248635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248639">SUSE bug 1248639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248643">SUSE bug 1248643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248647">SUSE bug 1248647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248648">SUSE bug 1248648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248652">SUSE bug 1248652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248655">SUSE bug 1248655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248662">SUSE bug 1248662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248664">SUSE bug 1248664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248666">SUSE bug 1248666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248669">SUSE bug 1248669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248674">SUSE bug 1248674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248681">SUSE bug 1248681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248727">SUSE bug 1248727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248728">SUSE bug 1248728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248748">SUSE bug 1248748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248754">SUSE bug 1248754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248775">SUSE bug 1248775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249022">SUSE bug 1249022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249038">SUSE bug 1249038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249060">SUSE bug 1249060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249061">SUSE bug 1249061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249062">SUSE bug 1249062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249064">SUSE bug 1249064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249065">SUSE bug 1249065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249066">SUSE bug 1249066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249126">SUSE bug 1249126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249143">SUSE bug 1249143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249156">SUSE bug 1249156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249159">SUSE bug 1249159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249160">SUSE bug 1249160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249163">SUSE bug 1249163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249164">SUSE bug 1249164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249166">SUSE bug 1249166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249167">SUSE bug 1249167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249169">SUSE bug 1249169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249170">SUSE bug 1249170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249172">SUSE bug 1249172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249176">SUSE bug 1249176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249177">SUSE bug 1249177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249182">SUSE bug 1249182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249186">SUSE bug 1249186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249190">SUSE bug 1249190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249193">SUSE bug 1249193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249195">SUSE bug 1249195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249199">SUSE bug 1249199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249201">SUSE bug 1249201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249202">SUSE bug 1249202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249203">SUSE bug 1249203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249204">SUSE bug 1249204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249206">SUSE bug 1249206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249215">SUSE bug 1249215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249220">SUSE bug 1249220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249221">SUSE bug 1249221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249254">SUSE bug 1249254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249258">SUSE bug 1249258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249262">SUSE bug 1249262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249263">SUSE bug 1249263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249265">SUSE bug 1249265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249266">SUSE bug 1249266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249269">SUSE bug 1249269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249271">SUSE bug 1249271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249272">SUSE bug 1249272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249273">SUSE bug 1249273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249274">SUSE bug 1249274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249278">SUSE bug 1249278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249279">SUSE bug 1249279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249281">SUSE bug 1249281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249282">SUSE bug 1249282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249284">SUSE bug 1249284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249285">SUSE bug 1249285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249286">SUSE bug 1249286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249288">SUSE bug 1249288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249290">SUSE bug 1249290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249292">SUSE bug 1249292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249295">SUSE bug 1249295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249296">SUSE bug 1249296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249297">SUSE bug 1249297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249299">SUSE bug 1249299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249300">SUSE bug 1249300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249301">SUSE bug 1249301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249303">SUSE bug 1249303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249304">SUSE bug 1249304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249305">SUSE bug 1249305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249306">SUSE bug 1249306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249308">SUSE bug 1249308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249309">SUSE bug 1249309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249312">SUSE bug 1249312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249313">SUSE bug 1249313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249314">SUSE bug 1249314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249315">SUSE bug 1249315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249316">SUSE bug 1249316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249318">SUSE bug 1249318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249319">SUSE bug 1249319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249320">SUSE bug 1249320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249321">SUSE bug 1249321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249322">SUSE bug 1249322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249323">SUSE bug 1249323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249324">SUSE bug 1249324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249333">SUSE bug 1249333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249334">SUSE bug 1249334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249338">SUSE bug 1249338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249346">SUSE bug 1249346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249374">SUSE bug 1249374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249413">SUSE bug 1249413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249477">SUSE bug 1249477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249478">SUSE bug 1249478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249479">SUSE bug 1249479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249486">SUSE bug 1249486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249490">SUSE bug 1249490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249494">SUSE bug 1249494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249500">SUSE bug 1249500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249504">SUSE bug 1249504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249506">SUSE bug 1249506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249508">SUSE bug 1249508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249509">SUSE bug 1249509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249510">SUSE bug 1249510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249513">SUSE bug 1249513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249515">SUSE bug 1249515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249516">SUSE bug 1249516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249522">SUSE bug 1249522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249523">SUSE bug 1249523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249524">SUSE bug 1249524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249526">SUSE bug 1249526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249533">SUSE bug 1249533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249540">SUSE bug 1249540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249542">SUSE bug 1249542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249545">SUSE bug 1249545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249547">SUSE bug 1249547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249548">SUSE bug 1249548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249550">SUSE bug 1249550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249552">SUSE bug 1249552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249554">SUSE bug 1249554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249562">SUSE bug 1249562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249566">SUSE bug 1249566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249587">SUSE bug 1249587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249598">SUSE bug 1249598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249604">SUSE bug 1249604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249615">SUSE bug 1249615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249618">SUSE bug 1249618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249774">SUSE bug 1249774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249833">SUSE bug 1249833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249887">SUSE bug 1249887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249888">SUSE bug 1249888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249901">SUSE bug 1249901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249904">SUSE bug 1249904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249906">SUSE bug 1249906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249915">SUSE bug 1249915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249974">SUSE bug 1249974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249975">SUSE bug 1249975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250002">SUSE bug 1250002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250007">SUSE bug 1250007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250021">SUSE bug 1250021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250025">SUSE bug 1250025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250028">SUSE bug 1250028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250032">SUSE bug 1250032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250087">SUSE bug 1250087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250088">SUSE bug 1250088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250119">SUSE bug 1250119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250123">SUSE bug 1250123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250124">SUSE bug 1250124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250177">SUSE bug 1250177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250179">SUSE bug 1250179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250203">SUSE bug 1250203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250204">SUSE bug 1250204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250205">SUSE bug 1250205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250237">SUSE bug 1250237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250242">SUSE bug 1250242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250247">SUSE bug 1250247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250249">SUSE bug 1250249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250251">SUSE bug 1250251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250258">SUSE bug 1250258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250262">SUSE bug 1250262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250266">SUSE bug 1250266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250267">SUSE bug 1250267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250268">SUSE bug 1250268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250275">SUSE bug 1250275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250276">SUSE bug 1250276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250281">SUSE bug 1250281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250291">SUSE bug 1250291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250292">SUSE bug 1250292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250294">SUSE bug 1250294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250296">SUSE bug 1250296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250297">SUSE bug 1250297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250298">SUSE bug 1250298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250334">SUSE bug 1250334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250344">SUSE bug 1250344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250365">SUSE bug 1250365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250371">SUSE bug 1250371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250377">SUSE bug 1250377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250386">SUSE bug 1250386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250389">SUSE bug 1250389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250398">SUSE bug 1250398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250402">SUSE bug 1250402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250406">SUSE bug 1250406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250407">SUSE bug 1250407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250408">SUSE bug 1250408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250450">SUSE bug 1250450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250491">SUSE bug 1250491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250519">SUSE bug 1250519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250522">SUSE bug 1250522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250650">SUSE bug 1250650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250655">SUSE bug 1250655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250671">SUSE bug 1250671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250702">SUSE bug 1250702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250711">SUSE bug 1250711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250712">SUSE bug 1250712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250713">SUSE bug 1250713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250716">SUSE bug 1250716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250719">SUSE bug 1250719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250722">SUSE bug 1250722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250729">SUSE bug 1250729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250736">SUSE bug 1250736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250737">SUSE bug 1250737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250739">SUSE bug 1250739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250741">SUSE bug 1250741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250758">SUSE bug 1250758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250952">SUSE bug 1250952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251100">SUSE bug 1251100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251114">SUSE bug 1251114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251134">SUSE bug 1251134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251135">SUSE bug 1251135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251143">SUSE bug 1251143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251146">SUSE bug 1251146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251186">SUSE bug 1251186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251216">SUSE bug 1251216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251230">SUSE bug 1251230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251810">SUSE bug 1251810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252084">SUSE bug 1252084</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57891/">CVE-2024-57891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57891">CVE-2024-57891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57951/">CVE-2024-57951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57951">CVE-2024-57951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57952/">CVE-2024-57952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57952">CVE-2024-57952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58090/">CVE-2024-58090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58090">CVE-2024-58090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22034/">CVE-2025-22034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22034">CVE-2025-22034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22077/">CVE-2025-22077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23141/">CVE-2025-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23141">CVE-2025-23141 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37821/">CVE-2025-37821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37821">CVE-2025-37821 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-37849/">CVE-2025-37849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37849">CVE-2025-37849 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37856/">CVE-2025-37856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37856">CVE-2025-37856 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37861/">CVE-2025-37861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37861">CVE-2025-37861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37864/">CVE-2025-37864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37864">CVE-2025-37864 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38006/">CVE-2025-38006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38008/">CVE-2025-38008 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38019/">CVE-2025-38019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38034/">CVE-2025-38034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38038/">CVE-2025-38038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38038">CVE-2025-38038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38058/">CVE-2025-38058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38062/">CVE-2025-38062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38075/">CVE-2025-38075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38087/">CVE-2025-38087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38088/">CVE-2025-38088 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38089/">CVE-2025-38089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38090/">CVE-2025-38090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38091/">CVE-2025-38091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38091">CVE-2025-38091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38095/">CVE-2025-38095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38095">CVE-2025-38095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38096/">CVE-2025-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38096">CVE-2025-38096 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38098/">CVE-2025-38098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38098">CVE-2025-38098 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38099/">CVE-2025-38099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38099">CVE-2025-38099 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38101/">CVE-2025-38101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38101">CVE-2025-38101 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38102/">CVE-2025-38102 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38102">CVE-2025-38102 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38103/">CVE-2025-38103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38103">CVE-2025-38103 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38106/">CVE-2025-38106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38106">CVE-2025-38106 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38107/">CVE-2025-38107 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38107">CVE-2025-38107 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38108/">CVE-2025-38108 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38108">CVE-2025-38108 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38109/">CVE-2025-38109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38110/">CVE-2025-38110 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38111/">CVE-2025-38111 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38112/">CVE-2025-38112 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38112">CVE-2025-38112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38113/">CVE-2025-38113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38113">CVE-2025-38113 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38114/">CVE-2025-38114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38114">CVE-2025-38114 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38117/">CVE-2025-38117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38117">CVE-2025-38117 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38118/">CVE-2025-38118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38118">CVE-2025-38118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38119/">CVE-2025-38119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38119">CVE-2025-38119 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38120/">CVE-2025-38120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38122/">CVE-2025-38122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38122">CVE-2025-38122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38123/">CVE-2025-38123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38123">CVE-2025-38123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38124/">CVE-2025-38124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38125/">CVE-2025-38125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38125">CVE-2025-38125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38127/">CVE-2025-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38127">CVE-2025-38127 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38128/">CVE-2025-38128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38128">CVE-2025-38128 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38134/">CVE-2025-38134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38134">CVE-2025-38134 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38135/">CVE-2025-38135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38135">CVE-2025-38135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38136/">CVE-2025-38136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38136">CVE-2025-38136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38137/">CVE-2025-38137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38137">CVE-2025-38137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38138/">CVE-2025-38138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38138">CVE-2025-38138 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38140/">CVE-2025-38140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38140">CVE-2025-38140 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38141/">CVE-2025-38141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38141">CVE-2025-38141 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38142/">CVE-2025-38142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38142">CVE-2025-38142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38143/">CVE-2025-38143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38143">CVE-2025-38143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38145/">CVE-2025-38145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38145">CVE-2025-38145 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38146/">CVE-2025-38146 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38146">CVE-2025-38146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38148/">CVE-2025-38148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38148">CVE-2025-38148 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38149/">CVE-2025-38149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38149">CVE-2025-38149 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38151/">CVE-2025-38151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38151">CVE-2025-38151 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38153/">CVE-2025-38153 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38153">CVE-2025-38153 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38154/">CVE-2025-38154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38155/">CVE-2025-38155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38155">CVE-2025-38155 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38156/">CVE-2025-38156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38156">CVE-2025-38156 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38157/">CVE-2025-38157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38157">CVE-2025-38157 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38160/">CVE-2025-38160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38160">CVE-2025-38160 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38161/">CVE-2025-38161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38161">CVE-2025-38161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38165/">CVE-2025-38165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38165">CVE-2025-38165 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38168/">CVE-2025-38168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38168">CVE-2025-38168 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38169/">CVE-2025-38169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38169">CVE-2025-38169 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38170/">CVE-2025-38170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38170">CVE-2025-38170 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38172/">CVE-2025-38172 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38172">CVE-2025-38172 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38173/">CVE-2025-38173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38173">CVE-2025-38173 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38174/">CVE-2025-38174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38174">CVE-2025-38174 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38181/">CVE-2025-38181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38182/">CVE-2025-38182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38184/">CVE-2025-38184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38185/">CVE-2025-38185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38186/">CVE-2025-38186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38186">CVE-2025-38186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38188/">CVE-2025-38188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38188">CVE-2025-38188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38189/">CVE-2025-38189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38189">CVE-2025-38189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38190/">CVE-2025-38190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38193/">CVE-2025-38193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38197/">CVE-2025-38197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38198/">CVE-2025-38198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38201/">CVE-2025-38201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38201">CVE-2025-38201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38205/">CVE-2025-38205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38205">CVE-2025-38205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38208/">CVE-2025-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38209/">CVE-2025-38209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38209">CVE-2025-38209 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38211/">CVE-2025-38211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38213/">CVE-2025-38213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38214/">CVE-2025-38214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38215/">CVE-2025-38215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38216/">CVE-2025-38216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38216">CVE-2025-38216 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38217/">CVE-2025-38217 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38220/">CVE-2025-38220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38222/">CVE-2025-38222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38224/">CVE-2025-38224 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38224">CVE-2025-38224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38225/">CVE-2025-38225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38226/">CVE-2025-38226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38227/">CVE-2025-38227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38228/">CVE-2025-38228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38228">CVE-2025-38228 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38229/">CVE-2025-38229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38231/">CVE-2025-38231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38232/">CVE-2025-38232 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38232">CVE-2025-38232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38233/">CVE-2025-38233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38233">CVE-2025-38233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38234/">CVE-2025-38234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38234">CVE-2025-38234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38242/">CVE-2025-38242 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38242">CVE-2025-38242 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38244/">CVE-2025-38244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38244">CVE-2025-38244 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38245/">CVE-2025-38245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38245">CVE-2025-38245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38246/">CVE-2025-38246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38246">CVE-2025-38246 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38249/">CVE-2025-38249 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38249">CVE-2025-38249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38251/">CVE-2025-38251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38251">CVE-2025-38251 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38253/">CVE-2025-38253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38253">CVE-2025-38253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38255/">CVE-2025-38255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38255">CVE-2025-38255 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38256/">CVE-2025-38256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38256">CVE-2025-38256 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38257/">CVE-2025-38257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38258/">CVE-2025-38258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38258">CVE-2025-38258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38259/">CVE-2025-38259 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38259">CVE-2025-38259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38263/">CVE-2025-38263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38263">CVE-2025-38263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38264/">CVE-2025-38264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38264">CVE-2025-38264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38265/">CVE-2025-38265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38265">CVE-2025-38265 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38267/">CVE-2025-38267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38267">CVE-2025-38267 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38268/">CVE-2025-38268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38268">CVE-2025-38268 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38270/">CVE-2025-38270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38270">CVE-2025-38270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38272/">CVE-2025-38272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38272">CVE-2025-38272 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38273/">CVE-2025-38273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38273">CVE-2025-38273 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38274/">CVE-2025-38274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38274">CVE-2025-38274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38275/">CVE-2025-38275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38275">CVE-2025-38275 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38277/">CVE-2025-38277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38277">CVE-2025-38277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38278/">CVE-2025-38278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38278">CVE-2025-38278 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38286/">CVE-2025-38286 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38286">CVE-2025-38286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38287/">CVE-2025-38287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38287">CVE-2025-38287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38288/">CVE-2025-38288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38288">CVE-2025-38288 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38289/">CVE-2025-38289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38289">CVE-2025-38289 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38290/">CVE-2025-38290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38290">CVE-2025-38290 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38291/">CVE-2025-38291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38291">CVE-2025-38291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38292/">CVE-2025-38292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38292">CVE-2025-38292 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38293/">CVE-2025-38293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38293">CVE-2025-38293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38299/">CVE-2025-38299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38299">CVE-2025-38299 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38300/">CVE-2025-38300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38300">CVE-2025-38300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38301/">CVE-2025-38301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38301">CVE-2025-38301 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38302/">CVE-2025-38302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38302">CVE-2025-38302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38303/">CVE-2025-38303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38303">CVE-2025-38303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38304/">CVE-2025-38304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38304">CVE-2025-38304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38305/">CVE-2025-38305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38305">CVE-2025-38305 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38306/">CVE-2025-38306 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38306">CVE-2025-38306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38307/">CVE-2025-38307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38307">CVE-2025-38307 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38311/">CVE-2025-38311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38311">CVE-2025-38311 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38312/">CVE-2025-38312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38312">CVE-2025-38312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38313/">CVE-2025-38313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38313">CVE-2025-38313 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38315/">CVE-2025-38315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38315">CVE-2025-38315 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38317/">CVE-2025-38317 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38317">CVE-2025-38317 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38318/">CVE-2025-38318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38318">CVE-2025-38318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38319/">CVE-2025-38319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38319">CVE-2025-38319 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38322/">CVE-2025-38322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38322">CVE-2025-38322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38323/">CVE-2025-38323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38326/">CVE-2025-38326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38326">CVE-2025-38326 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38335/">CVE-2025-38335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38335">CVE-2025-38335 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38336/">CVE-2025-38336 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38336">CVE-2025-38336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38337/">CVE-2025-38337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38337">CVE-2025-38337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38338/">CVE-2025-38338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38338">CVE-2025-38338 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38339/">CVE-2025-38339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38339">CVE-2025-38339 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38341/">CVE-2025-38341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38341">CVE-2025-38341 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38342/">CVE-2025-38342 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38342">CVE-2025-38342 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-38343/">CVE-2025-38343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38343">CVE-2025-38343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38344/">CVE-2025-38344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38344">CVE-2025-38344 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38345/">CVE-2025-38345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38345">CVE-2025-38345 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38348/">CVE-2025-38348 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38348">CVE-2025-38348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38349/">CVE-2025-38349 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38351/">CVE-2025-38351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38351">CVE-2025-38351 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38353/">CVE-2025-38353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38353">CVE-2025-38353 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38354/">CVE-2025-38354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38354">CVE-2025-38354 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38355/">CVE-2025-38355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38355">CVE-2025-38355 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38356/">CVE-2025-38356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38356">CVE-2025-38356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38359/">CVE-2025-38359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38359">CVE-2025-38359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38360/">CVE-2025-38360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38360">CVE-2025-38360 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38361/">CVE-2025-38361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38361">CVE-2025-38361 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38362/">CVE-2025-38362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38362">CVE-2025-38362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38363/">CVE-2025-38363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38363">CVE-2025-38363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38364/">CVE-2025-38364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38364">CVE-2025-38364 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38365/">CVE-2025-38365 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38365">CVE-2025-38365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38368/">CVE-2025-38368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38368">CVE-2025-38368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38369/">CVE-2025-38369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38369">CVE-2025-38369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38371/">CVE-2025-38371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38371">CVE-2025-38371 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38372/">CVE-2025-38372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38372">CVE-2025-38372 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38373/">CVE-2025-38373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38373">CVE-2025-38373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38374/">CVE-2025-38374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38374">CVE-2025-38374 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38375/">CVE-2025-38375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38376/">CVE-2025-38376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38376">CVE-2025-38376 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38377/">CVE-2025-38377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38377">CVE-2025-38377 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38381/">CVE-2025-38381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38381">CVE-2025-38381 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38382/">CVE-2025-38382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38382">CVE-2025-38382 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38383/">CVE-2025-38383 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38383">CVE-2025-38383 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38384/">CVE-2025-38384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38384">CVE-2025-38384 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38385/">CVE-2025-38385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38385">CVE-2025-38385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38386/">CVE-2025-38386 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38386">CVE-2025-38386 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38387/">CVE-2025-38387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38387">CVE-2025-38387 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38389/">CVE-2025-38389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38389">CVE-2025-38389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38390/">CVE-2025-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38390">CVE-2025-38390 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38391/">CVE-2025-38391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38391">CVE-2025-38391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38392/">CVE-2025-38392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38393/">CVE-2025-38393 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38395/">CVE-2025-38395 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38395">CVE-2025-38395 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38396/">CVE-2025-38396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38397/">CVE-2025-38397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38397">CVE-2025-38397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38399/">CVE-2025-38399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38399">CVE-2025-38399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38400/">CVE-2025-38400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38400">CVE-2025-38400 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38401/">CVE-2025-38401 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38401">CVE-2025-38401 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38402/">CVE-2025-38402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38402">CVE-2025-38402 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38403/">CVE-2025-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38404/">CVE-2025-38404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38404">CVE-2025-38404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38405/">CVE-2025-38405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38405">CVE-2025-38405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38406/">CVE-2025-38406 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38406">CVE-2025-38406 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38408/">CVE-2025-38408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38408">CVE-2025-38408 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38409/">CVE-2025-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38409">CVE-2025-38409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38410/">CVE-2025-38410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38410">CVE-2025-38410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38412/">CVE-2025-38412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38412">CVE-2025-38412 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38413/">CVE-2025-38413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38413">CVE-2025-38413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38414/">CVE-2025-38414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38414">CVE-2025-38414 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38416/">CVE-2025-38416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38416">CVE-2025-38416 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38417/">CVE-2025-38417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38417">CVE-2025-38417 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38418/">CVE-2025-38418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38418">CVE-2025-38418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38419/">CVE-2025-38419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38419">CVE-2025-38419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38420/">CVE-2025-38420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38420">CVE-2025-38420 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38421/">CVE-2025-38421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38421">CVE-2025-38421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38424/">CVE-2025-38424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38424">CVE-2025-38424 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38425/">CVE-2025-38425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38425">CVE-2025-38425 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38426/">CVE-2025-38426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38426">CVE-2025-38426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38427/">CVE-2025-38427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38427">CVE-2025-38427 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38428/">CVE-2025-38428 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38428">CVE-2025-38428 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38429/">CVE-2025-38429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38429">CVE-2025-38429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38430/">CVE-2025-38430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38430">CVE-2025-38430 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38436/">CVE-2025-38436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38436">CVE-2025-38436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38438/">CVE-2025-38438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38439/">CVE-2025-38439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38439">CVE-2025-38439 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38440/">CVE-2025-38440 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38440">CVE-2025-38440 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38441/">CVE-2025-38441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38441">CVE-2025-38441 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38443/">CVE-2025-38443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38443">CVE-2025-38443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38444/">CVE-2025-38444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38444">CVE-2025-38444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38445/">CVE-2025-38445 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38445">CVE-2025-38445 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38446/">CVE-2025-38446 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38446">CVE-2025-38446 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38448/">CVE-2025-38448 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38448">CVE-2025-38448 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38449/">CVE-2025-38449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38450/">CVE-2025-38450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38450">CVE-2025-38450 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38451/">CVE-2025-38451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38451">CVE-2025-38451 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38453/">CVE-2025-38453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38453">CVE-2025-38453 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38454/">CVE-2025-38454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38454">CVE-2025-38454 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38455/">CVE-2025-38455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38455">CVE-2025-38455 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38456/">CVE-2025-38456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38456">CVE-2025-38456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38457/">CVE-2025-38457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38457">CVE-2025-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38458/">CVE-2025-38458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38458">CVE-2025-38458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38460/">CVE-2025-38460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38461/">CVE-2025-38461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38462/">CVE-2025-38462 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38462">CVE-2025-38462 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38463/">CVE-2025-38463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38463">CVE-2025-38463 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38464/">CVE-2025-38464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38465/">CVE-2025-38465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38465">CVE-2025-38465 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-38466/">CVE-2025-38466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38466">CVE-2025-38466 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38467/">CVE-2025-38467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38467">CVE-2025-38467 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38468/">CVE-2025-38468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38470/">CVE-2025-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38472/">CVE-2025-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38473/">CVE-2025-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38473">CVE-2025-38473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38474/">CVE-2025-38474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38474">CVE-2025-38474 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38475/">CVE-2025-38475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38475">CVE-2025-38475 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38476/">CVE-2025-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38478/">CVE-2025-38478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38478">CVE-2025-38478 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38480/">CVE-2025-38480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38480">CVE-2025-38480 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38481/">CVE-2025-38481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38481">CVE-2025-38481 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38482/">CVE-2025-38482 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38482">CVE-2025-38482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38483/">CVE-2025-38483 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38483">CVE-2025-38483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38484/">CVE-2025-38484 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38484">CVE-2025-38484 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38485/">CVE-2025-38485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38485">CVE-2025-38485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38487/">CVE-2025-38487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38487">CVE-2025-38487 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38488/">CVE-2025-38488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38489/">CVE-2025-38489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38489">CVE-2025-38489 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38490/">CVE-2025-38490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38490">CVE-2025-38490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38491/">CVE-2025-38491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38491">CVE-2025-38491 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38493/">CVE-2025-38493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38493">CVE-2025-38493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38494/">CVE-2025-38494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38495/">CVE-2025-38495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38496/">CVE-2025-38496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38496">CVE-2025-38496 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38497/">CVE-2025-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38500/">CVE-2025-38500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38503/">CVE-2025-38503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38503">CVE-2025-38503 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38506/">CVE-2025-38506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38506">CVE-2025-38506 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38508/">CVE-2025-38508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38508">CVE-2025-38508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38514/">CVE-2025-38514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38514">CVE-2025-38514 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38524/">CVE-2025-38524 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38524">CVE-2025-38524 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38526/">CVE-2025-38526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38526">CVE-2025-38526 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38527/">CVE-2025-38527 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38528/">CVE-2025-38528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38528">CVE-2025-38528 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38531/">CVE-2025-38531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38531">CVE-2025-38531 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38533/">CVE-2025-38533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38533">CVE-2025-38533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38539/">CVE-2025-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38544/">CVE-2025-38544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38544">CVE-2025-38544 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38545/">CVE-2025-38545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38545">CVE-2025-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38546/">CVE-2025-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38549/">CVE-2025-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38549">CVE-2025-38549 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38552/">CVE-2025-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38553/">CVE-2025-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38554/">CVE-2025-38554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38554">CVE-2025-38554 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38555/">CVE-2025-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38557/">CVE-2025-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38557">CVE-2025-38557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38559/">CVE-2025-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38559">CVE-2025-38559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38560/">CVE-2025-38560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38564/">CVE-2025-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38564">CVE-2025-38564 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38565/">CVE-2025-38565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38566/">CVE-2025-38566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38568/">CVE-2025-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38571/">CVE-2025-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38572/">CVE-2025-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38573/">CVE-2025-38573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38573">CVE-2025-38573 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38574/">CVE-2025-38574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38576/">CVE-2025-38576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38581/">CVE-2025-38581 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38582/">CVE-2025-38582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38582">CVE-2025-38582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38583/">CVE-2025-38583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38584/">CVE-2025-38584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38584">CVE-2025-38584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38585/">CVE-2025-38585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38585">CVE-2025-38585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38586/">CVE-2025-38586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38586">CVE-2025-38586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38587/">CVE-2025-38587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38588/">CVE-2025-38588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38591/">CVE-2025-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38591">CVE-2025-38591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38593/">CVE-2025-38593 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38593">CVE-2025-38593 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38595/">CVE-2025-38595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38595">CVE-2025-38595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38597/">CVE-2025-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38597">CVE-2025-38597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38601/">CVE-2025-38601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38602/">CVE-2025-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38604/">CVE-2025-38604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38605/">CVE-2025-38605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38605">CVE-2025-38605 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38608/">CVE-2025-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38609/">CVE-2025-38609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38610/">CVE-2025-38610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38612/">CVE-2025-38612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38614/">CVE-2025-38614 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38614">CVE-2025-38614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38616/">CVE-2025-38616 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38616">CVE-2025-38616 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38618/">CVE-2025-38618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38619/">CVE-2025-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38619">CVE-2025-38619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38621/">CVE-2025-38621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38621">CVE-2025-38621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38622/">CVE-2025-38622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38623/">CVE-2025-38623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38624/">CVE-2025-38624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38628/">CVE-2025-38628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38628">CVE-2025-38628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38630/">CVE-2025-38630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38631/">CVE-2025-38631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38631">CVE-2025-38631 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38632/">CVE-2025-38632 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38634/">CVE-2025-38634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38635/">CVE-2025-38635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38639/">CVE-2025-38639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38640/">CVE-2025-38640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38643/">CVE-2025-38643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38643">CVE-2025-38643 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38644/">CVE-2025-38644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38646/">CVE-2025-38646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38648/">CVE-2025-38648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38656/">CVE-2025-38656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38656">CVE-2025-38656 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38658/">CVE-2025-38658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38658">CVE-2025-38658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38659/">CVE-2025-38659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38660/">CVE-2025-38660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38660">CVE-2025-38660 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38662/">CVE-2025-38662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38662">CVE-2025-38662 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38664/">CVE-2025-38664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38665/">CVE-2025-38665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38668/">CVE-2025-38668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38670/">CVE-2025-38670 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38671/">CVE-2025-38671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38676/">CVE-2025-38676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38676">CVE-2025-38676 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38678/">CVE-2025-38678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38678">CVE-2025-38678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38679/">CVE-2025-38679 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38680/">CVE-2025-38680 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38681/">CVE-2025-38681 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38683/">CVE-2025-38683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38685/">CVE-2025-38685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38686/">CVE-2025-38686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38686">CVE-2025-38686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38687/">CVE-2025-38687 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38691/">CVE-2025-38691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38692/">CVE-2025-38692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38693/">CVE-2025-38693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38694/">CVE-2025-38694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-38695/">CVE-2025-38695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38700/">CVE-2025-38700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38701/">CVE-2025-38701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38702/">CVE-2025-38702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38703/">CVE-2025-38703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38705/">CVE-2025-38705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38705">CVE-2025-38705 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38706/">CVE-2025-38706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38709/">CVE-2025-38709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38710/">CVE-2025-38710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38710">CVE-2025-38710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38717/">CVE-2025-38717 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38717">CVE-2025-38717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38721/">CVE-2025-38721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38722/">CVE-2025-38722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38722">CVE-2025-38722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38724/">CVE-2025-38724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38725/">CVE-2025-38725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38727/">CVE-2025-38727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38729/">CVE-2025-38729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38730/">CVE-2025-38730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38732/">CVE-2025-38732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38733/">CVE-2025-38733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38733">CVE-2025-38733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38734/">CVE-2025-38734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38735/">CVE-2025-38735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38736/">CVE-2025-38736 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38736">CVE-2025-38736 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39673/">CVE-2025-39673 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39675/">CVE-2025-39675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39677/">CVE-2025-39677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39677">CVE-2025-39677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39678/">CVE-2025-39678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39678">CVE-2025-39678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39679/">CVE-2025-39679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39681/">CVE-2025-39681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-39682/">CVE-2025-39682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39683/">CVE-2025-39683 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39684/">CVE-2025-39684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39685/">CVE-2025-39685 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39686/">CVE-2025-39686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39687/">CVE-2025-39687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39691/">CVE-2025-39691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39693/">CVE-2025-39693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39694/">CVE-2025-39694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39695/">CVE-2025-39695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39695">CVE-2025-39695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39697/">CVE-2025-39697 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39698/">CVE-2025-39698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39700/">CVE-2025-39700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39700">CVE-2025-39700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39701/">CVE-2025-39701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39703/">CVE-2025-39703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39705/">CVE-2025-39705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39705">CVE-2025-39705 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39706/">CVE-2025-39706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39707/">CVE-2025-39707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39707">CVE-2025-39707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39709/">CVE-2025-39709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39710/">CVE-2025-39710 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39711/">CVE-2025-39711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39712/">CVE-2025-39712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39712">CVE-2025-39712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39713/">CVE-2025-39713 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39714/">CVE-2025-39714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39718/">CVE-2025-39718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39719/">CVE-2025-39719 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39721/">CVE-2025-39721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39722/">CVE-2025-39722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39722">CVE-2025-39722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39723/">CVE-2025-39723 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39723">CVE-2025-39723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39724/">CVE-2025-39724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39726/">CVE-2025-39726 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39727/">CVE-2025-39727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39727">CVE-2025-39727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39730/">CVE-2025-39730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39732/">CVE-2025-39732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39732">CVE-2025-39732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39738/">CVE-2025-39738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39739/">CVE-2025-39739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39742/">CVE-2025-39742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39744/">CVE-2025-39744 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39746/">CVE-2025-39746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39747/">CVE-2025-39747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39747">CVE-2025-39747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39748/">CVE-2025-39748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39748">CVE-2025-39748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39749/">CVE-2025-39749 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39750/">CVE-2025-39750 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39754/">CVE-2025-39754 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39754">CVE-2025-39754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39758/">CVE-2025-39758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39759/">CVE-2025-39759 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39761/">CVE-2025-39761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39763/">CVE-2025-39763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39764/">CVE-2025-39764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39764">CVE-2025-39764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39765/">CVE-2025-39765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39765">CVE-2025-39765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39766/">CVE-2025-39766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39770/">CVE-2025-39770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39772/">CVE-2025-39772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39773/">CVE-2025-39773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39775/">CVE-2025-39775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39775">CVE-2025-39775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39782/">CVE-2025-39782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39783/">CVE-2025-39783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39787/">CVE-2025-39787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39788/">CVE-2025-39788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39790/">CVE-2025-39790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39791/">CVE-2025-39791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39791">CVE-2025-39791 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39792/">CVE-2025-39792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39792">CVE-2025-39792 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39798/">CVE-2025-39798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39800/">CVE-2025-39800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39800">CVE-2025-39800 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39801/">CVE-2025-39801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39801">CVE-2025-39801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39806/">CVE-2025-39806 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39806">CVE-2025-39806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39807/">CVE-2025-39807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39807">CVE-2025-39807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39808/">CVE-2025-39808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39808">CVE-2025-39808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39810/">CVE-2025-39810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39810">CVE-2025-39810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39811/">CVE-2025-39811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39811">CVE-2025-39811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39813/">CVE-2025-39813 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39813">CVE-2025-39813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39816/">CVE-2025-39816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39816">CVE-2025-39816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39823/">CVE-2025-39823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39823">CVE-2025-39823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39824/">CVE-2025-39824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39824">CVE-2025-39824 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39825/">CVE-2025-39825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39825">CVE-2025-39825 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39826/">CVE-2025-39826 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39826">CVE-2025-39826 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39827/">CVE-2025-39827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39827">CVE-2025-39827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39828/">CVE-2025-39828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39828">CVE-2025-39828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39830/">CVE-2025-39830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39830">CVE-2025-39830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39832/">CVE-2025-39832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39832">CVE-2025-39832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39833/">CVE-2025-39833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39833">CVE-2025-39833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39834/">CVE-2025-39834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39834">CVE-2025-39834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39835/">CVE-2025-39835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39835">CVE-2025-39835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39836/">CVE-2025-39836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39836">CVE-2025-39836 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39838/">CVE-2025-39838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39838">CVE-2025-39838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39839/">CVE-2025-39839 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39839">CVE-2025-39839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39841/">CVE-2025-39841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39841">CVE-2025-39841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39842/">CVE-2025-39842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39842">CVE-2025-39842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39844/">CVE-2025-39844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39844">CVE-2025-39844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39845/">CVE-2025-39845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39845">CVE-2025-39845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39847/">CVE-2025-39847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39847">CVE-2025-39847 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39848/">CVE-2025-39848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39848">CVE-2025-39848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39849/">CVE-2025-39849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39849">CVE-2025-39849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39850/">CVE-2025-39850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39850">CVE-2025-39850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39851/">CVE-2025-39851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39851">CVE-2025-39851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39852/">CVE-2025-39852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39852">CVE-2025-39852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39853/">CVE-2025-39853 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39853">CVE-2025-39853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39854/">CVE-2025-39854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39854">CVE-2025-39854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39857/">CVE-2025-39857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39857">CVE-2025-39857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39860/">CVE-2025-39860 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39860">CVE-2025-39860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39861/">CVE-2025-39861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39861">CVE-2025-39861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39863/">CVE-2025-39863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39863">CVE-2025-39863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39864/">CVE-2025-39864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39864">CVE-2025-39864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39865/">CVE-2025-39865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39865">CVE-2025-39865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39869/">CVE-2025-39869 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39870/">CVE-2025-39870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39870">CVE-2025-39870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39871/">CVE-2025-39871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39871">CVE-2025-39871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39873/">CVE-2025-39873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39873">CVE-2025-39873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39875/">CVE-2025-39875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39875">CVE-2025-39875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39877/">CVE-2025-39877 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39877">CVE-2025-39877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39882/">CVE-2025-39882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39882">CVE-2025-39882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39884/">CVE-2025-39884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39884">CVE-2025-39884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39885/">CVE-2025-39885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39885">CVE-2025-39885 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39889/">CVE-2025-39889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39889">CVE-2025-39889 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39890/">CVE-2025-39890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39890">CVE-2025-39890 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39891/">CVE-2025-39891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39891">CVE-2025-39891 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39896/">CVE-2025-39896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39896">CVE-2025-39896 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39899/">CVE-2025-39899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39899">CVE-2025-39899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39900/">CVE-2025-39900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39900">CVE-2025-39900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39902/">CVE-2025-39902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39902">CVE-2025-39902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39907/">CVE-2025-39907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907">CVE-2025-39907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39909/">CVE-2025-39909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909">CVE-2025-39909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39916/">CVE-2025-39916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916">CVE-2025-39916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39918/">CVE-2025-39918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39918">CVE-2025-39918 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39922/">CVE-2025-39922 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39922">CVE-2025-39922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39923/">CVE-2025-39923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923">CVE-2025-39923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39925/">CVE-2025-39925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925">CVE-2025-39925 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39926/">CVE-2025-39926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39926">CVE-2025-39926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39931/">CVE-2025-39931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931">CVE-2025-39931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39934/">CVE-2025-39934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934">CVE-2025-39934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39937/">CVE-2025-39937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937">CVE-2025-39937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39938/">CVE-2025-39938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938">CVE-2025-39938 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39945/">CVE-2025-39945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39946/">CVE-2025-39946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946">CVE-2025-39946 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39952/">CVE-2025-39952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952">CVE-2025-39952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39957/">CVE-2025-39957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957">CVE-2025-39957 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029122" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029123" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029124" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94620" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 16.0</platform>
		</affected>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1238472" ref_url="https://bugzilla.suse.com/1238472" source="BUGZILLA"/>
		<reference ref_id="1239206" ref_url="https://bugzilla.suse.com/1239206" source="BUGZILLA"/>
		<reference ref_id="1241166" ref_url="https://bugzilla.suse.com/1241166" source="BUGZILLA"/>
		<reference ref_id="1241637" ref_url="https://bugzilla.suse.com/1241637" source="BUGZILLA"/>
		<reference ref_id="1247222" ref_url="https://bugzilla.suse.com/1247222" source="BUGZILLA"/>
		<reference ref_id="1248630" ref_url="https://bugzilla.suse.com/1248630" source="BUGZILLA"/>
		<reference ref_id="1249161" ref_url="https://bugzilla.suse.com/1249161" source="BUGZILLA"/>
		<reference ref_id="1249226" ref_url="https://bugzilla.suse.com/1249226" source="BUGZILLA"/>
		<reference ref_id="1249302" ref_url="https://bugzilla.suse.com/1249302" source="BUGZILLA"/>
		<reference ref_id="1249317" ref_url="https://bugzilla.suse.com/1249317" source="BUGZILLA"/>
		<reference ref_id="1249397" ref_url="https://bugzilla.suse.com/1249397" source="BUGZILLA"/>
		<reference ref_id="1249398" ref_url="https://bugzilla.suse.com/1249398" source="BUGZILLA"/>
		<reference ref_id="1249495" ref_url="https://bugzilla.suse.com/1249495" source="BUGZILLA"/>
		<reference ref_id="1249512" ref_url="https://bugzilla.suse.com/1249512" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249735" ref_url="https://bugzilla.suse.com/1249735" source="BUGZILLA"/>
		<reference ref_id="1250202" ref_url="https://bugzilla.suse.com/1250202" source="BUGZILLA"/>
		<reference ref_id="1250379" ref_url="https://bugzilla.suse.com/1250379" source="BUGZILLA"/>
		<reference ref_id="1250400" ref_url="https://bugzilla.suse.com/1250400" source="BUGZILLA"/>
		<reference ref_id="1250455" ref_url="https://bugzilla.suse.com/1250455" source="BUGZILLA"/>
		<reference ref_id="1250491" ref_url="https://bugzilla.suse.com/1250491" source="BUGZILLA"/>
		<reference ref_id="1250704" ref_url="https://bugzilla.suse.com/1250704" source="BUGZILLA"/>
		<reference ref_id="1250721" ref_url="https://bugzilla.suse.com/1250721" source="BUGZILLA"/>
		<reference ref_id="1250749" ref_url="https://bugzilla.suse.com/1250749" source="BUGZILLA"/>
		<reference ref_id="1250946" ref_url="https://bugzilla.suse.com/1250946" source="BUGZILLA"/>
		<reference ref_id="1251176" ref_url="https://bugzilla.suse.com/1251176" source="BUGZILLA"/>
		<reference ref_id="1251177" ref_url="https://bugzilla.suse.com/1251177" source="BUGZILLA"/>
		<reference ref_id="1251232" ref_url="https://bugzilla.suse.com/1251232" source="BUGZILLA"/>
		<reference ref_id="1251233" ref_url="https://bugzilla.suse.com/1251233" source="BUGZILLA"/>
		<reference ref_id="1251804" ref_url="https://bugzilla.suse.com/1251804" source="BUGZILLA"/>
		<reference ref_id="1251809" ref_url="https://bugzilla.suse.com/1251809" source="BUGZILLA"/>
		<reference ref_id="1251819" ref_url="https://bugzilla.suse.com/1251819" source="BUGZILLA"/>
		<reference ref_id="1251930" ref_url="https://bugzilla.suse.com/1251930" source="BUGZILLA"/>
		<reference ref_id="1251967" ref_url="https://bugzilla.suse.com/1251967" source="BUGZILLA"/>
		<reference ref_id="1252033" ref_url="https://bugzilla.suse.com/1252033" source="BUGZILLA"/>
		<reference ref_id="1252035" ref_url="https://bugzilla.suse.com/1252035" source="BUGZILLA"/>
		<reference ref_id="1252039" ref_url="https://bugzilla.suse.com/1252039" source="BUGZILLA"/>
		<reference ref_id="1252044" ref_url="https://bugzilla.suse.com/1252044" source="BUGZILLA"/>
		<reference ref_id="1252047" ref_url="https://bugzilla.suse.com/1252047" source="BUGZILLA"/>
		<reference ref_id="1252051" ref_url="https://bugzilla.suse.com/1252051" source="BUGZILLA"/>
		<reference ref_id="1252052" ref_url="https://bugzilla.suse.com/1252052" source="BUGZILLA"/>
		<reference ref_id="1252056" ref_url="https://bugzilla.suse.com/1252056" source="BUGZILLA"/>
		<reference ref_id="1252060" ref_url="https://bugzilla.suse.com/1252060" source="BUGZILLA"/>
		<reference ref_id="1252062" ref_url="https://bugzilla.suse.com/1252062" source="BUGZILLA"/>
		<reference ref_id="1252064" ref_url="https://bugzilla.suse.com/1252064" source="BUGZILLA"/>
		<reference ref_id="1252065" ref_url="https://bugzilla.suse.com/1252065" source="BUGZILLA"/>
		<reference ref_id="1252067" ref_url="https://bugzilla.suse.com/1252067" source="BUGZILLA"/>
		<reference ref_id="1252069" ref_url="https://bugzilla.suse.com/1252069" source="BUGZILLA"/>
		<reference ref_id="1252070" ref_url="https://bugzilla.suse.com/1252070" source="BUGZILLA"/>
		<reference ref_id="1252072" ref_url="https://bugzilla.suse.com/1252072" source="BUGZILLA"/>
		<reference ref_id="1252074" ref_url="https://bugzilla.suse.com/1252074" source="BUGZILLA"/>
		<reference ref_id="1252075" ref_url="https://bugzilla.suse.com/1252075" source="BUGZILLA"/>
		<reference ref_id="1252076" ref_url="https://bugzilla.suse.com/1252076" source="BUGZILLA"/>
		<reference ref_id="1252078" ref_url="https://bugzilla.suse.com/1252078" source="BUGZILLA"/>
		<reference ref_id="1252079" ref_url="https://bugzilla.suse.com/1252079" source="BUGZILLA"/>
		<reference ref_id="1252081" ref_url="https://bugzilla.suse.com/1252081" source="BUGZILLA"/>
		<reference ref_id="1252082" ref_url="https://bugzilla.suse.com/1252082" source="BUGZILLA"/>
		<reference ref_id="1252083" ref_url="https://bugzilla.suse.com/1252083" source="BUGZILLA"/>
		<reference ref_id="1252253" ref_url="https://bugzilla.suse.com/1252253" source="BUGZILLA"/>
		<reference ref_id="1252265" ref_url="https://bugzilla.suse.com/1252265" source="BUGZILLA"/>
		<reference ref_id="1252267" ref_url="https://bugzilla.suse.com/1252267" source="BUGZILLA"/>
		<reference ref_id="1252270" ref_url="https://bugzilla.suse.com/1252270" source="BUGZILLA"/>
		<reference ref_id="1252330" ref_url="https://bugzilla.suse.com/1252330" source="BUGZILLA"/>
		<reference ref_id="1252333" ref_url="https://bugzilla.suse.com/1252333" source="BUGZILLA"/>
		<reference ref_id="1252336" ref_url="https://bugzilla.suse.com/1252336" source="BUGZILLA"/>
		<reference ref_id="1252346" ref_url="https://bugzilla.suse.com/1252346" source="BUGZILLA"/>
		<reference ref_id="1252348" ref_url="https://bugzilla.suse.com/1252348" source="BUGZILLA"/>
		<reference ref_id="1252349" ref_url="https://bugzilla.suse.com/1252349" source="BUGZILLA"/>
		<reference ref_id="1252678" ref_url="https://bugzilla.suse.com/1252678" source="BUGZILLA"/>
		<reference ref_id="1252679" ref_url="https://bugzilla.suse.com/1252679" source="BUGZILLA"/>
		<reference ref_id="1252688" ref_url="https://bugzilla.suse.com/1252688" source="BUGZILLA"/>
		<reference ref_id="1252725" ref_url="https://bugzilla.suse.com/1252725" source="BUGZILLA"/>
		<reference ref_id="1252734" ref_url="https://bugzilla.suse.com/1252734" source="BUGZILLA"/>
		<reference ref_id="1252772" ref_url="https://bugzilla.suse.com/1252772" source="BUGZILLA"/>
		<reference ref_id="1252774" ref_url="https://bugzilla.suse.com/1252774" source="BUGZILLA"/>
		<reference ref_id="1252780" ref_url="https://bugzilla.suse.com/1252780" source="BUGZILLA"/>
		<reference ref_id="1252785" ref_url="https://bugzilla.suse.com/1252785" source="BUGZILLA"/>
		<reference ref_id="1252787" ref_url="https://bugzilla.suse.com/1252787" source="BUGZILLA"/>
		<reference ref_id="1252789" ref_url="https://bugzilla.suse.com/1252789" source="BUGZILLA"/>
		<reference ref_id="1252797" ref_url="https://bugzilla.suse.com/1252797" source="BUGZILLA"/>
		<reference ref_id="1252819" ref_url="https://bugzilla.suse.com/1252819" source="BUGZILLA"/>
		<reference ref_id="1252822" ref_url="https://bugzilla.suse.com/1252822" source="BUGZILLA"/>
		<reference ref_id="1252826" ref_url="https://bugzilla.suse.com/1252826" source="BUGZILLA"/>
		<reference ref_id="1252841" ref_url="https://bugzilla.suse.com/1252841" source="BUGZILLA"/>
		<reference ref_id="1252848" ref_url="https://bugzilla.suse.com/1252848" source="BUGZILLA"/>
		<reference ref_id="1252849" ref_url="https://bugzilla.suse.com/1252849" source="BUGZILLA"/>
		<reference ref_id="1252850" ref_url="https://bugzilla.suse.com/1252850" source="BUGZILLA"/>
		<reference ref_id="1252851" ref_url="https://bugzilla.suse.com/1252851" source="BUGZILLA"/>
		<reference ref_id="1252854" ref_url="https://bugzilla.suse.com/1252854" source="BUGZILLA"/>
		<reference ref_id="1252858" ref_url="https://bugzilla.suse.com/1252858" source="BUGZILLA"/>
		<reference ref_id="1252862" ref_url="https://bugzilla.suse.com/1252862" source="BUGZILLA"/>
		<reference ref_id="1252865" ref_url="https://bugzilla.suse.com/1252865" source="BUGZILLA"/>
		<reference ref_id="1252866" ref_url="https://bugzilla.suse.com/1252866" source="BUGZILLA"/>
		<reference ref_id="1252873" ref_url="https://bugzilla.suse.com/1252873" source="BUGZILLA"/>
		<reference ref_id="1252902" ref_url="https://bugzilla.suse.com/1252902" source="BUGZILLA"/>
		<reference ref_id="1252909" ref_url="https://bugzilla.suse.com/1252909" source="BUGZILLA"/>
		<reference ref_id="1252915" ref_url="https://bugzilla.suse.com/1252915" source="BUGZILLA"/>
		<reference ref_id="1252918" ref_url="https://bugzilla.suse.com/1252918" source="BUGZILLA"/>
		<reference ref_id="1252921" ref_url="https://bugzilla.suse.com/1252921" source="BUGZILLA"/>
		<reference ref_id="1252939" ref_url="https://bugzilla.suse.com/1252939" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-21816" ref_url="https://www.suse.com/security/cve/CVE-2025-21816/" source="CVE"/>
		<reference ref_id="CVE-2025-38653" ref_url="https://www.suse.com/security/cve/CVE-2025-38653/" source="CVE"/>
		<reference ref_id="CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718/" source="CVE"/>
		<reference ref_id="CVE-2025-39676" ref_url="https://www.suse.com/security/cve/CVE-2025-39676/" source="CVE"/>
		<reference ref_id="CVE-2025-39702" ref_url="https://www.suse.com/security/cve/CVE-2025-39702/" source="CVE"/>
		<reference ref_id="CVE-2025-39756" ref_url="https://www.suse.com/security/cve/CVE-2025-39756/" source="CVE"/>
		<reference ref_id="CVE-2025-39779" ref_url="https://www.suse.com/security/cve/CVE-2025-39779/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39812" ref_url="https://www.suse.com/security/cve/CVE-2025-39812/" source="CVE"/>
		<reference ref_id="CVE-2025-39866" ref_url="https://www.suse.com/security/cve/CVE-2025-39866/" source="CVE"/>
		<reference ref_id="CVE-2025-39876" ref_url="https://www.suse.com/security/cve/CVE-2025-39876/" source="CVE"/>
		<reference ref_id="CVE-2025-39881" ref_url="https://www.suse.com/security/cve/CVE-2025-39881/" source="CVE"/>
		<reference ref_id="CVE-2025-39895" ref_url="https://www.suse.com/security/cve/CVE-2025-39895/" source="CVE"/>
		<reference ref_id="CVE-2025-39903" ref_url="https://www.suse.com/security/cve/CVE-2025-39903/" source="CVE"/>
		<reference ref_id="CVE-2025-39911" ref_url="https://www.suse.com/security/cve/CVE-2025-39911/" source="CVE"/>
		<reference ref_id="CVE-2025-39947" ref_url="https://www.suse.com/security/cve/CVE-2025-39947/" source="CVE"/>
		<reference ref_id="CVE-2025-39948" ref_url="https://www.suse.com/security/cve/CVE-2025-39948/" source="CVE"/>
		<reference ref_id="CVE-2025-39949" ref_url="https://www.suse.com/security/cve/CVE-2025-39949/" source="CVE"/>
		<reference ref_id="CVE-2025-39950" ref_url="https://www.suse.com/security/cve/CVE-2025-39950/" source="CVE"/>
		<reference ref_id="CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955/" source="CVE"/>
		<reference ref_id="CVE-2025-39956" ref_url="https://www.suse.com/security/cve/CVE-2025-39956/" source="CVE"/>
		<reference ref_id="CVE-2025-39963" ref_url="https://www.suse.com/security/cve/CVE-2025-39963/" source="CVE"/>
		<reference ref_id="CVE-2025-39965" ref_url="https://www.suse.com/security/cve/CVE-2025-39965/" source="CVE"/>
		<reference ref_id="CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967/" source="CVE"/>
		<reference ref_id="CVE-2025-39968" ref_url="https://www.suse.com/security/cve/CVE-2025-39968/" source="CVE"/>
		<reference ref_id="CVE-2025-39969" ref_url="https://www.suse.com/security/cve/CVE-2025-39969/" source="CVE"/>
		<reference ref_id="CVE-2025-39970" ref_url="https://www.suse.com/security/cve/CVE-2025-39970/" source="CVE"/>
		<reference ref_id="CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971/" source="CVE"/>
		<reference ref_id="CVE-2025-39972" ref_url="https://www.suse.com/security/cve/CVE-2025-39972/" source="CVE"/>
		<reference ref_id="CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973/" source="CVE"/>
		<reference ref_id="CVE-2025-39978" ref_url="https://www.suse.com/security/cve/CVE-2025-39978/" source="CVE"/>
		<reference ref_id="CVE-2025-39979" ref_url="https://www.suse.com/security/cve/CVE-2025-39979/" source="CVE"/>
		<reference ref_id="CVE-2025-39981" ref_url="https://www.suse.com/security/cve/CVE-2025-39981/" source="CVE"/>
		<reference ref_id="CVE-2025-39982" ref_url="https://www.suse.com/security/cve/CVE-2025-39982/" source="CVE"/>
		<reference ref_id="CVE-2025-39984" ref_url="https://www.suse.com/security/cve/CVE-2025-39984/" source="CVE"/>
		<reference ref_id="CVE-2025-39985" ref_url="https://www.suse.com/security/cve/CVE-2025-39985/" source="CVE"/>
		<reference ref_id="CVE-2025-39986" ref_url="https://www.suse.com/security/cve/CVE-2025-39986/" source="CVE"/>
		<reference ref_id="CVE-2025-39987" ref_url="https://www.suse.com/security/cve/CVE-2025-39987/" source="CVE"/>
		<reference ref_id="CVE-2025-39988" ref_url="https://www.suse.com/security/cve/CVE-2025-39988/" source="CVE"/>
		<reference ref_id="CVE-2025-39991" ref_url="https://www.suse.com/security/cve/CVE-2025-39991/" source="CVE"/>
		<reference ref_id="CVE-2025-39992" ref_url="https://www.suse.com/security/cve/CVE-2025-39992/" source="CVE"/>
		<reference ref_id="CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993/" source="CVE"/>
		<reference ref_id="CVE-2025-39994" ref_url="https://www.suse.com/security/cve/CVE-2025-39994/" source="CVE"/>
		<reference ref_id="CVE-2025-39995" ref_url="https://www.suse.com/security/cve/CVE-2025-39995/" source="CVE"/>
		<reference ref_id="CVE-2025-39996" ref_url="https://www.suse.com/security/cve/CVE-2025-39996/" source="CVE"/>
		<reference ref_id="CVE-2025-39997" ref_url="https://www.suse.com/security/cve/CVE-2025-39997/" source="CVE"/>
		<reference ref_id="CVE-2025-40000" ref_url="https://www.suse.com/security/cve/CVE-2025-40000/" source="CVE"/>
		<reference ref_id="CVE-2025-40005" ref_url="https://www.suse.com/security/cve/CVE-2025-40005/" source="CVE"/>
		<reference ref_id="CVE-2025-40009" ref_url="https://www.suse.com/security/cve/CVE-2025-40009/" source="CVE"/>
		<reference ref_id="CVE-2025-40011" ref_url="https://www.suse.com/security/cve/CVE-2025-40011/" source="CVE"/>
		<reference ref_id="CVE-2025-40012" ref_url="https://www.suse.com/security/cve/CVE-2025-40012/" source="CVE"/>
		<reference ref_id="CVE-2025-40013" ref_url="https://www.suse.com/security/cve/CVE-2025-40013/" source="CVE"/>
		<reference ref_id="CVE-2025-40016" ref_url="https://www.suse.com/security/cve/CVE-2025-40016/" source="CVE"/>
		<reference ref_id="CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018/" source="CVE"/>
		<reference ref_id="CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019/" source="CVE"/>
		<reference ref_id="CVE-2025-40020" ref_url="https://www.suse.com/security/cve/CVE-2025-40020/" source="CVE"/>
		<reference ref_id="CVE-2025-40029" ref_url="https://www.suse.com/security/cve/CVE-2025-40029/" source="CVE"/>
		<reference ref_id="CVE-2025-40032" ref_url="https://www.suse.com/security/cve/CVE-2025-40032/" source="CVE"/>
		<reference ref_id="CVE-2025-40035" ref_url="https://www.suse.com/security/cve/CVE-2025-40035/" source="CVE"/>
		<reference ref_id="CVE-2025-40036" ref_url="https://www.suse.com/security/cve/CVE-2025-40036/" source="CVE"/>
		<reference ref_id="CVE-2025-40037" ref_url="https://www.suse.com/security/cve/CVE-2025-40037/" source="CVE"/>
		<reference ref_id="CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040/" source="CVE"/>
		<reference ref_id="CVE-2025-40043" ref_url="https://www.suse.com/security/cve/CVE-2025-40043/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048/" source="CVE"/>
		<reference ref_id="CVE-2025-40049" ref_url="https://www.suse.com/security/cve/CVE-2025-40049/" source="CVE"/>
		<reference ref_id="CVE-2025-40051" ref_url="https://www.suse.com/security/cve/CVE-2025-40051/" source="CVE"/>
		<reference ref_id="CVE-2025-40052" ref_url="https://www.suse.com/security/cve/CVE-2025-40052/" source="CVE"/>
		<reference ref_id="CVE-2025-40056" ref_url="https://www.suse.com/security/cve/CVE-2025-40056/" source="CVE"/>
		<reference ref_id="CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058/" source="CVE"/>
		<reference ref_id="CVE-2025-40060" ref_url="https://www.suse.com/security/cve/CVE-2025-40060/" source="CVE"/>
		<reference ref_id="CVE-2025-40061" ref_url="https://www.suse.com/security/cve/CVE-2025-40061/" source="CVE"/>
		<reference ref_id="CVE-2025-40062" ref_url="https://www.suse.com/security/cve/CVE-2025-40062/" source="CVE"/>
		<reference ref_id="CVE-2025-40071" ref_url="https://www.suse.com/security/cve/CVE-2025-40071/" source="CVE"/>
		<reference ref_id="CVE-2025-40078" ref_url="https://www.suse.com/security/cve/CVE-2025-40078/" source="CVE"/>
		<reference ref_id="CVE-2025-40080" ref_url="https://www.suse.com/security/cve/CVE-2025-40080/" source="CVE"/>
		<reference ref_id="CVE-2025-40085" ref_url="https://www.suse.com/security/cve/CVE-2025-40085/" source="CVE"/>
		<reference ref_id="CVE-2025-40087" ref_url="https://www.suse.com/security/cve/CVE-2025-40087/" source="CVE"/>
		<reference ref_id="CVE-2025-40091" ref_url="https://www.suse.com/security/cve/CVE-2025-40091/" source="CVE"/>
		<reference ref_id="CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096/" source="CVE"/>
		<reference ref_id="CVE-2025-40100" ref_url="https://www.suse.com/security/cve/CVE-2025-40100/" source="CVE"/>
		<reference ref_id="CVE-2025-40104" ref_url="https://www.suse.com/security/cve/CVE-2025-40104/" source="CVE"/>
		<reference ref_id="CVE-2025-40364" ref_url="https://www.suse.com/security/cve/CVE-2025-40364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-21816: hrtimers: Force migrate away hrtimers queued after (bsc#1238472).
- CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630).
- CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161).
- CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302).
- CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317).
- CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512).
- CVE-2025-39779: btrfs: subpage: keep TOWRITE tag until folio is cleaned (bsc#1249495).
- CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202).
- CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455).
- CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400).
- CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379).
- CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721).
- CVE-2025-39903: of_numa: fix uninitialized memory nodes causing kernel panic (bsc#1250749).
- CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704).
- CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232).
- CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233).
- CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177).
- CVE-2025-39950: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR (bsc#1251176).
- CVE-2025-39955: tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect() (bsc#1251804).
- CVE-2025-39956: igc: don't fail igc_probe() on LED setup error (bsc#1251809).
- CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251819).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044).
- CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051).
- CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052).
- CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-39979: net/mlx5: fs, add API for sharing HWS action by refcount (bsc#1252067).
- CVE-2025-39984: net: tun: Update napi-&gt;skb after XDP process (bsc#1252081).
- CVE-2025-39992: mm: swap: check for stable address space before operating on the VMA (bsc#1252076).
- CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062).
- CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349).
- CVE-2025-40012: net/smc: fix warning in smc_rx_splice() when calling get_page() (bsc#1252330).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).
- CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858).
- CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826).
- CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848).
- CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789).
- CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).
- CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918).

The following non security issues were fixed:

- add bug reference to existing hv_netvsc change (bsc#1252265)
- amd-pstate-ut: Reset amd-pstate driver mode after running selftests (bsc#1249226).
- cgroup/cpuset: Remove remote_partition_check() &amp; make update_cpumasks_hier() handle remote partition (bsc#1241166).
- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).
- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).
- doc/README.SUSE: Correct the character used for TAINT_NO_SUPPORT
  The character was previously 'N', but upstream used it for TAINT_TEST,
  which prompted the change of TAINT_NO_SUPPORT to 'n'.
- dpll: zl3073x: Add firmware loading functionality (bsc#1252253).
- dpll: zl3073x: Add functions to access hardware registers (bsc#1252253).
- dpll: zl3073x: Add low-level flash functions (bsc#1252253).
- dpll: zl3073x: Add support to get fractional frequency offset (bsc#1252253).
- dpll: zl3073x: Add support to get phase offset on connected input pin (bsc#1252253).
- dpll: zl3073x: Add support to get/set esync on pins (bsc#1252253).
- dpll: zl3073x: Fix double free in zl3073x_devlink_flash_update() (bsc#1252253).
- dpll: zl3073x: Handle missing or corrupted flash configuration (bsc#1252253).
- dpll: zl3073x: Implement devlink flash callback (bsc#1252253).
- dpll: zl3073x: Increase maximum size of flash utility (bsc#1252253).
- dpll: zl3073x: Refactor DPLL initialization (bsc#1252253).
- drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes).
- drm/xe/guc: Prepare GuC register list and update ADS size for error capture (stable-fixes).
- ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd (bsc#1247222).
- ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation (bsc#1247222).
- ixgbevf: fix getting link speed data for E610 devices (bsc#1247222).
- ixgbevf: fix mailbox API compatibility by negotiating supported features (bsc#1247222).
- kbuild/modfinal: Link livepatches with module-common.o (bsc#1218644, bsc#1252270).
- kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939).
- kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930).
- nvme-auth: update sc_c in host response (git-fixes bsc#1249397).
- perf hwmon_pmu: Fix uninitialized variable warning (perf-sle16-v6.13-userspace-update, git-fixes).
- phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes).
- powerpc/fadump: skip parameter area allocation when fadump is disabled (jsc#PED-9891 git-fixes).
- proc: fix missing pde_set_flags() for net proc files (bsc#1248630)
- proc: fix type confusion in pde_set_flags() (bsc#1248630)
- rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too (bsc#1250946)
- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).
- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1252725).
- x86/resctrl: Fix miscount of bandwidth event when reactivating previously unavailable RMID (bsc#1252734).
- x86/resctrl: Refactor resctrl_arch_rmid_read() (bsc#1252734).
- x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL (jsc#PED-348).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2025-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238472">SUSE bug 1238472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239206">SUSE bug 1239206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241166">SUSE bug 1241166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241637">SUSE bug 1241637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247222">SUSE bug 1247222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248630">SUSE bug 1248630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249161">SUSE bug 1249161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249226">SUSE bug 1249226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249302">SUSE bug 1249302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249317">SUSE bug 1249317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249397">SUSE bug 1249397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249398">SUSE bug 1249398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249495">SUSE bug 1249495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249512">SUSE bug 1249512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249735">SUSE bug 1249735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250202">SUSE bug 1250202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250379">SUSE bug 1250379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250400">SUSE bug 1250400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250455">SUSE bug 1250455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250491">SUSE bug 1250491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250704">SUSE bug 1250704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250721">SUSE bug 1250721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250749">SUSE bug 1250749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250946">SUSE bug 1250946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251176">SUSE bug 1251176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251177">SUSE bug 1251177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251232">SUSE bug 1251232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251233">SUSE bug 1251233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251804">SUSE bug 1251804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251809">SUSE bug 1251809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251819">SUSE bug 1251819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251930">SUSE bug 1251930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251967">SUSE bug 1251967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252039">SUSE bug 1252039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252044">SUSE bug 1252044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252047">SUSE bug 1252047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252051">SUSE bug 1252051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252052">SUSE bug 1252052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252056">SUSE bug 1252056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252060">SUSE bug 1252060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252062">SUSE bug 1252062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252064">SUSE bug 1252064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252065">SUSE bug 1252065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252067">SUSE bug 1252067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252069">SUSE bug 1252069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252070">SUSE bug 1252070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252072">SUSE bug 1252072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252074">SUSE bug 1252074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252075">SUSE bug 1252075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252076">SUSE bug 1252076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252078">SUSE bug 1252078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252079">SUSE bug 1252079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252081">SUSE bug 1252081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252082">SUSE bug 1252082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252083">SUSE bug 1252083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252253">SUSE bug 1252253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252265">SUSE bug 1252265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252267">SUSE bug 1252267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252270">SUSE bug 1252270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252330">SUSE bug 1252330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252333">SUSE bug 1252333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252336">SUSE bug 1252336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252346">SUSE bug 1252346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252348">SUSE bug 1252348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252349">SUSE bug 1252349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252678">SUSE bug 1252678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252679">SUSE bug 1252679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252688">SUSE bug 1252688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252725">SUSE bug 1252725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252734">SUSE bug 1252734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252772">SUSE bug 1252772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252774">SUSE bug 1252774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252780">SUSE bug 1252780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252787">SUSE bug 1252787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252789">SUSE bug 1252789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252797">SUSE bug 1252797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252819">SUSE bug 1252819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252822">SUSE bug 1252822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252826">SUSE bug 1252826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252841">SUSE bug 1252841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252848">SUSE bug 1252848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252849">SUSE bug 1252849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252850">SUSE bug 1252850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252851">SUSE bug 1252851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252854">SUSE bug 1252854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252858">SUSE bug 1252858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252862">SUSE bug 1252862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252865">SUSE bug 1252865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252866">SUSE bug 1252866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252873">SUSE bug 1252873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252902">SUSE bug 1252902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252909">SUSE bug 1252909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252915">SUSE bug 1252915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252918">SUSE bug 1252918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252921">SUSE bug 1252921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252939">SUSE bug 1252939</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21816/">CVE-2025-21816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21816">CVE-2025-21816 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38653/">CVE-2025-38653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39676/">CVE-2025-39676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39702/">CVE-2025-39702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39756/">CVE-2025-39756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39779/">CVE-2025-39779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39779">CVE-2025-39779 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39812/">CVE-2025-39812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39812">CVE-2025-39812 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39866/">CVE-2025-39866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39866">CVE-2025-39866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39876/">CVE-2025-39876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39876">CVE-2025-39876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39881/">CVE-2025-39881 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39895/">CVE-2025-39895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39895">CVE-2025-39895 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39903/">CVE-2025-39903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39903">CVE-2025-39903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39911/">CVE-2025-39911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911">CVE-2025-39911 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39947/">CVE-2025-39947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947">CVE-2025-39947 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39948/">CVE-2025-39948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39948">CVE-2025-39948 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39949/">CVE-2025-39949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949">CVE-2025-39949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39950/">CVE-2025-39950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39950">CVE-2025-39950 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39956/">CVE-2025-39956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39956">CVE-2025-39956 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39963/">CVE-2025-39963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39965/">CVE-2025-39965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39965">CVE-2025-39965 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39968/">CVE-2025-39968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39968">CVE-2025-39968 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39969/">CVE-2025-39969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39969">CVE-2025-39969 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39970/">CVE-2025-39970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39970">CVE-2025-39970 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39972/">CVE-2025-39972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39972">CVE-2025-39972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39978/">CVE-2025-39978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39978">CVE-2025-39978 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39979/">CVE-2025-39979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39979">CVE-2025-39979 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39981/">CVE-2025-39981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39981">CVE-2025-39981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39982/">CVE-2025-39982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39982">CVE-2025-39982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39984/">CVE-2025-39984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39984">CVE-2025-39984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39985/">CVE-2025-39985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39985">CVE-2025-39985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39986/">CVE-2025-39986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39986">CVE-2025-39986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39987/">CVE-2025-39987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39987">CVE-2025-39987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39988/">CVE-2025-39988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39988">CVE-2025-39988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39991/">CVE-2025-39991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39991">CVE-2025-39991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39992/">CVE-2025-39992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39992">CVE-2025-39992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39994/">CVE-2025-39994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39994">CVE-2025-39994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39995/">CVE-2025-39995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39996/">CVE-2025-39996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39996">CVE-2025-39996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39997/">CVE-2025-39997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39997">CVE-2025-39997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40000/">CVE-2025-40000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40005/">CVE-2025-40005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40005">CVE-2025-40005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40009/">CVE-2025-40009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40009">CVE-2025-40009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40011/">CVE-2025-40011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40011">CVE-2025-40011 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40012/">CVE-2025-40012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40012">CVE-2025-40012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40013/">CVE-2025-40013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40013">CVE-2025-40013 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40016/">CVE-2025-40016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40016">CVE-2025-40016 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40020/">CVE-2025-40020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40020">CVE-2025-40020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40029/">CVE-2025-40029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40032/">CVE-2025-40032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40035/">CVE-2025-40035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40036/">CVE-2025-40036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40037/">CVE-2025-40037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40043/">CVE-2025-40043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40049/">CVE-2025-40049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40051/">CVE-2025-40051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40052/">CVE-2025-40052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40056/">CVE-2025-40056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40060/">CVE-2025-40060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40061/">CVE-2025-40061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40062/">CVE-2025-40062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40071/">CVE-2025-40071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40078/">CVE-2025-40078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40080/">CVE-2025-40080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40085/">CVE-2025-40085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40087/">CVE-2025-40087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40091/">CVE-2025-40091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40091">CVE-2025-40091 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40100/">CVE-2025-40100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40104/">CVE-2025-40104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40364/">CVE-2025-40364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40364">CVE-2025-40364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:16.0</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2010029125" comment="SUSE Linux Enterprise High Availability Extension 16.0 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032876" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032877" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032878" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025971" version="1" comment="389-ds is &lt;3.0.6~git86.dce421a0d-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025972" version="1" comment="389-ds-devel is &lt;3.0.6~git86.dce421a0d-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025973" version="1" comment="389-ds-snmp is &lt;3.0.6~git86.dce421a0d-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025974" version="1" comment="lib389 is &lt;3.0.6~git86.dce421a0d-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025975" version="1" comment="libsvrcore0 is &lt;3.0.6~git86.dce421a0d-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025976" version="1" comment="sles-release is ==16.0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025977" version="1" comment="FastCGI is &lt;2.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025978" version="1" comment="FastCGI-devel is &lt;2.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025979" version="1" comment="libfcgi0 is &lt;2.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025980" version="1" comment="perl-FCGI is &lt;2.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025981" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025982" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025983" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025984" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025985" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025986" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025987" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025988" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025989" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025990" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025991" version="1" comment="Mesa is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025992" version="1" comment="Mesa-KHR-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025993" version="1" comment="Mesa-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025994" version="1" comment="Mesa-dri is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025995" version="1" comment="Mesa-dri-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025996" version="1" comment="Mesa-dri-nouveau is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025997" version="1" comment="Mesa-dri-vc4 is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025998" version="1" comment="Mesa-gallium is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025999" version="1" comment="Mesa-libEGL-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026000" version="1" comment="Mesa-libEGL1 is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026001" version="1" comment="Mesa-libGL-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026002" version="1" comment="Mesa-libGL1 is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026003" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026004" version="1" comment="Mesa-libGLESv2-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026005" version="1" comment="Mesa-libGLESv3-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026006" version="1" comment="Mesa-libOpenCL is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026007" version="1" comment="Mesa-libRusticlOpenCL is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026008" version="1" comment="Mesa-libd3d is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026009" version="1" comment="Mesa-libd3d-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026010" version="1" comment="Mesa-libglapi-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026011" version="1" comment="Mesa-libglapi0 is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026012" version="1" comment="Mesa-libva is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026013" version="1" comment="Mesa-vulkan-device-select is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026014" version="1" comment="Mesa-vulkan-overlay is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026015" version="1" comment="libOSMesa-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026016" version="1" comment="libOSMesa8 is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026017" version="1" comment="libgbm-devel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026018" version="1" comment="libgbm1 is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026019" version="1" comment="libvdpau_nouveau is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026020" version="1" comment="libvdpau_r600 is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026021" version="1" comment="libvdpau_radeonsi is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026022" version="1" comment="libvdpau_virtio_gpu is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026023" version="1" comment="libvulkan_broadcom is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026024" version="1" comment="libvulkan_freedreno is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026025" version="1" comment="libvulkan_intel is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026026" version="1" comment="libvulkan_lvp is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026027" version="1" comment="libvulkan_radeon is &lt;24.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026028" version="1" comment="libxatracker-devel is &lt;1.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026029" version="1" comment="libxatracker2 is &lt;1.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026030" version="1" comment="MozillaFirefox is &lt;140.2.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026031" version="1" comment="MozillaFirefox-devel is &lt;140.2.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026032" version="1" comment="MozillaFirefox-translations-common is &lt;140.2.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026033" version="1" comment="MozillaFirefox-translations-other is &lt;140.2.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026034" version="1" comment="NetworkManager is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026035" version="1" comment="NetworkManager-cloud-setup is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026036" version="1" comment="NetworkManager-config-server is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026037" version="1" comment="NetworkManager-devel is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026038" version="1" comment="NetworkManager-lang is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026039" version="1" comment="NetworkManager-pppoe is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026040" version="1" comment="NetworkManager-tui is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026041" version="1" comment="NetworkManager-wwan is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026042" version="1" comment="libnm0 is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026043" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026044" version="1" comment="OpenIPMI is &lt;2.0.36.56+git.0a3a991-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026045" version="1" comment="OpenIPMI-devel is &lt;2.0.36.56+git.0a3a991-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026046" version="1" comment="OpenIPMI-python3 is &lt;2.0.36.56+git.0a3a991-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026047" version="1" comment="libOpenIPMI0 is &lt;2.0.36.56+git.0a3a991-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026048" version="1" comment="libOpenIPMIui1 is &lt;2.0.36.56+git.0a3a991-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026049" version="1" comment="PackageKit is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026050" version="1" comment="PackageKit-backend-zypp is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026051" version="1" comment="PackageKit-branding-upstream is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026052" version="1" comment="PackageKit-devel is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026053" version="1" comment="PackageKit-lang is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026054" version="1" comment="libpackagekit-glib2-18 is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026055" version="1" comment="libpackagekit-glib2-devel is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026056" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026057" version="1" comment="WebKitGTK-4.1-lang is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026058" version="1" comment="WebKitGTK-6.0-lang is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026059" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026060" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026061" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026062" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026063" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026064" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026065" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026066" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026067" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026068" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026069" version="1" comment="webkit-jsc-4.1 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026070" version="1" comment="webkit-jsc-6.0 is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026071" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026072" version="1" comment="webkit2gtk3-minibrowser is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026073" version="1" comment="webkit2gtk4-minibrowser is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026074" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.48.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026075" version="1" comment="aaa_base is &lt;84.87+git20250429.1cad3bc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026076" version="1" comment="aaa_base-extras is &lt;84.87+git20250429.1cad3bc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026077" version="1" comment="aaa_base-malloccheck is &lt;84.87+git20250429.1cad3bc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026078" version="1" comment="aaa_base-wsl is &lt;84.87+git20250429.1cad3bc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026079" version="1" comment="aaa_base-yama-enable-ptrace is &lt;84.87+git20250429.1cad3bc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026080" version="1" comment="aardvark-dns is &lt;1.14.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026081" version="1" comment="accountsservice is &lt;23.13.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026082" version="1" comment="accountsservice-devel is &lt;23.13.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026083" version="1" comment="accountsservice-lang is &lt;23.13.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026084" version="1" comment="accountsservice-vala is &lt;23.13.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026085" version="1" comment="libaccountsservice0 is &lt;23.13.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026086" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;23.13.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026087" version="1" comment="afterburn is &lt;5.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026088" version="1" comment="afterburn-dracut is &lt;5.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026089" version="1" comment="agama-scripts is &lt;17+359.34bc8cc0b-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026090" version="1" comment="aide is &lt;0.18.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026091" version="1" comment="alloy is &lt;1.9.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026092" version="1" comment="alsa is &lt;1.2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026093" version="1" comment="alsa-devel is &lt;1.2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026094" version="1" comment="alsa-docs is &lt;1.2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026095" version="1" comment="alsa-topology-devel is &lt;1.2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026096" version="1" comment="libasound2 is &lt;1.2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026097" version="1" comment="libatopology2 is &lt;1.2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026098" version="1" comment="amazon-ssm-agent is &lt;3.3.2299.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026099" version="1" comment="ansible is &lt;11.3.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026100" version="1" comment="ansible-core is &lt;2.18.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026101" version="1" comment="ant is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026102" version="1" comment="ant-antlr is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026103" version="1" comment="ant-apache-bcel is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026104" version="1" comment="ant-apache-bsf is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026105" version="1" comment="ant-apache-log4j is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026106" version="1" comment="ant-apache-oro is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026107" version="1" comment="ant-apache-regexp is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026108" version="1" comment="ant-apache-resolver is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026109" version="1" comment="ant-apache-xalan2 is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026110" version="1" comment="ant-commons-logging is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026111" version="1" comment="ant-commons-net is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026112" version="1" comment="ant-imageio is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026113" version="1" comment="ant-jakartamail is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026114" version="1" comment="ant-javamail is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026115" version="1" comment="ant-jdepend is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026116" version="1" comment="ant-jmf is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026117" version="1" comment="ant-jsch is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026118" version="1" comment="ant-junit is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026119" version="1" comment="ant-junit5 is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026120" version="1" comment="ant-manual is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026121" version="1" comment="ant-scripts is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026122" version="1" comment="ant-swing is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026123" version="1" comment="ant-testutil is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026124" version="1" comment="ant-xz is &lt;1.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026125" version="1" comment="aom-tools is &lt;3.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026126" version="1" comment="libaom3 is &lt;3.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026127" version="1" comment="apache-commons-beanutils is &lt;1.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026128" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026129" version="1" comment="apache-commons-compress is &lt;1.26.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026130" version="1" comment="apache-commons-compress-javadoc is &lt;1.26.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026131" version="1" comment="apache-commons-configuration2 is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026132" version="1" comment="apache-commons-configuration2-javadoc is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026133" version="1" comment="apache-commons-daemon is &lt;1.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026134" version="1" comment="apache-commons-daemon-javadoc is &lt;1.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026135" version="1" comment="apache-commons-daemon-jsvc is &lt;1.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026136" version="1" comment="apache-commons-httpclient is &lt;3.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026137" version="1" comment="apache-commons-httpclient-demo is &lt;3.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026138" version="1" comment="apache-commons-httpclient-javadoc is &lt;3.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026139" version="1" comment="apache-commons-httpclient-manual is &lt;3.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026140" version="1" comment="apache-commons-io is &lt;2.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026141" version="1" comment="apache-commons-io-javadoc is &lt;2.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026142" version="1" comment="apache-commons-lang3 is &lt;3.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026143" version="1" comment="apache-commons-lang3-javadoc is &lt;3.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026144" version="1" comment="apache-commons-net is &lt;3.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026145" version="1" comment="apache-commons-net-javadoc is &lt;3.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026146" version="1" comment="apache-commons-text is &lt;1.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026147" version="1" comment="apache-commons-text-javadoc is &lt;1.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026148" version="1" comment="apache-commons-vfs2 is &lt;2.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026149" version="1" comment="apache-commons-vfs2-ant is &lt;2.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026150" version="1" comment="apache-commons-vfs2-examples is &lt;2.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026151" version="1" comment="apache-commons-vfs2-javadoc is &lt;2.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026152" version="1" comment="apache-ivy is &lt;2.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026153" version="1" comment="apache-ivy-javadoc is &lt;2.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026154" version="1" comment="apache-pdfbox is &lt;2.0.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026155" version="1" comment="apache-pdfbox-javadoc is &lt;2.0.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026156" version="1" comment="apache2 is &lt;2.4.63-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026157" version="1" comment="apache2-devel is &lt;2.4.63-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026158" version="1" comment="apache2-event is &lt;2.4.63-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026159" version="1" comment="apache2-manual is &lt;2.4.63-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026160" version="1" comment="apache2-prefork is &lt;2.4.63-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026161" version="1" comment="apache2-utils is &lt;2.4.63-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026162" version="1" comment="apache2-worker is &lt;2.4.63-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026163" version="1" comment="apache2-mod_auth_mellon is &lt;0.19.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026164" version="1" comment="apache2-mod_auth_mellon-diagnostics is &lt;0.19.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026165" version="1" comment="apache2-mod_auth_mellon-doc is &lt;0.19.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026166" version="1" comment="apache2-mod_auth_openidc is &lt;2.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026167" version="1" comment="apache2-mod_php8 is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026168" version="1" comment="php8 is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026169" version="1" comment="php8-bcmath is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026170" version="1" comment="php8-bz2 is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026171" version="1" comment="php8-calendar is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026172" version="1" comment="php8-cli is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026173" version="1" comment="php8-ctype is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026174" version="1" comment="php8-curl is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026175" version="1" comment="php8-dba is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026176" version="1" comment="php8-devel is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026177" version="1" comment="php8-dom is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026178" version="1" comment="php8-embed is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026179" version="1" comment="php8-enchant is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026180" version="1" comment="php8-exif is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026181" version="1" comment="php8-fastcgi is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026182" version="1" comment="php8-ffi is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026183" version="1" comment="php8-fileinfo is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026184" version="1" comment="php8-fpm is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026185" version="1" comment="php8-fpm-apache is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026186" version="1" comment="php8-ftp is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026187" version="1" comment="php8-gd is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026188" version="1" comment="php8-gettext is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026189" version="1" comment="php8-gmp is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026190" version="1" comment="php8-iconv is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026191" version="1" comment="php8-intl is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026192" version="1" comment="php8-ldap is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026193" version="1" comment="php8-mbstring is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026194" version="1" comment="php8-mysql is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026195" version="1" comment="php8-odbc is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026196" version="1" comment="php8-opcache is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026197" version="1" comment="php8-openssl is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026198" version="1" comment="php8-pcntl is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026199" version="1" comment="php8-pdo is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026200" version="1" comment="php8-pgsql is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026201" version="1" comment="php8-phar is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026202" version="1" comment="php8-posix is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026203" version="1" comment="php8-readline is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026204" version="1" comment="php8-shmop is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026205" version="1" comment="php8-snmp is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026206" version="1" comment="php8-soap is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026207" version="1" comment="php8-sockets is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026208" version="1" comment="php8-sodium is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026209" version="1" comment="php8-sqlite is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026210" version="1" comment="php8-sysvmsg is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026211" version="1" comment="php8-sysvsem is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026212" version="1" comment="php8-sysvshm is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026213" version="1" comment="php8-tidy is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026214" version="1" comment="php8-tokenizer is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026215" version="1" comment="php8-xmlreader is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026216" version="1" comment="php8-xmlwriter is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026217" version="1" comment="php8-xsl is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026218" version="1" comment="php8-zip is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026219" version="1" comment="php8-zlib is &lt;8.4.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026220" version="1" comment="apache2-mod_security2 is &lt;2.9.11-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026221" version="1" comment="apr-devel is &lt;1.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026222" version="1" comment="libapr1-0 is &lt;1.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026223" version="1" comment="apr-util-devel is &lt;1.6.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026224" version="1" comment="libapr-util1-0 is &lt;1.6.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026225" version="1" comment="libapr-util1-0-dbd-mysql is &lt;1.6.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026226" version="1" comment="libapr-util1-0-dbd-pgsql is &lt;1.6.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026227" version="1" comment="libapr-util1-0-dbd-sqlite3 is &lt;1.6.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026228" version="1" comment="argyllcms is &lt;3.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026229" version="1" comment="argyllcms-doc is &lt;3.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026230" version="1" comment="arm-trusted-firmware is &lt;2.10.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026231" version="1" comment="arm-trusted-firmware-rpi3 is &lt;2.10.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026232" version="1" comment="arm-trusted-firmware-rpi4 is &lt;2.10.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026233" version="1" comment="arpwatch is &lt;3.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026234" version="1" comment="audit-devel is &lt;4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026235" version="1" comment="libaudit1 is &lt;4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026236" version="1" comment="libauparse0 is &lt;4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026237" version="1" comment="augeas is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026238" version="1" comment="augeas-bash-completion is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026239" version="1" comment="augeas-devel is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026240" version="1" comment="augeas-lenses is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026241" version="1" comment="libaugeas0 is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026242" version="1" comment="libfa1 is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026243" version="1" comment="autofs is &lt;5.1.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026244" version="1" comment="automake is &lt;1.18.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026245" version="1" comment="m4 is &lt;1.4.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026246" version="1" comment="avahi is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026247" version="1" comment="avahi-autoipd is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026248" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026249" version="1" comment="avahi-lang is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026250" version="1" comment="avahi-utils is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026251" version="1" comment="avahi-utils-gtk is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026252" version="1" comment="libavahi-client3 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026253" version="1" comment="libavahi-common3 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026254" version="1" comment="libavahi-core7 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026255" version="1" comment="libavahi-devel is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026256" version="1" comment="libavahi-glib-devel is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026257" version="1" comment="libavahi-glib1 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026258" version="1" comment="libavahi-gobject-devel is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026259" version="1" comment="libavahi-gobject0 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026260" version="1" comment="libavahi-libevent1 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026261" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026262" version="1" comment="libdns_sd is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026263" version="1" comment="libhowl0 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026264" version="1" comment="python3-avahi-gtk is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026265" version="1" comment="python313-avahi is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026266" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026267" version="1" comment="avif-tools is &lt;1.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026268" version="1" comment="gdk-pixbuf-loader-libavif is &lt;1.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026269" version="1" comment="libavif16 is &lt;1.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026270" version="1" comment="aws-nitro-enclaves-binaryblobs-upstream is &lt;1.4.2~git0.6e8512e-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026271" version="1" comment="aws-nitro-enclaves-cli is &lt;1.4.2~git0.6e8512e-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026272" version="1" comment="system-group-ne is &lt;1.4.2~git0.6e8512e-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026273" version="1" comment="bash is &lt;5.2.37-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026274" version="1" comment="bash-devel is &lt;5.2.37-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026275" version="1" comment="bash-doc is &lt;5.2.37-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026276" version="1" comment="bash-lang is &lt;5.2.37-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026277" version="1" comment="bash-loadables is &lt;5.2.37-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026278" version="1" comment="bash-sh is &lt;5.2.37-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026279" version="1" comment="libreadline8 is &lt;8.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026280" version="1" comment="readline-devel is &lt;8.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026281" version="1" comment="readline-devel-static is &lt;8.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026282" version="1" comment="readline-doc is &lt;8.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026283" version="1" comment="bcel is &lt;6.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026284" version="1" comment="bcel-javadoc is &lt;6.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026285" version="1" comment="bcm43xx-firmware is &lt;20180314-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026286" version="1" comment="bind is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026287" version="1" comment="bind-doc is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026288" version="1" comment="bind-modules-generic is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026289" version="1" comment="bind-modules-ldap is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026290" version="1" comment="bind-modules-mysql is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026291" version="1" comment="bind-modules-perl is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026292" version="1" comment="bind-modules-sqlite3 is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026293" version="1" comment="bind-utils is &lt;9.20.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026294" version="1" comment="binutils is &lt;2.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026295" version="1" comment="binutils-devel is &lt;2.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026296" version="1" comment="gprofng is &lt;2.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026297" version="1" comment="libctf-nobfd0 is &lt;2.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026298" version="1" comment="libctf0 is &lt;2.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026299" version="1" comment="bison is &lt;3.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026300" version="1" comment="bison-lang is &lt;3.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026301" version="1" comment="blas-devel is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026302" version="1" comment="blas-devel-static is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026303" version="1" comment="cblas-devel is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026304" version="1" comment="cblas-devel-static is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026305" version="1" comment="lapack-devel is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026306" version="1" comment="lapack-devel-static is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026307" version="1" comment="lapack-man is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026308" version="1" comment="lapacke-devel is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026309" version="1" comment="lapacke-devel-static is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026310" version="1" comment="libblas3 is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026311" version="1" comment="libcblas3 is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026312" version="1" comment="liblapack3 is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026313" version="1" comment="liblapacke3 is &lt;3.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026314" version="1" comment="libopenblas_openmp-devel is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026315" version="1" comment="libopenblas_openmp0 is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026316" version="1" comment="libopenblas_pthreads-devel is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026317" version="1" comment="libopenblas_pthreads0 is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026318" version="1" comment="libopenblas_serial-devel is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026319" version="1" comment="libopenblas_serial0 is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026320" version="1" comment="openblas-common-devel is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026321" version="1" comment="openblas_openmp-devel-static is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026322" version="1" comment="openblas_pthreads-devel-static is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026323" version="1" comment="openblas_serial-devel-static is &lt;0.3.29-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026324" version="1" comment="bluez is &lt;5.79-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026325" version="1" comment="bluez-auto-enable-devices is &lt;5.79-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026326" version="1" comment="bluez-cups is &lt;5.79-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026327" version="1" comment="bluez-devel is &lt;5.79-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026328" version="1" comment="bluez-obexd is &lt;5.79-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026329" version="1" comment="bluez-zsh-completion is &lt;5.79-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026330" version="1" comment="libbluetooth3 is &lt;5.79-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026331" version="1" comment="boost-license1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026332" version="1" comment="boost1_86_0-jam is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026333" version="1" comment="libboost_atomic1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026334" version="1" comment="libboost_atomic1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026335" version="1" comment="libboost_atomic1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026336" version="1" comment="libboost_charconv1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026337" version="1" comment="libboost_charconv1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026338" version="1" comment="libboost_charconv1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026339" version="1" comment="libboost_chrono1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026340" version="1" comment="libboost_chrono1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026341" version="1" comment="libboost_container1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026342" version="1" comment="libboost_container1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026343" version="1" comment="libboost_container1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026344" version="1" comment="libboost_context1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026345" version="1" comment="libboost_context1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026346" version="1" comment="libboost_contract1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026347" version="1" comment="libboost_contract1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026348" version="1" comment="libboost_coroutine1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026349" version="1" comment="libboost_coroutine1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026350" version="1" comment="libboost_date_time1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026351" version="1" comment="libboost_date_time1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026352" version="1" comment="libboost_date_time1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026353" version="1" comment="libboost_fiber1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026354" version="1" comment="libboost_fiber1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026355" version="1" comment="libboost_filesystem1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026356" version="1" comment="libboost_filesystem1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026357" version="1" comment="libboost_filesystem1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026358" version="1" comment="libboost_graph1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026359" version="1" comment="libboost_graph1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026360" version="1" comment="libboost_graph1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026361" version="1" comment="libboost_headers1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026362" version="1" comment="libboost_iostreams1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026363" version="1" comment="libboost_iostreams1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026364" version="1" comment="libboost_iostreams1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026365" version="1" comment="libboost_json1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026366" version="1" comment="libboost_json1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026367" version="1" comment="libboost_json1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026368" version="1" comment="libboost_locale1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026369" version="1" comment="libboost_locale1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026370" version="1" comment="libboost_locale1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026371" version="1" comment="libboost_log1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026372" version="1" comment="libboost_log1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026373" version="1" comment="libboost_math1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026374" version="1" comment="libboost_math1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026375" version="1" comment="libboost_math1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026376" version="1" comment="libboost_nowide1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026377" version="1" comment="libboost_nowide1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026378" version="1" comment="libboost_nowide1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026379" version="1" comment="libboost_process1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026380" version="1" comment="libboost_process1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026381" version="1" comment="libboost_process1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026382" version="1" comment="libboost_program_options1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026383" version="1" comment="libboost_program_options1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026384" version="1" comment="libboost_program_options1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026385" version="1" comment="libboost_random1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026386" version="1" comment="libboost_random1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026387" version="1" comment="libboost_random1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026388" version="1" comment="libboost_regex1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026389" version="1" comment="libboost_regex1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026390" version="1" comment="libboost_regex1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026391" version="1" comment="libboost_serialization1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026392" version="1" comment="libboost_serialization1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026393" version="1" comment="libboost_serialization1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026394" version="1" comment="libboost_stacktrace1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026395" version="1" comment="libboost_stacktrace1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026396" version="1" comment="libboost_stacktrace1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026397" version="1" comment="libboost_system1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026398" version="1" comment="libboost_system1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026399" version="1" comment="libboost_system1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026400" version="1" comment="libboost_test1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026401" version="1" comment="libboost_test1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026402" version="1" comment="libboost_test1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026403" version="1" comment="libboost_thread1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026404" version="1" comment="libboost_thread1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026405" version="1" comment="libboost_thread1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026406" version="1" comment="libboost_timer1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026407" version="1" comment="libboost_timer1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026408" version="1" comment="libboost_type_erasure1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026409" version="1" comment="libboost_type_erasure1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026410" version="1" comment="libboost_type_erasure1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026411" version="1" comment="libboost_url1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026412" version="1" comment="libboost_url1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026413" version="1" comment="libboost_url1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026414" version="1" comment="libboost_wave1_86_0 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026415" version="1" comment="libboost_wave1_86_0-devel is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026416" version="1" comment="libboost_wave1_86_0-x86-64-v3 is &lt;1.86.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026417" version="1" comment="bosh is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026418" version="1" comment="btcflash is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026419" version="1" comment="cdda2wav is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026420" version="1" comment="cdrecord is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026421" version="1" comment="libcdrdeflt1_0 is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026422" version="1" comment="libdeflt1_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026423" version="1" comment="libedc_ecc1_0 is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026424" version="1" comment="libedc_ecc_dec1_0 is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026425" version="1" comment="libfile1_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026426" version="1" comment="libfind4_0 is &lt;1.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026427" version="1" comment="libparanoia1_0 is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026428" version="1" comment="librmt-devel-doc is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026429" version="1" comment="librmt1_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026430" version="1" comment="librscg1_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026431" version="1" comment="libscg-devel is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026432" version="1" comment="libscg1_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026433" version="1" comment="libscgcmd1_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026434" version="1" comment="libschily-devel is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026435" version="1" comment="libschily-devel-doc is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026436" version="1" comment="libschily2_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026437" version="1" comment="libxtermcap1_0 is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026438" version="1" comment="mkisofs is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026439" version="1" comment="readcd is &lt;3.02~a10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026440" version="1" comment="rscsi is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026441" version="1" comment="schily-ctags is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026442" version="1" comment="schily-mt is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026443" version="1" comment="schily-rmt is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026444" version="1" comment="smake is &lt;2022.10.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026445" version="1" comment="spax is &lt;1.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026446" version="1" comment="star is &lt;1.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026447" version="1" comment="ved is &lt;1.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026448" version="1" comment="bouncycastle is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026449" version="1" comment="bouncycastle-javadoc is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026450" version="1" comment="bouncycastle-jmail is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026451" version="1" comment="bouncycastle-mail is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026452" version="1" comment="bouncycastle-pg is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026453" version="1" comment="bouncycastle-pkix is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026454" version="1" comment="bouncycastle-tls is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026455" version="1" comment="bouncycastle-util is &lt;1.80-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026456" version="1" comment="bpftrace is &lt;0.23.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026457" version="1" comment="bpftrace-tools is &lt;0.23.5-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026458" version="1" comment="bsdtar is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026459" version="1" comment="libarchive-devel is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026460" version="1" comment="libarchive13 is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026461" version="1" comment="bsh2 is &lt;2.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026462" version="1" comment="bsh2-bsf is &lt;2.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026463" version="1" comment="bsh2-classgen is &lt;2.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026464" version="1" comment="bsh2-demo is &lt;2.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026465" version="1" comment="bsh2-javadoc is &lt;2.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026466" version="1" comment="bsh2-manual is &lt;2.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026467" version="1" comment="btrfsmaintenance is &lt;0.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026468" version="1" comment="bubblewrap is &lt;0.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026469" version="1" comment="bubblewrap-zsh-completion is &lt;0.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026470" version="1" comment="buildah is &lt;1.39.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026471" version="1" comment="buildkit is &lt;0.12.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026472" version="1" comment="busybox is &lt;1.37.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026473" version="1" comment="busybox-static is &lt;1.37.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026474" version="1" comment="busybox-warewulf3 is &lt;1.37.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026475" version="1" comment="bzip2 is &lt;1.0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026476" version="1" comment="bzip2-doc is &lt;1.0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026477" version="1" comment="libbz2-1 is &lt;1.0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026478" version="1" comment="libbz2-1-x86-64-v3 is &lt;1.0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026479" version="1" comment="libbz2-devel is &lt;1.0.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026480" version="1" comment="c-ares-devel is &lt;1.34.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026481" version="1" comment="c-ares-utils is &lt;1.34.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026482" version="1" comment="libcares2 is &lt;1.34.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026483" version="1" comment="cairo-devel is &lt;1.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026484" version="1" comment="cairo-tools is &lt;1.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026485" version="1" comment="libcairo-gobject2 is &lt;1.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026486" version="1" comment="libcairo-script-interpreter2 is &lt;1.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026487" version="1" comment="libcairo2 is &lt;1.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026488" version="1" comment="cargo is &lt;1.88.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026489" version="1" comment="rust is &lt;1.88.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026490" version="1" comment="cargo-audit is &lt;0.21.2~git0.18e58c2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026491" version="1" comment="cargo-audit-advisory-db is &lt;20250304-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026492" version="1" comment="cargo-c is &lt;0.10.3~git0.ee7d7ef-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026493" version="1" comment="checkbashisms is &lt;2.22.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026494" version="1" comment="chrony is &lt;4.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026495" version="1" comment="chrony-pool-empty is &lt;4.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026496" version="1" comment="chrony-pool-suse is &lt;4.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026497" version="1" comment="cifs-utils is &lt;7.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026498" version="1" comment="cifs-utils-devel is &lt;7.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026499" version="1" comment="pam_cifscreds is &lt;7.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026500" version="1" comment="wb-cifs-idmap-plugin is &lt;7.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026501" version="1" comment="clamav is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026502" version="1" comment="clamav-devel is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026503" version="1" comment="clamav-docs-html is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026504" version="1" comment="clamav-milter is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026505" version="1" comment="libclamav12 is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026506" version="1" comment="libclammspack0 is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026507" version="1" comment="libfreshclam3 is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026508" version="1" comment="cloud-init is &lt;25.1.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026509" version="1" comment="cloud-init-config-suse is &lt;25.1.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026510" version="1" comment="cloud-init-doc is &lt;25.1.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026511" version="1" comment="cmake is &lt;3.31.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026512" version="1" comment="cmake-full is &lt;3.31.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026513" version="1" comment="cmake-man is &lt;3.31.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026514" version="1" comment="cockpit is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026515" version="1" comment="cockpit-bridge is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026516" version="1" comment="cockpit-devel is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026517" version="1" comment="cockpit-doc is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026518" version="1" comment="cockpit-firewalld is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026519" version="1" comment="cockpit-kdump is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026520" version="1" comment="cockpit-networkmanager is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026521" version="1" comment="cockpit-packagekit is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026522" version="1" comment="cockpit-selinux is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026523" version="1" comment="cockpit-storaged is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026524" version="1" comment="cockpit-system is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026525" version="1" comment="cockpit-ws is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026526" version="1" comment="cockpit-ws-selinux is &lt;340-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026527" version="1" comment="colord is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026528" version="1" comment="colord-color-profiles is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026529" version="1" comment="colord-lang is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026530" version="1" comment="libcolord-devel is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026531" version="1" comment="libcolord2 is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026532" version="1" comment="libcolorhug2 is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026533" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026534" version="1" comment="typelib-1_0-Colorhug-1_0 is &lt;1.4.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026535" version="1" comment="colord-gtk is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026536" version="1" comment="colord-gtk-doc is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026537" version="1" comment="colord-gtk-lang is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026538" version="1" comment="libcolord-gtk-devel is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026539" version="1" comment="libcolord-gtk1 is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026540" version="1" comment="libcolord-gtk4-1 is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026541" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026542" version="1" comment="conmon is &lt;2.1.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026543" version="1" comment="conntrack-tools is &lt;1.4.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026544" version="1" comment="conntrackd is &lt;1.4.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026545" version="1" comment="containerd is &lt;1.7.27-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026546" version="1" comment="containerd-ctr is &lt;1.7.27-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026547" version="1" comment="containerd-devel is &lt;1.7.27-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026548" version="1" comment="corepack22 is &lt;22.15.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026549" version="1" comment="nodejs22 is &lt;22.15.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026550" version="1" comment="nodejs22-devel is &lt;22.15.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026551" version="1" comment="nodejs22-docs is &lt;22.15.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026552" version="1" comment="npm22 is &lt;22.15.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026553" version="1" comment="coreutils is &lt;9.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026554" version="1" comment="coreutils-doc is &lt;9.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026555" version="1" comment="coreutils-lang is &lt;9.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026556" version="1" comment="coreutils-single is &lt;9.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026557" version="1" comment="coreutils-systemd is &lt;9.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026558" version="1" comment="cosign is &lt;2.5.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026559" version="1" comment="cpio is &lt;2.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026560" version="1" comment="cpio-lang is &lt;2.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026561" version="1" comment="cpio-mt is &lt;2.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026562" version="1" comment="cpp13 is &lt;13.4.0+git9739-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026563" version="1" comment="gcc13 is &lt;13.4.0+git9739-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026564" version="1" comment="cracklib is &lt;2.9.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026565" version="1" comment="cracklib-devel is &lt;2.9.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026566" version="1" comment="cracklib-dict-small is &lt;2.9.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026567" version="1" comment="libcrack2 is &lt;2.9.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026568" version="1" comment="crash is &lt;9.0.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026569" version="1" comment="crash-devel is &lt;9.0.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026570" version="1" comment="crash-doc is &lt;9.0.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026571" version="1" comment="crash-gcore is &lt;9.0.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026572" version="1" comment="crash-kmp-64kb is &lt;9.0.0_k6.12.0_160000.5-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026573" version="1" comment="crash-kmp-default is &lt;9.0.0_k6.12.0_160000.5-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026574" version="1" comment="cron is &lt;4.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026575" version="1" comment="cronie is &lt;1.7.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026576" version="1" comment="cronie-anacron is &lt;1.7.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026577" version="1" comment="cryptsetup is &lt;2.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026578" version="1" comment="cryptsetup-doc is &lt;2.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026579" version="1" comment="cryptsetup-lang is &lt;2.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026580" version="1" comment="cryptsetup-ssh is &lt;2.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026581" version="1" comment="libcryptsetup-devel is &lt;2.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026582" version="1" comment="libcryptsetup12 is &lt;2.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026583" version="1" comment="cscope is &lt;15.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026584" version="1" comment="ctags is &lt;5.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026585" version="1" comment="ctdb is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026586" version="1" comment="ctdb-pcp-pmda is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026587" version="1" comment="ldb-tools is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026588" version="1" comment="libldb-devel is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026589" version="1" comment="libldb2 is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026590" version="1" comment="python3-ldb is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026591" version="1" comment="samba is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026592" version="1" comment="samba-ad-dc is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026593" version="1" comment="samba-ad-dc-libs is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026594" version="1" comment="samba-client is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026595" version="1" comment="samba-client-libs is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026596" version="1" comment="samba-dcerpc is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026597" version="1" comment="samba-devel is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026598" version="1" comment="samba-doc is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026599" version="1" comment="samba-dsdb-modules is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026600" version="1" comment="samba-gpupdate is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026601" version="1" comment="samba-ldb-ldap is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026602" version="1" comment="samba-libs is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026603" version="1" comment="samba-libs-python3 is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026604" version="1" comment="samba-python3 is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026605" version="1" comment="samba-tool is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026606" version="1" comment="samba-winbind is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026607" version="1" comment="samba-winbind-libs is &lt;4.22.3+git.401.c70158430cc-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026608" version="1" comment="cups is &lt;2.4.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026609" version="1" comment="cups-client is &lt;2.4.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026610" version="1" comment="cups-config is &lt;2.4.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026611" version="1" comment="cups-ddk is &lt;2.4.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026612" version="1" comment="cups-devel is &lt;2.4.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026613" version="1" comment="libcups2 is &lt;2.4.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026614" version="1" comment="libcupsimage2 is &lt;2.4.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026615" version="1" comment="cups-pk-helper is &lt;0.2.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026616" version="1" comment="cups-pk-helper-lang is &lt;0.2.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026617" version="1" comment="curl is &lt;8.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026618" version="1" comment="curl-zsh-completion is &lt;8.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026619" version="1" comment="libcurl-devel is &lt;8.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026620" version="1" comment="libcurl-devel-doc is &lt;8.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026621" version="1" comment="libcurl-mini4 is &lt;8.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026622" version="1" comment="libcurl4 is &lt;8.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026623" version="1" comment="cyrus-sasl is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026624" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026625" version="1" comment="cyrus-sasl-devel is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026626" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026627" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026628" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026629" version="1" comment="cyrus-sasl-ldap-auxprop is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026630" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026631" version="1" comment="cyrus-sasl-otp is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026632" version="1" comment="cyrus-sasl-plain is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026633" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026634" version="1" comment="cyrus-sasl-scram is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026635" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026636" version="1" comment="libsasl2-3 is &lt;2.1.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026637" version="1" comment="dav1d is &lt;1.5.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026638" version="1" comment="dav1d-devel is &lt;1.5.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026639" version="1" comment="libdav1d7 is &lt;1.5.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026640" version="1" comment="db48-doc is &lt;4.8.30-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026641" version="1" comment="db48-utils is &lt;4.8.30-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026642" version="1" comment="libdb-4_8 is &lt;4.8.30-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026643" version="1" comment="libdb-4_8-devel is &lt;4.8.30-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026644" version="1" comment="libdb-4_8-x86-64-v3 is &lt;4.8.30-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026645" version="1" comment="libdb_java-4_8 is &lt;4.8.30-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026646" version="1" comment="dbus-1 is &lt;1.14.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026647" version="1" comment="dbus-1-common is &lt;1.14.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026648" version="1" comment="dbus-1-daemon is &lt;1.14.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026649" version="1" comment="dbus-1-devel is &lt;1.14.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026650" version="1" comment="dbus-1-tools is &lt;1.14.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026651" version="1" comment="libdbus-1-3 is &lt;1.14.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026652" version="1" comment="dbus-1-glib-bash-completion is &lt;0.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026653" version="1" comment="dbus-1-glib-devel is &lt;0.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026654" version="1" comment="dbus-1-glib-doc is &lt;0.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026655" version="1" comment="dbus-1-glib-tool is &lt;0.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026656" version="1" comment="libdbus-glib-1-2 is &lt;0.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026657" version="1" comment="dbus-1-x11 is &lt;1.14.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026658" version="1" comment="dcraw is &lt;9.28.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026659" version="1" comment="dcraw-lang is &lt;9.28.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026660" version="1" comment="dhcp-keama is &lt;4.4.2.P1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026661" version="1" comment="dirmngr is &lt;2.5.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026662" version="1" comment="gpg2 is &lt;2.5.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026663" version="1" comment="gpg2-lang is &lt;2.5.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026664" version="1" comment="gpg2-tpm is &lt;2.5.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026665" version="1" comment="distribution-registry is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026666" version="1" comment="djvulibre is &lt;3.5.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026667" version="1" comment="djvulibre-doc is &lt;3.5.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026668" version="1" comment="libdjvulibre-devel is &lt;3.5.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026669" version="1" comment="libdjvulibre21 is &lt;3.5.28-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026670" version="1" comment="dnsdist is &lt;1.9.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026671" version="1" comment="dnsmasq is &lt;2.90-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026672" version="1" comment="dnsmasq-utils is &lt;2.90-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026673" version="1" comment="docker is &lt;28.3.2_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026674" version="1" comment="docker-bash-completion is &lt;28.3.2_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026675" version="1" comment="docker-buildx is &lt;0.25.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026676" version="1" comment="docker-fish-completion is &lt;28.3.2_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026677" version="1" comment="docker-rootless-extras is &lt;28.3.2_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026678" version="1" comment="docker-zsh-completion is &lt;28.3.2_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026679" version="1" comment="docker-compose is &lt;2.33.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026680" version="1" comment="docker-stable is &lt;24.0.9_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026681" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026682" version="1" comment="docker-stable-buildx is &lt;0.22.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026683" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026684" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026685" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026686" version="1" comment="dom4j is &lt;2.1.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026687" version="1" comment="dom4j-demo is &lt;2.1.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026688" version="1" comment="dom4j-javadoc is &lt;2.1.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026689" version="1" comment="dovecot24 is &lt;2.4.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026690" version="1" comment="dovecot24-backend-mysql is &lt;2.4.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026691" version="1" comment="dovecot24-backend-pgsql is &lt;2.4.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026692" version="1" comment="dovecot24-backend-sqlite is &lt;2.4.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026693" version="1" comment="dovecot24-devel is &lt;2.4.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026694" version="1" comment="dovecot24-fts is &lt;2.4.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026695" version="1" comment="dovecot24-fts-solr is &lt;2.4.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026696" version="1" comment="dpdk is &lt;24.11.1-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026697" version="1" comment="dpdk-devel is &lt;24.11.1-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026698" version="1" comment="dpdk-devel-static is &lt;24.11.1-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026699" version="1" comment="dpdk-doc is &lt;24.11.1-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026700" version="1" comment="dpdk-tools is &lt;24.11.1-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026701" version="1" comment="libdpdk-25 is &lt;24.11.1-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026702" version="1" comment="dpkg is &lt;1.22.21-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026703" version="1" comment="dpkg-devel is &lt;1.22.21-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026704" version="1" comment="dpkg-lang is &lt;1.22.21-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026705" version="1" comment="update-alternatives is &lt;1.22.21-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026706" version="1" comment="dracut is &lt;059+suse.696.g950c4798-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026707" version="1" comment="dracut-extra is &lt;059+suse.696.g950c4798-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026708" version="1" comment="dracut-fips is &lt;059+suse.696.g950c4798-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026709" version="1" comment="dracut-ima is &lt;059+suse.696.g950c4798-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026710" version="1" comment="dracut-tools is &lt;059+suse.696.g950c4798-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026711" version="1" comment="e2fsprogs is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026712" version="1" comment="e2fsprogs-devel is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026713" version="1" comment="e2fsprogs-scrub is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026714" version="1" comment="fuse2fs is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026715" version="1" comment="libcom_err-devel is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026716" version="1" comment="libcom_err-devel-static is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026717" version="1" comment="libcom_err2 is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026718" version="1" comment="libext2fs-devel is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026719" version="1" comment="libext2fs-devel-static is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026720" version="1" comment="libext2fs2 is &lt;1.47.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026721" version="1" comment="ed25519-java is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026722" version="1" comment="ed25519-java-javadoc is &lt;0.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026723" version="1" comment="editorconfig is &lt;0.12.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026724" version="1" comment="libeditorconfig0 is &lt;0.12.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026725" version="1" comment="elfutils is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026726" version="1" comment="elfutils-lang is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026727" version="1" comment="libasm-devel is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026728" version="1" comment="libasm1 is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026729" version="1" comment="libdw-devel is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026730" version="1" comment="libdw1 is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026731" version="1" comment="libelf-devel is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026732" version="1" comment="libelf1 is &lt;0.192-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026733" version="1" comment="emacs is &lt;30.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026734" version="1" comment="emacs-el is &lt;30.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026735" version="1" comment="emacs-eln is &lt;30.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026736" version="1" comment="emacs-info is &lt;30.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026737" version="1" comment="emacs-nox is &lt;30.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026738" version="1" comment="emacs-x11 is &lt;30.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026739" version="1" comment="etags is &lt;30.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026740" version="1" comment="erlang is &lt;27.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026741" version="1" comment="erlang-epmd is &lt;27.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026742" version="1" comment="erlang-rabbitmq-client is &lt;3.13.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026743" version="1" comment="rabbitmq-server is &lt;3.13.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026744" version="1" comment="rabbitmq-server-bash-completion is &lt;3.13.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026745" version="1" comment="rabbitmq-server-plugins is &lt;3.13.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026746" version="1" comment="rabbitmq-server-zsh-completion is &lt;3.13.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026747" version="1" comment="espeak-ng is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026748" version="1" comment="espeak-ng-compat is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026749" version="1" comment="espeak-ng-compat-devel is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026750" version="1" comment="espeak-ng-devel is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026751" version="1" comment="espeak-ng-vim is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026752" version="1" comment="libespeak-ng1 is &lt;1.52.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026753" version="1" comment="expat is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026754" version="1" comment="libexpat-devel is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026755" version="1" comment="libexpat1 is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026756" version="1" comment="fetchmail is &lt;6.5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026757" version="1" comment="ffmpeg-7 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026758" version="1" comment="libavcodec61 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026759" version="1" comment="libavdevice61 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026760" version="1" comment="libavfilter10 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026761" version="1" comment="libavformat61 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026762" version="1" comment="libavutil59 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026763" version="1" comment="libpostproc58 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026764" version="1" comment="libswresample5 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026765" version="1" comment="libswscale8 is &lt;7.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026766" version="1" comment="file is &lt;5.46-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026767" version="1" comment="file-devel is &lt;5.46-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026768" version="1" comment="file-magic is &lt;5.46-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026769" version="1" comment="libmagic1 is &lt;5.46-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026770" version="1" comment="findutils is &lt;4.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026771" version="1" comment="findutils-lang is &lt;4.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026772" version="1" comment="firewalld is &lt;2.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026773" version="1" comment="firewalld-bash-completion is &lt;2.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026774" version="1" comment="firewalld-lang is &lt;2.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026775" version="1" comment="firewalld-zsh-completion is &lt;2.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026776" version="1" comment="python3-firewall is &lt;2.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026777" version="1" comment="fish is &lt;4.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026778" version="1" comment="fish-devel is &lt;4.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026779" version="1" comment="flac is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026780" version="1" comment="libFLAC++10 is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026781" version="1" comment="libFLAC++10-x86-64-v3 is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026782" version="1" comment="libFLAC12 is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026783" version="1" comment="libFLAC12-x86-64-v3 is &lt;1.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026784" version="1" comment="flake-pilot is &lt;3.1.19-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026785" version="1" comment="flake-pilot-podman is &lt;3.1.19-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026786" version="1" comment="flatpak is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026787" version="1" comment="flatpak-devel is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026788" version="1" comment="flatpak-remote-flathub is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026789" version="1" comment="flatpak-selinux is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026790" version="1" comment="flatpak-zsh-completion is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026791" version="1" comment="libflatpak0 is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026792" version="1" comment="system-user-flatpak is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026793" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026794" version="1" comment="fontforge is &lt;20230101-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026795" version="1" comment="fontforge-devel is &lt;20230101-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026796" version="1" comment="fontforge-doc is &lt;20230101-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026797" version="1" comment="freeradius-server is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026798" version="1" comment="freeradius-server-devel is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026799" version="1" comment="freeradius-server-doc is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026800" version="1" comment="freeradius-server-krb5 is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026801" version="1" comment="freeradius-server-ldap is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026802" version="1" comment="freeradius-server-libs is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026803" version="1" comment="freeradius-server-mysql is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026804" version="1" comment="freeradius-server-perl is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026805" version="1" comment="freeradius-server-postgresql is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026806" version="1" comment="freeradius-server-python3 is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026807" version="1" comment="freeradius-server-sqlite is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026808" version="1" comment="freeradius-server-utils is &lt;3.2.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026809" version="1" comment="freerdp is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026810" version="1" comment="freerdp-devel is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026811" version="1" comment="freerdp-proxy is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026812" version="1" comment="freerdp-proxy-plugins is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026813" version="1" comment="freerdp-sdl is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026814" version="1" comment="freerdp-server is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026815" version="1" comment="freerdp-wayland is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026816" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026817" version="1" comment="libfreerdp3-3 is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026818" version="1" comment="librdtk0-0 is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026819" version="1" comment="libuwac0-0 is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026820" version="1" comment="libwinpr3-3 is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026821" version="1" comment="winpr-devel is &lt;3.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026822" version="1" comment="freetds-config is &lt;1.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026823" version="1" comment="freetds-devel is &lt;1.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026824" version="1" comment="freetds-doc is &lt;1.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026825" version="1" comment="freetds-tools is &lt;1.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026826" version="1" comment="libct4 is &lt;1.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026827" version="1" comment="libsybdb5 is &lt;1.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026828" version="1" comment="libtdsodbc0 is &lt;1.4.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026829" version="1" comment="freetype2-devel is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026830" version="1" comment="freetype2-profile-tti35 is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026831" version="1" comment="ftdump is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026832" version="1" comment="libfreetype6 is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026833" version="1" comment="fribidi is &lt;1.0.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026834" version="1" comment="fribidi-devel is &lt;1.0.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026835" version="1" comment="libfribidi0 is &lt;1.0.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026836" version="1" comment="frr is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026837" version="1" comment="frr-devel is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026838" version="1" comment="libfrr0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026839" version="1" comment="libfrr_pb0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026840" version="1" comment="libfrrcares0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026841" version="1" comment="libfrrfpm_pb0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026842" version="1" comment="libfrrospfapiclient0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026843" version="1" comment="libfrrsnmp0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026844" version="1" comment="libfrrzmq0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026845" version="1" comment="libmgmt_be_nb0 is &lt;10.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026846" version="1" comment="ftbench is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026847" version="1" comment="ftdiff is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026848" version="1" comment="ftgamma is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026849" version="1" comment="ftgrid is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026850" version="1" comment="ftlint is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026851" version="1" comment="ftmulti is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026852" version="1" comment="ftsdf is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026853" version="1" comment="ftstring is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026854" version="1" comment="ftvalid is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026855" version="1" comment="ftview is &lt;2.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026856" version="1" comment="fuse is &lt;2.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026857" version="1" comment="fuse-devel is &lt;2.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026858" version="1" comment="fuse-devel-static is &lt;2.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026859" version="1" comment="fuse-doc is &lt;2.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026860" version="1" comment="libfuse2 is &lt;2.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026861" version="1" comment="libulockmgr1 is &lt;2.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026862" version="1" comment="fwupd is &lt;2.0.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026863" version="1" comment="fwupd-bash-completion is &lt;2.0.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026864" version="1" comment="fwupd-devel is &lt;2.0.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026865" version="1" comment="fwupd-doc is &lt;2.0.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026866" version="1" comment="fwupd-lang is &lt;2.0.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026867" version="1" comment="libfwupd3 is &lt;2.0.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026868" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;2.0.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026869" version="1" comment="gc-devel is &lt;8.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026870" version="1" comment="libgc1 is &lt;8.2.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026871" version="1" comment="gcab is &lt;1.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026872" version="1" comment="gcab-lang is &lt;1.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026873" version="1" comment="libgcab-1_0-0 is &lt;1.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026874" version="1" comment="typelib-1_0-GCab-1_0 is &lt;1.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026875" version="1" comment="gd is &lt;2.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026876" version="1" comment="gd-devel is &lt;2.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026877" version="1" comment="libgd3 is &lt;2.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026878" version="1" comment="gdb is &lt;16.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026879" version="1" comment="gdbserver is &lt;16.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026880" version="1" comment="gdk-pixbuf-devel is &lt;2.42.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026881" version="1" comment="gdk-pixbuf-lang is &lt;2.42.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026882" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026883" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026884" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026885" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026886" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026887" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026888" version="1" comment="libheif-aom is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026889" version="1" comment="libheif-dav1d is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026890" version="1" comment="libheif-ffmpeg is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026891" version="1" comment="libheif-jpeg is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026892" version="1" comment="libheif-openjpeg is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026893" version="1" comment="libheif-rav1e is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026894" version="1" comment="libheif-svtenc is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026895" version="1" comment="libheif1 is &lt;1.19.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026896" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.60.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026897" version="1" comment="librsvg-2-2 is &lt;2.60.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026898" version="1" comment="librsvg-devel is &lt;2.60.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026899" version="1" comment="rsvg-convert is &lt;2.60.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026900" version="1" comment="rsvg-thumbnailer is &lt;2.60.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026901" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.60.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026902" version="1" comment="gdm is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026903" version="1" comment="gdm-devel is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026904" version="1" comment="gdm-lang is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026905" version="1" comment="gdm-schema is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026906" version="1" comment="gdm-systemd is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026907" version="1" comment="gdmflexiserver is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026908" version="1" comment="libgdm1 is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026909" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026910" version="1" comment="gettext-its-gtk3 is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026911" version="1" comment="gtk3-data is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026912" version="1" comment="gtk3-devel is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026913" version="1" comment="gtk3-devel-doc is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026914" version="1" comment="gtk3-immodule-amharic is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026915" version="1" comment="gtk3-immodule-broadway is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026916" version="1" comment="gtk3-immodule-inuktitut is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026917" version="1" comment="gtk3-immodule-multipress is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026918" version="1" comment="gtk3-immodule-thai is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026919" version="1" comment="gtk3-immodule-tigrigna is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026920" version="1" comment="gtk3-immodule-vietnamese is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026921" version="1" comment="gtk3-immodule-xim is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026922" version="1" comment="gtk3-lang is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026923" version="1" comment="gtk3-schema is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026924" version="1" comment="gtk3-tools is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026925" version="1" comment="libgtk-3-0 is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026926" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.24.49+14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026927" version="1" comment="ghostscript is &lt;10.05.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026928" version="1" comment="ghostscript-devel is &lt;10.05.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026929" version="1" comment="ghostscript-x11 is &lt;10.05.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026930" version="1" comment="giflib-devel is &lt;5.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026931" version="1" comment="giflib-progs is &lt;5.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026932" version="1" comment="libgif7 is &lt;5.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026933" version="1" comment="git is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026934" version="1" comment="git-arch is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026935" version="1" comment="git-core is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026936" version="1" comment="git-credential-libsecret is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026937" version="1" comment="git-daemon is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026938" version="1" comment="git-doc is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026939" version="1" comment="git-email is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026940" version="1" comment="git-gui is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026941" version="1" comment="git-p4 is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026942" version="1" comment="git-web is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026943" version="1" comment="gitk is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026944" version="1" comment="perl-Git is &lt;2.51.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026945" version="1" comment="glib-networking is &lt;2.80.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026946" version="1" comment="glib-networking-lang is &lt;2.80.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026947" version="1" comment="glib2-devel is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026948" version="1" comment="glib2-devel-static is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026949" version="1" comment="glib2-doc is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026950" version="1" comment="glib2-lang is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026951" version="1" comment="glib2-tools is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026952" version="1" comment="libgio-2_0-0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026953" version="1" comment="libgirepository-2_0-0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026954" version="1" comment="libglib-2_0-0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026955" version="1" comment="libgmodule-2_0-0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026956" version="1" comment="libgobject-2_0-0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026957" version="1" comment="libgthread-2_0-0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026958" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026959" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026960" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026961" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026962" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026963" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026964" version="1" comment="glibc is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026965" version="1" comment="glibc-devel is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026966" version="1" comment="glibc-devel-static is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026967" version="1" comment="glibc-extra is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026968" version="1" comment="glibc-gconv-modules-extra is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026969" version="1" comment="glibc-html is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026970" version="1" comment="glibc-i18ndata is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026971" version="1" comment="glibc-info is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026972" version="1" comment="glibc-lang is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026973" version="1" comment="glibc-locale is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026974" version="1" comment="glibc-locale-base is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026975" version="1" comment="glibc-profile is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026976" version="1" comment="glibc-utils is &lt;2.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026977" version="1" comment="gmp-devel is &lt;6.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026978" version="1" comment="libgmp10 is &lt;6.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026979" version="1" comment="libgmpxx4 is &lt;6.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026980" version="1" comment="gnome-autoar-devel is &lt;0.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026981" version="1" comment="libgnome-autoar-0-0 is &lt;0.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026982" version="1" comment="libgnome-autoar-gtk-0-0 is &lt;0.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026983" version="1" comment="typelib-1_0-GnomeAutoar-0_1 is &lt;0.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026984" version="1" comment="typelib-1_0-GnomeAutoarGtk-0_1 is &lt;0.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026985" version="1" comment="gnome-desktop-lang is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026986" version="1" comment="libgnome-desktop-3-20 is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026987" version="1" comment="libgnome-desktop-3-devel is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026988" version="1" comment="libgnome-desktop-3_0-common is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026989" version="1" comment="libgnome-desktop-4-2 is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026990" version="1" comment="libgnome-desktop-4-devel is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026991" version="1" comment="typelib-1_0-GnomeBG-4_0 is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026992" version="1" comment="typelib-1_0-GnomeDesktop-3_0 is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026993" version="1" comment="typelib-1_0-GnomeDesktop-4_0 is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026994" version="1" comment="typelib-1_0-GnomeRR-4_0 is &lt;44.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026995" version="1" comment="gnome-extensions is &lt;48.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026996" version="1" comment="gnome-shell is &lt;48.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026997" version="1" comment="gnome-shell-devel is &lt;48.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026998" version="1" comment="gnome-shell-lang is &lt;48.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010026999" version="1" comment="gnome-keyring is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027000" version="1" comment="gnome-keyring-lang is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027001" version="1" comment="gnome-keyring-pam is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027002" version="1" comment="libgck-modules-gnome-keyring is &lt;48.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027003" version="1" comment="gnome-remote-desktop is &lt;48.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027004" version="1" comment="gnome-remote-desktop-lang is &lt;48.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027005" version="1" comment="gnome-settings-daemon is &lt;48.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027006" version="1" comment="gnome-settings-daemon-devel is &lt;48.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027007" version="1" comment="gnome-settings-daemon-lang is &lt;48.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027008" version="1" comment="gnutls is &lt;3.8.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027009" version="1" comment="libgnutls-devel is &lt;3.8.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027010" version="1" comment="libgnutls30 is &lt;3.8.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027011" version="1" comment="libgnutlsxx-devel is &lt;3.8.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027012" version="1" comment="libgnutlsxx30 is &lt;3.8.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027013" version="1" comment="go is &lt;1.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027014" version="1" comment="go-doc is &lt;1.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027015" version="1" comment="go-race is &lt;1.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027016" version="1" comment="go1.24 is &lt;1.24.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027017" version="1" comment="go1.24-doc is &lt;1.24.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027018" version="1" comment="go1.24-libstd is &lt;1.24.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027019" version="1" comment="go1.24-openssl is &lt;1.24.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027020" version="1" comment="go1.24-openssl-race is &lt;1.24.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027021" version="1" comment="go1.24-race is &lt;1.24.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027022" version="1" comment="go1.25 is &lt;1.25.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027023" version="1" comment="go1.25-doc is &lt;1.25.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027024" version="1" comment="go1.25-libstd is &lt;1.25.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027025" version="1" comment="go1.25-race is &lt;1.25.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027026" version="1" comment="golang-github-prometheus-prometheus is &lt;2.53.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027027" version="1" comment="google-cloud-sap-agent is &lt;3.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027028" version="1" comment="google-gson is &lt;2.8.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027029" version="1" comment="google-gson-javadoc is &lt;2.8.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027030" version="1" comment="google-guest-agent is &lt;20250116.00-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027031" version="1" comment="google-osconfig-agent is &lt;20250416.02-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027032" version="1" comment="govulncheck-vulndb is &lt;0.0.20250814T182633-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027033" version="1" comment="gpgme is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027034" version="1" comment="libgpgme-devel is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027035" version="1" comment="libgpgme11 is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027036" version="1" comment="libgpgmepp-devel is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027037" version="1" comment="libgpgmepp6 is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027038" version="1" comment="libqgpgmeqt6-15 is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027039" version="1" comment="libqgpgmeqt6-devel is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027040" version="1" comment="python313-gpg is &lt;1.24.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027041" version="1" comment="gptfdisk is &lt;1.0.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027042" version="1" comment="gptfdisk-fixparts is &lt;1.0.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027043" version="1" comment="graphite2 is &lt;1.3.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027044" version="1" comment="graphite2-devel is &lt;1.3.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027045" version="1" comment="libgraphite2-3 is &lt;1.3.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027046" version="1" comment="grep is &lt;3.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027047" version="1" comment="grep-lang is &lt;3.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027048" version="1" comment="groff is &lt;1.23.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027049" version="1" comment="groff-doc is &lt;1.23.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027050" version="1" comment="groff-full is &lt;1.23.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027051" version="1" comment="gxditview is &lt;1.23.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027052" version="1" comment="grpc-devel is &lt;1.59.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027053" version="1" comment="libgrpc++1_59 is &lt;1.59.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027054" version="1" comment="libgrpc1_59 is &lt;1.59.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027055" version="1" comment="libgrpc36 is &lt;1.59.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027056" version="1" comment="libupb36 is &lt;1.59.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027057" version="1" comment="upb-devel is &lt;1.59.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027058" version="1" comment="grub2 is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027059" version="1" comment="grub2-arm64-efi is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027060" version="1" comment="grub2-common is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027061" version="1" comment="grub2-i386-pc is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027062" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027063" version="1" comment="grub2-s390x-emu is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027064" version="1" comment="grub2-snapper-plugin is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027065" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027066" version="1" comment="grub2-x86_64-efi is &lt;2.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027067" version="1" comment="gsasl is &lt;2.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027068" version="1" comment="gsasl-devel is &lt;2.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027069" version="1" comment="gsasl-lang is &lt;2.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027070" version="1" comment="libgsasl18 is &lt;2.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027071" version="1" comment="gstreamer is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027072" version="1" comment="gstreamer-lang is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027073" version="1" comment="gstreamer-utils is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027074" version="1" comment="libgstreamer-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027075" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027076" version="1" comment="gstreamer-plugins-bad is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027077" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027078" version="1" comment="gstreamer-transcoder is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027079" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027080" version="1" comment="libgstanalytics-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027081" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027082" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027083" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027084" version="1" comment="libgstcodecs-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027085" version="1" comment="libgstcuda-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027086" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027087" version="1" comment="libgstisoff-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027088" version="1" comment="libgstmpegts-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027089" version="1" comment="libgstmse-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027090" version="1" comment="libgstphotography-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027091" version="1" comment="libgstplay-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027092" version="1" comment="libgstplayer-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027093" version="1" comment="libgstsctp-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027094" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027095" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027096" version="1" comment="libgstva-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027097" version="1" comment="libgstvulkan-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027098" version="1" comment="libgstwayland-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027099" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027100" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027101" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027102" version="1" comment="typelib-1_0-GstAnalytics-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027103" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027104" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027105" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027106" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027107" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027108" version="1" comment="typelib-1_0-GstMse-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027109" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027110" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027111" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027112" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027113" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027114" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027115" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027116" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027117" version="1" comment="gstreamer-plugins-base is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027118" version="1" comment="gstreamer-plugins-base-lang is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027119" version="1" comment="libgstallocators-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027120" version="1" comment="libgstapp-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027121" version="1" comment="libgstaudio-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027122" version="1" comment="libgstfft-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027123" version="1" comment="libgstgl-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027124" version="1" comment="libgstpbutils-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027125" version="1" comment="libgstriff-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027126" version="1" comment="libgstrtp-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027127" version="1" comment="libgstrtsp-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027128" version="1" comment="libgstsdp-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027129" version="1" comment="libgsttag-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027130" version="1" comment="libgstvideo-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027131" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027132" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027133" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027134" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027135" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027136" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027137" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027138" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027139" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027140" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027141" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027142" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027143" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027144" version="1" comment="gstreamer-plugins-good is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027145" version="1" comment="gstreamer-plugins-good-extra is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027146" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027147" version="1" comment="gstreamer-plugins-good-jack is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027148" version="1" comment="gstreamer-plugins-good-lang is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027149" version="1" comment="gstreamer-plugins-ugly is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027150" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027151" version="1" comment="guava is &lt;33.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027152" version="1" comment="guava-javadoc is &lt;33.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027153" version="1" comment="guava-testlib is &lt;33.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027154" version="1" comment="guestfs-tools is &lt;1.54.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027155" version="1" comment="guestfs-tools-bash-completion is &lt;1.54.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027156" version="1" comment="guestfs-tools-man-pages-ja is &lt;1.54.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027157" version="1" comment="guestfs-tools-man-pages-uk is &lt;1.54.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027158" version="1" comment="virt-v2v is &lt;2.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027159" version="1" comment="virt-v2v-bash-completion is &lt;2.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027160" version="1" comment="virt-v2v-man-pages-ja is &lt;2.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027161" version="1" comment="virt-v2v-man-pages-uk is &lt;2.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027162" version="1" comment="virt-win-reg is &lt;1.54.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027163" version="1" comment="guile is &lt;3.0.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027164" version="1" comment="guile-devel is &lt;3.0.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027165" version="1" comment="guile-modules-3_0 is &lt;3.0.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027166" version="1" comment="libguile-3_0-1 is &lt;3.0.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027167" version="1" comment="gupnp-doc is &lt;1.6.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027168" version="1" comment="libgupnp-1_6-0 is &lt;1.6.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027169" version="1" comment="typelib-1_0-GUPnP-1_0 is &lt;1.6.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027170" version="1" comment="gvfs is &lt;1.57.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027171" version="1" comment="gvfs-backends is &lt;1.57.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027172" version="1" comment="gvfs-fuse is &lt;1.57.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027173" version="1" comment="gvfs-lang is &lt;1.57.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027174" version="1" comment="gvim is &lt;9.1.1406-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027175" version="1" comment="vim is &lt;9.1.1406-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027176" version="1" comment="vim-data is &lt;9.1.1406-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027177" version="1" comment="vim-data-common is &lt;9.1.1406-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027178" version="1" comment="vim-small is &lt;9.1.1406-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027179" version="1" comment="xxd is &lt;9.1.1406-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027180" version="1" comment="gzip is &lt;1.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027181" version="1" comment="harfbuzz-devel is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027182" version="1" comment="harfbuzz-tools is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027183" version="1" comment="libharfbuzz-cairo0 is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027184" version="1" comment="libharfbuzz-gobject0 is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027185" version="1" comment="libharfbuzz-icu0 is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027186" version="1" comment="libharfbuzz-subset0 is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027187" version="1" comment="libharfbuzz0 is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027188" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;11.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027189" version="1" comment="helm is &lt;3.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027190" version="1" comment="helm-bash-completion is &lt;3.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027191" version="1" comment="helm-fish-completion is &lt;3.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027192" version="1" comment="helm-zsh-completion is &lt;3.18.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027193" version="1" comment="himmelblau is &lt;0.9.22+git.0.d41f700-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027194" version="1" comment="himmelblau-qr-greeter is &lt;0.9.22+git.0.d41f700-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027195" version="1" comment="himmelblau-sshd-config is &lt;0.9.22+git.0.d41f700-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027196" version="1" comment="himmelblau-sso is &lt;0.9.22+git.0.d41f700-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027197" version="1" comment="libnss_himmelblau2 is &lt;0.9.22+git.0.d41f700-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027198" version="1" comment="pam-himmelblau is &lt;0.9.22+git.0.d41f700-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027199" version="1" comment="hivex is &lt;1.3.24-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027200" version="1" comment="hivex-devel is &lt;1.3.24-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027201" version="1" comment="hivex-lang is &lt;1.3.24-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027202" version="1" comment="libhivex0 is &lt;1.3.24-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027203" version="1" comment="perl-Win-Hivex is &lt;1.3.24-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027204" version="1" comment="python3-hivex is &lt;1.3.24-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027205" version="1" comment="hsqldb is &lt;2.7.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027206" version="1" comment="hsqldb-demo is &lt;2.7.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027207" version="1" comment="hsqldb-javadoc is &lt;2.7.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027208" version="1" comment="hsqldb-manual is &lt;2.7.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027209" version="1" comment="httpcomponents-client is &lt;4.5.14-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027210" version="1" comment="httpcomponents-client-cache is &lt;4.5.14-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027211" version="1" comment="httpcomponents-client-javadoc is &lt;4.5.14-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027212" version="1" comment="hunspell is &lt;1.7.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027213" version="1" comment="hunspell-devel is &lt;1.7.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027214" version="1" comment="hunspell-tools is &lt;1.7.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027215" version="1" comment="libhunspell-1_7-0 is &lt;1.7.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027216" version="1" comment="hwloc is &lt;2.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027217" version="1" comment="hwloc-data is &lt;2.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027218" version="1" comment="hwloc-devel is &lt;2.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027219" version="1" comment="hwloc-doc is &lt;2.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027220" version="1" comment="hwloc-gl is &lt;2.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027221" version="1" comment="hwloc-gui is &lt;2.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027222" version="1" comment="libhwloc15 is &lt;2.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027223" version="1" comment="hyper-v is &lt;9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027224" version="1" comment="ibus is &lt;1.5.32-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027225" version="1" comment="ibus-dict-emoji is &lt;1.5.32-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027226" version="1" comment="ibus-gtk3 is &lt;1.5.32-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027227" version="1" comment="ibus-gtk4 is &lt;1.5.32-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027228" version="1" comment="ibus-lang is &lt;1.5.32-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027229" version="1" comment="libibus-1_0-5 is &lt;1.5.32-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027230" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.32-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027231" version="1" comment="icu is &lt;77.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027232" version="1" comment="libicu-devel is &lt;77.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027233" version="1" comment="libicu-doc is &lt;77.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027234" version="1" comment="libicu77 is &lt;77.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027235" version="1" comment="libicu77-bedata is &lt;77.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027236" version="1" comment="libicu77-ledata is &lt;77.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027237" version="1" comment="imlib2 is &lt;1.12.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027238" version="1" comment="imlib2-filters is &lt;1.12.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027239" version="1" comment="imlib2-loaders is &lt;1.12.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027240" version="1" comment="libImlib2-1 is &lt;1.12.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027241" version="1" comment="indent is &lt;2.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027242" version="1" comment="indent-lang is &lt;2.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027243" version="1" comment="iperf is &lt;3.19.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027244" version="1" comment="iperf-devel is &lt;3.19.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027245" version="1" comment="libiperf0 is &lt;3.19.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027246" version="1" comment="ipmitool is &lt;1.8.19.13.gbe11d94-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027247" version="1" comment="ipmitool-bmc-snmp-proxy is &lt;1.8.19.13.gbe11d94-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027248" version="1" comment="iputils is &lt;20240905-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027249" version="1" comment="iscsiuio is &lt;0.7.8.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027250" version="1" comment="libopeniscsiusr0 is &lt;0.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027251" version="1" comment="open-iscsi is &lt;2.1.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027252" version="1" comment="open-iscsi-devel is &lt;2.1.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027253" version="1" comment="jackson-annotations is &lt;2.17.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027254" version="1" comment="jackson-annotations-javadoc is &lt;2.17.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027255" version="1" comment="jackson-core is &lt;2.17.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027256" version="1" comment="jackson-core-javadoc is &lt;2.17.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027257" version="1" comment="jackson-databind is &lt;2.17.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027258" version="1" comment="jackson-databind-javadoc is &lt;2.17.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027259" version="1" comment="jakarta-taglibs-standard is &lt;1.1.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027260" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027261" version="1" comment="jasper is &lt;4.2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027262" version="1" comment="libjasper7 is &lt;4.2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027263" version="1" comment="java-17-openjdk is &lt;17.0.16.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027264" version="1" comment="java-17-openjdk-demo is &lt;17.0.16.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027265" version="1" comment="java-17-openjdk-devel is &lt;17.0.16.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027266" version="1" comment="java-17-openjdk-headless is &lt;17.0.16.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027267" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.16.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027268" version="1" comment="java-17-openjdk-jmods is &lt;17.0.16.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027269" version="1" comment="java-17-openjdk-src is &lt;17.0.16.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027270" version="1" comment="java-21-openjdk is &lt;21.0.8.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027271" version="1" comment="java-21-openjdk-demo is &lt;21.0.8.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027272" version="1" comment="java-21-openjdk-devel is &lt;21.0.8.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027273" version="1" comment="java-21-openjdk-headless is &lt;21.0.8.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027274" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.8.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027275" version="1" comment="java-21-openjdk-jmods is &lt;21.0.8.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027276" version="1" comment="java-21-openjdk-src is &lt;21.0.8.0-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027277" version="1" comment="javamail is &lt;1.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027278" version="1" comment="javamail-javadoc is &lt;1.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027279" version="1" comment="jbigkit is &lt;2.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027280" version="1" comment="libjbig-devel is &lt;2.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027281" version="1" comment="libjbig2 is &lt;2.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027282" version="1" comment="jcat-tool is &lt;0.2.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027283" version="1" comment="libjcat-devel is &lt;0.2.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027284" version="1" comment="libjcat1 is &lt;0.2.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027285" version="1" comment="typelib-1_0-Jcat-1_0 is &lt;0.2.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027286" version="1" comment="jcl-over-slf4j is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027287" version="1" comment="jul-to-slf4j is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027288" version="1" comment="log4j-over-slf4j is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027289" version="1" comment="slf4j is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027290" version="1" comment="slf4j-ext is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027291" version="1" comment="slf4j-javadoc is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027292" version="1" comment="slf4j-jcl is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027293" version="1" comment="slf4j-jdk14 is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027294" version="1" comment="slf4j-manual is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027295" version="1" comment="slf4j-reload4j is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027296" version="1" comment="slf4j-sources is &lt;1.7.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027297" version="1" comment="jdom is &lt;1.1.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027298" version="1" comment="jdom-demo is &lt;1.1.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027299" version="1" comment="jdom-javadoc is &lt;1.1.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027300" version="1" comment="jdom2 is &lt;2.0.6.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027301" version="1" comment="jdom2-javadoc is &lt;2.0.6.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027302" version="1" comment="jq is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027303" version="1" comment="libjq-devel is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027304" version="1" comment="libjq1 is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027305" version="1" comment="jsch is &lt;0.2.22-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027306" version="1" comment="jsch-agent-proxy-connector-factory is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027307" version="1" comment="jsch-agent-proxy-core is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027308" version="1" comment="jsch-agent-proxy-javadoc is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027309" version="1" comment="jsch-agent-proxy-jsch is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027310" version="1" comment="jsch-agent-proxy-pageant is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027311" version="1" comment="jsch-agent-proxy-sshagent is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027312" version="1" comment="jsch-agent-proxy-svnkit-trilead-ssh2 is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027313" version="1" comment="jsch-agent-proxy-usocket-jna is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027314" version="1" comment="jsch-agent-proxy-usocket-nc is &lt;0.0.9-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027315" version="1" comment="jsch-demo is &lt;0.2.22-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027316" version="1" comment="jsch-javadoc is &lt;0.2.22-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027317" version="1" comment="trilead-ssh2 is &lt;217.293.v56de4d4d3515-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027318" version="1" comment="trilead-ssh2-javadoc is &lt;217.293.v56de4d4d3515-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027319" version="1" comment="jsoup is &lt;1.15.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027320" version="1" comment="jsoup-javadoc is &lt;1.15.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027321" version="1" comment="jsr-305 is &lt;3.0.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027322" version="1" comment="jsr-305-javadoc is &lt;3.0.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027323" version="1" comment="jtidy is &lt;1.0.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027324" version="1" comment="jtidy-javadoc is &lt;1.0.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027325" version="1" comment="jtidy-scripts is &lt;1.0.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027326" version="1" comment="junit is &lt;4.13.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027327" version="1" comment="junit-javadoc is &lt;4.13.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027328" version="1" comment="junit-manual is &lt;4.13.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027329" version="1" comment="kbd is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027330" version="1" comment="kbd-legacy is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027331" version="1" comment="libkbdfile1 is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027332" version="1" comment="libkeymap1 is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027333" version="1" comment="libkfont0 is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027334" version="1" comment="kdump is &lt;2.1.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027335" version="1" comment="kea is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027336" version="1" comment="kea-devel is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027337" version="1" comment="kea-doc is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027338" version="1" comment="kea-hooks is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027339" version="1" comment="libkea-asiodns62 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027340" version="1" comment="libkea-asiolink87 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027341" version="1" comment="libkea-cc82 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027342" version="1" comment="libkea-cfgrpt3 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027343" version="1" comment="libkea-config83 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027344" version="1" comment="libkea-cryptolink63 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027345" version="1" comment="libkea-d2srv63 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027346" version="1" comment="libkea-database76 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027347" version="1" comment="libkea-dhcp109 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027348" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027349" version="1" comment="libkea-dhcpsrv129 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027350" version="1" comment="libkea-dns71 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027351" version="1" comment="libkea-eval84 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027352" version="1" comment="libkea-exceptions45 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027353" version="1" comment="libkea-hooks118 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027354" version="1" comment="libkea-http87 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027355" version="1" comment="libkea-log-interprocess3 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027356" version="1" comment="libkea-log75 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027357" version="1" comment="libkea-mysql88 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027358" version="1" comment="libkea-pgsql88 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027359" version="1" comment="libkea-process90 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027360" version="1" comment="libkea-stats53 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027361" version="1" comment="libkea-tcp33 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027362" version="1" comment="libkea-util-io12 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027363" version="1" comment="libkea-util101 is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027364" version="1" comment="python3-kea is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027365" version="1" comment="kernel-64kb is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027367" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027368" version="1" comment="kernel-default is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027370" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027371" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027372" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027374" version="1" comment="kernel-docs is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027375" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027376" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027378" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027379" version="1" comment="kernel-macros is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027380" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027381" version="1" comment="kernel-source is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027382" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027383" version="1" comment="kernel-syms is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027384" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027385" version="1" comment="kernel-azure is &lt;6.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027387" version="1" comment="kernel-azure-extra is &lt;6.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027388" version="1" comment="kernel-azure-vdso is &lt;6.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027390" version="1" comment="kernel-source-azure is &lt;6.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027391" version="1" comment="kernel-firmware-all is &lt;20250206-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027392" version="1" comment="kernel-firmware-amdgpu is &lt;20250718-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027393" version="1" comment="kernel-firmware-ath10k is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027394" version="1" comment="kernel-firmware-ath11k is &lt;20250424-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027395" version="1" comment="kernel-firmware-ath12k is &lt;20250523-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027396" version="1" comment="kernel-firmware-atheros is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027397" version="1" comment="kernel-firmware-bluetooth is &lt;20250714-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027398" version="1" comment="kernel-firmware-bnx2 is &lt;20250627-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027399" version="1" comment="kernel-firmware-brcm is &lt;20250623-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027400" version="1" comment="kernel-firmware-chelsio is &lt;20250627-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027401" version="1" comment="kernel-firmware-dpaa2 is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027402" version="1" comment="kernel-firmware-i915 is &lt;20250708-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027403" version="1" comment="kernel-firmware-intel is &lt;20250718-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027404" version="1" comment="kernel-firmware-iwlwifi is &lt;20250609-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027405" version="1" comment="kernel-firmware-liquidio is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027406" version="1" comment="kernel-firmware-marvell is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027407" version="1" comment="kernel-firmware-media is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027408" version="1" comment="kernel-firmware-mediatek is &lt;20250708-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027409" version="1" comment="kernel-firmware-mellanox is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027410" version="1" comment="kernel-firmware-mwifiex is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027411" version="1" comment="kernel-firmware-network is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027412" version="1" comment="kernel-firmware-nfp is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027413" version="1" comment="kernel-firmware-nvidia is &lt;20250516-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027414" version="1" comment="kernel-firmware-platform is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027415" version="1" comment="kernel-firmware-prestera is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027416" version="1" comment="kernel-firmware-qcom is &lt;20250714-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027417" version="1" comment="kernel-firmware-qlogic is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027418" version="1" comment="kernel-firmware-radeon is &lt;20250627-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027419" version="1" comment="kernel-firmware-realtek is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027420" version="1" comment="kernel-firmware-serial is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027421" version="1" comment="kernel-firmware-sound is &lt;20250721-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027422" version="1" comment="kernel-firmware-ti is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027423" version="1" comment="kernel-firmware-ueagle is &lt;20250206-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027424" version="1" comment="kernel-firmware-usb-network is &lt;20250717-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027425" version="1" comment="ucode-amd is &lt;20250708-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027426" version="1" comment="keylime-config is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027427" version="1" comment="keylime-firewalld is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027428" version="1" comment="keylime-logrotate is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027429" version="1" comment="keylime-registrar is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027430" version="1" comment="keylime-tenant is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027431" version="1" comment="keylime-tpm_cert_store is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027432" version="1" comment="keylime-verifier is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027433" version="1" comment="python313-keylime is &lt;7.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027434" version="1" comment="keylime-ima-policy is &lt;0.2.7+117-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027435" version="1" comment="rust-keylime is &lt;0.2.7+117-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027436" version="1" comment="kpartx is &lt;0.11.0+183+suse.3973293-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027437" version="1" comment="libdmmp-devel is &lt;0.11.0+183+suse.3973293-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027438" version="1" comment="libdmmp0_2_0 is &lt;0.11.0+183+suse.3973293-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027439" version="1" comment="libmpath0 is &lt;0.11.0+183+suse.3973293-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027440" version="1" comment="multipath-tools is &lt;0.11.0+183+suse.3973293-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027441" version="1" comment="multipath-tools-devel is &lt;0.11.0+183+suse.3973293-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027442" version="1" comment="krb5 is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027443" version="1" comment="krb5-client is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027444" version="1" comment="krb5-devel is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027445" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027446" version="1" comment="krb5-plugin-preauth-otp is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027447" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027448" version="1" comment="krb5-plugin-preauth-spake is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027449" version="1" comment="krb5-server is &lt;1.21.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027450" version="1" comment="kubevirt-virtctl is &lt;1.5.2-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027451" version="1" comment="lame is &lt;3.100-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027452" version="1" comment="lame-doc is &lt;3.100-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027453" version="1" comment="lame-mp3rtp is &lt;3.100-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027454" version="1" comment="libmp3lame0 is &lt;3.100-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027455" version="1" comment="libmp3lame0-x86-64-v3 is &lt;3.100-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027456" version="1" comment="lastlog2 is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027457" version="1" comment="libblkid-devel is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027458" version="1" comment="libblkid-devel-static is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027459" version="1" comment="libblkid1 is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027460" version="1" comment="libfdisk-devel is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027461" version="1" comment="libfdisk-devel-static is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027462" version="1" comment="libfdisk1 is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027463" version="1" comment="liblastlog2-2 is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027464" version="1" comment="liblastlog2-devel is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027465" version="1" comment="libmount-devel is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027466" version="1" comment="libmount-devel-static is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027467" version="1" comment="libmount1 is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027468" version="1" comment="libsmartcols-devel is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027469" version="1" comment="libsmartcols-devel-static is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027470" version="1" comment="libsmartcols1 is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027471" version="1" comment="libuuid-devel is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027472" version="1" comment="libuuid-devel-static is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027473" version="1" comment="libuuid1 is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027474" version="1" comment="python313-libmount is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027475" version="1" comment="util-linux is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027476" version="1" comment="util-linux-lang is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027477" version="1" comment="util-linux-systemd is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027478" version="1" comment="util-linux-tty-tools is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027479" version="1" comment="uuidd is &lt;2.41.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027480" version="1" comment="lcms2 is &lt;2.16-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027481" version="1" comment="liblcms2-2 is &lt;2.16-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027482" version="1" comment="liblcms2-devel is &lt;2.16-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027483" version="1" comment="liblcms2-doc is &lt;2.16-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027484" version="1" comment="ldns is &lt;1.8.4-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027485" version="1" comment="ldns-devel is &lt;1.8.4-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027486" version="1" comment="libldns3 is &lt;1.8.4-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027487" version="1" comment="perl-DNS-LDNS is &lt;1.8.4-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027488" version="1" comment="python3-ldns is &lt;1.8.4-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027489" version="1" comment="less is &lt;668-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027490" version="1" comment="lftp is &lt;4.9.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027491" version="1" comment="libEMF-devel is &lt;1.0.13-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027492" version="1" comment="libEMF-utils is &lt;1.0.13-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027493" version="1" comment="libEMF1 is &lt;1.0.13-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027494" version="1" comment="libHX-devel is &lt;4.27-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027495" version="1" comment="libHX32 is &lt;4.27-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027496" version="1" comment="libICE-devel is &lt;1.1.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027497" version="1" comment="libICE6 is &lt;1.1.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027498" version="1" comment="libIex-3_2-31 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027499" version="1" comment="libIex-3_2-31-x86-64-v3 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027500" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027501" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027502" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027503" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027504" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027505" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027506" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027507" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027508" version="1" comment="openexr is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027509" version="1" comment="openexr-doc is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027510" version="1" comment="libQt6Bluetooth6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027511" version="1" comment="libQt6Nfc6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027512" version="1" comment="qt6-connectivity is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027513" version="1" comment="qt6-connectivity-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027514" version="1" comment="qt6-connectivity-docs-html is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027515" version="1" comment="qt6-connectivity-docs-qch is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027516" version="1" comment="qt6-connectivity-examples is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027517" version="1" comment="qt6-connectivity-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027518" version="1" comment="libQt6Concurrent6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027519" version="1" comment="libQt6Core6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027520" version="1" comment="libQt6DBus6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027521" version="1" comment="libQt6Gui6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027522" version="1" comment="libQt6Network6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027523" version="1" comment="libQt6OpenGL6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027524" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027525" version="1" comment="libQt6PrintSupport6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027526" version="1" comment="libQt6Sql6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027527" version="1" comment="libQt6Test6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027528" version="1" comment="libQt6Widgets6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027529" version="1" comment="libQt6Xml6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027530" version="1" comment="qt6-base-common-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027531" version="1" comment="qt6-base-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027532" version="1" comment="qt6-base-docs-html is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027533" version="1" comment="qt6-base-docs-qch is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027534" version="1" comment="qt6-base-examples is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027535" version="1" comment="qt6-base-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027536" version="1" comment="qt6-concurrent-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027537" version="1" comment="qt6-core-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027538" version="1" comment="qt6-core-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027539" version="1" comment="qt6-dbus-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027540" version="1" comment="qt6-dbus-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027541" version="1" comment="qt6-docs-common is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027542" version="1" comment="qt6-exampleicons-devel-static is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027543" version="1" comment="qt6-gui-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027544" version="1" comment="qt6-gui-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027545" version="1" comment="qt6-kmssupport-devel-static is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027546" version="1" comment="qt6-kmssupport-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027547" version="1" comment="qt6-network-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027548" version="1" comment="qt6-network-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027549" version="1" comment="qt6-network-tls is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027550" version="1" comment="qt6-networkinformation-glib is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027551" version="1" comment="qt6-networkinformation-nm is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027552" version="1" comment="qt6-opengl-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027553" version="1" comment="qt6-opengl-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027554" version="1" comment="qt6-openglwidgets-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027555" version="1" comment="qt6-platformsupport-devel-static is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027556" version="1" comment="qt6-platformsupport-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027557" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027558" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027559" version="1" comment="qt6-printsupport-cups is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027560" version="1" comment="qt6-printsupport-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027561" version="1" comment="qt6-printsupport-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027562" version="1" comment="qt6-sql-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027563" version="1" comment="qt6-sql-mysql is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027564" version="1" comment="qt6-sql-postgresql is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027565" version="1" comment="qt6-sql-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027566" version="1" comment="qt6-sql-sqlite is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027567" version="1" comment="qt6-sql-unixODBC is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027568" version="1" comment="qt6-test-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027569" version="1" comment="qt6-test-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027570" version="1" comment="qt6-widgets-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027571" version="1" comment="qt6-widgets-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027572" version="1" comment="qt6-xml-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027573" version="1" comment="qt6-xml-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027574" version="1" comment="libQt6NetworkAuth6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027575" version="1" comment="qt6-networkauth-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027576" version="1" comment="qt6-networkauth-docs-html is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027577" version="1" comment="qt6-networkauth-docs-qch is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027578" version="1" comment="qt6-networkauth-examples is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027579" version="1" comment="qt6-networkauth-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027580" version="1" comment="libQt6Svg6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027581" version="1" comment="libQt6SvgWidgets6 is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027582" version="1" comment="qt6-svg-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027583" version="1" comment="qt6-svg-docs-html is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027584" version="1" comment="qt6-svg-docs-qch is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027585" version="1" comment="qt6-svg-private-devel is &lt;6.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027586" version="1" comment="libSDL2-2_0-0 is &lt;2.30.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027587" version="1" comment="libSDL2_ttf-2_0-0 is &lt;2.24.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027588" version="1" comment="libSoundTouch1 is &lt;2.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027589" version="1" comment="libSoundTouchDll1 is &lt;2.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027590" version="1" comment="soundtouch is &lt;2.3.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027591" version="1" comment="libX11-6 is &lt;1.8.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027592" version="1" comment="libX11-data is &lt;1.8.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027593" version="1" comment="libX11-devel is &lt;1.8.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027594" version="1" comment="libX11-devel-doc is &lt;1.8.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027595" version="1" comment="libX11-xcb1 is &lt;1.8.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027596" version="1" comment="libXRes1 is &lt;1.2.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027597" version="1" comment="libXres-devel is &lt;1.2.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027598" version="1" comment="libXcursor-devel is &lt;1.2.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027599" version="1" comment="libXcursor1 is &lt;1.2.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027600" version="1" comment="libXdmcp-devel is &lt;1.1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027601" version="1" comment="libXdmcp6 is &lt;1.1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027602" version="1" comment="libXext-devel is &lt;1.3.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027603" version="1" comment="libXext6 is &lt;1.3.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027604" version="1" comment="libXfixes-devel is &lt;6.0.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027605" version="1" comment="libXfixes3 is &lt;6.0.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027606" version="1" comment="libXfont2-2 is &lt;2.0.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027607" version="1" comment="libXfont2-devel is &lt;2.0.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027608" version="1" comment="libXi-devel is &lt;1.8.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027609" version="1" comment="libXi6 is &lt;1.8.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027610" version="1" comment="libXinerama-devel is &lt;1.1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027611" version="1" comment="libXinerama1 is &lt;1.1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027612" version="1" comment="libXpm-devel is &lt;3.5.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027613" version="1" comment="libXpm-tools is &lt;3.5.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027614" version="1" comment="libXpm4 is &lt;3.5.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027615" version="1" comment="libXrandr-devel is &lt;1.5.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027616" version="1" comment="libXrandr2 is &lt;1.5.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027617" version="1" comment="libXrender-devel is &lt;0.9.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027618" version="1" comment="libXrender1 is &lt;0.9.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027619" version="1" comment="libXt-devel is &lt;1.3.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027620" version="1" comment="libXt6 is &lt;1.3.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027621" version="1" comment="libXtst-devel is &lt;1.2.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027622" version="1" comment="libXtst6 is &lt;1.2.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027623" version="1" comment="libXv-devel is &lt;1.0.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027624" version="1" comment="libXv1 is &lt;1.0.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027625" version="1" comment="libXvMC-devel is &lt;1.0.14-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027626" version="1" comment="libXvMC1 is &lt;1.0.14-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027627" version="1" comment="libXxf86dga-devel is &lt;1.1.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027628" version="1" comment="libXxf86dga1 is &lt;1.1.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027629" version="1" comment="libXxf86vm-devel is &lt;1.1.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027630" version="1" comment="libXxf86vm1 is &lt;1.1.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027631" version="1" comment="libZXing3 is &lt;2.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027632" version="1" comment="libass9 is &lt;0.17.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027633" version="1" comment="libassimp5 is &lt;5.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027634" version="1" comment="libbd_btrfs-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027635" version="1" comment="libbd_btrfs3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027636" version="1" comment="libbd_crypto-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027637" version="1" comment="libbd_crypto3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027638" version="1" comment="libbd_dm-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027639" version="1" comment="libbd_dm3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027640" version="1" comment="libbd_fs-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027641" version="1" comment="libbd_fs3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027642" version="1" comment="libbd_loop-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027643" version="1" comment="libbd_loop3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027644" version="1" comment="libbd_lvm-dbus-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027645" version="1" comment="libbd_lvm-dbus3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027646" version="1" comment="libbd_lvm-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027647" version="1" comment="libbd_lvm3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027648" version="1" comment="libbd_mdraid-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027649" version="1" comment="libbd_mdraid3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027650" version="1" comment="libbd_mpath-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027651" version="1" comment="libbd_mpath3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027652" version="1" comment="libbd_nvme3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027653" version="1" comment="libbd_part-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027654" version="1" comment="libbd_part3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027655" version="1" comment="libbd_swap-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027656" version="1" comment="libbd_swap3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027657" version="1" comment="libbd_utils-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027658" version="1" comment="libbd_utils3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027659" version="1" comment="libblockdev is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027660" version="1" comment="libblockdev-devel is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027661" version="1" comment="libblockdev3 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027662" version="1" comment="python3-libblockdev is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027663" version="1" comment="typelib-1_0-BlockDev-3_0 is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027664" version="1" comment="libbpf-devel is &lt;1.6.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027665" version="1" comment="libbpf-devel-static is &lt;1.6.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027666" version="1" comment="libbpf1 is &lt;1.6.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027667" version="1" comment="libcaca0 is &lt;0.99.beta20-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027668" version="1" comment="libcaca0-plugins is &lt;0.99.beta20-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027669" version="1" comment="python3-caca is &lt;0.99.beta20-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027670" version="1" comment="libcacard-devel is &lt;2.8.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027671" version="1" comment="libcacard0 is &lt;2.8.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027672" version="1" comment="libcap-devel is &lt;2.73-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027673" version="1" comment="libcap-progs is &lt;2.73-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027674" version="1" comment="libcap2 is &lt;2.73-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027675" version="1" comment="libpsx2 is &lt;2.73-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027676" version="1" comment="libcdio++1 is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027677" version="1" comment="libcdio-devel is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027678" version="1" comment="libcdio19 is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027679" version="1" comment="libiso9660++0 is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027680" version="1" comment="libiso9660-11 is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027681" version="1" comment="libudf0 is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027682" version="1" comment="libcdt5 is &lt;2.49.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027683" version="1" comment="libcgraph6 is &lt;2.49.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027684" version="1" comment="libgvc6 is &lt;2.49.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027685" version="1" comment="libgvpr2 is &lt;2.49.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027686" version="1" comment="libpathplan4 is &lt;2.49.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027687" version="1" comment="libcjose-devel is &lt;0.6.2.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027688" version="1" comment="libcjose0 is &lt;0.6.2.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027689" version="1" comment="libcjson1 is &lt;1.7.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027690" version="1" comment="libconfuse-devel is &lt;3.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027691" version="1" comment="libconfuse-lang is &lt;3.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027692" version="1" comment="libconfuse2 is &lt;3.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027693" version="1" comment="libcontainers-common is &lt;20250409-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027694" version="1" comment="libcontainers-default-policy is &lt;20250409-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027695" version="1" comment="libcontainers-openSUSE-policy is &lt;20250409-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027696" version="1" comment="registries-conf-default is &lt;20250409-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027697" version="1" comment="registries-conf-suse is &lt;20250409-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027698" version="1" comment="libcpp-httplib0_22 is &lt;0.22.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027699" version="1" comment="libcue2 is &lt;2.3.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027700" version="1" comment="libdmx-devel is &lt;1.1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027701" version="1" comment="libdmx1 is &lt;1.1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027702" version="1" comment="libdrm-devel is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027703" version="1" comment="libdrm-tools is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027704" version="1" comment="libdrm2 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027705" version="1" comment="libdrm_amdgpu1 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027706" version="1" comment="libdrm_etnaviv1 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027707" version="1" comment="libdrm_exynos1 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027708" version="1" comment="libdrm_freedreno1 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027709" version="1" comment="libdrm_intel1 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027710" version="1" comment="libdrm_nouveau2 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027711" version="1" comment="libdrm_radeon1 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027712" version="1" comment="libdrm_tegra0 is &lt;2.4.124-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027713" version="1" comment="libeconf-devel is &lt;0.7.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027714" version="1" comment="libeconf-devel-static is &lt;0.7.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027715" version="1" comment="libeconf-utils is &lt;0.7.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027716" version="1" comment="libeconf0 is &lt;0.7.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027717" version="1" comment="libecpg6 is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027718" version="1" comment="libpq5 is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027719" version="1" comment="postgresql17 is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027720" version="1" comment="postgresql17-contrib is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027721" version="1" comment="postgresql17-devel is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027722" version="1" comment="postgresql17-docs is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027723" version="1" comment="postgresql17-llvmjit is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027724" version="1" comment="postgresql17-plperl is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027725" version="1" comment="postgresql17-plpython is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027726" version="1" comment="postgresql17-pltcl is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027727" version="1" comment="postgresql17-server is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027728" version="1" comment="postgresql17-server-devel is &lt;17.6-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027729" version="1" comment="libekmfweb1 is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027730" version="1" comment="libkmipclient1 is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027731" version="1" comment="osasnmpd is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027732" version="1" comment="s390-tools is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027733" version="1" comment="s390-tools-chreipl-fcp-mpath is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027734" version="1" comment="s390-tools-genprotimg-data is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027735" version="1" comment="s390-tools-hmcdrvfs is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027736" version="1" comment="s390-tools-zdsfs is &lt;2.38.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027737" version="1" comment="libesmtp-devel is &lt;1.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027738" version="1" comment="libesmtp6_2_0 is &lt;1.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027739" version="1" comment="libevent-2_1-7 is &lt;2.1.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027740" version="1" comment="libevent-devel is &lt;2.1.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027741" version="1" comment="libevent-devel-static is &lt;2.1.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027742" version="1" comment="libexempi8 is &lt;2.6.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027743" version="1" comment="libexif12 is &lt;0.6.25-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027744" version="1" comment="libexiv2-28 is &lt;0.28.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027745" version="1" comment="libexiv2-28-x86-64-v3 is &lt;0.28.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027746" version="1" comment="libexslt0 is &lt;1.1.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027747" version="1" comment="libxslt-devel is &lt;1.1.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027748" version="1" comment="libxslt-tools is &lt;1.1.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027749" version="1" comment="libxslt1 is &lt;1.1.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027750" version="1" comment="libfastjson4 is &lt;1.2304.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027751" version="1" comment="libfreebl3 is &lt;3.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027752" version="1" comment="libsoftokn3 is &lt;3.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027753" version="1" comment="mozilla-nss is &lt;3.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027754" version="1" comment="mozilla-nss-certs is &lt;3.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027755" version="1" comment="mozilla-nss-devel is &lt;3.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027756" version="1" comment="mozilla-nss-sysinit is &lt;3.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027757" version="1" comment="mozilla-nss-tools is &lt;3.112-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027758" version="1" comment="libgcrypt-devel is &lt;1.11.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027759" version="1" comment="libgcrypt-devel-x86-64-v3 is &lt;1.11.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027760" version="1" comment="libgcrypt20 is &lt;1.11.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027761" version="1" comment="libgcrypt20-x86-64-v3 is &lt;1.11.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027762" version="1" comment="libgit2-1_9 is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027763" version="1" comment="libgit2-tools is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027764" version="1" comment="libgme0 is &lt;0.6.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027765" version="1" comment="libgoa-1_0-0 is &lt;3.54.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027766" version="1" comment="libgoa-backend-1_0-2 is &lt;3.54.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027767" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.54.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027768" version="1" comment="libgstrtspserver-1_0-0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027769" version="1" comment="typelib-1_0-GstRtspServer-1_0 is &lt;1.26.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027770" version="1" comment="libgtk-vnc-2_0-0 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027771" version="1" comment="libgvnc-1_0-0 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027772" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027773" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027774" version="1" comment="libgtop is &lt;2.41.3+4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027775" version="1" comment="libgtop-2_0-11 is &lt;2.41.3+4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027776" version="1" comment="libgtop-doc is &lt;2.41.3+4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027777" version="1" comment="libgtop-lang is &lt;2.41.3+4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027778" version="1" comment="typelib-1_0-GTop-2_0 is &lt;2.41.3+4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027779" version="1" comment="libguestfs is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027780" version="1" comment="libguestfs-appliance is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027781" version="1" comment="libguestfs-bash-completion is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027782" version="1" comment="libguestfs-devel is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027783" version="1" comment="libguestfs-gobject-1_0 is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027784" version="1" comment="libguestfs-gobject-devel is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027785" version="1" comment="libguestfs-man-pages-ja is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027786" version="1" comment="libguestfs-man-pages-uk is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027787" version="1" comment="libguestfs-rescue is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027788" version="1" comment="libguestfs-rsync is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027789" version="1" comment="libguestfs-typelib-Guestfs-1_0 is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027790" version="1" comment="libguestfs-winsupport is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027791" version="1" comment="libguestfs-xfs is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027792" version="1" comment="libguestfs0 is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027793" version="1" comment="libguestfsd is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027794" version="1" comment="perl-Sys-Guestfs is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027795" version="1" comment="python3-libguestfs is &lt;1.56.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027796" version="1" comment="libhogweed6 is &lt;3.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027797" version="1" comment="libhogweed6-x86-64-v3 is &lt;3.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027798" version="1" comment="libnettle-devel is &lt;3.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027799" version="1" comment="libnettle8 is &lt;3.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027800" version="1" comment="libnettle8-x86-64-v3 is &lt;3.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027801" version="1" comment="nettle is &lt;3.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027802" version="1" comment="libical-devel is &lt;3.0.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027803" version="1" comment="libical-doc is &lt;3.0.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027804" version="1" comment="libical3 is &lt;3.0.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027805" version="1" comment="libid3tag0 is &lt;0.16.3-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027806" version="1" comment="libidn-devel is &lt;1.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027807" version="1" comment="libidn-tools is &lt;1.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027808" version="1" comment="libidn12 is &lt;1.43-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027809" version="1" comment="libidn2-0 is &lt;2.3.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027810" version="1" comment="libidn2-devel is &lt;2.3.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027811" version="1" comment="libidn2-lang is &lt;2.3.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027812" version="1" comment="libidn2-tools is &lt;2.3.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027813" version="1" comment="libimobiledevice-1_0-6 is &lt;1.3.0+190git.20230705-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027814" version="1" comment="libiniparser-devel is &lt;4.2.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027815" version="1" comment="libiniparser4 is &lt;4.2.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027816" version="1" comment="libinput-devel is &lt;1.28.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027817" version="1" comment="libinput-tools is &lt;1.28.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027818" version="1" comment="libinput-udev is &lt;1.28.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027819" version="1" comment="libinput10 is &lt;1.28.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027820" version="1" comment="libipa_hbac-devel is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027821" version="1" comment="libipa_hbac0 is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027822" version="1" comment="libnfsidmap-sss is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027823" version="1" comment="libsss_certmap-devel is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027824" version="1" comment="libsss_certmap0 is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027825" version="1" comment="libsss_idmap-devel is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027826" version="1" comment="libsss_idmap0 is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027827" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027828" version="1" comment="libsss_nss_idmap0 is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027829" version="1" comment="python3-ipa_hbac is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027830" version="1" comment="python3-sss-murmur is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027831" version="1" comment="python3-sss_nss_idmap is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027832" version="1" comment="python3-sssd-config is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027833" version="1" comment="sssd is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027834" version="1" comment="sssd-ad is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027835" version="1" comment="sssd-dbus is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027836" version="1" comment="sssd-ipa is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027837" version="1" comment="sssd-kcm is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027838" version="1" comment="sssd-krb5 is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027839" version="1" comment="sssd-krb5-common is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027840" version="1" comment="sssd-ldap is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027841" version="1" comment="sssd-proxy is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027842" version="1" comment="sssd-tools is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027843" version="1" comment="sssd-winbind-idmap is &lt;2.9.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027844" version="1" comment="libjansson-devel is &lt;2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027845" version="1" comment="libjansson4 is &lt;2.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027846" version="1" comment="libjpeg-turbo is &lt;3.0.4-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027847" version="1" comment="libjpeg62 is &lt;62.4.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027848" version="1" comment="libjpeg62-devel is &lt;62.4.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027849" version="1" comment="libjpeg8 is &lt;8.3.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027850" version="1" comment="libjpeg8-devel is &lt;8.3.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027851" version="1" comment="libjpeg8-x86-64-v3 is &lt;8.3.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027852" version="1" comment="libturbojpeg0 is &lt;8.3.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027853" version="1" comment="libturbojpeg0-x86-64-v3 is &lt;8.3.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027854" version="1" comment="libjson-c-devel is &lt;0.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027855" version="1" comment="libjson-c-doc is &lt;0.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027856" version="1" comment="libjson-c5 is &lt;0.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027857" version="1" comment="libjxl-devel is &lt;0.11.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027858" version="1" comment="libjxl0_11 is &lt;0.11.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027859" version="1" comment="libjxl0_11-x86-64-v3 is &lt;0.11.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027860" version="1" comment="libksba-devel is &lt;1.6.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027861" version="1" comment="libksba8 is &lt;1.6.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027862" version="1" comment="liblasso-devel is &lt;2.8.2-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027863" version="1" comment="liblasso3 is &lt;2.8.2-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027864" version="1" comment="liblouis-data is &lt;3.34.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027865" version="1" comment="liblouis20 is &lt;3.34.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027866" version="1" comment="python3-louis is &lt;3.34.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027867" version="1" comment="libltdl7 is &lt;2.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027868" version="1" comment="libtool is &lt;2.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027869" version="1" comment="liblua5_3-5 is &lt;5.3.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027870" version="1" comment="lua53 is &lt;5.3.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027871" version="1" comment="lua53-devel is &lt;5.3.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027872" version="1" comment="lua53-doc is &lt;5.3.6-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027873" version="1" comment="liblua5_4-5 is &lt;5.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027874" version="1" comment="lua54 is &lt;5.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027875" version="1" comment="lua54-devel is &lt;5.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027876" version="1" comment="lua54-doc is &lt;5.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027877" version="1" comment="liblz4-1 is &lt;1.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027878" version="1" comment="liblz4-1-x86-64-v3 is &lt;1.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027879" version="1" comment="liblz4-devel is &lt;1.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027880" version="1" comment="lz4 is &lt;1.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027881" version="1" comment="liblzma5 is &lt;5.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027882" version="1" comment="liblzma5-x86-64-v3 is &lt;5.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027883" version="1" comment="xz is &lt;5.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027884" version="1" comment="xz-devel is &lt;5.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027885" version="1" comment="xz-lang is &lt;5.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027886" version="1" comment="liblzo2-2 is &lt;2.10-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027887" version="1" comment="liblzo2-2-x86-64-v3 is &lt;2.10-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027888" version="1" comment="lzo-devel is &lt;2.10-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027889" version="1" comment="lzo-devel-static is &lt;2.10-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027890" version="1" comment="libmailutils9 is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027891" version="1" comment="mailutils is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027892" version="1" comment="mailutils-delivery is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027893" version="1" comment="mailutils-devel is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027894" version="1" comment="mailutils-imap4d is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027895" version="1" comment="mailutils-mh is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027896" version="1" comment="mailutils-notify is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027897" version="1" comment="mailutils-pop3d is &lt;3.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027898" version="1" comment="libmariadb-devel is &lt;3.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027899" version="1" comment="libmariadb3 is &lt;3.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027900" version="1" comment="libmariadb_plugins is &lt;3.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027901" version="1" comment="libmariadbprivate is &lt;3.4.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027902" version="1" comment="libmariadbd-devel is &lt;11.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027903" version="1" comment="libmariadbd19 is &lt;11.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027904" version="1" comment="mariadb is &lt;11.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027905" version="1" comment="mariadb-bench is &lt;11.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027906" version="1" comment="mariadb-client is &lt;11.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027907" version="1" comment="mariadb-errormessages is &lt;11.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027908" version="1" comment="mariadb-tools is &lt;11.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027909" version="1" comment="libmicrohttpd-devel is &lt;1.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027910" version="1" comment="libmicrohttpd12 is &lt;1.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027911" version="1" comment="libmilter1_0 is &lt;8.18.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027912" version="1" comment="libminizip1 is &lt;1.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027913" version="1" comment="libminizip1-x86-64-v3 is &lt;1.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027914" version="1" comment="libz1 is &lt;1.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027915" version="1" comment="libz1-x86-64-v3 is &lt;1.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027916" version="1" comment="minizip-devel is &lt;1.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027917" version="1" comment="zlib-devel is &lt;1.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027918" version="1" comment="zlib-devel-static is &lt;1.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027919" version="1" comment="libmozjs-128-0 is &lt;128.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027920" version="1" comment="mozjs128 is &lt;128.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027921" version="1" comment="mozjs128-devel is &lt;128.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027922" version="1" comment="libmpfr6 is &lt;4.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027923" version="1" comment="mpfr-devel is &lt;4.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027924" version="1" comment="libmpg123-0 is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027925" version="1" comment="libout123-0 is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027926" version="1" comment="libsyn123-0 is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027927" version="1" comment="mpg123 is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027928" version="1" comment="mpg123-jack is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027929" version="1" comment="mpg123-openal is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027930" version="1" comment="mpg123-portaudio is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027931" version="1" comment="mpg123-pulse is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027932" version="1" comment="mpg123-sdl is &lt;1.32.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027933" version="1" comment="libmspack-devel is &lt;0.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027934" version="1" comment="libmspack0 is &lt;0.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027935" version="1" comment="mspack-examples is &lt;0.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027936" version="1" comment="libmysofa1 is &lt;1.3.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027937" version="1" comment="libnautilus-extension4 is &lt;48.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027938" version="1" comment="nautilus is &lt;48.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027939" version="1" comment="nautilus-lang is &lt;48.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027940" version="1" comment="libnbd is &lt;1.22.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027941" version="1" comment="libnbd-bash-completion is &lt;1.22.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027942" version="1" comment="libnbd0 is &lt;1.22.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027943" version="1" comment="nbdfuse is &lt;1.22.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027944" version="1" comment="python3-libnbd is &lt;1.22.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027945" version="1" comment="libncurses5 is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027946" version="1" comment="libncurses6 is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027947" version="1" comment="ncurses-devel is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027948" version="1" comment="ncurses-devel-static is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027949" version="1" comment="ncurses-examples is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027950" version="1" comment="ncurses-utils is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027951" version="1" comment="tack is &lt;1.11.20250503-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027952" version="1" comment="terminfo is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027953" version="1" comment="terminfo-base is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027954" version="1" comment="terminfo-iterm is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027955" version="1" comment="terminfo-screen is &lt;6.5.20250531-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027956" version="1" comment="libndp is &lt;1.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027957" version="1" comment="libndp-devel is &lt;1.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027958" version="1" comment="libndp0 is &lt;1.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027959" version="1" comment="libneon-devel is &lt;0.34.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027960" version="1" comment="libneon27 is &lt;0.34.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027961" version="1" comment="libnetpbm-devel is &lt;11.9.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027962" version="1" comment="libnetpbm11 is &lt;11.9.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027963" version="1" comment="netpbm is &lt;11.9.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027964" version="1" comment="libnewt0_52 is &lt;0.52.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027965" version="1" comment="newt is &lt;0.52.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027966" version="1" comment="newt-devel is &lt;0.52.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027967" version="1" comment="newt-static is &lt;0.52.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027968" version="1" comment="python3-newt is &lt;0.52.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027969" version="1" comment="libnfsidmap1 is &lt;1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027970" version="1" comment="nfs-client is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027971" version="1" comment="nfs-kernel-server is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027972" version="1" comment="nfsidmap-devel is &lt;1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027973" version="1" comment="libnghttp2-14 is &lt;1.64.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027974" version="1" comment="libnghttp2-devel is &lt;1.64.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027975" version="1" comment="nghttp2 is &lt;1.64.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027976" version="1" comment="libntfs-3g-devel is &lt;2022.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027977" version="1" comment="libntfs-3g89 is &lt;2022.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027978" version="1" comment="ntfs-3g is &lt;2022.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027979" version="1" comment="ntfsprogs is &lt;2022.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027980" version="1" comment="ntfsprogs-extra is &lt;2022.10.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027981" version="1" comment="libnutclient2 is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027982" version="1" comment="libnutclientstub1 is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027983" version="1" comment="libnutscan2 is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027984" version="1" comment="libupsclient6 is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027985" version="1" comment="nut is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027986" version="1" comment="nut-drivers-net is &lt;2.8.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027987" version="1" comment="liboath-devel is &lt;2.6.11.12-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027988" version="1" comment="liboath0 is &lt;2.6.11.12-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027989" version="1" comment="libpskc-devel is &lt;2.6.11.12-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027990" version="1" comment="libpskc0 is &lt;2.6.11.12-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027991" version="1" comment="oath-toolkit is &lt;2.6.11.12-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027992" version="1" comment="oath-toolkit-xml is &lt;2.6.11.12-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027993" version="1" comment="pam_oath is &lt;2.6.11.12-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027994" version="1" comment="libodbc2 is &lt;2.3.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027995" version="1" comment="unixODBC is &lt;2.3.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027996" version="1" comment="unixODBC-devel is &lt;2.3.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027997" version="1" comment="libonig5 is &lt;6.9.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027998" version="1" comment="oniguruma-devel is &lt;6.9.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010027999" version="1" comment="libopenjp2-7 is &lt;2.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028000" version="1" comment="libopenjp2-7-x86-64-v3 is &lt;2.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028001" version="1" comment="openjpeg2 is &lt;2.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028002" version="1" comment="openjpeg2-devel is &lt;2.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028003" version="1" comment="openjpeg2-devel-doc is &lt;2.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028004" version="1" comment="libopenmpt0 is &lt;0.7.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028005" version="1" comment="openmpt123 is &lt;0.7.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028006" version="1" comment="libopenssl-3-devel is &lt;3.5.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028007" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028008" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028009" version="1" comment="libopenssl3 is &lt;3.5.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028010" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028011" version="1" comment="openssl-3 is &lt;3.5.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028012" version="1" comment="openssl-3-doc is &lt;3.5.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028013" version="1" comment="libopenssl-devel is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028014" version="1" comment="libopenssl-fips-provider is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028015" version="1" comment="openssl is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028016" version="1" comment="libopenvswitch-3_5-0 is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028017" version="1" comment="libovn-25_03-0 is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028018" version="1" comment="openvswitch is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028019" version="1" comment="openvswitch-devel is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028020" version="1" comment="openvswitch-doc is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028021" version="1" comment="openvswitch-ipsec is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028022" version="1" comment="openvswitch-pki is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028023" version="1" comment="openvswitch-vtep is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028024" version="1" comment="ovn is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028025" version="1" comment="ovn-central is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028026" version="1" comment="ovn-devel is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028027" version="1" comment="ovn-doc is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028028" version="1" comment="ovn-docker is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028029" version="1" comment="ovn-host is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028030" version="1" comment="ovn-vtep is &lt;25.03.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028031" version="1" comment="python3-openvswitch is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028032" version="1" comment="libopus0 is &lt;1.5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028033" version="1" comment="liboqs-devel is &lt;0.13.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028034" version="1" comment="liboqs7 is &lt;0.13.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028035" version="1" comment="liborc-0_4-0 is &lt;0.4.41-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028036" version="1" comment="orc is &lt;0.4.41-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028037" version="1" comment="orc-doc is &lt;0.4.41-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028038" version="1" comment="libosinfo is &lt;1.12.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028039" version="1" comment="libosinfo-1_0-0 is &lt;1.12.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028040" version="1" comment="typelib-1_0-Libosinfo-1_0 is &lt;1.12.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028041" version="1" comment="libostree is &lt;2025.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028042" version="1" comment="libostree-1-1 is &lt;2025.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028043" version="1" comment="libostree-devel is &lt;2025.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028044" version="1" comment="libostree-grub2 is &lt;2025.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028045" version="1" comment="typelib-1_0-OSTree-1_0 is &lt;2025.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028046" version="1" comment="libp11-kit0 is &lt;0.25.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028047" version="1" comment="p11-kit is &lt;0.25.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028048" version="1" comment="p11-kit-devel is &lt;0.25.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028049" version="1" comment="p11-kit-nss-trust is &lt;0.25.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028050" version="1" comment="p11-kit-server is &lt;0.25.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028051" version="1" comment="p11-kit-tools is &lt;0.25.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028052" version="1" comment="libpango-1_0-0 is &lt;1.56.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028053" version="1" comment="pango-devel is &lt;1.56.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028054" version="1" comment="pango-tools is &lt;1.56.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028055" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.56.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028056" version="1" comment="libpcap-devel is &lt;1.10.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028057" version="1" comment="libpcap1 is &lt;1.10.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028058" version="1" comment="libpcp-devel is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028059" version="1" comment="libpcp3 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028060" version="1" comment="libpcp_gui2 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028061" version="1" comment="libpcp_import1 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028062" version="1" comment="libpcp_mmv1 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028063" version="1" comment="libpcp_trace2 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028064" version="1" comment="libpcp_web1 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028065" version="1" comment="pcp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028066" version="1" comment="pcp-conf is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028067" version="1" comment="pcp-devel is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028068" version="1" comment="pcp-doc is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028069" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028070" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028071" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028072" version="1" comment="pcp-export-pcp2json is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028073" version="1" comment="pcp-export-pcp2spark is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028074" version="1" comment="pcp-export-pcp2xml is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028075" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028076" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028077" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028078" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028079" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028080" version="1" comment="pcp-import-sar2pcp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028081" version="1" comment="pcp-pmda-activemq is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028082" version="1" comment="pcp-pmda-apache is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028083" version="1" comment="pcp-pmda-bash is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028084" version="1" comment="pcp-pmda-bonding is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028085" version="1" comment="pcp-pmda-cifs is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028086" version="1" comment="pcp-pmda-cisco is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028087" version="1" comment="pcp-pmda-dbping is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028088" version="1" comment="pcp-pmda-dm is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028089" version="1" comment="pcp-pmda-docker is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028090" version="1" comment="pcp-pmda-ds389 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028091" version="1" comment="pcp-pmda-ds389log is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028092" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028093" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028094" version="1" comment="pcp-pmda-gpfs is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028095" version="1" comment="pcp-pmda-gpsd is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028096" version="1" comment="pcp-pmda-hacluster is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028097" version="1" comment="pcp-pmda-haproxy is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028098" version="1" comment="pcp-pmda-infiniband is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028099" version="1" comment="pcp-pmda-json is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028100" version="1" comment="pcp-pmda-lio is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028101" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028102" version="1" comment="pcp-pmda-logger is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028103" version="1" comment="pcp-pmda-lustre is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028104" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028105" version="1" comment="pcp-pmda-mailq is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028106" version="1" comment="pcp-pmda-memcache is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028107" version="1" comment="pcp-pmda-mic is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028108" version="1" comment="pcp-pmda-mounts is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028109" version="1" comment="pcp-pmda-mysql is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028110" version="1" comment="pcp-pmda-named is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028111" version="1" comment="pcp-pmda-netcheck is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028112" version="1" comment="pcp-pmda-netfilter is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028113" version="1" comment="pcp-pmda-news is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028114" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028115" version="1" comment="pcp-pmda-nginx is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028116" version="1" comment="pcp-pmda-nutcracker is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028117" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028118" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028119" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028120" version="1" comment="pcp-pmda-oracle is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028121" version="1" comment="pcp-pmda-pdns is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028122" version="1" comment="pcp-pmda-perfevent is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028123" version="1" comment="pcp-pmda-postfix is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028124" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028125" version="1" comment="pcp-pmda-redis is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028126" version="1" comment="pcp-pmda-resctrl is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028127" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028128" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028129" version="1" comment="pcp-pmda-samba is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028130" version="1" comment="pcp-pmda-sendmail is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028131" version="1" comment="pcp-pmda-shping is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028132" version="1" comment="pcp-pmda-slurm is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028133" version="1" comment="pcp-pmda-smart is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028134" version="1" comment="pcp-pmda-snmp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028135" version="1" comment="pcp-pmda-sockets is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028136" version="1" comment="pcp-pmda-summary is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028137" version="1" comment="pcp-pmda-systemd is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028138" version="1" comment="pcp-pmda-trace is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028139" version="1" comment="pcp-pmda-unbound is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028140" version="1" comment="pcp-pmda-weblog is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028141" version="1" comment="pcp-pmda-zimbra is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028142" version="1" comment="pcp-pmda-zswap is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028143" version="1" comment="pcp-selinux is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028144" version="1" comment="pcp-system-tools is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028145" version="1" comment="pcp-zeroconf is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028146" version="1" comment="perl-PCP-LogImport is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028147" version="1" comment="perl-PCP-LogSummary is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028148" version="1" comment="perl-PCP-MMV is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028149" version="1" comment="perl-PCP-PMDA is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028150" version="1" comment="python3-pcp is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028151" version="1" comment="libpcre1 is &lt;8.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028152" version="1" comment="libpcre2-16-0 is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028153" version="1" comment="libpcre2-32-0 is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028154" version="1" comment="libpcre2-8-0 is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028155" version="1" comment="libpcre2-posix3 is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028156" version="1" comment="pcre2-devel is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028157" version="1" comment="pcre2-devel-static is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028158" version="1" comment="pcre2-doc is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028159" version="1" comment="pcre2-tools is &lt;10.45-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028160" version="1" comment="libpcsclite1 is &lt;2.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028161" version="1" comment="libpcscspy0 is &lt;2.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028162" version="1" comment="pcsc-lite is &lt;2.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028163" version="1" comment="pcsc-lite-devel is &lt;2.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028164" version="1" comment="libpixman-1-0 is &lt;0.43.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028165" version="1" comment="libpixman-1-0-devel is &lt;0.43.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028166" version="1" comment="libpkgconf-devel is &lt;2.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028167" version="1" comment="libpkgconf5 is &lt;2.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028168" version="1" comment="pkgconf is &lt;2.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028169" version="1" comment="pkgconf-m4 is &lt;2.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028170" version="1" comment="pkgconf-pkg-config is &lt;2.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028171" version="1" comment="libplist++-2_0-4 is &lt;2.6.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028172" version="1" comment="libplist-2_0-4 is &lt;2.6.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028173" version="1" comment="libpng16-16 is &lt;1.6.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028174" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028175" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028176" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028177" version="1" comment="libpng16-devel is &lt;1.6.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028178" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028179" version="1" comment="libpng16-tools is &lt;1.6.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028180" version="1" comment="libpolkit-agent-1-0 is &lt;123-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028181" version="1" comment="libpolkit-gobject-1-0 is &lt;123-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028182" version="1" comment="pkexec is &lt;123-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028183" version="1" comment="polkit is &lt;123-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028184" version="1" comment="polkit-devel is &lt;123-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028185" version="1" comment="polkit-doc is &lt;123-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028186" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;123-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028187" version="1" comment="libpoppler-cpp2 is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028188" version="1" comment="libpoppler-devel is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028189" version="1" comment="libpoppler-glib8 is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028190" version="1" comment="libpoppler-qt6-3 is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028191" version="1" comment="libpoppler-qt6-devel is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028192" version="1" comment="libpoppler148 is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028193" version="1" comment="poppler-tools is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028194" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.04.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028195" version="1" comment="libproc2-1 is &lt;4.0.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028196" version="1" comment="procps is &lt;4.0.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028197" version="1" comment="procps-devel is &lt;4.0.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028198" version="1" comment="procps-lang is &lt;4.0.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028199" version="1" comment="libprotobuf-c1 is &lt;1.5.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028200" version="1" comment="libproxy-devel is &lt;0.5.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028201" version="1" comment="libproxy-tools is &lt;0.5.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028202" version="1" comment="libproxy1 is &lt;0.5.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028203" version="1" comment="libpxbackend-1_0 is &lt;0.5.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028204" version="1" comment="libpulse-devel is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028205" version="1" comment="libpulse-mainloop-glib0 is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028206" version="1" comment="libpulse0 is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028207" version="1" comment="pulseaudio-bash-completion is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028208" version="1" comment="pulseaudio-setup is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028209" version="1" comment="pulseaudio-utils is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028210" version="1" comment="pulseaudio-zsh-completion is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028211" version="1" comment="system-user-pulse is &lt;17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028212" version="1" comment="libpython3_13-1_0 is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028213" version="1" comment="libpython3_13-1_0-x86-64-v3 is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028214" version="1" comment="python313 is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028215" version="1" comment="python313-base is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028216" version="1" comment="python313-base-x86-64-v3 is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028217" version="1" comment="python313-curses is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028218" version="1" comment="python313-dbm is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028219" version="1" comment="python313-devel is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028220" version="1" comment="python313-doc is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028221" version="1" comment="python313-doc-devhelp is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028222" version="1" comment="python313-idle is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028223" version="1" comment="python313-tk is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028224" version="1" comment="python313-tools is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028225" version="1" comment="python313-x86-64-v3 is &lt;3.13.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028226" version="1" comment="libqb-devel is &lt;2.0.8+20230721.002171b-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028227" version="1" comment="libqb-tools is &lt;2.0.8+20230721.002171b-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028228" version="1" comment="libqb100 is &lt;2.0.8+20230721.002171b-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028229" version="1" comment="libqpdf29 is &lt;11.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028230" version="1" comment="libquicktime0 is &lt;1.2.4+git20180804.fff99cd-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028231" version="1" comment="libraptor2-0 is &lt;2.0.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028232" version="1" comment="raptor is &lt;2.0.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028233" version="1" comment="librav1e0_8 is &lt;0.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028234" version="1" comment="rav1e is &lt;0.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028235" version="1" comment="zram-generator is &lt;1.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028236" version="1" comment="libraw-tools is &lt;0.21.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028237" version="1" comment="libraw23 is &lt;0.21.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028238" version="1" comment="librelp0 is &lt;1.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028239" version="1" comment="librepo-devel is &lt;1.19.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028240" version="1" comment="librepo0 is &lt;1.19.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028241" version="1" comment="python3-librepo is &lt;1.19.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028242" version="1" comment="librpmbuild10 is &lt;4.20.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028243" version="1" comment="rpm is &lt;4.20.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028244" version="1" comment="rpm-build is &lt;4.20.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028245" version="1" comment="rpm-devel is &lt;4.20.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028246" version="1" comment="librrd8 is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028247" version="1" comment="lua-rrdtool is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028248" version="1" comment="perl-rrdtool is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028249" version="1" comment="python3-rrdtool is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028250" version="1" comment="rrdtool is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028251" version="1" comment="rrdtool-cached is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028252" version="1" comment="rrdtool-devel is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028253" version="1" comment="rrdtool-doc is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028254" version="1" comment="ruby-rrdtool is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028255" version="1" comment="tcl-rrdtool is &lt;1.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028256" version="1" comment="libruby3_4-3_4 is &lt;3.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028257" version="1" comment="ruby3.4 is &lt;3.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028258" version="1" comment="ruby3.4-devel is &lt;3.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028259" version="1" comment="ruby3.4-devel-extra is &lt;3.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028260" version="1" comment="ruby3.4-doc is &lt;3.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028261" version="1" comment="ruby3.4-doc-ri is &lt;3.4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028262" version="1" comment="libsaml13 is &lt;3.3.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028263" version="1" comment="opensaml-schemas is &lt;3.3.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028264" version="1" comment="libsamplerate-devel is &lt;0.2.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028265" version="1" comment="libsamplerate0 is &lt;0.2.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028266" version="1" comment="libseccomp-devel is &lt;2.6.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028267" version="1" comment="libseccomp-tools is &lt;2.6.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028268" version="1" comment="libseccomp2 is &lt;2.6.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028269" version="1" comment="python3-seccomp is &lt;2.6.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028270" version="1" comment="libsepol-devel is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028271" version="1" comment="libsepol-devel-static is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028272" version="1" comment="libsepol-utils is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028273" version="1" comment="libsepol2 is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028274" version="1" comment="libsha1detectcoll-devel is &lt;1.0.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028275" version="1" comment="libsha1detectcoll1 is &lt;1.0.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028276" version="1" comment="sha1collisiondetection is &lt;1.0.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028277" version="1" comment="libsharpyuv0 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028278" version="1" comment="libwebp-devel is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028279" version="1" comment="libwebp7 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028280" version="1" comment="libwebpdecoder3 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028281" version="1" comment="libwebpdemux2 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028282" version="1" comment="libwebpmux3 is &lt;1.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028283" version="1" comment="libshibsp-lite12 is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028284" version="1" comment="libshibsp12 is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028285" version="1" comment="shibboleth-sp is &lt;3.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028286" version="1" comment="libslirp-devel is &lt;4.8.0+2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028287" version="1" comment="libslirp0 is &lt;4.8.0+2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028288" version="1" comment="libslp1 is &lt;2.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028289" version="1" comment="openslp is &lt;2.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028290" version="1" comment="openslp-devel is &lt;2.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028291" version="1" comment="openslp-server is &lt;2.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028292" version="1" comment="libsmi is &lt;0.4.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028293" version="1" comment="libsmi-devel is &lt;0.4.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028294" version="1" comment="libsmi2 is &lt;0.4.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028295" version="1" comment="libsndfile1 is &lt;1.2.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028296" version="1" comment="libsnmp40 is &lt;5.9.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028297" version="1" comment="net-snmp is &lt;5.9.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028298" version="1" comment="net-snmp-devel is &lt;5.9.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028299" version="1" comment="perl-SNMP is &lt;5.9.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028300" version="1" comment="python313-net-snmp is &lt;5.9.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028301" version="1" comment="snmp-mibs is &lt;5.9.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028302" version="1" comment="libsolv-demo is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028303" version="1" comment="libsolv-devel is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028304" version="1" comment="libsolv-devel-static is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028305" version="1" comment="libsolv-tools is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028306" version="1" comment="libsolv-tools-base is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028307" version="1" comment="libsolv1 is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028308" version="1" comment="perl-solv is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028309" version="1" comment="python313-solv is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028310" version="1" comment="ruby-solv is &lt;0.7.34-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028311" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028312" version="1" comment="libsoup-devel is &lt;3.6.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028313" version="1" comment="libsoup-lang is &lt;3.6.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028314" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028315" version="1" comment="libspeex1 is &lt;1.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028316" version="1" comment="speex is &lt;1.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028317" version="1" comment="libspiro-devel is &lt;20240903-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028318" version="1" comment="libspiro1 is &lt;20240903-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028319" version="1" comment="libsqlite3-0 is &lt;3.50.4-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028320" version="1" comment="libsqlite3-0-x86-64-v3 is &lt;3.50.4-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028321" version="1" comment="sqlite3 is &lt;3.50.4-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028322" version="1" comment="sqlite3-devel is &lt;3.50.4-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028323" version="1" comment="sqlite3-doc is &lt;3.50.4-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028324" version="1" comment="sqlite3-tcl is &lt;3.50.4-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028325" version="1" comment="libsrt1_5 is &lt;1.5.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028326" version="1" comment="srt is &lt;1.5.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028327" version="1" comment="libsrtp2-1 is &lt;2.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028328" version="1" comment="libssh-config is &lt;0.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028329" version="1" comment="libssh-devel is &lt;0.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028330" version="1" comment="libssh4 is &lt;0.11.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028331" version="1" comment="libssh2-1 is &lt;1.11.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028332" version="1" comment="libssh2-devel is &lt;1.11.1-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028333" version="1" comment="libsubid-devel is &lt;4.17.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028334" version="1" comment="libsubid5 is &lt;4.17.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028335" version="1" comment="login_defs is &lt;4.17.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028336" version="1" comment="shadow is &lt;4.17.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028337" version="1" comment="libsystemd0 is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028338" version="1" comment="libudev1 is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028339" version="1" comment="systemd is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028340" version="1" comment="systemd-container is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028341" version="1" comment="systemd-devel is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028342" version="1" comment="systemd-doc is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028343" version="1" comment="systemd-experimental is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028344" version="1" comment="systemd-homed is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028345" version="1" comment="systemd-journal-remote is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028346" version="1" comment="systemd-lang is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028347" version="1" comment="systemd-portable is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028348" version="1" comment="systemd-resolved is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028349" version="1" comment="udev is &lt;257.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028350" version="1" comment="libtag2 is &lt;2.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028351" version="1" comment="libtag_c2 is &lt;2.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028352" version="1" comment="taglib is &lt;2.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028353" version="1" comment="libtasn1-6 is &lt;4.20.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028354" version="1" comment="libtasn1-devel is &lt;4.20.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028355" version="1" comment="libtasn1-tools is &lt;4.20.0-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028356" version="1" comment="libtcmu-devel is &lt;1.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028357" version="1" comment="libtcmu2 is &lt;1.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028358" version="1" comment="tcmu-runner is &lt;1.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028359" version="1" comment="libthai-data is &lt;0.1.29-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028360" version="1" comment="libthai-devel is &lt;0.1.29-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028361" version="1" comment="libthai0 is &lt;0.1.29-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028362" version="1" comment="libtidy-devel is &lt;5.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028363" version="1" comment="libtidy58 is &lt;5.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028364" version="1" comment="tidy is &lt;5.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028365" version="1" comment="tidy-doc is &lt;5.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028366" version="1" comment="libtiff-devel is &lt;4.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028367" version="1" comment="libtiff6 is &lt;4.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028368" version="1" comment="tiff is &lt;4.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028369" version="1" comment="libtirpc-devel is &lt;1.3.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028370" version="1" comment="libtirpc-netconfig is &lt;1.3.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028371" version="1" comment="libtirpc3 is &lt;1.3.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028372" version="1" comment="libtpms0 is &lt;0.10.0-160000.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028373" version="1" comment="libtree-sitter0_25 is &lt;0.25.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028374" version="1" comment="libtree-sitter0_25-x86-64-v3 is &lt;0.25.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028375" version="1" comment="tree-sitter-devel is &lt;0.25.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028376" version="1" comment="libtspi1 is &lt;0.3.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028377" version="1" comment="trousers is &lt;0.3.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028378" version="1" comment="trousers-devel is &lt;0.3.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028379" version="1" comment="libtss2-esys0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028380" version="1" comment="libtss2-fapi-common is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028381" version="1" comment="libtss2-fapi1 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028382" version="1" comment="libtss2-mu0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028383" version="1" comment="libtss2-policy0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028384" version="1" comment="libtss2-rc0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028385" version="1" comment="libtss2-sys1 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028386" version="1" comment="libtss2-tcti-cmd0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028387" version="1" comment="libtss2-tcti-device0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028388" version="1" comment="libtss2-tcti-i2c-helper0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028389" version="1" comment="libtss2-tcti-mssim0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028390" version="1" comment="libtss2-tcti-pcap0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028391" version="1" comment="libtss2-tcti-spi-helper0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028392" version="1" comment="libtss2-tcti-spidev0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028393" version="1" comment="libtss2-tcti-swtpm0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028394" version="1" comment="libtss2-tctildr0 is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028395" version="1" comment="tpm2-0-tss is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028396" version="1" comment="tpm2-0-tss-devel is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028397" version="1" comment="libudisks2-0 is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028398" version="1" comment="libudisks2-0-devel is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028399" version="1" comment="libudisks2-0_btrfs is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028400" version="1" comment="libudisks2-0_lsm is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028401" version="1" comment="libudisks2-0_lvm2 is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028402" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028403" version="1" comment="udisks2 is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028404" version="1" comment="udisks2-docs is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028405" version="1" comment="udisks2-lang is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028406" version="1" comment="udisks2-zsh-completion is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028407" version="1" comment="libunbound8 is &lt;1.23.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028408" version="1" comment="python3-unbound is &lt;1.23.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028409" version="1" comment="unbound is &lt;1.23.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028410" version="1" comment="unbound-anchor is &lt;1.23.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028411" version="1" comment="unbound-devel is &lt;1.23.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028412" version="1" comment="libunwind-coredump0 is &lt;1.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028413" version="1" comment="libunwind-devel is &lt;1.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028414" version="1" comment="libunwind-ptrace0 is &lt;1.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028415" version="1" comment="libunwind-setjmp0 is &lt;1.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028416" version="1" comment="libunwind8 is &lt;1.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028417" version="1" comment="liburiparser1 is &lt;0.9.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028418" version="1" comment="uriparser is &lt;0.9.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028419" version="1" comment="uriparser-devel is &lt;0.9.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028420" version="1" comment="uriparser-doc is &lt;0.9.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028421" version="1" comment="libusbguard1 is &lt;1.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028422" version="1" comment="usbguard is &lt;1.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028423" version="1" comment="usbguard-devel is &lt;1.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028424" version="1" comment="usbguard-tools is &lt;1.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028425" version="1" comment="libusbmuxd-2_0-6 is &lt;2.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028426" version="1" comment="libusbmuxd-tools is &lt;2.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028427" version="1" comment="libusbredirparser1 is &lt;0.14.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028428" version="1" comment="libuv-devel is &lt;1.50.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028429" version="1" comment="libuv1 is &lt;1.50.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028430" version="1" comment="libvdpau-devel is &lt;1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028431" version="1" comment="libvdpau1 is &lt;1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028432" version="1" comment="libvdpau_trace1 is &lt;1.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028433" version="1" comment="libvirglrenderer1 is &lt;1.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028434" version="1" comment="libvirt-client is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028435" version="1" comment="libvirt-client-qemu is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028436" version="1" comment="libvirt-daemon is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028437" version="1" comment="libvirt-daemon-common is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028438" version="1" comment="libvirt-daemon-config-network is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028439" version="1" comment="libvirt-daemon-config-nwfilter is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028440" version="1" comment="libvirt-daemon-driver-network is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028441" version="1" comment="libvirt-daemon-driver-nodedev is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028442" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028443" version="1" comment="libvirt-daemon-driver-qemu is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028444" version="1" comment="libvirt-daemon-driver-secret is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028445" version="1" comment="libvirt-daemon-driver-storage is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028446" version="1" comment="libvirt-daemon-driver-storage-core is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028447" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028448" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028449" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028450" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028451" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028452" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028453" version="1" comment="libvirt-daemon-hooks is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028454" version="1" comment="libvirt-daemon-lock is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028455" version="1" comment="libvirt-daemon-log is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028456" version="1" comment="libvirt-daemon-plugin-lockd is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028457" version="1" comment="libvirt-daemon-proxy is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028458" version="1" comment="libvirt-daemon-qemu is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028459" version="1" comment="libvirt-devel is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028460" version="1" comment="libvirt-doc is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028461" version="1" comment="libvirt-libs is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028462" version="1" comment="libvirt-nss is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028463" version="1" comment="libvirt-ssh-proxy is &lt;11.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028464" version="1" comment="libvmtools-devel is &lt;13.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028465" version="1" comment="libvmtools0 is &lt;13.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028466" version="1" comment="open-vm-tools is &lt;13.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028467" version="1" comment="open-vm-tools-containerinfo is &lt;13.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028468" version="1" comment="open-vm-tools-desktop is &lt;13.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028469" version="1" comment="open-vm-tools-sdmp is &lt;13.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028470" version="1" comment="libvncclient1 is &lt;0.9.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028471" version="1" comment="libvncserver1 is &lt;0.9.14-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028472" version="1" comment="libvorbis0 is &lt;1.3.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028473" version="1" comment="libvorbis0-x86-64-v3 is &lt;1.3.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028474" version="1" comment="libvorbisenc2 is &lt;1.3.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028475" version="1" comment="libvorbisenc2-x86-64-v3 is &lt;1.3.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028476" version="1" comment="libvorbisfile3 is &lt;1.3.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028477" version="1" comment="libvorbisfile3-x86-64-v3 is &lt;1.3.7-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028478" version="1" comment="libvpx9 is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028479" version="1" comment="vpx-tools is &lt;1.14.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028480" version="1" comment="libvte-2_91-0 is &lt;0.80.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028481" version="1" comment="typelib-1_0-Vte-2_91 is &lt;0.80.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028482" version="1" comment="typelib-1_0-Vte-3_91 is &lt;0.80.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028483" version="1" comment="vte-devel is &lt;0.80.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028484" version="1" comment="vte-lang is &lt;0.80.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028485" version="1" comment="vte-tools is &lt;0.80.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028486" version="1" comment="vte-tools-gtk4 is &lt;0.80.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028487" version="1" comment="libwavpack1 is &lt;5.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028488" version="1" comment="libwavpack1-x86-64-v3 is &lt;5.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028489" version="1" comment="wavpack is &lt;5.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028490" version="1" comment="wavpack-doc is &lt;5.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028491" version="1" comment="libwireshark18 is &lt;4.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028492" version="1" comment="libwiretap15 is &lt;4.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028493" version="1" comment="libwsutil16 is &lt;4.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028494" version="1" comment="wireshark is &lt;4.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028495" version="1" comment="wireshark-devel is &lt;4.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028496" version="1" comment="wireshark-ui-qt is &lt;4.4.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028497" version="1" comment="libwmf-0_2-7 is &lt;0.2.13-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028498" version="1" comment="libwmf-tools is &lt;0.2.13-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028499" version="1" comment="libxcb-composite0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028500" version="1" comment="libxcb-damage0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028501" version="1" comment="libxcb-dbe0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028502" version="1" comment="libxcb-devel is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028503" version="1" comment="libxcb-devel-doc is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028504" version="1" comment="libxcb-dpms0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028505" version="1" comment="libxcb-dri2-0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028506" version="1" comment="libxcb-dri3-0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028507" version="1" comment="libxcb-glx0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028508" version="1" comment="libxcb-present0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028509" version="1" comment="libxcb-randr0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028510" version="1" comment="libxcb-record0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028511" version="1" comment="libxcb-render0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028512" version="1" comment="libxcb-res0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028513" version="1" comment="libxcb-screensaver0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028514" version="1" comment="libxcb-shape0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028515" version="1" comment="libxcb-shm0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028516" version="1" comment="libxcb-sync1 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028517" version="1" comment="libxcb-xf86dri0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028518" version="1" comment="libxcb-xfixes0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028519" version="1" comment="libxcb-xinerama0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028520" version="1" comment="libxcb-xinput0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028521" version="1" comment="libxcb-xkb1 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028522" version="1" comment="libxcb-xtest0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028523" version="1" comment="libxcb-xv0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028524" version="1" comment="libxcb-xvmc0 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028525" version="1" comment="libxcb1 is &lt;1.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028526" version="1" comment="libxerces-c-3_3 is &lt;3.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028527" version="1" comment="libxkbcommon-devel is &lt;1.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028528" version="1" comment="libxkbcommon-tools is &lt;1.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028529" version="1" comment="libxkbcommon-x11-0 is &lt;1.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028530" version="1" comment="libxkbcommon-x11-devel is &lt;1.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028531" version="1" comment="libxkbcommon0 is &lt;1.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028532" version="1" comment="libxkbregistry-devel is &lt;1.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028533" version="1" comment="libxkbregistry0 is &lt;1.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028534" version="1" comment="libxkbfile-devel is &lt;1.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028535" version="1" comment="libxkbfile1 is &lt;1.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028536" version="1" comment="libxml2-2 is &lt;2.13.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028537" version="1" comment="libxml2-devel is &lt;2.13.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028538" version="1" comment="libxml2-doc is &lt;2.13.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028539" version="1" comment="libxml2-tools is &lt;2.13.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028540" version="1" comment="python313-libxml2 is &lt;2.13.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028541" version="1" comment="libxmltooling-lite11 is &lt;3.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028542" version="1" comment="libxmltooling11 is &lt;3.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028543" version="1" comment="xmltooling-schemas is &lt;3.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028544" version="1" comment="libyajl-devel is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028545" version="1" comment="libyajl-devel-static is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028546" version="1" comment="libyajl2 is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028547" version="1" comment="yajl is &lt;2.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028548" version="1" comment="libyaml-0-2 is &lt;0.2.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028549" version="1" comment="libyaml-devel is &lt;0.2.5-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028550" version="1" comment="libyaml-cpp0_8 is &lt;0.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028551" version="1" comment="yaml-cpp-devel is &lt;0.8.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028552" version="1" comment="libyang2 is &lt;2.1.148-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028553" version="1" comment="libyelp0 is &lt;42.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028554" version="1" comment="yelp is &lt;42.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028555" version="1" comment="yelp-lang is &lt;42.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028556" version="1" comment="yelp-xsl is &lt;42.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028557" version="1" comment="libzbar0 is &lt;0.23.93-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028558" version="1" comment="python3-zbar is &lt;0.23.93-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028559" version="1" comment="libzip-devel is &lt;1.11.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028560" version="1" comment="libzip-tools is &lt;1.11.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028561" version="1" comment="libzip5 is &lt;1.11.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028562" version="1" comment="libzmq5 is &lt;4.3.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028563" version="1" comment="zeromq-devel is &lt;4.3.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028564" version="1" comment="zeromq-tools is &lt;4.3.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028565" version="1" comment="libzstd-devel is &lt;1.5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028566" version="1" comment="libzstd-devel-static is &lt;1.5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028567" version="1" comment="libzstd1 is &lt;1.5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028568" version="1" comment="libzstd1-x86-64-v3 is &lt;1.5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028569" version="1" comment="zstd is &lt;1.5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028570" version="1" comment="zstd-gzip is &lt;1.5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028571" version="1" comment="libzvbi-chains0 is &lt;0.2.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028572" version="1" comment="libzvbi0 is &lt;0.2.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028573" version="1" comment="zvbi is &lt;0.2.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028574" version="1" comment="zvbi-lang is &lt;0.2.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028575" version="1" comment="libzypp is &lt;17.37.17-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028576" version="1" comment="libzypp-devel is &lt;17.37.17-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028577" version="1" comment="libzypp-devel-doc is &lt;17.37.17-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028578" version="1" comment="libzypp-plugin-appdata is &lt;1.0.1+git.20240209-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028579" version="1" comment="logrotate is &lt;3.22.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028580" version="1" comment="mailx is &lt;12.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028581" version="1" comment="man is &lt;2.13.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028582" version="1" comment="maven is &lt;3.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028583" version="1" comment="maven-javadoc is &lt;3.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028584" version="1" comment="maven-lib is &lt;3.9.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028585" version="1" comment="maven-shared-utils is &lt;3.4.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028586" version="1" comment="maven-shared-utils-javadoc is &lt;3.4.2-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028587" version="1" comment="memcached is &lt;1.6.38-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028588" version="1" comment="memcached-devel is &lt;1.6.38-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028589" version="1" comment="mercurial is &lt;7.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028590" version="1" comment="mercurial-lang is &lt;7.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028591" version="1" comment="mozilla-nspr is &lt;4.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028592" version="1" comment="mozilla-nspr-devel is &lt;4.36-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028593" version="1" comment="mutt is &lt;2.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028594" version="1" comment="mutt-doc is &lt;2.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028595" version="1" comment="mutt-lang is &lt;2.2.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028596" version="1" comment="mysql-connector-java is &lt;9.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028597" version="1" comment="nbd is &lt;3.25-160000.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028598" version="1" comment="nbdkit is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028599" version="1" comment="nbdkit-basic-filters is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028600" version="1" comment="nbdkit-basic-plugins is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028601" version="1" comment="nbdkit-curl-plugin is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028602" version="1" comment="nbdkit-linuxdisk-plugin is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028603" version="1" comment="nbdkit-nbd-plugin is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028604" version="1" comment="nbdkit-python-plugin is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028605" version="1" comment="nbdkit-server is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028606" version="1" comment="nbdkit-ssh-plugin is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028607" version="1" comment="nbdkit-vddk-plugin is &lt;1.44.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028608" version="1" comment="ncat is &lt;7.92-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028609" version="1" comment="nmap is &lt;7.92-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028610" version="1" comment="net-tools is &lt;2.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028611" version="1" comment="net-tools-deprecated is &lt;2.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028612" version="1" comment="net-tools-lang is &lt;2.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028613" version="1" comment="nginx is &lt;1.27.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028614" version="1" comment="nginx-source is &lt;1.27.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028615" version="1" comment="nv-prefer-signed-open-driver is &lt;580.65.06-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028616" version="1" comment="nvidia-open-driver-G06-signed-64kb-devel is &lt;580.76.05-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028617" version="1" comment="nvidia-open-driver-G06-signed-cuda-64kb-devel is &lt;580.65.06-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028618" version="1" comment="nvidia-open-driver-G06-signed-cuda-default-devel is &lt;580.65.06-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028619" version="1" comment="nvidia-open-driver-G06-signed-cuda-kmp-64kb is &lt;580.65.06_k6.12.0_160000.5-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028620" version="1" comment="nvidia-open-driver-G06-signed-cuda-kmp-default is &lt;580.65.06_k6.12.0_160000.5-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028621" version="1" comment="nvidia-open-driver-G06-signed-default-devel is &lt;580.76.05-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028622" version="1" comment="nvidia-open-driver-G06-signed-kmp-64kb is &lt;580.76.05_k6.12.0_160000.5-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028623" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;580.76.05_k6.12.0_160000.5-160000.1.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028624" version="1" comment="openCryptoki is &lt;3.25.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028625" version="1" comment="openCryptoki-64bit is &lt;3.25.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028626" version="1" comment="openCryptoki-devel is &lt;3.25.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028627" version="1" comment="opensc is &lt;0.26.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028628" version="1" comment="openssh is &lt;10.0p2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028629" version="1" comment="openssh-cavs is &lt;10.0p2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028630" version="1" comment="openssh-clients is &lt;10.0p2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028631" version="1" comment="openssh-common is &lt;10.0p2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028632" version="1" comment="openssh-helpers is &lt;10.0p2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028633" version="1" comment="openssh-server is &lt;10.0p2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028634" version="1" comment="openssh-server-config-rootlogin is &lt;10.0p2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028635" version="1" comment="openvpn is &lt;2.6.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028636" version="1" comment="openvpn-auth-pam-plugin is &lt;2.6.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028637" version="1" comment="openvpn-devel is &lt;2.6.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028638" version="1" comment="openvpn-down-root-plugin is &lt;2.6.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028639" version="1" comment="oqs-provider is &lt;0.9.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028640" version="1" comment="ovmf is &lt;202502-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028641" version="1" comment="ovmf-tools is &lt;202502-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028642" version="1" comment="qemu-ovmf-x86_64 is &lt;202502-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028643" version="1" comment="qemu-uefi-aarch64 is &lt;202502-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028644" version="1" comment="pam is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028645" version="1" comment="pam-devel is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028646" version="1" comment="pam-doc is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028647" version="1" comment="pam-extra is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028648" version="1" comment="pam-manpages is &lt;1.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028649" version="1" comment="pam_krb5 is &lt;2.4.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028650" version="1" comment="pam_pkcs11 is &lt;0.6.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028651" version="1" comment="pam_pkcs11-devel-doc is &lt;0.6.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028652" version="1" comment="pam_u2f is &lt;1.3.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028653" version="1" comment="patch is &lt;2.7.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028654" version="1" comment="pcsc-ccid is &lt;1.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028655" version="1" comment="perl is &lt;5.42.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028656" version="1" comment="perl-base is &lt;5.42.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028657" version="1" comment="perl-doc is &lt;5.42.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028658" version="1" comment="perl-Archive-Extract is &lt;0.88-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028659" version="1" comment="perl-ExtUtils-MakeMaker is &lt;7.70-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028660" version="1" comment="perl-MIME-Charset is &lt;1.013.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028661" version="1" comment="perl-Test-File is &lt;1.993-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028662" version="1" comment="perl-CGI is &lt;4.670.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028663" version="1" comment="perl-Config-IniFiles is &lt;3.000003-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028664" version="1" comment="perl-Convert-ASN1 is &lt;0.340.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028665" version="1" comment="perl-DBD-mysql is &lt;4.050-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028666" version="1" comment="perl-DBI is &lt;1.647.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028667" version="1" comment="perl-File-Find-Rule is &lt;0.350.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028668" version="1" comment="perl-File-Path is &lt;2.180000-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028669" version="1" comment="perl-HTML-Parser is &lt;3.830.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028670" version="1" comment="perl-HTTP-Daemon is &lt;6.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028671" version="1" comment="perl-LWP-Protocol-https is &lt;6.140.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028672" version="1" comment="perl-Spreadsheet-ParseExcel is &lt;0.660.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028673" version="1" comment="perl-XML-LibXML is &lt;2.0210-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028674" version="1" comment="perl-XML-Twig is &lt;3.530.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028675" version="1" comment="perl-YAML-LibYAML is &lt;0.903.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028676" version="1" comment="permctl is &lt;1699_20250120-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028677" version="1" comment="permissions is &lt;1699_20250120-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028678" version="1" comment="permissions-config is &lt;1699_20250120-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028679" version="1" comment="permissions-zypp-plugin is &lt;1699_20250120-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028680" version="1" comment="pesign is &lt;116-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028681" version="1" comment="php-composer2 is &lt;2.8.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028682" version="1" comment="php8-pear is &lt;1.10.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028683" version="1" comment="php8-pecl is &lt;1.10.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028684" version="1" comment="plexus-archiver is &lt;4.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028685" version="1" comment="plexus-archiver-javadoc is &lt;4.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028686" version="1" comment="podman is &lt;5.4.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028687" version="1" comment="podman-docker is &lt;5.4.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028688" version="1" comment="podman-remote is &lt;5.4.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028689" version="1" comment="podmansh is &lt;5.4.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028690" version="1" comment="policycoreutils is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028691" version="1" comment="policycoreutils-devel is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028692" version="1" comment="policycoreutils-lang is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028693" version="1" comment="policycoreutils-newrole is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028694" version="1" comment="policycoreutils-python-utils is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028695" version="1" comment="python313-policycoreutils is &lt;3.8.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028696" version="1" comment="postfix is &lt;3.10.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028697" version="1" comment="postfix-doc is &lt;3.10.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028698" version="1" comment="postfix-ldap is &lt;3.10.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028699" version="1" comment="postfix-mysql is &lt;3.10.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028700" version="1" comment="postfix-postgresql is &lt;3.10.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028701" version="1" comment="postgresql is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028702" version="1" comment="postgresql-contrib is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028703" version="1" comment="postgresql-devel is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028704" version="1" comment="postgresql-docs is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028705" version="1" comment="postgresql-llvmjit is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028706" version="1" comment="postgresql-plperl is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028707" version="1" comment="postgresql-plpython is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028708" version="1" comment="postgresql-pltcl is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028709" version="1" comment="postgresql-server is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028710" version="1" comment="postgresql-server-devel is &lt;17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028711" version="1" comment="postgresql-jdbc is &lt;42.7.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028712" version="1" comment="postgresql-jdbc-javadoc is &lt;42.7.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028713" version="1" comment="postgresql13 is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028714" version="1" comment="postgresql13-contrib is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028715" version="1" comment="postgresql13-devel is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028716" version="1" comment="postgresql13-docs is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028717" version="1" comment="postgresql13-llvmjit is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028718" version="1" comment="postgresql13-plperl is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028719" version="1" comment="postgresql13-plpython is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028720" version="1" comment="postgresql13-pltcl is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028721" version="1" comment="postgresql13-server is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028722" version="1" comment="postgresql13-server-devel is &lt;13.22-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028723" version="1" comment="postgresql14 is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028724" version="1" comment="postgresql14-contrib is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028725" version="1" comment="postgresql14-devel is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028726" version="1" comment="postgresql14-docs is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028727" version="1" comment="postgresql14-llvmjit is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028728" version="1" comment="postgresql14-plperl is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028729" version="1" comment="postgresql14-plpython is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028730" version="1" comment="postgresql14-pltcl is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028731" version="1" comment="postgresql14-server is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028732" version="1" comment="postgresql14-server-devel is &lt;14.19-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028733" version="1" comment="postgresql15 is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028734" version="1" comment="postgresql15-contrib is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028735" version="1" comment="postgresql15-devel is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028736" version="1" comment="postgresql15-docs is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028737" version="1" comment="postgresql15-llvmjit is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028738" version="1" comment="postgresql15-plperl is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028739" version="1" comment="postgresql15-plpython is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028740" version="1" comment="postgresql15-pltcl is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028741" version="1" comment="postgresql15-server is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028742" version="1" comment="postgresql15-server-devel is &lt;15.14-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028743" version="1" comment="postgresql16 is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028744" version="1" comment="postgresql16-contrib is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028745" version="1" comment="postgresql16-devel is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028746" version="1" comment="postgresql16-docs is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028747" version="1" comment="postgresql16-llvmjit is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028748" version="1" comment="postgresql16-plperl is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028749" version="1" comment="postgresql16-plpython is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028750" version="1" comment="postgresql16-pltcl is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028751" version="1" comment="postgresql16-server is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028752" version="1" comment="postgresql16-server-devel is &lt;16.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028753" version="1" comment="powerpc-utils is &lt;1.3.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028754" version="1" comment="ppc64-diag is &lt;2.7.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028755" version="1" comment="ppp is &lt;2.5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028756" version="1" comment="ppp-devel is &lt;2.5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028757" version="1" comment="ppp-modem is &lt;2.5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028758" version="1" comment="procmail is &lt;3.24-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028759" version="1" comment="python-M2Crypto-doc is &lt;0.45.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028760" version="1" comment="python313-M2Crypto is &lt;0.45.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028761" version="1" comment="python-SQLAlchemy-doc is &lt;2.0.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028762" version="1" comment="python313-SQLAlchemy is &lt;2.0.40-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028763" version="1" comment="python-Twisted-doc is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028764" version="1" comment="python313-Twisted is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028765" version="1" comment="python313-Twisted-all_non_platform is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028766" version="1" comment="python313-Twisted-conch is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028767" version="1" comment="python313-Twisted-conch_nacl is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028768" version="1" comment="python313-Twisted-contextvars is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028769" version="1" comment="python313-Twisted-http2 is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028770" version="1" comment="python313-Twisted-serial is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028771" version="1" comment="python313-Twisted-tls is &lt;24.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028772" version="1" comment="python-WebOb-doc is &lt;1.8.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028773" version="1" comment="python313-WebOb is &lt;1.8.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028774" version="1" comment="python-bottle-doc is &lt;0.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028775" version="1" comment="python313-bottle is &lt;0.13.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028776" version="1" comment="python-gevent-doc is &lt;25.4.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028777" version="1" comment="python313-gevent is &lt;25.4.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028778" version="1" comment="python-gunicorn-doc is &lt;23.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028779" version="1" comment="python313-gunicorn is &lt;23.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028780" version="1" comment="python-lxml-doc is &lt;5.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028781" version="1" comment="python313-lxml is &lt;5.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028782" version="1" comment="python313-lxml-devel is &lt;5.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028783" version="1" comment="python-marshmallow-doc is &lt;3.20.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028784" version="1" comment="python313-marshmallow is &lt;3.20.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028785" version="1" comment="python-paramiko-doc is &lt;3.5.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028786" version="1" comment="python313-paramiko is &lt;3.5.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028787" version="1" comment="python-rtslib-fb-common is &lt;2.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028788" version="1" comment="python313-rtslib-fb is &lt;2.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028789" version="1" comment="python-tqdm-bash-completion is &lt;4.67.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028790" version="1" comment="python313-tqdm is &lt;4.67.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028791" version="1" comment="python313-Babel is &lt;2.17.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028792" version="1" comment="python313-Brotli is &lt;1.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028793" version="1" comment="python313-CairoSVG is &lt;2.7.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028794" version="1" comment="python313-CherryPy is &lt;18.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028795" version="1" comment="python313-Flask is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028796" version="1" comment="python313-Flask-doc is &lt;3.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028797" version="1" comment="python313-FontTools is &lt;4.53.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028798" version="1" comment="python313-GitPython is &lt;3.1.44-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028799" version="1" comment="python313-Jinja2 is &lt;3.1.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028800" version="1" comment="python313-Js2Py is &lt;0.74-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028801" version="1" comment="python313-Mako is &lt;1.3.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028802" version="1" comment="python313-Pillow is &lt;11.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028803" version="1" comment="python313-Pillow-tk is &lt;11.3.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028804" version="1" comment="python313-PyJWT is &lt;2.10.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028805" version="1" comment="python313-PyMySQL is &lt;1.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028806" version="1" comment="python313-PyYAML is &lt;6.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028807" version="1" comment="python313-Pygments is &lt;2.19.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028808" version="1" comment="python313-Werkzeug is &lt;3.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028809" version="1" comment="python313-aiohttp is &lt;3.11.16-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028810" version="1" comment="python313-asyncpg is &lt;0.30.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028811" version="1" comment="python313-black is &lt;25.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028812" version="1" comment="python313-bleach is &lt;6.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028813" version="1" comment="python313-certifi is &lt;2025.1.31-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028814" version="1" comment="python313-cmarkgfm is &lt;2022.10.27-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028815" version="1" comment="python313-configobj is &lt;5.0.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028816" version="1" comment="python313-cryptography is &lt;44.0.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028817" version="1" comment="python313-cryptography-vectors is &lt;44.0.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028818" version="1" comment="python313-dnspython is &lt;2.7.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028819" version="1" comment="python313-eventlet is &lt;0.40.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028820" version="1" comment="python313-ecdsa is &lt;0.19.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028821" version="1" comment="python313-fastapi is &lt;0.115.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028822" version="1" comment="python313-h11 is &lt;0.16.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028823" version="1" comment="python313-hpack is &lt;4.1.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028824" version="1" comment="python313-httplib2 is &lt;0.22.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028825" version="1" comment="python313-httptools is &lt;0.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028826" version="1" comment="python313-httpx is &lt;0.28.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028827" version="1" comment="python313-idna is &lt;3.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028828" version="1" comment="python313-jwcrypto is &lt;1.5.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028829" version="1" comment="python313-markdown-it-py is &lt;3.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028830" version="1" comment="python313-mistune is &lt;3.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028831" version="1" comment="python313-nh3 is &lt;0.2.17-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028832" version="1" comment="python313-numpy is &lt;2.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028833" version="1" comment="python313-numpy-devel is &lt;2.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028834" version="1" comment="python313-oauthlib is &lt;3.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028835" version="1" comment="python313-orjson is &lt;3.10.15-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028836" version="1" comment="python313-pip is &lt;25.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028837" version="1" comment="python313-pip-wheel is &lt;25.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028838" version="1" comment="python313-py is &lt;1.11.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028839" version="1" comment="python313-pyOpenSSL is &lt;25.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028840" version="1" comment="python313-pycares is &lt;4.9.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028841" version="1" comment="python313-pycryptodome is &lt;3.22.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028842" version="1" comment="python313-pydantic is &lt;2.11.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028843" version="1" comment="python313-python-jose is &lt;3.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028844" version="1" comment="python313-python-jose-cryptography is &lt;3.4.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028845" version="1" comment="python313-python-multipart is &lt;0.0.20-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028846" version="1" comment="python313-pywbem is &lt;1.7.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028847" version="1" comment="python313-pyzmq is &lt;25.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028848" version="1" comment="python313-pyzmq-devel is &lt;25.1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028849" version="1" comment="python313-redis is &lt;5.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028850" version="1" comment="python313-requests is &lt;2.32.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028851" version="1" comment="python313-rsa is &lt;4.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028852" version="1" comment="python313-ruamel.yaml is &lt;0.18.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028853" version="1" comment="python313-setuptools is &lt;78.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028854" version="1" comment="python313-setuptools-wheel is &lt;78.1.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028855" version="1" comment="python313-sqlparse is &lt;0.5.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028856" version="1" comment="python313-starlette is &lt;0.41.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028857" version="1" comment="python313-suds is &lt;1.2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028858" version="1" comment="python313-targetcli-fb is &lt;3.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028859" version="1" comment="targetcli-fb-common is &lt;3.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028860" version="1" comment="python313-tornado6 is &lt;6.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028861" version="1" comment="python313-ujson is &lt;5.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028862" version="1" comment="python313-urllib3 is &lt;2.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028863" version="1" comment="python313-urllib3_1 is &lt;1.26.20-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028864" version="1" comment="python313-uv is &lt;0.7.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028865" version="1" comment="python313-validators is &lt;0.35.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028866" version="1" comment="python313-virtualenv is &lt;20.29.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028867" version="1" comment="python313-waitress is &lt;3.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028868" version="1" comment="python313-waitress-doc is &lt;3.0.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028869" version="1" comment="python313-websockets is &lt;14.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028870" version="1" comment="python313-wheel is &lt;0.45.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028871" version="1" comment="python313-yarl is &lt;1.20.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028872" version="1" comment="python313-zipp is &lt;3.21.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028873" version="1" comment="qemu is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028874" version="1" comment="qemu-SLOF is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028875" version="1" comment="qemu-arm is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028876" version="1" comment="qemu-audio-alsa is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028877" version="1" comment="qemu-audio-dbus is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028878" version="1" comment="qemu-audio-jack is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028879" version="1" comment="qemu-audio-oss is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028880" version="1" comment="qemu-block-curl is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028881" version="1" comment="qemu-block-dmg is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028882" version="1" comment="qemu-block-iscsi is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028883" version="1" comment="qemu-block-nfs is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028884" version="1" comment="qemu-block-ssh is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028885" version="1" comment="qemu-doc is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028886" version="1" comment="qemu-extra is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028887" version="1" comment="qemu-guest-agent is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028888" version="1" comment="qemu-headless is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028889" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028890" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028891" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028892" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028893" version="1" comment="qemu-hw-usb-host is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028894" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028895" version="1" comment="qemu-hw-usb-smartcard is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028896" version="1" comment="qemu-img is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028897" version="1" comment="qemu-ipxe is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028898" version="1" comment="qemu-ivshmem-tools is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028899" version="1" comment="qemu-ksm is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028900" version="1" comment="qemu-lang is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028901" version="1" comment="qemu-linux-user is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028902" version="1" comment="qemu-microvm is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028903" version="1" comment="qemu-ppc is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028904" version="1" comment="qemu-pr-helper is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028905" version="1" comment="qemu-s390x is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028906" version="1" comment="qemu-seabios is &lt;10.0.31.16.3_3_g3d33c746-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028907" version="1" comment="qemu-skiboot is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028908" version="1" comment="qemu-tools is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028909" version="1" comment="qemu-vgabios is &lt;10.0.31.16.3_3_g3d33c746-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028910" version="1" comment="qemu-vhost-user-gpu is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028911" version="1" comment="qemu-vmsr-helper is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028912" version="1" comment="qemu-x86 is &lt;10.0.3-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028913" version="1" comment="radvd is &lt;2.20-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028914" version="1" comment="rage-encryption is &lt;0.11.1+0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028915" version="1" comment="rage-encryption-bash-completion is &lt;0.11.1+0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028916" version="1" comment="rage-encryption-fish-completion is &lt;0.11.1+0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028917" version="1" comment="rage-encryption-zsh-completion is &lt;0.11.1+0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028918" version="1" comment="raspberrypi-firmware-dt is &lt;2023.05.02-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028919" version="1" comment="rekor is &lt;1.3.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028920" version="1" comment="rpcbind is &lt;1.2.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028921" version="1" comment="rsync is &lt;3.4.1-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028922" version="1" comment="rsyslog is &lt;8.2502.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028923" version="1" comment="rsyslog-module-gssapi is &lt;8.2502.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028924" version="1" comment="rsyslog-module-gtls is &lt;8.2502.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028925" version="1" comment="rsyslog-module-mmnormalize is &lt;8.2502.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028926" version="1" comment="rsyslog-module-relp is &lt;8.2502.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028927" version="1" comment="rtkit is &lt;0.13-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028928" version="1" comment="runc is &lt;1.2.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028929" version="1" comment="rustup is &lt;1.28.1~0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028930" version="1" comment="sca-patterns-sle12 is &lt;1.5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028931" version="1" comment="sca-patterns-sle15 is &lt;1.5.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028932" version="1" comment="sccache is &lt;0.9.1~22-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028933" version="1" comment="screen is &lt;4.9.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028934" version="1" comment="sevctl is &lt;0.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028935" version="1" comment="virtiofsd is &lt;1.12.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028936" version="1" comment="sharutils is &lt;4.15.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028937" version="1" comment="sharutils-lang is &lt;4.15.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028938" version="1" comment="shim is &lt;15.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028939" version="1" comment="skopeo is &lt;1.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028940" version="1" comment="skopeo-bash-completion is &lt;1.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028941" version="1" comment="skopeo-fish-completion is &lt;1.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028942" version="1" comment="skopeo-zsh-completion is &lt;1.18.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028943" version="1" comment="slirp4netns is &lt;1.3.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028944" version="1" comment="snakeyaml is &lt;2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028945" version="1" comment="snakeyaml-javadoc is &lt;2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028946" version="1" comment="socat is &lt;1.8.0.2-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028947" version="1" comment="spice-vdagent is &lt;0.22.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028948" version="1" comment="squashfs is &lt;4.6.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028949" version="1" comment="squid is &lt;6.12-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028950" version="1" comment="stalld is &lt;1.19.8-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028951" version="1" comment="strongswan is &lt;6.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028952" version="1" comment="strongswan-doc is &lt;6.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028953" version="1" comment="strongswan-fips is &lt;6.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028954" version="1" comment="strongswan-ipsec is &lt;6.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028955" version="1" comment="strongswan-mysql is &lt;6.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028956" version="1" comment="strongswan-nm is &lt;6.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028957" version="1" comment="strongswan-sqlite is &lt;6.0.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028958" version="1" comment="stunnel is &lt;5.74-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028959" version="1" comment="stunnel-doc is &lt;5.74-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028960" version="1" comment="sudo is &lt;1.9.17p1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028961" version="1" comment="sudo-devel is &lt;1.9.17p1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028962" version="1" comment="sudo-plugin-python is &lt;1.9.17p1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028963" version="1" comment="sudo-policy-sudo-auth-self is &lt;1.9.17p1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028964" version="1" comment="sudo-policy-wheel-auth-self is &lt;1.9.17p1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028965" version="1" comment="system-group-sudo is &lt;1.9.17p1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028966" version="1" comment="supportutils is &lt;3.2.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028967" version="1" comment="suse-module-tools is &lt;16.0.60-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028968" version="1" comment="suse-module-tools-scriptlets is &lt;16.0.60-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028969" version="1" comment="swtpm is &lt;0.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028970" version="1" comment="swtpm-selinux is &lt;0.10.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028971" version="1" comment="syslog-service is &lt;2.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028972" version="1" comment="sysstat is &lt;12.7.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028973" version="1" comment="system-user-velociraptor is &lt;1.0.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028974" version="1" comment="velociraptor is &lt;0.7.0.4.git152.fb24dfd-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028975" version="1" comment="velociraptor-client is &lt;0.7.0.4.git152.fb24dfd-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028976" version="1" comment="systemtap is &lt;5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028977" version="1" comment="systemtap-runtime is &lt;5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028978" version="1" comment="systemtap-sdt-devel is &lt;5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028979" version="1" comment="systemtap-server is &lt;5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028980" version="1" comment="tar is &lt;1.35-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028981" version="1" comment="tar-backup-scripts is &lt;1.35-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028982" version="1" comment="tar-doc is &lt;1.35-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028983" version="1" comment="tar-lang is &lt;1.35-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028984" version="1" comment="tar-rmt is &lt;1.35-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028985" version="1" comment="tboot is &lt;20250417_1.11.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028986" version="1" comment="tcpdump is &lt;4.99.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028987" version="1" comment="telnet is &lt;1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028988" version="1" comment="telnet-server is &lt;1.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028989" version="1" comment="testng is &lt;7.10.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028990" version="1" comment="testng-javadoc is &lt;7.10.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028991" version="1" comment="tftp is &lt;5.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028992" version="1" comment="tigervnc is &lt;1.15.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028993" version="1" comment="tigervnc-selinux is &lt;1.15.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028994" version="1" comment="tmux is &lt;3.5a-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028995" version="1" comment="tomcat is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028996" version="1" comment="tomcat-admin-webapps is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028997" version="1" comment="tomcat-docs-webapp is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028998" version="1" comment="tomcat-el-3_0-api is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010028999" version="1" comment="tomcat-embed is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029000" version="1" comment="tomcat-javadoc is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029001" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029002" version="1" comment="tomcat-jsvc is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029003" version="1" comment="tomcat-lib is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029004" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029005" version="1" comment="tomcat-webapps is &lt;9.0.108-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029006" version="1" comment="tomcat10 is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029007" version="1" comment="tomcat10-admin-webapps is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029008" version="1" comment="tomcat10-doc is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029009" version="1" comment="tomcat10-docs-webapp is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029010" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029011" version="1" comment="tomcat10-embed is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029012" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029013" version="1" comment="tomcat10-jsvc is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029014" version="1" comment="tomcat10-lib is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029015" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029016" version="1" comment="tomcat10-webapps is &lt;10.1.44-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029017" version="1" comment="tomcat11 is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029018" version="1" comment="tomcat11-admin-webapps is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029019" version="1" comment="tomcat11-doc is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029020" version="1" comment="tomcat11-docs-webapp is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029021" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029022" version="1" comment="tomcat11-embed is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029023" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029024" version="1" comment="tomcat11-jsvc is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029025" version="1" comment="tomcat11-lib is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029026" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029027" version="1" comment="tomcat11-webapps is &lt;11.0.10-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029028" version="1" comment="tpm2.0-tools is &lt;5.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029029" version="1" comment="traceroute is &lt;2.1.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029030" version="1" comment="tuned is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029031" version="1" comment="tuned-gtk is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029032" version="1" comment="tuned-profiles-atomic is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029033" version="1" comment="tuned-profiles-nfv is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029034" version="1" comment="tuned-profiles-openshift is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029035" version="1" comment="tuned-profiles-oracle is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029036" version="1" comment="tuned-profiles-postgresql is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029037" version="1" comment="tuned-profiles-realtime is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029038" version="1" comment="tuned-profiles-security is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029039" version="1" comment="tuned-profiles-spectrumscale is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029040" version="1" comment="tuned-utils is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029041" version="1" comment="tuned-utils-systemtap is &lt;2.25.1.0+git.889387b-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029042" version="1" comment="u-boot-rpi3 is &lt;2023.04-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029043" version="1" comment="u-boot-rpi3-doc is &lt;2023.04-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029044" version="1" comment="u-boot-rpi4 is &lt;2023.04-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029045" version="1" comment="u-boot-rpi4-doc is &lt;2023.04-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029046" version="1" comment="u-boot-rpiarm64 is &lt;2023.04-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029047" version="1" comment="u-boot-rpiarm64-doc is &lt;2023.04-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029048" version="1" comment="u-boot-tools is &lt;2023.04-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029049" version="1" comment="ucode-intel is &lt;20250812-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029050" version="1" comment="umoci is &lt;0.5.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029051" version="1" comment="unzip is &lt;6.00-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029052" version="1" comment="unzip-doc is &lt;6.00-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029053" version="1" comment="valgrind is &lt;3.24.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029054" version="1" comment="valgrind-client-headers is &lt;3.24.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029055" version="1" comment="valgrind-devel is &lt;3.24.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029056" version="1" comment="valkey is &lt;8.0.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029057" version="1" comment="valkey-compat-redis is &lt;8.0.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029058" version="1" comment="valkey-devel is &lt;8.0.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029059" version="1" comment="velocity is &lt;1.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029060" version="1" comment="velocity-custom-parser-example is &lt;2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029061" version="1" comment="velocity-demo is &lt;1.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029062" version="1" comment="velocity-engine-core is &lt;2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029063" version="1" comment="velocity-engine-core-javadoc is &lt;2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029064" version="1" comment="velocity-engine-examples is &lt;2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029065" version="1" comment="velocity-engine-javadoc is &lt;2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029066" version="1" comment="velocity-engine-parent is &lt;2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029067" version="1" comment="velocity-engine-scripting is &lt;2.4-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029068" version="1" comment="velocity-javadoc is &lt;1.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029069" version="1" comment="velocity-manual is &lt;1.7-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029070" version="1" comment="virt-install is &lt;5.0.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029071" version="1" comment="virt-manager is &lt;5.0.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029072" version="1" comment="virt-manager-common is &lt;5.0.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029073" version="1" comment="vsftpd is &lt;3.0.5-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029074" version="1" comment="w3m is &lt;0.5.3+git20230121-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029075" version="1" comment="w3m-inline-image is &lt;0.5.3+git20230121-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029076" version="1" comment="wdiff is &lt;1.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029077" version="1" comment="wdiff-lang is &lt;1.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029078" version="1" comment="wget is &lt;1.25.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029079" version="1" comment="wget-lang is &lt;1.25.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029080" version="1" comment="whois is &lt;5.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029081" version="1" comment="whois-bash-completion is &lt;5.6.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029082" version="1" comment="wpa_supplicant is &lt;2.11-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029083" version="1" comment="x3270 is &lt;4.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029084" version="1" comment="xalan-j2 is &lt;2.7.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029085" version="1" comment="xalan-j2-manual is &lt;2.7.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029086" version="1" comment="xalan-j2-xsltc is &lt;2.7.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029087" version="1" comment="xdg-desktop-portal is &lt;1.20.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029088" version="1" comment="xdg-desktop-portal-devel is &lt;1.20.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029089" version="1" comment="xdg-desktop-portal-devel-docs is &lt;1.20.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029090" version="1" comment="xdg-desktop-portal-lang is &lt;1.20.3-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029091" version="1" comment="xdg-utils is &lt;1.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029092" version="1" comment="xdg-utils-screensaver is &lt;1.2.1-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029093" version="1" comment="xerces-j2 is &lt;2.12.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029094" version="1" comment="xerces-j2-demo is &lt;2.12.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029095" version="1" comment="xerces-j2-javadoc is &lt;2.12.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029096" version="1" comment="xmlgraphics-batik is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029097" version="1" comment="xmlgraphics-batik-css is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029098" version="1" comment="xmlgraphics-batik-demo is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029099" version="1" comment="xmlgraphics-batik-javadoc is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029100" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029101" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029102" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029103" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029104" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.18-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029105" version="1" comment="xmlgraphics-commons is &lt;2.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029106" version="1" comment="xmlgraphics-commons-javadoc is &lt;2.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029107" version="1" comment="xmlgraphics-fop is &lt;2.10-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029108" version="1" comment="xrdb is &lt;1.2.2-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029109" version="1" comment="xterm is &lt;393-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029110" version="1" comment="xterm-bin is &lt;393-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029111" version="1" comment="xterm-resize is &lt;393-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029112" version="1" comment="xtrans is &lt;1.6.0-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029113" version="1" comment="xwayland is &lt;24.1.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029114" version="1" comment="xwayland-devel is &lt;24.1.6-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029115" version="1" comment="zsh is &lt;5.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029116" version="1" comment="zsh-htmldoc is &lt;5.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029117" version="1" comment="zsh-sh is &lt;5.9-160000.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029118" version="1" comment="zypper is &lt;1.14.93-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029119" version="1" comment="zypper-aptitude is &lt;1.14.93-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029120" version="1" comment="zypper-log is &lt;1.14.93-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029121" version="1" comment="zypper-needs-restarting is &lt;1.14.93-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033428" version="1" comment="go1.25 is &lt;1.25.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033429" version="1" comment="go1.25-doc is &lt;1.25.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033430" version="1" comment="go1.25-libstd is &lt;1.25.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033431" version="1" comment="go1.25-race is &lt;1.25.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029126" version="1" comment="SLES_SAP-release is ==16.0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033432" version="1" comment="go1.24 is &lt;1.24.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033433" version="1" comment="go1.24-doc is &lt;1.24.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033434" version="1" comment="go1.24-libstd is &lt;1.24.11-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033435" version="1" comment="go1.24-race is &lt;1.24.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033436" version="1" comment="keylime-config is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033437" version="1" comment="keylime-firewalld is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033438" version="1" comment="keylime-logrotate is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033439" version="1" comment="keylime-registrar is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033440" version="1" comment="keylime-tenant is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033441" version="1" comment="keylime-tpm_cert_store is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033442" version="1" comment="keylime-verifier is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033443" version="1" comment="python313-keylime is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034111" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034112" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034113" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034114" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034115" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034116" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034117" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034118" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034119" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034120" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034121" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034122" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034123" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034124" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034125" version="1" comment="grub2 is &lt;2.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034126" version="1" comment="grub2-arm64-efi is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034131" version="1" comment="grub2-common is &lt;2.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034132" version="1" comment="grub2-i386-pc is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034135" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034138" version="1" comment="grub2-s390x-emu is &lt;2.12-160000.3.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034141" version="1" comment="grub2-snapper-plugin is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034142" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034143" version="1" comment="grub2-x86_64-efi is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034150" version="1" comment="libopenssl-3-devel is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034151" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034152" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.0-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034153" version="1" comment="libopenssl3 is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034154" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.0-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034155" version="1" comment="openssl-3 is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034156" version="1" comment="openssl-3-doc is &lt;3.5.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034877" version="1" comment="qemu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034878" version="1" comment="qemu-SLOF is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035030" version="1" comment="qemu-arm is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035031" version="1" comment="qemu-audio-alsa is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035032" version="1" comment="qemu-audio-dbus is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035033" version="1" comment="qemu-audio-jack is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035034" version="1" comment="qemu-audio-oss is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035037" version="1" comment="qemu-block-curl is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035038" version="1" comment="qemu-block-dmg is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034881" version="1" comment="qemu-block-iscsi is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035039" version="1" comment="qemu-block-nfs is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034882" version="1" comment="qemu-block-ssh is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035042" version="1" comment="qemu-doc is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035043" version="1" comment="qemu-extra is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034884" version="1" comment="qemu-guest-agent is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035044" version="1" comment="qemu-headless is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034886" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034887" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034888" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035045" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034890" version="1" comment="qemu-hw-usb-host is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034891" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035046" version="1" comment="qemu-hw-usb-smartcard is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034892" version="1" comment="qemu-img is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034893" version="1" comment="qemu-ipxe is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035047" version="1" comment="qemu-ivshmem-tools is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034894" version="1" comment="qemu-ksm is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034895" version="1" comment="qemu-lang is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035048" version="1" comment="qemu-linux-user is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035049" version="1" comment="qemu-microvm is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035050" version="1" comment="qemu-ppc is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034897" version="1" comment="qemu-pr-helper is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035051" version="1" comment="qemu-s390x is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034899" version="1" comment="qemu-seabios is &lt;10.0.71.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035052" version="1" comment="qemu-skiboot is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034900" version="1" comment="qemu-tools is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034903" version="1" comment="qemu-vgabios is &lt;10.0.71.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035058" version="1" comment="qemu-vhost-user-gpu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034904" version="1" comment="qemu-vmsr-helper is &lt;10.0.7-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035059" version="1" comment="qemu-x86 is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036932" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.8.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036933" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.8.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036934" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.8.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035092" version="1" comment="kernel-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035094" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035096" version="1" comment="kernel-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035097" version="1" comment="kernel-default-base is &lt;6.12.0-160000.8.1.160000.2.5 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035099" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036935" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.8.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035101" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035103" version="1" comment="kernel-docs is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035104" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035105" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035107" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035108" version="1" comment="kernel-macros is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035110" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035116" version="1" comment="kernel-source is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035117" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035118" version="1" comment="kernel-syms is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035119" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.8.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035126" version="1" comment="fontforge is &lt;20230101-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035127" version="1" comment="fontforge-devel is &lt;20230101-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035128" version="1" comment="fontforge-doc is &lt;20230101-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035129" version="1" comment="libmariadbd-devel is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035130" version="1" comment="libmariadbd19 is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035131" version="1" comment="mariadb is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035132" version="1" comment="mariadb-bench is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035133" version="1" comment="mariadb-client is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035134" version="1" comment="mariadb-errormessages is &lt;11.8.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035138" version="1" comment="mariadb-tools is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035629" version="1" comment="libipa_hbac-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035630" version="1" comment="libipa_hbac0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035631" version="1" comment="libnfsidmap-sss is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035632" version="1" comment="libsss_certmap-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035633" version="1" comment="libsss_certmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035634" version="1" comment="libsss_idmap-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035635" version="1" comment="libsss_idmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035636" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035637" version="1" comment="libsss_nss_idmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035638" version="1" comment="python3-ipa_hbac is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035639" version="1" comment="python3-sss-murmur is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035640" version="1" comment="python3-sss_nss_idmap is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035641" version="1" comment="python3-sssd-config is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035642" version="1" comment="sssd is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035643" version="1" comment="sssd-ad is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035645" version="1" comment="sssd-dbus is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035646" version="1" comment="sssd-ipa is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035647" version="1" comment="sssd-kcm is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035648" version="1" comment="sssd-krb5 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035649" version="1" comment="sssd-krb5-common is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035650" version="1" comment="sssd-ldap is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035651" version="1" comment="sssd-proxy is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035652" version="1" comment="sssd-tools is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035653" version="1" comment="sssd-winbind-idmap is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037150" version="1" comment="valkey is &lt;8.0.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037151" version="1" comment="valkey-compat-redis is &lt;8.0.6-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037152" version="1" comment="valkey-devel is &lt;8.0.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037153" version="1" comment="avahi is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037154" version="1" comment="avahi-autoipd is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037156" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037157" version="1" comment="avahi-lang is &lt;0.8-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037158" version="1" comment="avahi-utils is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037159" version="1" comment="avahi-utils-gtk is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037160" version="1" comment="libavahi-client3 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037161" version="1" comment="libavahi-common3 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037162" version="1" comment="libavahi-core7 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037163" version="1" comment="libavahi-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037164" version="1" comment="libavahi-glib-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037165" version="1" comment="libavahi-glib1 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037166" version="1" comment="libavahi-gobject-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037167" version="1" comment="libavahi-gobject0 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037168" version="1" comment="libavahi-libevent1 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037171" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037172" version="1" comment="libdns_sd is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037173" version="1" comment="libhowl0 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037174" version="1" comment="python3-avahi-gtk is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037175" version="1" comment="python313-avahi is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037176" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037177" version="1" comment="MozillaFirefox is &lt;140.6.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037179" version="1" comment="MozillaFirefox-devel is &lt;140.6.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037180" version="1" comment="MozillaFirefox-translations-common is &lt;140.6.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037181" version="1" comment="MozillaFirefox-translations-other is &lt;140.6.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037182" version="1" comment="python313-tornado6 is &lt;6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037183" version="1" comment="libmicrohttpd-devel is &lt;1.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037184" version="1" comment="libmicrohttpd12 is &lt;1.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037185" version="1" comment="libpng16-16 is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037186" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037187" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037188" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037189" version="1" comment="libpng16-devel is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037190" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037191" version="1" comment="libpng16-tools is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037475" version="1" comment="gio-branding-SLE is &lt;16-160000.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037193" version="1" comment="glib2-devel is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037194" version="1" comment="glib2-devel-static is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037195" version="1" comment="glib2-doc is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037196" version="1" comment="glib2-lang is &lt;2.84.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037198" version="1" comment="glib2-tools is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037199" version="1" comment="libgio-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037200" version="1" comment="libgirepository-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037201" version="1" comment="libglib-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037202" version="1" comment="libgmodule-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037203" version="1" comment="libgobject-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037204" version="1" comment="libgthread-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037205" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037206" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037207" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037208" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037209" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037210" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038478" version="1" comment="hawk2 is &lt;2.7.0+git.1742310530.bfcd0e2c-160000.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037704" version="1" comment="python313-uv is &lt;0.7.18-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037708" version="1" comment="squid is &lt;6.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037709" version="1" comment="dirmngr is &lt;2.5.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037710" version="1" comment="gpg2 is &lt;2.5.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037711" version="1" comment="gpg2-lang is &lt;2.5.5-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037712" version="1" comment="gpg2-tpm is &lt;2.5.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037713" version="1" comment="apache2 is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037714" version="1" comment="apache2-devel is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037715" version="1" comment="apache2-event is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037716" version="1" comment="apache2-manual is &lt;2.4.63-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037717" version="1" comment="apache2-prefork is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037718" version="1" comment="apache2-utils is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037719" version="1" comment="apache2-worker is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037720" version="1" comment="curl is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037722" version="1" comment="curl-zsh-completion is &lt;8.14.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037723" version="1" comment="libcurl-devel is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037724" version="1" comment="libcurl-devel-doc is &lt;8.14.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038479" version="1" comment="libcurl-mini4 is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037725" version="1" comment="libcurl4 is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038480" version="1" comment="haproxy is &lt;3.2.0+git0.e134140d2-160000.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037727" version="1" comment="tomcat is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037728" version="1" comment="tomcat-admin-webapps is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037729" version="1" comment="tomcat-docs-webapp is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037730" version="1" comment="tomcat-el-3_0-api is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037731" version="1" comment="tomcat-embed is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037732" version="1" comment="tomcat-javadoc is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037733" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037734" version="1" comment="tomcat-jsvc is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037735" version="1" comment="tomcat-lib is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037736" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037737" version="1" comment="tomcat-webapps is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037847" version="1" comment="bind is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037848" version="1" comment="bind-doc is &lt;9.20.15-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037850" version="1" comment="bind-modules-generic is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037851" version="1" comment="bind-modules-ldap is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037852" version="1" comment="bind-modules-mysql is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037853" version="1" comment="bind-modules-perl is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037854" version="1" comment="bind-modules-sqlite3 is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037855" version="1" comment="bind-utils is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037856" version="1" comment="MozillaFirefox is &lt;140.7.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037858" version="1" comment="MozillaFirefox-devel is &lt;140.7.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037859" version="1" comment="MozillaFirefox-translations-common is &lt;140.7.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037860" version="1" comment="MozillaFirefox-translations-other is &lt;140.7.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037861" version="1" comment="erlang is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037869" version="1" comment="erlang-epmd is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037881" version="1" comment="alloy is &lt;1.12.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037883" version="1" comment="libcpp-httplib0_22 is &lt;0.22.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037884" version="1" comment="docker is &lt;28.5.1_ce-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037885" version="1" comment="docker-bash-completion is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037886" version="1" comment="docker-buildx is &lt;0.29.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037887" version="1" comment="docker-fish-completion is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037888" version="1" comment="docker-rootless-extras is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037889" version="1" comment="docker-zsh-completion is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038432" version="1" comment="cargo-c is &lt;0.10.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038433" version="1" comment="cargo1.91 is &lt;1.91.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038434" version="1" comment="cargo1.92 is &lt;1.92.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038435" version="1" comment="rust1.91 is &lt;1.91.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038437" version="1" comment="rust1.92 is &lt;1.92.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038440" version="1" comment="WebKitGTK-4.1-lang is &lt;2.50.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038441" version="1" comment="WebKitGTK-6.0-lang is &lt;2.50.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038443" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038444" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038446" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038447" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038449" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038450" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038451" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038453" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038455" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038456" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038458" version="1" comment="webkit-jsc-4.1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038459" version="1" comment="webkit-jsc-6.0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038461" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038463" version="1" comment="webkit2gtk3-minibrowser is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038467" version="1" comment="webkit2gtk4-minibrowser is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038468" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038469" version="1" comment="libvmtools-devel is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038470" version="1" comment="libvmtools0 is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038471" version="1" comment="open-vm-tools is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038472" version="1" comment="open-vm-tools-containerinfo is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038473" version="1" comment="open-vm-tools-desktop is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038475" version="1" comment="open-vm-tools-sdmp is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039518" version="1" comment="podman is &lt;5.4.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039519" version="1" comment="podman-docker is &lt;5.4.2-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039520" version="1" comment="podman-remote is &lt;5.4.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039521" version="1" comment="podmansh is &lt;5.4.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039638" version="1" comment="libpcap-devel is &lt;1.10.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039640" version="1" comment="libpcap1 is &lt;1.10.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039641" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039642" version="1" comment="libheif-aom is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039643" version="1" comment="libheif-dav1d is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039645" version="1" comment="libheif-ffmpeg is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039646" version="1" comment="libheif-jpeg is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039647" version="1" comment="libheif-openjpeg is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039648" version="1" comment="libheif-rav1e is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039649" version="1" comment="libheif-svtenc is &lt;1.19.7-160000.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039650" version="1" comment="libheif1 is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039651" version="1" comment="go1.24 is &lt;1.24.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039652" version="1" comment="go1.24-doc is &lt;1.24.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039653" version="1" comment="go1.24-libstd is &lt;1.24.12-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039654" version="1" comment="go1.24-race is &lt;1.24.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039655" version="1" comment="buildah is &lt;1.39.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039656" version="1" comment="libpython3_13-1_0 is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039657" version="1" comment="libpython3_13-1_0-x86-64-v3 is &lt;3.13.11-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039659" version="1" comment="python313 is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039660" version="1" comment="python313-base is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039661" version="1" comment="python313-base-x86-64-v3 is &lt;3.13.11-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039662" version="1" comment="python313-curses is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039663" version="1" comment="python313-dbm is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039664" version="1" comment="python313-devel is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039665" version="1" comment="python313-doc is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039666" version="1" comment="python313-doc-devhelp is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039667" version="1" comment="python313-idle is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039678" version="1" comment="python313-tk is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039679" version="1" comment="python313-tools is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039680" version="1" comment="python313-x86-64-v3 is &lt;3.13.11-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039681" version="1" comment="erlang-rabbitmq-client is &lt;4.1.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039682" version="1" comment="rabbitmq-server is &lt;4.1.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039683" version="1" comment="rabbitmq-server-bash-completion is &lt;4.1.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039684" version="1" comment="rabbitmq-server-plugins is &lt;4.1.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039685" version="1" comment="rabbitmq-server-zsh-completion is &lt;4.1.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039686" version="1" comment="libpng16-16 is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039687" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039688" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039689" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039690" version="1" comment="libpng16-devel is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039691" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039692" version="1" comment="libpng16-tools is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039693" version="1" comment="gdk-pixbuf-devel is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039694" version="1" comment="gdk-pixbuf-lang is &lt;2.42.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039695" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039696" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039697" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039698" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039699" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039700" version="1" comment="go1.25 is &lt;1.25.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039701" version="1" comment="go1.25-doc is &lt;1.25.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039702" version="1" comment="go1.25-libstd is &lt;1.25.6-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039703" version="1" comment="go1.25-race is &lt;1.25.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039704" version="1" comment="python313-virtualenv is &lt;20.29.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039705" version="1" comment="python-marshmallow-doc is &lt;3.20.2-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039706" version="1" comment="python313-marshmallow is &lt;3.20.2-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039707" version="1" comment="python313-urllib3 is &lt;2.5.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039708" version="1" comment="python313-pyasn1 is &lt;0.6.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039709" version="1" comment="busybox is &lt;1.37.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039710" version="1" comment="busybox-static is &lt;1.37.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039711" version="1" comment="busybox-warewulf3 is &lt;1.37.0-160000.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039712" version="1" comment="bind is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039713" version="1" comment="bind-doc is &lt;9.20.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039715" version="1" comment="bind-modules-generic is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039716" version="1" comment="bind-modules-ldap is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039717" version="1" comment="bind-modules-mysql is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039718" version="1" comment="bind-modules-perl is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039719" version="1" comment="bind-modules-sqlite3 is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039720" version="1" comment="bind-utils is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039721" version="1" comment="python313-jaraco.context is &lt;5.3.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246765"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 6.12.0-160000.7-default is currently running" id="oval:org.opensuse.security:tst:2010039722" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009246766"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039723" version="1" comment="kernel-livepatch-6_12_0-160000_7-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039724" version="1" comment="kernel-livepatch-6_12_0-160000_7-default is &lt;2-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040025" version="1" comment="avahi is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040026" version="1" comment="avahi-autoipd is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040028" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040029" version="1" comment="avahi-lang is &lt;0.8-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040030" version="1" comment="avahi-utils is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040031" version="1" comment="avahi-utils-gtk is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040032" version="1" comment="libavahi-client3 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040033" version="1" comment="libavahi-common3 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040034" version="1" comment="libavahi-core7 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040035" version="1" comment="libavahi-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040036" version="1" comment="libavahi-glib-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040037" version="1" comment="libavahi-glib1 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040038" version="1" comment="libavahi-gobject-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040039" version="1" comment="libavahi-gobject0 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040040" version="1" comment="libavahi-libevent1 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040043" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040044" version="1" comment="libdns_sd is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040045" version="1" comment="libhowl0 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040046" version="1" comment="python3-avahi-gtk is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040047" version="1" comment="python313-avahi is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040048" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 6.12.0-160000.5-default is currently running" id="oval:org.opensuse.security:tst:2010040504" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009246941"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040505" version="1" comment="kernel-livepatch-6_12_0-160000_5-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040506" version="1" comment="kernel-livepatch-6_12_0-160000_5-default is &lt;5-160000.4.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040052" version="1" comment="apache2-mod_php8 is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040053" version="1" comment="php8 is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040054" version="1" comment="php8-bcmath is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040055" version="1" comment="php8-bz2 is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040056" version="1" comment="php8-calendar is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040057" version="1" comment="php8-cli is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040058" version="1" comment="php8-ctype is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040059" version="1" comment="php8-curl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040060" version="1" comment="php8-dba is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040061" version="1" comment="php8-devel is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040062" version="1" comment="php8-dom is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040063" version="1" comment="php8-embed is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040064" version="1" comment="php8-enchant is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040065" version="1" comment="php8-exif is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040066" version="1" comment="php8-fastcgi is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040067" version="1" comment="php8-ffi is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040068" version="1" comment="php8-fileinfo is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040069" version="1" comment="php8-fpm is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040070" version="1" comment="php8-fpm-apache is &lt;8.4.16-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040071" version="1" comment="php8-ftp is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040072" version="1" comment="php8-gd is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040073" version="1" comment="php8-gettext is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040074" version="1" comment="php8-gmp is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040075" version="1" comment="php8-iconv is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040076" version="1" comment="php8-intl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040077" version="1" comment="php8-ldap is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040078" version="1" comment="php8-mbstring is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040079" version="1" comment="php8-mysql is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040080" version="1" comment="php8-odbc is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040081" version="1" comment="php8-opcache is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040082" version="1" comment="php8-openssl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040083" version="1" comment="php8-pcntl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040084" version="1" comment="php8-pdo is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040085" version="1" comment="php8-pgsql is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040086" version="1" comment="php8-phar is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040087" version="1" comment="php8-posix is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040088" version="1" comment="php8-readline is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040089" version="1" comment="php8-shmop is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040090" version="1" comment="php8-snmp is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040091" version="1" comment="php8-soap is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040092" version="1" comment="php8-sockets is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040093" version="1" comment="php8-sodium is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040094" version="1" comment="php8-sqlite is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040095" version="1" comment="php8-sysvmsg is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040096" version="1" comment="php8-sysvsem is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040097" version="1" comment="php8-sysvshm is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040099" version="1" comment="php8-tidy is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040100" version="1" comment="php8-tokenizer is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040101" version="1" comment="php8-xmlreader is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040102" version="1" comment="php8-xmlwriter is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040103" version="1" comment="php8-xsl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040104" version="1" comment="php8-zip is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040105" version="1" comment="php8-zlib is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024369" version="1" comment="flake-pilot is &lt;3.1.22-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024373" version="1" comment="flake-pilot-podman is &lt;3.1.22-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041320" version="1" comment="cockpit-subscriptions is &lt;12.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041321" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041322" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041323" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041324" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041325" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041326" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041327" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041328" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041329" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041330" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041331" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041332" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041333" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041334" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041335" version="1" comment="python313-FontTools is &lt;4.53.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247073"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 6.12.0-160000.6-default is currently running" id="oval:org.opensuse.security:tst:2010041336" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009247074"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041337" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041338" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;3-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041339" version="1" comment="python313-h2 is &lt;4.2.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041340" version="1" comment="xkbcomp is &lt;1.4.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041341" version="1" comment="xkbcomp-devel is &lt;1.4.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041342" version="1" comment="ucode-amd is &lt;20251203-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041343" version="1" comment="python313-python-multipart is &lt;0.0.20-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041344" version="1" comment="java-21-openjdk is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041345" version="1" comment="java-21-openjdk-demo is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041346" version="1" comment="java-21-openjdk-devel is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041347" version="1" comment="java-21-openjdk-headless is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041348" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.10.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041349" version="1" comment="java-21-openjdk-jmods is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041350" version="1" comment="java-21-openjdk-src is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041351" version="1" comment="python313-urllib3 is &lt;2.5.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041352" version="1" comment="cloud-init is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041353" version="1" comment="cloud-init-config-suse is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041354" version="1" comment="cloud-init-doc is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041355" version="1" comment="postgresql16 is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041356" version="1" comment="postgresql16-contrib is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041357" version="1" comment="postgresql16-devel is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041358" version="1" comment="postgresql16-docs is &lt;16.11-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041361" version="1" comment="postgresql16-plperl is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041362" version="1" comment="postgresql16-plpython is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041363" version="1" comment="postgresql16-pltcl is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041364" version="1" comment="postgresql16-server is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041365" version="1" comment="postgresql16-server-devel is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050151" version="1" comment="libecpg6 is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050152" version="1" comment="libpq5 is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041369" version="1" comment="postgresql is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041370" version="1" comment="postgresql-contrib is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041371" version="1" comment="postgresql-devel is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041372" version="1" comment="postgresql-docs is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041375" version="1" comment="postgresql-plperl is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041376" version="1" comment="postgresql-plpython is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041377" version="1" comment="postgresql-pltcl is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041378" version="1" comment="postgresql-server is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041379" version="1" comment="postgresql-server-devel is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041381" version="1" comment="postgresql13-pgaudit is &lt;1.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041382" version="1" comment="postgresql13-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041383" version="1" comment="postgresql14-pgaudit is &lt;1.6.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041384" version="1" comment="postgresql14-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041385" version="1" comment="postgresql15-pgaudit is &lt;1.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041386" version="1" comment="postgresql15-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041387" version="1" comment="postgresql16-pgaudit is &lt;16.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041388" version="1" comment="postgresql16-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041389" version="1" comment="postgresql17 is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041390" version="1" comment="postgresql17-contrib is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041391" version="1" comment="postgresql17-devel is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041392" version="1" comment="postgresql17-docs is &lt;17.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041395" version="1" comment="postgresql17-pgaudit is &lt;17.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041396" version="1" comment="postgresql17-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041397" version="1" comment="postgresql17-plperl is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041398" version="1" comment="postgresql17-plpython is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041399" version="1" comment="postgresql17-pltcl is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041400" version="1" comment="postgresql17-server is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041401" version="1" comment="postgresql17-server-devel is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050153" version="1" comment="postgresql18 is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050154" version="1" comment="postgresql18-contrib is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050155" version="1" comment="postgresql18-devel is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050156" version="1" comment="postgresql18-docs is &lt;18.1-160000.1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041410" version="1" comment="postgresql18-pgaudit is &lt;18.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041411" version="1" comment="postgresql18-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050159" version="1" comment="postgresql18-plperl is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050160" version="1" comment="postgresql18-plpython is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050161" version="1" comment="postgresql18-pltcl is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050162" version="1" comment="postgresql18-server is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050163" version="1" comment="postgresql18-server-devel is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041425" version="1" comment="glibc is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041426" version="1" comment="glibc-devel is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041427" version="1" comment="glibc-devel-static is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041428" version="1" comment="glibc-extra is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041429" version="1" comment="glibc-gconv-modules-extra is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041430" version="1" comment="glibc-html is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041431" version="1" comment="glibc-i18ndata is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041432" version="1" comment="glibc-info is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041433" version="1" comment="glibc-lang is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041434" version="1" comment="glibc-locale is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041435" version="1" comment="glibc-locale-base is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041436" version="1" comment="glibc-profile is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041437" version="1" comment="glibc-utils is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041438" version="1" comment="java-17-openjdk is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041439" version="1" comment="java-17-openjdk-demo is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041440" version="1" comment="java-17-openjdk-devel is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041441" version="1" comment="java-17-openjdk-headless is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041442" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.18.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041443" version="1" comment="java-17-openjdk-jmods is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041444" version="1" comment="java-17-openjdk-src is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030508" version="1" comment="ctdb is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030509" version="1" comment="ctdb-pcp-pmda is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030510" version="1" comment="ldb-tools is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030511" version="1" comment="libldb-devel is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030512" version="1" comment="libldb2 is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030513" version="1" comment="python3-ldb is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030514" version="1" comment="samba is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030515" version="1" comment="samba-ad-dc is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030516" version="1" comment="samba-ad-dc-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030518" version="1" comment="samba-client is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030519" version="1" comment="samba-client-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030520" version="1" comment="samba-dcerpc is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030521" version="1" comment="samba-devel is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030522" version="1" comment="samba-doc is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030523" version="1" comment="samba-dsdb-modules is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030524" version="1" comment="samba-gpupdate is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030525" version="1" comment="samba-ldb-ldap is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030526" version="1" comment="samba-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030527" version="1" comment="samba-libs-python3 is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030528" version="1" comment="samba-python3 is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030530" version="1" comment="samba-tool is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030531" version="1" comment="samba-winbind is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030532" version="1" comment="samba-winbind-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041445" version="1" comment="dirmngr is &lt;2.5.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041446" version="1" comment="gpg2 is &lt;2.5.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041447" version="1" comment="gpg2-lang is &lt;2.5.5-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041448" version="1" comment="gpg2-tpm is &lt;2.5.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041449" version="1" comment="openvpn is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041450" version="1" comment="openvpn-auth-pam-plugin is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041451" version="1" comment="openvpn-devel is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041452" version="1" comment="openvpn-down-root-plugin is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041453" version="1" comment="jasper is &lt;4.2.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041455" version="1" comment="libjasper7 is &lt;4.2.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041456" version="1" comment="libunbound8 is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041457" version="1" comment="python3-unbound is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041458" version="1" comment="unbound is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041459" version="1" comment="unbound-anchor is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041460" version="1" comment="unbound-devel is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041462" version="1" comment="alloy is &lt;1.12.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041463" version="1" comment="libudisks2-0 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041464" version="1" comment="libudisks2-0-devel is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041465" version="1" comment="libudisks2-0_btrfs is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041466" version="1" comment="libudisks2-0_lsm is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041467" version="1" comment="libudisks2-0_lvm2 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041468" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041469" version="1" comment="udisks2 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041471" version="1" comment="udisks2-docs is &lt;2.10.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041472" version="1" comment="udisks2-lang is &lt;2.10.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041473" version="1" comment="udisks2-zsh-completion is &lt;2.10.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041474" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041475" version="1" comment="libsoup-devel is &lt;3.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041476" version="1" comment="libsoup-lang is &lt;3.6.5-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041477" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041478" version="1" comment="java-25-openjdk is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041479" version="1" comment="java-25-openjdk-demo is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041480" version="1" comment="java-25-openjdk-devel is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041481" version="1" comment="java-25-openjdk-headless is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041482" version="1" comment="java-25-openjdk-javadoc is &lt;25.0.2.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041483" version="1" comment="java-25-openjdk-jmods is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041484" version="1" comment="java-25-openjdk-src is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041485" version="1" comment="python313-filelock is &lt;3.18.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030533" version="1" comment="libtiff-devel is &lt;4.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030535" version="1" comment="libtiff6 is &lt;4.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030536" version="1" comment="tiff is &lt;4.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042236" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.9.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042237" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.9.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042238" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.9.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041521" version="1" comment="kernel-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041523" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041525" version="1" comment="kernel-azure is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041527" version="1" comment="kernel-azure-extra is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041529" version="1" comment="kernel-azure-vdso is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041530" version="1" comment="kernel-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041531" version="1" comment="kernel-default-base is &lt;6.12.0-160000.9.1.160000.2.6 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041533" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042144" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.9.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041535" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041537" version="1" comment="kernel-docs is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041538" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041539" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041541" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041542" version="1" comment="kernel-macros is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041544" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041550" version="1" comment="kernel-source is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041551" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041552" version="1" comment="kernel-syms is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041553" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.9.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041562" version="1" comment="python313-wheel is &lt;0.45.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041563" version="1" comment="dpdk is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041564" version="1" comment="dpdk-devel is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041565" version="1" comment="dpdk-devel-static is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041566" version="1" comment="dpdk-doc is &lt;24.11.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041568" version="1" comment="dpdk-tools is &lt;24.11.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041569" version="1" comment="libdpdk-25 is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041571" version="1" comment="glib2-devel is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041572" version="1" comment="glib2-devel-static is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041573" version="1" comment="glib2-doc is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041574" version="1" comment="glib2-lang is &lt;2.84.4-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041576" version="1" comment="glib2-tools is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041577" version="1" comment="libgio-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041578" version="1" comment="libgirepository-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041579" version="1" comment="libglib-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041580" version="1" comment="libgmodule-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041581" version="1" comment="libgobject-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041582" version="1" comment="libgthread-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041583" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041584" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041585" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041586" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041587" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041588" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041589" version="1" comment="libwireshark18 is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041590" version="1" comment="libwiretap15 is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041591" version="1" comment="libwsutil16 is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041592" version="1" comment="wireshark is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041593" version="1" comment="wireshark-devel is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041594" version="1" comment="wireshark-ui-qt is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041595" version="1" comment="libopenssl-3-devel is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041596" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041597" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.0-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041598" version="1" comment="libopenssl3 is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041599" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.0-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041600" version="1" comment="openssl-3 is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041601" version="1" comment="openssl-3-doc is &lt;3.5.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030538" version="1" comment="libexslt0 is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030539" version="1" comment="libxslt-devel is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030540" version="1" comment="libxslt-tools is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030541" version="1" comment="libxslt1 is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042222" version="1" comment="cups is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042223" version="1" comment="cups-client is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042224" version="1" comment="cups-config is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042225" version="1" comment="cups-ddk is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042226" version="1" comment="cups-devel is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042227" version="1" comment="libcups2 is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042228" version="1" comment="libcupsimage2 is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042229" version="1" comment="golang-github-prometheus-prometheus is &lt;3.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042230" version="1" comment="libxml2-2 is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042231" version="1" comment="libxml2-devel is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042232" version="1" comment="libxml2-doc is &lt;2.13.8-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042233" version="1" comment="libxml2-tools is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042234" version="1" comment="python313-libxml2 is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042305" version="1" comment="python313-maturin is &lt;1.8.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042306" version="1" comment="cockpit-subscriptions is &lt;12.1-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042307" version="1" comment="cockpit is &lt;340-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042308" version="1" comment="cockpit-bridge is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042309" version="1" comment="cockpit-devel is &lt;340-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042310" version="1" comment="cockpit-doc is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042311" version="1" comment="cockpit-firewalld is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042312" version="1" comment="cockpit-kdump is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042313" version="1" comment="cockpit-networkmanager is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042314" version="1" comment="cockpit-packagekit is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042315" version="1" comment="cockpit-selinux is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042316" version="1" comment="cockpit-storaged is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042317" version="1" comment="cockpit-system is &lt;340-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042318" version="1" comment="cockpit-ws is &lt;340-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042319" version="1" comment="cockpit-ws-selinux is &lt;340-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042592" version="1" comment="cockpit-packages is &lt;3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042593" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042594" version="1" comment="libsoup-devel is &lt;3.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042595" version="1" comment="libsoup-lang is &lt;3.6.5-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042596" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043887" version="1" comment="python313-pip is &lt;25.0.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043888" version="1" comment="python313-pip-wheel is &lt;25.0.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043889" version="1" comment="libopenjp2-7 is &lt;2.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043890" version="1" comment="libopenjp2-7-x86-64-v3 is &lt;2.5.3-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043891" version="1" comment="openjpeg2 is &lt;2.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043892" version="1" comment="openjpeg2-devel is &lt;2.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043893" version="1" comment="openjpeg2-devel-doc is &lt;2.5.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043894" version="1" comment="python313-Brotli is &lt;1.1.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043895" version="1" comment="python313-aiohttp is &lt;3.11.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043896" version="1" comment="cargo1.93 is &lt;1.93.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043897" version="1" comment="rust1.93 is &lt;1.93.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043900" version="1" comment="go1.25 is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043901" version="1" comment="go1.25-doc is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043902" version="1" comment="go1.25-libstd is &lt;1.25.7-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043903" version="1" comment="go1.25-race is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044008" version="1" comment="go1.24 is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044009" version="1" comment="go1.24-doc is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044010" version="1" comment="go1.24-libstd is &lt;1.24.13-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044011" version="1" comment="go1.24-race is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044012" version="1" comment="patch is &lt;2.7.6-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044013" version="1" comment="openCryptoki is &lt;3.26.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044014" version="1" comment="openCryptoki-64bit is &lt;3.26.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044015" version="1" comment="openCryptoki-devel is &lt;3.26.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044190" version="1" comment="fontforge is &lt;20251009-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044191" version="1" comment="fontforge-devel is &lt;20251009-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044192" version="1" comment="fontforge-doc is &lt;20251009-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044193" version="1" comment="corepack22 is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044194" version="1" comment="nodejs22 is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044195" version="1" comment="nodejs22-devel is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044196" version="1" comment="nodejs22-docs is &lt;22.22.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044197" version="1" comment="npm22 is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030542" version="1" comment="expat is &lt;2.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030543" version="1" comment="libexpat-devel is &lt;2.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030544" version="1" comment="libexpat1 is &lt;2.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044293" version="1" comment="golang-github-prometheus-prometheus is &lt;3.5.0-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044370" version="1" comment="cockpit is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044371" version="1" comment="cockpit-bridge is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044372" version="1" comment="cockpit-devel is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044373" version="1" comment="cockpit-doc is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044374" version="1" comment="cockpit-firewalld is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044375" version="1" comment="cockpit-kdump is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044376" version="1" comment="cockpit-machines is &lt;346-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044377" version="1" comment="cockpit-networkmanager is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044378" version="1" comment="cockpit-packagekit is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044379" version="1" comment="cockpit-selinux is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044380" version="1" comment="cockpit-storaged is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044381" version="1" comment="cockpit-system is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044382" version="1" comment="cockpit-ws is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044383" version="1" comment="cockpit-ws-selinux is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044384" version="1" comment="wicked2nm is &lt;1.4.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044571" version="1" comment="docker is &lt;28.5.1_ce-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044572" version="1" comment="docker-bash-completion is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044573" version="1" comment="docker-buildx is &lt;0.29.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044574" version="1" comment="docker-fish-completion is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044575" version="1" comment="docker-rootless-extras is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044576" version="1" comment="docker-zsh-completion is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044577" version="1" comment="cockpit-repos is &lt;4.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044578" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;4-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047375" version="1" comment="openssl-3-livepatches is &lt;0.3-160000.1.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044579" version="1" comment="MozillaFirefox is &lt;140.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044581" version="1" comment="MozillaFirefox-devel is &lt;140.7.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044582" version="1" comment="MozillaFirefox-translations-common is &lt;140.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044583" version="1" comment="MozillaFirefox-translations-other is &lt;140.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030545" version="1" comment="libIex-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030546" version="1" comment="libIex-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030547" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030548" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030549" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030550" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030551" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030552" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030553" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030554" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030555" version="1" comment="openexr is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030557" version="1" comment="openexr-doc is &lt;3.2.2-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044584" version="1" comment="libpython3_13-1_0 is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044585" version="1" comment="libpython3_13-1_0-x86-64-v3 is &lt;3.13.12-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044587" version="1" comment="python313 is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044588" version="1" comment="python313-base is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044589" version="1" comment="python313-base-x86-64-v3 is &lt;3.13.12-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044590" version="1" comment="python313-curses is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044591" version="1" comment="python313-dbm is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044592" version="1" comment="python313-devel is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044593" version="1" comment="python313-doc is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044594" version="1" comment="python313-doc-devhelp is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044595" version="1" comment="python313-idle is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044606" version="1" comment="python313-tk is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044607" version="1" comment="python313-tools is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044608" version="1" comment="python313-x86-64-v3 is &lt;3.13.12-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047376" version="1" comment="glibc-livepatches is &lt;0.3-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045656" version="1" comment="docker-stable is &lt;24.0.9_ce-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045657" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045658" version="1" comment="docker-stable-buildx is &lt;0.25.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045659" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045660" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045661" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045662" version="1" comment="postgresql14 is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045663" version="1" comment="postgresql14-contrib is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045664" version="1" comment="postgresql14-devel is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045665" version="1" comment="postgresql14-docs is &lt;14.21-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045668" version="1" comment="postgresql14-plperl is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045669" version="1" comment="postgresql14-plpython is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045670" version="1" comment="postgresql14-pltcl is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045671" version="1" comment="postgresql14-server is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045672" version="1" comment="postgresql14-server-devel is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045674" version="1" comment="postgresql15 is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045675" version="1" comment="postgresql15-contrib is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045676" version="1" comment="postgresql15-devel is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045677" version="1" comment="postgresql15-docs is &lt;15.16-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045680" version="1" comment="postgresql15-plperl is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045681" version="1" comment="postgresql15-plpython is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045682" version="1" comment="postgresql15-pltcl is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045683" version="1" comment="postgresql15-server is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045684" version="1" comment="postgresql15-server-devel is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045686" version="1" comment="autogen is &lt;5.18.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045687" version="1" comment="autoopts is &lt;5.18.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045688" version="1" comment="libopts25 is &lt;5.18.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045689" version="1" comment="python313-urllib3_1 is &lt;1.26.20-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045690" version="1" comment="7zip is &lt;25.01-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045713" version="1" comment="kubevirt-virtctl is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047378" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.26.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047379" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.26.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047380" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.26.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045754" version="1" comment="kernel-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045756" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045758" version="1" comment="kernel-azure is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045760" version="1" comment="kernel-azure-extra is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045762" version="1" comment="kernel-azure-vdso is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045763" version="1" comment="kernel-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045764" version="1" comment="kernel-default-base is &lt;6.12.0-160000.26.1.160000.2.7 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045766" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047381" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.26.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045768" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045770" version="1" comment="kernel-docs is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045771" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045772" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045774" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045775" version="1" comment="kernel-macros is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045777" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045783" version="1" comment="kernel-source is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045784" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045785" version="1" comment="kernel-syms is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045786" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.26.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045795" version="1" comment="kernel-livepatch-6_12_0-160000_26-default is &lt;1-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047382" version="1" comment="haproxy is &lt;3.2.12+git0.6011f448e-160000.1.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030558" version="1" comment="ongres-scram is &lt;3.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030559" version="1" comment="ongres-scram-client is &lt;3.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030560" version="1" comment="ongres-scram-javadoc is &lt;3.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046377" version="1" comment="python313-azure-core is &lt;1.32.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047303" version="1" comment="libcpp-httplib0_22 is &lt;0.22.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047304" version="1" comment="rhino is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047305" version="1" comment="rhino-demo is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047306" version="1" comment="rhino-engine is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047307" version="1" comment="rhino-javadoc is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047308" version="1" comment="rhino-runtime is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047309" version="1" comment="assertj-core is &lt;3.27.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047310" version="1" comment="assertj-core-javadoc is &lt;3.27.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047311" version="1" comment="go1.25-openssl is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047312" version="1" comment="go1.25-openssl-doc is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047313" version="1" comment="go1.25-openssl-race is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047314" version="1" comment="podman is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047315" version="1" comment="podman-docker is &lt;5.4.2-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047316" version="1" comment="podman-remote is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047317" version="1" comment="podmansh is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047318" version="1" comment="expat is &lt;2.7.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047319" version="1" comment="libexpat-devel is &lt;2.7.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047320" version="1" comment="libexpat1 is &lt;2.7.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047321" version="1" comment="go1.24-openssl is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047322" version="1" comment="go1.24-openssl-doc is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047323" version="1" comment="go1.24-openssl-race is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047931" version="1" comment="cockpit-podman is &lt;117-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047324" version="1" comment="kernel-livepatch-6_12_0-160000_7-default is &lt;3-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047551" version="1" comment="kernel-livepatch-6_12_0-160000_5-default is &lt;7-160000.4.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047325" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;5-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047326" version="1" comment="libexslt0 is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047327" version="1" comment="libxml2-2 is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047328" version="1" comment="libxml2-devel is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047329" version="1" comment="libxml2-doc is &lt;2.13.8-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047330" version="1" comment="libxml2-tools is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047331" version="1" comment="libxslt-devel is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047332" version="1" comment="libxslt-tools is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047333" version="1" comment="libxslt1 is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047334" version="1" comment="python313-libxml2 is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 6.12.0-160000.8-default is currently running" id="oval:org.opensuse.security:tst:2010047335" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009248379"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047336" version="1" comment="kernel-livepatch-6_12_0-160000_8-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047337" version="1" comment="kernel-livepatch-6_12_0-160000_8-default is &lt;2-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047568" version="1" comment="shim is &lt;16.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047569" version="1" comment="virtiofsd is &lt;1.12.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047570" version="1" comment="helm is &lt;3.19.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047571" version="1" comment="helm-bash-completion is &lt;3.19.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047572" version="1" comment="helm-fish-completion is &lt;3.19.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047573" version="1" comment="helm-zsh-completion is &lt;3.19.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047574" version="1" comment="gstreamer is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047576" version="1" comment="gstreamer-devtools is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047578" version="1" comment="gstreamer-docs is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047579" version="1" comment="gstreamer-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047580" version="1" comment="gstreamer-plugins-bad is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047583" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047584" version="1" comment="gstreamer-plugins-base is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047586" version="1" comment="gstreamer-plugins-base-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047587" version="1" comment="gstreamer-plugins-good is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047588" version="1" comment="gstreamer-plugins-good-extra is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047589" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047590" version="1" comment="gstreamer-plugins-good-jack is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047591" version="1" comment="gstreamer-plugins-good-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047593" version="1" comment="gstreamer-plugins-libav is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047594" version="1" comment="gstreamer-plugins-rs is &lt;1.26.7+git0.6ab75814-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047595" version="1" comment="gstreamer-plugins-ugly is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047596" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047598" version="1" comment="gstreamer-transcoder is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047600" version="1" comment="gstreamer-utils is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047601" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047602" version="1" comment="libgstallocators-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047603" version="1" comment="libgstanalytics-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047604" version="1" comment="libgstapp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047605" version="1" comment="libgstaudio-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047606" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047607" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047608" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047609" version="1" comment="libgstcodecs-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047610" version="1" comment="libgstcuda-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047612" version="1" comment="libgstfft-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047613" version="1" comment="libgstgl-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047614" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047615" version="1" comment="libgstisoff-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047616" version="1" comment="libgstmpegts-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047617" version="1" comment="libgstmse-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047618" version="1" comment="libgstpbutils-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047619" version="1" comment="libgstphotography-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047620" version="1" comment="libgstplay-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047621" version="1" comment="libgstplayer-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047622" version="1" comment="libgstreamer-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047623" version="1" comment="libgstriff-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047624" version="1" comment="libgstrtp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047625" version="1" comment="libgstrtsp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047626" version="1" comment="libgstrtspserver-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047627" version="1" comment="libgstsctp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047628" version="1" comment="libgstsdp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047629" version="1" comment="libgsttag-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047630" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047631" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047632" version="1" comment="libgstva-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047633" version="1" comment="libgstvalidate-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047634" version="1" comment="libgstvideo-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047635" version="1" comment="libgstvulkan-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047636" version="1" comment="libgstwayland-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047637" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047638" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047639" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047640" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047641" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047642" version="1" comment="typelib-1_0-GstAnalytics-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047643" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047644" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047645" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047646" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047647" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047649" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047650" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047651" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047652" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047653" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047654" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047655" version="1" comment="typelib-1_0-GstMse-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047656" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047657" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047658" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047659" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047660" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047661" version="1" comment="typelib-1_0-GstRtspServer-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047662" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047663" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047664" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047665" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047666" version="1" comment="typelib-1_0-GstValidate-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047667" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047668" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047669" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047670" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047671" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047672" version="1" comment="python313-uv is &lt;0.7.18-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047932" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047933" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047934" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047935" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047936" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047937" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047938" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047939" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047940" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047941" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047942" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047943" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047944" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047945" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048376" version="1" comment="freerdp is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048377" version="1" comment="freerdp-devel is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048378" version="1" comment="freerdp-proxy is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048379" version="1" comment="freerdp-proxy-plugins is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048380" version="1" comment="freerdp-sdl is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048381" version="1" comment="freerdp-server is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048382" version="1" comment="freerdp-wayland is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048383" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048384" version="1" comment="libfreerdp3-3 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048385" version="1" comment="librdtk0-0 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048386" version="1" comment="libuwac0-0 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048387" version="1" comment="libwinpr3-3 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048390" version="1" comment="winpr-devel is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048392" version="1" comment="libcjson1 is &lt;1.7.19-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048393" version="1" comment="kea is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048394" version="1" comment="kea-devel is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048395" version="1" comment="kea-doc is &lt;3.0.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048396" version="1" comment="kea-hooks is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048397" version="1" comment="libkea-asiodns62 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048398" version="1" comment="libkea-asiolink88 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048399" version="1" comment="libkea-cc82 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048400" version="1" comment="libkea-cfgrpt3 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048401" version="1" comment="libkea-config83 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048402" version="1" comment="libkea-cryptolink64 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048403" version="1" comment="libkea-d2srv63 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048404" version="1" comment="libkea-database76 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048405" version="1" comment="libkea-dhcp109 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048406" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048407" version="1" comment="libkea-dhcpsrv130 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048408" version="1" comment="libkea-dns71 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048409" version="1" comment="libkea-eval84 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048410" version="1" comment="libkea-exceptions45 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048411" version="1" comment="libkea-hooks119 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048412" version="1" comment="libkea-http87 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048413" version="1" comment="libkea-log-interprocess3 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048414" version="1" comment="libkea-log75 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048415" version="1" comment="libkea-mysql88 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048416" version="1" comment="libkea-pgsql88 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048417" version="1" comment="libkea-process90 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048418" version="1" comment="libkea-stats53 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048419" version="1" comment="libkea-tcp33 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048420" version="1" comment="libkea-util-io12 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048421" version="1" comment="libkea-util101 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048422" version="1" comment="python3-kea is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048423" version="1" comment="go1.26 is &lt;1.26.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048424" version="1" comment="go1.26-doc is &lt;1.26.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048425" version="1" comment="go1.26-libstd is &lt;1.26.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048426" version="1" comment="go1.26-race is &lt;1.26.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048642" version="1" comment="tomcat is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048643" version="1" comment="tomcat-admin-webapps is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048644" version="1" comment="tomcat-docs-webapp is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048645" version="1" comment="tomcat-el-3_0-api is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048646" version="1" comment="tomcat-embed is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048647" version="1" comment="tomcat-javadoc is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048648" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048649" version="1" comment="tomcat-jsvc is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048650" version="1" comment="tomcat-lib is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048651" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048652" version="1" comment="tomcat-webapps is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048653" version="1" comment="amazon-ssm-agent is &lt;3.3.2299.0-160000.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048658" version="1" comment="qemu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048659" version="1" comment="qemu-SLOF is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048661" version="1" comment="qemu-arm is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048662" version="1" comment="qemu-audio-alsa is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048663" version="1" comment="qemu-audio-dbus is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048664" version="1" comment="qemu-audio-jack is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048665" version="1" comment="qemu-audio-oss is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048669" version="1" comment="qemu-block-curl is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048670" version="1" comment="qemu-block-dmg is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048671" version="1" comment="qemu-block-iscsi is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048672" version="1" comment="qemu-block-nfs is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048674" version="1" comment="qemu-block-ssh is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048677" version="1" comment="qemu-doc is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048678" version="1" comment="qemu-extra is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048679" version="1" comment="qemu-guest-agent is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048680" version="1" comment="qemu-headless is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048682" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048683" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048684" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048685" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048686" version="1" comment="qemu-hw-usb-host is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048687" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048688" version="1" comment="qemu-hw-usb-smartcard is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048689" version="1" comment="qemu-img is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048690" version="1" comment="qemu-ipxe is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048691" version="1" comment="qemu-ivshmem-tools is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048692" version="1" comment="qemu-ksm is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048693" version="1" comment="qemu-lang is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048694" version="1" comment="qemu-linux-user is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048695" version="1" comment="qemu-microvm is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048696" version="1" comment="qemu-ppc is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048697" version="1" comment="qemu-pr-helper is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048698" version="1" comment="qemu-s390x is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048699" version="1" comment="qemu-seabios is &lt;10.0.81.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048700" version="1" comment="qemu-skiboot is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048702" version="1" comment="qemu-tools is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048709" version="1" comment="qemu-vgabios is &lt;10.0.81.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048710" version="1" comment="qemu-vhost-user-gpu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048711" version="1" comment="qemu-vmsr-helper is &lt;10.0.8-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048712" version="1" comment="qemu-x86 is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049112" version="1" comment="keylime-ima-policy is &lt;0.2.8+116-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049113" version="1" comment="rust-keylime is &lt;0.2.8+116-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049114" version="1" comment="MozillaFirefox is &lt;140.8.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049116" version="1" comment="MozillaFirefox-devel is &lt;140.8.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049117" version="1" comment="MozillaFirefox-translations-common is &lt;140.8.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049118" version="1" comment="MozillaFirefox-translations-other is &lt;140.8.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049119" version="1" comment="docker-stable is &lt;24.0.9_ce-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049120" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049121" version="1" comment="docker-stable-buildx is &lt;0.25.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049122" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049123" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049124" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030561" version="1" comment="MozillaFirefox is &lt;140.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030563" version="1" comment="MozillaFirefox-devel is &lt;140.5.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030564" version="1" comment="MozillaFirefox-translations-common is &lt;140.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030565" version="1" comment="MozillaFirefox-translations-other is &lt;140.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050011" version="1" comment="python313-maturin is &lt;1.8.7-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050012" version="1" comment="libpng16-16 is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050165" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050166" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050167" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050168" version="1" comment="libpng16-devel is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050169" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050170" version="1" comment="libpng16-tools is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050171" version="1" comment="snpguest is &lt;0.10.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050013" version="1" comment="libsnmp40 is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050172" version="1" comment="net-snmp is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050173" version="1" comment="net-snmp-devel is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050174" version="1" comment="perl-SNMP is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050175" version="1" comment="python313-net-snmp is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050014" version="1" comment="snmp-mibs is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050015" version="1" comment="libsoup-3_0-0 is &lt;3.6.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050176" version="1" comment="libsoup-devel is &lt;3.6.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050177" version="1" comment="libsoup-lang is &lt;3.6.6-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050178" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050179" version="1" comment="libjxl-devel is &lt;0.11.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050181" version="1" comment="libjxl0_11 is &lt;0.11.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050182" version="1" comment="libjxl0_11-x86-64-v3 is &lt;0.11.2-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050183" version="1" comment="cosign is &lt;3.0.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050187" version="1" comment="busybox is &lt;1.37.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050188" version="1" comment="busybox-static is &lt;1.37.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050189" version="1" comment="busybox-warewulf3 is &lt;1.37.0-160000.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050190" version="1" comment="postgresql17 is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050191" version="1" comment="postgresql17-contrib is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050192" version="1" comment="postgresql17-devel is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050193" version="1" comment="postgresql17-docs is &lt;17.9-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050196" version="1" comment="postgresql17-plperl is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050197" version="1" comment="postgresql17-plpython is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050198" version="1" comment="postgresql17-pltcl is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050199" version="1" comment="postgresql17-server is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050200" version="1" comment="postgresql17-server-devel is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050202" version="1" comment="libprotobuf-lite28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050016" version="1" comment="libprotobuf28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050203" version="1" comment="libprotoc28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050017" version="1" comment="libutf8_range-28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050204" version="1" comment="protobuf-devel is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050205" version="1" comment="protobuf-java is &lt;28.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050209" version="1" comment="python313-protobuf is &lt;5.28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050018" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050019" version="1" comment="librsvg-2-2 is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050702" version="1" comment="librsvg-devel is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050703" version="1" comment="rsvg-convert is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050704" version="1" comment="rsvg-thumbnailer is &lt;2.60.2-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050705" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050706" version="1" comment="libpoppler-cpp2 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050707" version="1" comment="libpoppler-devel is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050708" version="1" comment="libpoppler-glib8 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050709" version="1" comment="libpoppler-qt6-3 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050710" version="1" comment="libpoppler-qt6-devel is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050711" version="1" comment="libpoppler148 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050712" version="1" comment="poppler-tools is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050713" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050714" version="1" comment="keylime-config is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050715" version="1" comment="keylime-firewalld is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050716" version="1" comment="keylime-logrotate is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050717" version="1" comment="keylime-registrar is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050718" version="1" comment="keylime-tenant is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050719" version="1" comment="keylime-tpm_cert_store is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050720" version="1" comment="keylime-verifier is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050721" version="1" comment="python313-keylime is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050722" version="1" comment="libsodium-devel is &lt;1.0.20-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050020" version="1" comment="libsodium26 is &lt;1.0.20-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050021" version="1" comment="ucode-intel is &lt;20260210-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050723" version="1" comment="gstreamer-plugins-ugly is &lt;1.26.7-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050724" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.26.7-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050725" version="1" comment="gvim is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050726" version="1" comment="vim is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050727" version="1" comment="vim-data is &lt;9.2.0110-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050022" version="1" comment="vim-data-common is &lt;9.2.0110-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050023" version="1" comment="vim-small is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050728" version="1" comment="xxd is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050024" version="1" comment="curl is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050729" version="1" comment="curl-zsh-completion is &lt;8.14.1-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050730" version="1" comment="libcurl-devel is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050731" version="1" comment="libcurl-devel-doc is &lt;8.14.1-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050732" version="1" comment="libcurl-mini4 is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050025" version="1" comment="libcurl4 is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050733" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050734" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050735" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050736" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050737" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050738" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050739" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050740" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050741" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050742" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050743" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050744" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050745" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050746" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030566" version="1" comment="libpoppler-cpp2 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030567" version="1" comment="libpoppler-devel is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030569" version="1" comment="libpoppler-glib8 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030572" version="1" comment="libpoppler-qt6-3 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030573" version="1" comment="libpoppler-qt6-devel is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030574" version="1" comment="libpoppler148 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030575" version="1" comment="poppler-tools is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030576" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050026" version="1" comment="python313-tornado6 is &lt;6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050747" version="1" comment="python313-orjson is &lt;3.10.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050748" version="1" comment="libecpg6 is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050749" version="1" comment="libpq5 is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050750" version="1" comment="postgresql18 is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050751" version="1" comment="postgresql18-contrib is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050752" version="1" comment="postgresql18-devel is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050753" version="1" comment="postgresql18-docs is &lt;18.3-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050754" version="1" comment="postgresql18-plperl is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050755" version="1" comment="postgresql18-plpython is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050756" version="1" comment="postgresql18-pltcl is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050757" version="1" comment="postgresql18-server is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050758" version="1" comment="postgresql18-server-devel is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050759" version="1" comment="harfbuzz-devel is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050760" version="1" comment="harfbuzz-tools is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050761" version="1" comment="libharfbuzz-cairo0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050027" version="1" comment="libharfbuzz-gobject0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050762" version="1" comment="libharfbuzz-icu0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050763" version="1" comment="libharfbuzz-subset0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050028" version="1" comment="libharfbuzz0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050029" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050764" version="1" comment="libexiv2-28 is &lt;0.28.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050765" version="1" comment="libexiv2-28-x86-64-v3 is &lt;0.28.8-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051784" version="1" comment="libnghttp2-14 is &lt;1.64.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051785" version="1" comment="libnghttp2-devel is &lt;1.64.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051786" version="1" comment="nghttp2 is &lt;1.64.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051787" version="1" comment="tomcat11 is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051788" version="1" comment="tomcat11-admin-webapps is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051789" version="1" comment="tomcat11-doc is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051790" version="1" comment="tomcat11-docs-webapp is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051791" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051792" version="1" comment="tomcat11-embed is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051793" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051794" version="1" comment="tomcat11-jsvc is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051795" version="1" comment="tomcat11-lib is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051796" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051797" version="1" comment="tomcat11-webapps is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051798" version="1" comment="389-ds is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051799" version="1" comment="389-ds-devel is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051800" version="1" comment="389-ds-snmp is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051801" version="1" comment="lib389 is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051802" version="1" comment="libsvrcore0 is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052261" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052262" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052263" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051838" version="1" comment="kernel-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051839" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051841" version="1" comment="kernel-azure is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051842" version="1" comment="kernel-azure-extra is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051844" version="1" comment="kernel-azure-vdso is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051845" version="1" comment="kernel-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051846" version="1" comment="kernel-default-base is &lt;6.12.0-160000.27.1.160000.2.8 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051847" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051991" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.27.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051849" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051850" version="1" comment="kernel-docs is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051851" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051852" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051853" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051854" version="1" comment="kernel-macros is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051856" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051861" version="1" comment="kernel-source is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051862" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051863" version="1" comment="kernel-syms is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051864" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.27.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051993" version="1" comment="kernel-livepatch-6_12_0-160000_27-default is &lt;1-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051873" version="1" comment="python313-black is &lt;25.1.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051874" version="1" comment="python313-pyasn1 is &lt;0.6.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051875" version="1" comment="python313-pyOpenSSL is &lt;25.0.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249427"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 6.12.0-160000.9-default is currently running" id="oval:org.opensuse.security:tst:2010051995" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009249454"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051996" version="1" comment="kernel-livepatch-6_12_0-160000_9-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051997" version="1" comment="kernel-livepatch-6_12_0-160000_9-default is &lt;2-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051998" version="1" comment="kernel-livepatch-6_12_0-160000_8-default is &lt;3-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051876" version="1" comment="ffmpeg-7 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051885" version="1" comment="libavcodec61 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051886" version="1" comment="libavdevice61 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051887" version="1" comment="libavfilter10 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051888" version="1" comment="libavformat61 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051889" version="1" comment="libavutil59 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051890" version="1" comment="libpostproc58 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051891" version="1" comment="libswresample5 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051892" version="1" comment="libswscale8 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051893" version="1" comment="python313-ldap is &lt;3.4.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051999" version="1" comment="python313-PyJWT is &lt;2.12.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052000" version="1" comment="kernel-livepatch-6_12_0-160000_5-default is &lt;8-160000.4.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052001" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;6-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052002" version="1" comment="kernel-livepatch-6_12_0-160000_7-default is &lt;4-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052264" version="1" comment="fetchmail is &lt;6.5.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052265" version="1" comment="libIex-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052266" version="1" comment="libIex-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052267" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052268" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052269" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052270" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052271" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052272" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052273" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052274" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052275" version="1" comment="openexr is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052276" version="1" comment="openexr-doc is &lt;3.2.2-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052277" version="1" comment="net-tools is &lt;2.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052278" version="1" comment="net-tools-lang is &lt;2.10-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052590" version="1" comment="docker-compose is &lt;2.33.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052591" version="1" comment="MozillaFirefox is &lt;140.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052593" version="1" comment="MozillaFirefox-devel is &lt;140.9.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052594" version="1" comment="MozillaFirefox-translations-common is &lt;140.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052595" version="1" comment="MozillaFirefox-translations-other is &lt;140.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030577" version="1" comment="runc is &lt;1.3.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052604" version="1" comment="tomcat10 is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052605" version="1" comment="tomcat10-admin-webapps is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052606" version="1" comment="tomcat10-doc is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052607" version="1" comment="tomcat10-docs-webapp is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052608" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052609" version="1" comment="tomcat10-embed is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052610" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052611" version="1" comment="tomcat10-jsvc is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052612" version="1" comment="tomcat10-lib is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052613" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052614" version="1" comment="tomcat10-webapps is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052615" version="1" comment="gnutls is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052616" version="1" comment="libgnutls-devel is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052618" version="1" comment="libgnutls30 is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052619" version="1" comment="libgnutlsxx-devel is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052620" version="1" comment="libgnutlsxx30 is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052621" version="1" comment="postgresql16 is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052622" version="1" comment="postgresql16-contrib is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052623" version="1" comment="postgresql16-devel is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052624" version="1" comment="postgresql16-docs is &lt;16.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052627" version="1" comment="postgresql16-plperl is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052628" version="1" comment="postgresql16-plpython is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052629" version="1" comment="postgresql16-pltcl is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052630" version="1" comment="postgresql16-server is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052631" version="1" comment="postgresql16-server-devel is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052633" version="1" comment="expat is &lt;2.7.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052634" version="1" comment="libexpat-devel is &lt;2.7.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052635" version="1" comment="libexpat1 is &lt;2.7.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052636" version="1" comment="postgresql13 is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052637" version="1" comment="postgresql13-contrib is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052638" version="1" comment="postgresql13-devel is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052639" version="1" comment="postgresql13-docs is &lt;13.23-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052642" version="1" comment="postgresql13-plperl is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052643" version="1" comment="postgresql13-plpython is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052644" version="1" comment="postgresql13-pltcl is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052645" version="1" comment="postgresql13-server is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052646" version="1" comment="postgresql13-server-devel is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052651" version="1" comment="gvfs is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052656" version="1" comment="gvfs-backends is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052657" version="1" comment="gvfs-fuse is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052658" version="1" comment="gvfs-lang is &lt;1.59.90-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052659" version="1" comment="libgoa-1_0-0 is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052660" version="1" comment="libgoa-backend-1_0-2 is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052661" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030578" version="1" comment="alloy is &lt;1.11.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052662" version="1" comment="kea is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052663" version="1" comment="kea-devel is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052664" version="1" comment="kea-doc is &lt;3.0.3-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052665" version="1" comment="kea-hooks is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052666" version="1" comment="libkea-asiodns62 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052667" version="1" comment="libkea-asiolink88 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052668" version="1" comment="libkea-cc83 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052669" version="1" comment="libkea-cfgrpt3 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052670" version="1" comment="libkea-config84 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052671" version="1" comment="libkea-cryptolink64 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052672" version="1" comment="libkea-d2srv63 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052673" version="1" comment="libkea-database76 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052674" version="1" comment="libkea-dhcp109 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052675" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052676" version="1" comment="libkea-dhcpsrv131 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052677" version="1" comment="libkea-dns71 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052678" version="1" comment="libkea-eval84 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052679" version="1" comment="libkea-exceptions45 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052680" version="1" comment="libkea-hooks121 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052681" version="1" comment="libkea-http87 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052682" version="1" comment="libkea-log-interprocess3 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052683" version="1" comment="libkea-log75 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052684" version="1" comment="libkea-mysql88 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052685" version="1" comment="libkea-pgsql88 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052686" version="1" comment="libkea-process91 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052687" version="1" comment="libkea-stats53 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052688" version="1" comment="libkea-tcp33 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052689" version="1" comment="libkea-util-io12 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052690" version="1" comment="libkea-util102 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052691" version="1" comment="python3-kea is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052692" version="1" comment="himmelblau is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052693" version="1" comment="himmelblau-qr-greeter is &lt;2.3.8+git0.dec3693-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052694" version="1" comment="himmelblau-sshd-config is &lt;2.3.8+git0.dec3693-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052695" version="1" comment="himmelblau-sso is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052696" version="1" comment="libnss_himmelblau2 is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052697" version="1" comment="pam-himmelblau is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052809" version="1" comment="python313-Pillow is &lt;11.3.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052810" version="1" comment="python313-Pillow-tk is &lt;11.3.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052811" version="1" comment="perl-XML-Parser is &lt;2.470.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053417" version="1" comment="dnsdist is &lt;1.9.11-160000.1.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053188" version="1" comment="cockpit-repos is &lt;4.7-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032869" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.6.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032870" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.6.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032871" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.6.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025436" version="1" comment="kernel-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025438" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025440" version="1" comment="kernel-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031628" version="1" comment="kernel-default-base is &lt;6.12.0-160000.6.1.160000.2.4 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025442" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025850" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.6.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025444" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025446" version="1" comment="kernel-docs is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025447" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025448" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025450" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025451" version="1" comment="kernel-macros is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025453" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025459" version="1" comment="kernel-source is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025460" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025461" version="1" comment="kernel-syms is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025462" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.6.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031629" version="1" comment="liblasso-devel is &lt;2.8.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031630" version="1" comment="liblasso3 is &lt;2.8.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031701" version="1" comment="mysql-connector-java is &lt;9.3.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031702" version="1" comment="curl is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031704" version="1" comment="curl-zsh-completion is &lt;8.14.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031705" version="1" comment="libcurl-devel is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031706" version="1" comment="libcurl-devel-doc is &lt;8.14.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032872" version="1" comment="libcurl-mini4 is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031707" version="1" comment="libcurl4 is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032873" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.7.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032874" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.7.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032875" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.7.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031740" version="1" comment="kernel-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031742" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031744" version="1" comment="kernel-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031746" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032145" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.7.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031748" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031750" version="1" comment="kernel-docs is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031751" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031752" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031754" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031755" version="1" comment="kernel-macros is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031757" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031763" version="1" comment="kernel-source is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031764" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031765" version="1" comment="kernel-syms is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031766" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.7.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032041" version="1" comment="xwayland is &lt;24.1.6-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032042" version="1" comment="xwayland-devel is &lt;24.1.6-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032044" version="1" comment="libvirt-client is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032045" version="1" comment="libvirt-client-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032046" version="1" comment="libvirt-daemon is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032047" version="1" comment="libvirt-daemon-common is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032048" version="1" comment="libvirt-daemon-config-network is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032049" version="1" comment="libvirt-daemon-config-nwfilter is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032050" version="1" comment="libvirt-daemon-driver-network is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032051" version="1" comment="libvirt-daemon-driver-nodedev is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032052" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032053" version="1" comment="libvirt-daemon-driver-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032054" version="1" comment="libvirt-daemon-driver-secret is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032055" version="1" comment="libvirt-daemon-driver-storage is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032056" version="1" comment="libvirt-daemon-driver-storage-core is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032057" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032058" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032059" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032060" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032061" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032062" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032063" version="1" comment="libvirt-daemon-hooks is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032064" version="1" comment="libvirt-daemon-lock is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032065" version="1" comment="libvirt-daemon-log is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032066" version="1" comment="libvirt-daemon-plugin-lockd is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032067" version="1" comment="libvirt-daemon-proxy is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032068" version="1" comment="libvirt-daemon-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032069" version="1" comment="libvirt-devel is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032070" version="1" comment="libvirt-doc is &lt;11.4.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032071" version="1" comment="libvirt-libs is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032072" version="1" comment="libvirt-nss is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032073" version="1" comment="libvirt-ssh-proxy is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032075" version="1" comment="tomcat11 is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032076" version="1" comment="tomcat11-admin-webapps is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032077" version="1" comment="tomcat11-doc is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032078" version="1" comment="tomcat11-docs-webapp is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032079" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032080" version="1" comment="tomcat11-embed is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032081" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032082" version="1" comment="tomcat11-jsvc is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032083" version="1" comment="tomcat11-lib is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032084" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032085" version="1" comment="tomcat11-webapps is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032086" version="1" comment="dovecot24 is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032087" version="1" comment="dovecot24-backend-mysql is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032088" version="1" comment="dovecot24-backend-pgsql is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032089" version="1" comment="dovecot24-backend-sqlite is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032090" version="1" comment="dovecot24-devel is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032091" version="1" comment="dovecot24-fts is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032093" version="1" comment="dovecot24-fts-solr is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032094" version="1" comment="himmelblau is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032095" version="1" comment="himmelblau-qr-greeter is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032096" version="1" comment="himmelblau-sshd-config is &lt;0.9.23+git.0.9776141-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032097" version="1" comment="himmelblau-sso is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032098" version="1" comment="libnss_himmelblau2 is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032099" version="1" comment="pam-himmelblau is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032319" version="1" comment="openssh is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032320" version="1" comment="openssh-askpass-gnome is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032321" version="1" comment="openssh-cavs is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032322" version="1" comment="openssh-clients is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032323" version="1" comment="openssh-common is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032324" version="1" comment="openssh-helpers is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032325" version="1" comment="openssh-server is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032326" version="1" comment="openssh-server-config-rootlogin is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032327" version="1" comment="java-21-openjdk is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032328" version="1" comment="java-21-openjdk-demo is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032329" version="1" comment="java-21-openjdk-devel is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032330" version="1" comment="java-21-openjdk-headless is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032331" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.9.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032332" version="1" comment="java-21-openjdk-jmods is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032333" version="1" comment="java-21-openjdk-src is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032334" version="1" comment="java-17-openjdk is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032335" version="1" comment="java-17-openjdk-demo is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032336" version="1" comment="java-17-openjdk-devel is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032337" version="1" comment="java-17-openjdk-headless is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032338" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.17.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032339" version="1" comment="java-17-openjdk-jmods is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032340" version="1" comment="java-17-openjdk-src is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032401" version="1" comment="strongswan is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032402" version="1" comment="strongswan-doc is &lt;6.0.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032403" version="1" comment="strongswan-fips is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032404" version="1" comment="strongswan-ipsec is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032405" version="1" comment="strongswan-mysql is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032406" version="1" comment="strongswan-nm is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032407" version="1" comment="strongswan-sqlite is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032408" version="1" comment="python313-cbor2 is &lt;5.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032507" version="1" comment="libmozjs-128-0 is &lt;128.14.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032508" version="1" comment="mozjs128 is &lt;128.14.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032509" version="1" comment="mozjs128-devel is &lt;128.14.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033326" version="1" comment="libIex-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033327" version="1" comment="libIex-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033328" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033329" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033330" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033331" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033332" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033333" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033334" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033335" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033336" version="1" comment="openexr is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033338" version="1" comment="openexr-doc is &lt;3.2.2-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033339" version="1" comment="binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033340" version="1" comment="binutils-devel is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033444" version="1" comment="bpftool is &lt;7.5.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033445" version="1" comment="bpftool-bash-completion is &lt;7.5.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033368" version="1" comment="gprofng is &lt;2.45-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033369" version="1" comment="libctf-nobfd0 is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033370" version="1" comment="libctf0 is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036936" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.8.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036937" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.8.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036938" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.8.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029125" version="1" comment="sle-ha-release is ==16.0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038481" version="1" comment="hawk2 is &lt;2.7.0+git.1742310530.bfcd0e2c-160000.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038482" version="1" comment="haproxy is &lt;3.2.0+git0.e134140d2-160000.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042239" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.9.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042240" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.9.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042241" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.9.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047383" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.26.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047384" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.26.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047385" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.26.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047386" version="1" comment="haproxy is &lt;3.2.12+git0.6011f448e-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052279" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.27.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052280" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.27.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052281" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.27.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029122" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.6.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029123" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.6.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029124" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.6.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032876" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.7.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032877" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.7.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032878" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.7.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245289"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvrcore0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfcgi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-KHR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-vc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libOpenCL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libRusticlOpenCL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libva</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-vulkan-device-select</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-vulkan-overlay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_radeonsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_virtio_gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_broadcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_freedreno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_lvp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-cloud-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-pppoe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wwan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenIPMI0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenIPMIui1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-4.1-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-6.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-6_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-6_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKitWebProcessExtension-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_1-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk4-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk-6_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-malloccheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-wsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-yama-enable-ptrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aardvark-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>agama-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alloy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-topology-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatopology2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-ssm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-xalan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-imageio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jakartamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-testutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aom-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-net-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-text-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-vfs2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-pdfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-pdfbox-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fpm-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-0-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arm-trusted-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arm-trusted-firmware-rpi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arm-trusted-firmware-rpi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfa1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-libevent1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Avahi-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avif-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-libavif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavif16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-nitro-enclaves-binaryblobs-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-nitro-enclaves-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-group-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-loadables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcm43xx-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bison</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bison-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cblas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cblas-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblas3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcblas3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapack3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapacke3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenblas_openmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenblas_openmp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenblas_pthreads-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenblas_pthreads0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenblas_serial-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenblas_serial0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas_openmp-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas_pthreads-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas_serial-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-auto-enable-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-obexd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost1_86_0-jam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_charconv1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_charconv1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_charconv1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_container1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_container1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_container1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_context1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_context1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_contract1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_contract1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_coroutine1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_coroutine1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_fiber1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_fiber1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_headers1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_json1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_json1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_json1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_log1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_log1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_nowide1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_nowide1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_nowide1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_process1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_process1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_process1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_stacktrace1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_stacktrace1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_stacktrace1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_type_erasure1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_type_erasure1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_type_erasure1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_url1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_url1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_url1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_86_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_86_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_86_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bosh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btcflash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdda2wav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdrecord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdrdeflt1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdeflt1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedc_ecc1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedc_ecc_dec1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfile1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfind4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libparanoia1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librmt-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librmt1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librscg1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libscg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libscg1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libscgcmd1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libschily-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libschily-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libschily2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxtermcap1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mkisofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schily-ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schily-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schily-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-jmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pkix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-classgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-warewulf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-audit-advisory-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>checkbashisms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-empty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cifscreds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wb-cifs-idmap-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-milter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclammspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmake-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmake-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-storaged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-color-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colord-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colorhug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColordGtk-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrackd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-single</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-gcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie-anacron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cscope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dcerpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-gpupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-mini4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap-auxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dav1d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dav1d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdav1d7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb_java-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-glib-1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcraw-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-keama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dirmngr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-tpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>distribution-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsdist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-compose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-ima</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-scrub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse2fs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed25519-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed25519-java-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>editorconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeditorconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-eln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-rabbitmq-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libespeak-ng1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++10-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC12-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-remote-flathub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libflatpak0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Flatpak-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-server-proxy3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdtk0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuwac0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libct4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsybdb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdsodbc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-profile-tti35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrcares0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrsnmp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrzmq0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmgmt_be_nb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftbench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgamma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftmulti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftsdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftvalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libulockmgr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Fwupd-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GCab-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixdata-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-libheif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-aom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-dav1d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-rav1e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-svtenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-convert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-its-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-broadway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgirepository-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GIRepository-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GLib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GLibUnix-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GModule-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GObject-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gio-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-gconv-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-autoar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-gtk-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoar-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoarGtk-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3_0-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeBG-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeDesktop-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeDesktop-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeRR-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-remote-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-remote-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-cloud-sap-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-gson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-gson-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-osconfig-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>govulncheck-vulndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgmepp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgmepp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqgpgmeqt6-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqgpgmeqt6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-gpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gptfdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gptfdisk-fixparts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc++1_59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc1_59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupb36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsasl-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsasl18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-transcoder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstanalytics-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecs-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcuda-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmse-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplay-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttranscoder-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstva-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvulkan-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtcnice-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-CudaGst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAnalytics-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstBadAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCodecs-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCuda-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMse-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlay-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTranscoder-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkan-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanXCB-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstWebRTC-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLEGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLX11-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava-testlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-win-reg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-3_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_6-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUPnP-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-cairo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-subset0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-HarfBuzz-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-qr-greeter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-sshd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-sso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_himmelblau2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-himmelblau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_7-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwloc-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhwloc15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-dict-emoji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu77</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu77-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu77-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libImlib2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>indent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>indent-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiperf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool-bmc-snmp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javamail-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbigkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jcat-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjcat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjcat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Jcat-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jcl-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jul-to-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-ext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-jcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-jdk14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-reload4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-sources</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-connector-factory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-pageant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-sshagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-svnkit-trilead-ssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-usocket-jna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-usocket-nc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trilead-ssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trilead-ssh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd-legacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkbdfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkeymap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkfont0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiodns62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiolink87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cc82</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cfgrpt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-config83</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cryptolink63</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-d2srv63</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-database76</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp109</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp_ddns68</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv129</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dns71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-eval84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-exceptions45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks118</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-http87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-log-interprocess3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-log75</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-mysql88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-pgsql88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-process90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-stats53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-tcp33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util-io12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util101</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-kea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-amdgpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath10k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath11k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath12k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-atheros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bnx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-brcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-chelsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-dpaa2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-i915</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-iwlwifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-liquidio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mellanox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mwifiex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-prestera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-realtek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-sound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ueagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-usb-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-registrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tenant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tpm_cert_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-verifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-ima-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-spake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-mp3rtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lastlog2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblastlog2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblastlog2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-tty-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DNS-LDNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Bluetooth6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Nfc6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-docs-qch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-connectivity-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Concurrent6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Core6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6DBus6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Gui6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Network6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6OpenGL6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6OpenGLWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6PrintSupport6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Sql6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Test6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Widgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Xml6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-docs-qch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-core-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-dbus-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-docs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-exampleicons-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-gui-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-kmssupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-kmssupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkinformation-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkinformation-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-opengl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-opengl-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-openglwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformsupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformsupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformtheme-xdgdesktopportal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-test-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-widgets-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-xml-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6NetworkAuth6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-docs-qch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Svg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6SvgWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-svg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-svg-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-svg-docs-qch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-svg-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_ttf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouchDll1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libZXing3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libassimp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_btrfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_btrfs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_crypto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_crypto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_dm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_dm3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_fs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_loop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_loop3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm-dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm-dbus3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mdraid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mdraid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mpath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mpath3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_nvme3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_part-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_part3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_swap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_swap3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_utils3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-BlockDev-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-caca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpsx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660++0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgraph6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvc6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpathplan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjose-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjose0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjson1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-default-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-openSUSE-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>registries-conf-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>registries-conf-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpp-httplib0_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcue2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_amdgpu1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_etnaviv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_exynos1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_freedreno1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_intel1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_nouveau2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_radeon1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm_tegra0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libekmfweb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmipclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osasnmpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-chreipl-fcp-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-genprotimg-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-hmcdrvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-zdsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp6_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_1-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-28-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexslt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtspserver-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtspServer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GTop-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-appliance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-typelib-Guestfs-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-xfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed6-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle8-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-1_0-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_11-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_4-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua54-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua54-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmailutils9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-delivery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-imap4d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-mh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-notify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailutils-pop3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbprivate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmilter1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-128-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs128</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs128-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpg123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libout123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsyn123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-openal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-portaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mspack-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysofa1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfsidmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g89</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnutclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnutclientstub1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnutscan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_oath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodbc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonig5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oniguruma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpt123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-fips-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-3_5-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-25_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboqs7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborc-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Libosinfo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-OSTree-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_gui2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_import1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_mmv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_trace2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_web1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-hacluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nutcracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-resctrl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpkgconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpkgconf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkgconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkgconf-m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkgconf-pkg-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-agent-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-gobject-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkexec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler148</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproc2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-c1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpxbackend-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_13-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_13-1_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-base-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb100</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librav1e0_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rav1e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zram-generator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpmbuild10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librrd8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby3_4-3_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby3.4-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-seccomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sha1collisiondetection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsharpyuv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspiro-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspiro1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrt1_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsubid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsubid5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-homed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-portable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-resolved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtree-sitter0_25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtree-sitter0_25-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tree-sitter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-cmd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-i2c-helper0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-mssim0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-pcap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-spi-helper0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-spidev0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-swtpm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-coredump0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-ptrace0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-setjmp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liburiparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbguard1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd-2_0-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbredirparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_trace1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-lockd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-ssh-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-containerinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte-2_91-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Vte-2_91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Vte-3_91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-tools-gtk4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dbe0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinput0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbregistry-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbregistry0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-lite11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yaml-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbar0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-zbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd-gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzvbi-chains0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzvbi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zvbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zvbi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-plugin-appdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-utils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-curl-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-linuxdisk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-nbd-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-python-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-ssh-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-vddk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools-deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nv-prefer-signed-open-driver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-64kb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-cuda-64kb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-cuda-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-cuda-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-cuda-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server-config-rootlogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oqs-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-manpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Extract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-MakeMaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-MIME-Charset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-ASN1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Spreadsheet-ParseExcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions-zypp-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-composer2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pecl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podmansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-newrole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-modem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-M2Crypto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted-all_non_platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted-conch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted-conch_nacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted-contextvars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted-http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Twisted-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-WebOb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-WebOb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bottle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gevent-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gunicorn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-gunicorn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-marshmallow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rtslib-fb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tqdm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-CairoSVG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-FontTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Js2Py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-asyncpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-black</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cmarkgfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-eventlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-fastapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-h11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-hpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-httptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-httpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-markdown-it-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-mistune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nh3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-orjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pycares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pycryptodome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pydantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-python-jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-python-jose-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-python-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ruamel.yaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-starlette</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli-fb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-urllib3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-validators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-waitress-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-websockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-yarl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-zipp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-SLOF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-oss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-s390x-virtio-gpu-ccw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-smartcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ivshmem-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-microvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-pr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-skiboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vhost-user-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vmsr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raspberrypi-firmware-dt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rekor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sca-patterns-sle12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sca-patterns-sle15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sccache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sevctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtiofsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-plugin-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-policy-sudo-auth-self</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-policy-wheel-auth-self</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-group-sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools-scriptlets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-velociraptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velociraptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velociraptor-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-sdt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tmux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-el-5_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsp-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-servlet-6_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-el-6_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-jsp-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-servlet-6_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-atomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-nfv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-openshift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-realtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-spectrumscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils-systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpiarm64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpiarm64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>umoci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-client-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-compat-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-custom-parser-example</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-engine-scripting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m-inline-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>x3270</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-xsltc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-css</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-rasterizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-slideshow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-squiggle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-svgpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-ttf2svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-commons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-commons-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-fop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-resize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh-htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-aptitude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-limited</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-open</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-secure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-websafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.92</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.92</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jaraco.context</name>
	</rpminfo_object>
	<unix-def:uname_object xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:obj:2009060496" version="1"/>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-subscriptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-h2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkbcomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkbcomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-filelock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-maturin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-machines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked2nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-repos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3-livepatches</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-livepatches</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autogen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoopts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopts25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-azure-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-libav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-rs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvalidate-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstValidate-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiolink88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cryptolink64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv130</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks119</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snpguest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cc83</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-config84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv131</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks121</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-process91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util102</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cbor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-ha-release</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6~git86.dce421a0d-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">16.0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.2.0-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.56+git.0a3a991-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.5-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.87+git20250429.1cad3bc-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.13.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17+359.34bc8cc0b-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2299.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.15-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.29-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.63-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.17-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.11-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.14-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2~git0.6e8512e-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.37-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180314-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.29-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.79-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.86.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.10.16-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02~a10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.5-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.88.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.2~git0.18e58c2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250304-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3~git0.ee7d7ef-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.3-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.31.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:340-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.27-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4.0+git9739-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0_k6.12.0_160000.5-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.3+git.401.c70158430cc-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.28-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.28.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.P1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.28-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.90-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3.2_ce-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.1-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.21-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:059+suse.696.g950c4798-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.47.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.192-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:30.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.1.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.46-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.19-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230101-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.17-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.15-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.60.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:48.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.49+14-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.05.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.51.0-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.80.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:44.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:48.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:48.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.0-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250116.00-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250416.02-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20250814T182633-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:33.2.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.57.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1406-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.22+git.0.d41f700-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.24-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.14-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.32-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.3-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19.13.gbe11d94-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240905-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.3-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.16.0-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.8.0-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.36-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.22-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.9-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:217.293.v56de4d4d3515-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.3-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.6-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250206-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250718-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250206-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250424-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250523-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250714-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250627-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250623-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250708-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250609-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250717-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250516-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250721-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7+117-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0+183+suse.3973293-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.100-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.4-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:668-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.13-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.27-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.17-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.12-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta20-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.73-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.49.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.2.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.18-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250409-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.124-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.6-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.12-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.25-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2304.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.112-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.54.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41.3+4-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.18-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.3-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0+190git.20230705-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.4.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.8.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.18.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.20250531-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.20250503-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.24-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.10.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.11.12-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.12-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.03.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.41-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.45-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:123-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.04.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8+20230721.002171b-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.10.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4+git20180804.fff99cd-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.16-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.0+2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.34-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240903-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.50.4-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:257.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20.0-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.29-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-160000.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.1-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.50.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.14-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.13-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.148-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.93-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.44-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.37.17-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.20240209-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.38-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.36-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25-160000.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.92-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.65.06-160000.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.76.05-160000.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.65.06_k6.12.0_160000.5-160000.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.76.05_k6.12.0_160000.5-160000.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0p2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202502-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.42.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.88-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.70-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.013.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.993-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.670.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.000003-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.340.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.050-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.647.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.350.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.180000-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.830.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.140.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.660.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0210-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.530.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.903.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1699_20250120-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:42.7.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.22-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.14-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.45.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.40-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.4.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.0.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.67.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.53.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.44-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.74-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.16-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.1.31-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.10.27-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:44.0.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.17-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.10-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.20-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.18-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.29.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.3-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31.16.3_3_g3d33c746-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1+0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.05.02-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2502.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.1~0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1~22-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.2-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.8-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.74-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.17p1-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.60-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.7.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.4.git152.fb24dfd-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250417_1.11.10-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.10.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5a-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.108-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.44-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.10-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1.0+git.889387b-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.04-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250812-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20230121-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.2-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:393-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.6-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.93-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.13.0+40-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.71.16.3_3_g3d33c746-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1.160000.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230101-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230101-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.8.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.8.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0+git.1742310530.bfcd0e2c-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.18-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.63-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.63-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0+git0.e134140d2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.111-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.15-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.15-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.1.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.15-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.91.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.92.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.29.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-160000.3.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009246766" version="1">
   <unix-def:os_release operation="pattern match">6.12.0-160000.7-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.4.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009246941" version="1">
   <unix-def:os_release operation="pattern match">6.12.0-160000.5-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-160000.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.22-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.53.1-160000.3.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009247074" version="1">
   <unix-def:os_release operation="pattern match">6.12.0-160000.6-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20251203-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.3-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.1-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.1-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.5+git.431.dc5a539f124-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.5+git.431.dc5a539f124-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.10-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.2.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.2.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1.160000.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.45.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:340-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:340-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.16-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.93.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251009-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20251009-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:346-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.16-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.20-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.01-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1.160000.2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12+git0.6011f448e-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.15.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.27.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:117-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-160000.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.4.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009248379" version="1">
   <unix-def:os_release operation="pattern match">6.12.0-160000.8-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7+git0.6ab75814-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.18-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.19-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.115-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2299.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.81.16.3_3_g3d33c746-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8+116-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.4-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.9-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.9-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.28.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.60.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.60.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.04.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.14.0+0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260210-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.04.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6~git249.6688af9b2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1.160000.2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0-160000.3.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009249454" version="1">
   <unix-def:os_release operation="pattern match">6.12.0-160000.9-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-160000.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.52-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.90-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.90-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.58.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8+git0.dec3693-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8+git0.dec3693-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.470.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1.160000.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.6-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23+git.0.9776141-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23+git.0.9776141-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0p2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0+git.1742310530.bfcd0e2c-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0+git0.e134140d2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12+git0.6011f448e-160000.1.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
